From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E927538F954 for ; Tue, 28 Apr 2026 23:45:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.52 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777419924; cv=none; b=FUm1/VZmjRs8+PrA6jYF4y5/gRj7Zx39REa7NUbtXVAkJVB8I/ifg1FGREEzhXY2+lQ8eLhPLKRW45+1SeD+u4lzzme5b03YoCXmTxYMpkzD1iB4/oT0YkF7fb9K4KDK05seLan2cwnaMTpHVnhDXffbb0y23txY3uDlZCas3hg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777419924; c=relaxed/simple; bh=/jGlD16wwf+LKViAk9+60yGEYsvt20pYf1s5W49VBcc=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=r3Jp4qwQyBbJ9ipCfa0uiO5K4CCg9Lxy92srOq3ys8KnBnnhF7144YThNl0kBSLPFP12ueOLVfc2jigXTotABtdlaB0iUS6Mwzh+W959VnJC7ROaEfmV8zxO7tIkexSdij15bm/Bs4uRtidmSMFu+JIliKE6E0cevGbyuSqfdI4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com; spf=pass smtp.mailfrom=suse.com; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b=gkIIWA/u; arc=none smtp.client-ip=209.85.128.52 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b="gkIIWA/u" Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-488ab2db91aso168554945e9.3 for ; Tue, 28 Apr 2026 16:45:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=google; t=1777419921; x=1778024721; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=K+aXTQmh1BdIEplotgCd37rKzWea3sfpPCHgEBxHTL4=; b=gkIIWA/uYPP6SYeEH23GagW1QixS6UJkR3Sh3Sa/SCf6gNZjpnbbnRtUz+p3wY07Xi SHCYUyPTn2/ww4+7VBPY8/zkx0TGTy+fI86MFJHs0lh7chrarqNpRrCBUgyu9OvqWuV6 eRUK2FLvT8dCEA4C7W+nY9qTI5QzsBFDwiuneTOVir762wnNPUm7LhJeANVSFoO9ppwd JLjSa2QjkIfSLEiIIuHj6HXef0J+d9KjFfrJT8sr/eRslfiJ3t1IVQ+KqdHSjCNk8hOT vQYb3nKFhdVoN7wPN0MDQt5Oku5dTE/PZJ5yhgjkYwQLXLjFLigvQuCe+T8PPpGwzbFR N1Cw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777419921; x=1778024721; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=K+aXTQmh1BdIEplotgCd37rKzWea3sfpPCHgEBxHTL4=; b=IcoHHvtTIvBGVMWDzc/8w9iKj3RERpPdcKzTxpioR0Cfua8O1bvtPEGw0Y8W/MLDrW JCa/8aValpwG+32I/zB99NyQfEXuzBmNcaBVCDKs3x86CXqknkWtaJfse4BgeDoJD4Rj Gt/OytY46aofxBZPu/rXW74zW3g7lpcPR3QXSuS8HjceQR511IgwxIRCStMNr0nO11oI vHYk1EHPzfH/R+TsUmwq0JnkzdxXbwtbLn7oj6gZHBB46xsvahf76iM9yomrT4nOMLTQ A9eJenLS12btWHI8XE8QuuZYxKotUq/kXUrz2XUcRvKRQ0PRamX4Z7aDkJMBET40QOYU sDug== X-Gm-Message-State: AOJu0Ywnw77RaPbjGxDi6znjl1t4eJNezOZB5gnenbNRXIo3G68OG/Ys urGNM+QreUE+y9DMMj9j6b9QLGdL+eaObxlFE0A3RbWgWT70u2a+uB6l3SLsVBrvPJ8= X-Gm-Gg: AeBDieu9StU+CyE7cVaieajzI7N9bCgk9jh+Xr4k7m5F7BTkO76vGm+Z2EPi6WT/a+m I5l9y8sBTDIKz1QJk384CXYxTMGlKVL69LU3A86hdTklo1gbAPu2A+fixRdSIuElFmk4xBmrB3B 6eeLC+jmAIIb2vOBBLsc/aIXpUBqOVLL61pNIa68qJjCnoBelNWMwh2h+3kBF8sT4/NFeO1fC+Y iERGptoPFsiMHBkTjOGJbbAePR3ZByp0eTTck8bduoiRnASRYh+7FbROSRSkMFF5f/+1nxPBXnW aZY4F5d52tr9DD5dpzGxcSkpAYkAyhsaa8BQGtjMxPmc9VdO+DrWTMWUULxW3UXPJvN/nNMP/8r ic+Y0K8h9Du+2KSBWh2MLS9Zst+EJTtKL418DZkuCPdsaUfO8xWSoDjx6wQfPFtkN/lEaAg04YD c67xRQjGbcbweAV5kEzNw0lZhX X-Received: by 2002:a05:600c:3411:b0:489:1ff5:edda with SMTP id 5b1f17b1804b1-48a7b83efe0mr13303665e9.6.1777419921476; Tue, 28 Apr 2026 16:45:21 -0700 (PDT) Received: from localhost ([2804:7f0:b765:105d:ce28:aaff:fe86:149c]) by smtp.gmail.com with ESMTPSA id 71dfb90a1353d-573b6b7d1f5sm223312e0c.3.2026.04.28.16.45.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Apr 2026 16:45:20 -0700 (PDT) From: =?utf-8?q?Ricardo_B=2E_Marli=C3=A8re?= Date: Tue, 28 Apr 2026 20:45:02 -0300 Subject: [PATCH bpf-next v8 01/11] selftests/bpf: Add BPF_STRICT_BUILD toggle Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Message-Id: <20260428-selftests-bpf_misconfig-v8-1-bf02cf97dbcb@suse.com> References: <20260428-selftests-bpf_misconfig-v8-0-bf02cf97dbcb@suse.com> In-Reply-To: <20260428-selftests-bpf_misconfig-v8-0-bf02cf97dbcb@suse.com> To: Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Kumar Kartikeya Dwivedi , Song Liu , Yonghong Song , Jiri Olsa , Shuah Khan , Nathan Chancellor , Nick Desaulniers , Bill Wendling , Justin Stitt Cc: bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, Alan Maguire , "Ricardo B. Marliere" X-Mailer: b4 0.15.2 X-Developer-Signature: v=1; a=openssh-sha256; t=1777419912; l=1573; i=rbm@suse.com; h=from:subject:message-id; bh=/jGlD16wwf+LKViAk9+60yGEYsvt20pYf1s5W49VBcc=; b=U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgguRCc5X8/UX9M40lkMnr//aFGOhce x5ezt8MFNUFlqYAAAAGcGF0YXR0AAAAAAAAAAZzaGE1MTIAAABTAAAAC3NzaC1lZDI1NTE5AAAA QOUqofUorymPrniGUFcpYDh+n1AzuQbx8/XteyEdSb9PLdBuMBvuuQOl1gRUMnkqlmHx/7pLMyS mend0pXhQvwE= X-Developer-Key: i=rbm@suse.com; a=openssh; fpr=SHA256:pzhe0fJpYLz+3cZ33FFPhIfaUElk9CXPFFXmalIH+1g Distro kernels often lack BTF types or kernel features required by some BPF selftests, causing the build to abort on the first failure and preventing the remaining tests from running. Add BPF_STRICT_BUILD (default 1) to control build failure tolerance. When set to 0, the PERMISSIVE make variable is assigned a non-empty value that subsequent Makefile rules use to make individual build steps non-fatal. When set to 1 (the default), the build fails on any error, preserving the existing behavior for CI and direct builds. Users can opt in to permissive mode on the command line: make -C tools/testing/selftests \ TARGETS=bpf SKIP_TARGETS= BPF_STRICT_BUILD=0 Suggested-by: Alan Maguire Signed-off-by: Ricardo B. Marlière --- tools/testing/selftests/bpf/Makefile | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/tools/testing/selftests/bpf/Makefile b/tools/testing/selftests/bpf/Makefile index 97ee61f2ade5..6094fe99b5f6 100644 --- a/tools/testing/selftests/bpf/Makefile +++ b/tools/testing/selftests/bpf/Makefile @@ -44,6 +44,12 @@ SKIP_LLVM ?= SKIP_LIBBFD ?= SKIP_CRYPTO ?= +# When BPF_STRICT_BUILD is 1, any BPF object, skeleton, test object, or +# benchmark compilation failure is fatal. Set to 0 to tolerate failures +# and continue building the remaining tests. +BPF_STRICT_BUILD ?= 1 +PERMISSIVE := $(filter 0,$(BPF_STRICT_BUILD)) + ifeq ($(srctree),) srctree := $(patsubst %/,%,$(dir $(CURDIR))) srctree := $(patsubst %/,%,$(dir $(srctree))) -- 2.54.0