Document miri skip reasons

reviewable/pr942/r1
Tamir Duberstein 5 months ago
parent 7a7d16885a
commit 35962a4794

@ -1703,7 +1703,7 @@ mod tests {
#[test] #[test]
#[cfg(feature = "std")] #[cfg(feature = "std")]
#[cfg_attr(miri, ignore)] #[cfg_attr(miri, ignore = "`open` not available when isolation is enabled")]
fn test_read_btf_from_sys_fs() { fn test_read_btf_from_sys_fs() {
let btf = Btf::parse_file("/sys/kernel/btf/vmlinux", Endianness::default()).unwrap(); let btf = Btf::parse_file("/sys/kernel/btf/vmlinux", Endianness::default()).unwrap();
let task_struct_id = btf let task_struct_id = btf

@ -1147,10 +1147,10 @@ mod tests {
} }
#[test] #[test]
// Syscall overrides are performing integer-to-pointer conversions, which #[cfg_attr(
// should be done with `ptr::from_exposed_addr` in Rust nightly, but we have miri,
// to support stable as well. ignore = "`let map_info = unsafe { &mut *(attr.info.info as *mut bpf_map_info) }` is trying to retag from <wildcard> for Unique permission, but no exposed tags have suitable permission in the borrow stack for this location"
#[cfg_attr(miri, ignore)] )]
fn test_name() { fn test_name() {
use crate::generated::bpf_map_info; use crate::generated::bpf_map_info;
@ -1183,10 +1183,10 @@ mod tests {
} }
#[test] #[test]
// Syscall overrides are performing integer-to-pointer conversions, which #[cfg_attr(
// should be done with `ptr::from_exposed_addr` in Rust nightly, but we have miri,
// to support stable as well. ignore = "`let map_info = unsafe { &mut *(attr.info.info as *mut bpf_map_info) }` is trying to retag from <wildcard> for Unique permission, but no exposed tags have suitable permission in the borrow stack for this location"
#[cfg_attr(miri, ignore)] )]
fn test_loaded_maps() { fn test_loaded_maps() {
use crate::generated::bpf_map_info; use crate::generated::bpf_map_info;

@ -327,7 +327,6 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)]
fn test_no_out_bufs() { fn test_no_out_bufs() {
let mmapped_buf = MMappedBuf { let mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],
@ -339,7 +338,10 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(
miri,
ignore = "`unsafe { (*header).data_tail = tail as u64 };` is attempting a write access using using a tag that only grants SharedReadOnly permission"
)]
fn test_no_events() { fn test_no_events() {
let mmapped_buf = MMappedBuf { let mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],
@ -355,7 +357,10 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(
miri,
ignore = "`ptr::write_unaligned(dst, value)` is attempting a write access but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_read_first_lost() { fn test_read_first_lost() {
let mut mmapped_buf = MMappedBuf { let mut mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],
@ -428,7 +433,10 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(
miri,
ignore = "`ptr::write_unaligned(dst, value)` is attempting a write access but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_read_first_sample() { fn test_read_first_sample() {
let mut mmapped_buf = MMappedBuf { let mut mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],
@ -446,7 +454,10 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(
miri,
ignore = "`ptr::write_unaligned(dst, value)` is attempting a write access but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_read_many_with_many_reads() { fn test_read_many_with_many_reads() {
let mut mmapped_buf = MMappedBuf { let mut mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],
@ -469,7 +480,10 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(
miri,
ignore = "`ptr::write_unaligned(dst, value)` is attempting a write access but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_read_many_with_one_read() { fn test_read_many_with_one_read() {
let mut mmapped_buf = MMappedBuf { let mut mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],
@ -491,7 +505,10 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(
miri,
ignore = "`ptr::write_unaligned(dst, value)` is attempting a write access but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_read_last_sample() { fn test_read_last_sample() {
let mut mmapped_buf = MMappedBuf { let mut mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],
@ -511,7 +528,10 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(
miri,
ignore = "`ptr::write_unaligned(dst, value)` is attempting a write access but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_read_wrapping_sample_size() { fn test_read_wrapping_sample_size() {
let mut mmapped_buf = MMappedBuf { let mut mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],
@ -540,7 +560,10 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(
miri,
ignore = "`ptr::write_unaligned(dst, value)` is attempting a write access but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_read_wrapping_value() { fn test_read_wrapping_value() {
let mut mmapped_buf = MMappedBuf { let mut mmapped_buf = MMappedBuf {
data: [0; PAGE_SIZE * 2], data: [0; PAGE_SIZE * 2],

@ -504,7 +504,7 @@ mod tests {
} }
#[test] #[test]
#[cfg_attr(miri, ignore)] #[cfg_attr(miri, ignore = "`mkdir` not available when isolation is enabled")]
fn test_pin() { fn test_pin() {
let dir = tempdir().unwrap(); let dir = tempdir().unwrap();
let f1 = File::create(dir.path().join("f1")).expect("unable to create file in tmpdir"); let f1 = File::create(dir.path().join("f1")).expect("unable to create file in tmpdir");

Loading…
Cancel
Save