Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp1786847ybm; Thu, 23 May 2019 06:47:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqxPSse5uCCSFB8AHucQ+qMNlaAs2UYmeQmc9flrxxUVV1CDcHQl6kBvPj6dWLA1sNy93stN X-Received: by 2002:a17:90a:d98d:: with SMTP id d13mr1229074pjv.64.1558619273324; Thu, 23 May 2019 06:47:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558619273; cv=none; d=google.com; s=arc-20160816; b=Nv/vrLF/6RUIhYLrXa8P9oeByzVZzpM8fTJ4QQk08Ylt8DFF9fT9k9C4pzPWxXMNLf GZv+6Cai52JxGYB77Pk/lwTc4tujEqpyFuyxTqo3VrKLdIcAOY2AKwDrex1cWwuzdKPF KXOsJDr7ZwSg+Sb3ljqGA7rqgJPXQHhhXY2Wj20IlGbXIN80o/B2uMCU5aoEcSTso0u2 veAAtLZiA3NJBS+jMLhuJ32ARLCyayM4aj8ntxMO8QjNFSCkxm11E2yJMmIoCoAOu/fW 0WhDFll027ULuz73QnhKucysdxVWGX/Zp2PTWtUcCoNOegRGF2GrF0jyTw6Zl08lIsi1 QOvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=vd5igbAae9KRxsNtx+2dGIy0B51y4OKwWpzWgt6UP/M=; b=m8/BMGFa8pwPCOdLky04Y5fK3QgF3eWdTXJhZqj3NkQp9/zHY9LMh8RL6ke6pmBX/v X+mLWNDANniEs4zkzhINT24obR0cOCqm0GMQs6hwEJU3B0xHdve4Hy+gpLneo+mShvA9 uajzNu8PDkW21cewrVcVjLjDf/U/prHi2wUJ9I0OkAa+JLJaW6a0N3n2fjTEV/tidvo8 dt7MWy73BTg+cc4KrMTwWXFuUiKQ0X3xfyMd1zothWKy4IN3Z51H0J2lhSarQBggpg2E VIFr7Xk4lnEvX8aS6wmjZA4jLPRCyohsbh4nwcABwXnjGpuuucGtHLxoGml0e/X4ck+M oaBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k33si29784196pld.415.2019.05.23.06.47.36; Thu, 23 May 2019 06:47:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730751AbfEWNqa (ORCPT + 99 others); Thu, 23 May 2019 09:46:30 -0400 Received: from www62.your-server.de ([213.133.104.62]:51730 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729902AbfEWNqa (ORCPT ); Thu, 23 May 2019 09:46:30 -0400 Received: from [88.198.220.132] (helo=sslproxy03.your-server.de) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1hTo3A-0003BO-4A; Thu, 23 May 2019 15:46:28 +0200 Received: from [178.197.249.12] (helo=linux.home) by sslproxy03.your-server.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1hTo39-0008Tu-N1; Thu, 23 May 2019 15:46:27 +0200 Subject: Re: [PATCH 4.19 144/187] selftests/bpf: skip verifier tests for unsupported program types To: "Rantala, Tommi T. (Nokia - FI/Espoo)" , "linux-kernel@vger.kernel.org" , "gregkh@linuxfoundation.org" Cc: "sashal@kernel.org" , "stable@vger.kernel.org" , "sdf@google.com" References: <20190404084603.119654039@linuxfoundation.org> <20190404084609.946908305@linuxfoundation.org> <16ec5436310b0df657a4898e3d15ccc3b9aab8e2.camel@nokia.com> From: Daniel Borkmann Message-ID: <47a9ede3-bef8-7ae1-6353-b954b6e7f7af@iogearbox.net> Date: Thu, 23 May 2019 15:46:26 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <16ec5436310b0df657a4898e3d15ccc3b9aab8e2.camel@nokia.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.100.3/25458/Thu May 23 09:58:32 2019) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/23/2019 12:27 PM, Rantala, Tommi T. (Nokia - FI/Espoo) wrote: > On Thu, 2019-04-04 at 10:48 +0200, Greg Kroah-Hartman wrote: >> 4.19-stable review patch. If anyone has any objections, please let >> me know. >> >> ------------------ >> >> [ Upstream commit 8184d44c9a577a2f1842ed6cc844bfd4a9981d8e ] >> >> Use recently introduced bpf_probe_prog_type() to skip tests in the >> test_verifier() if bpf_verify_program() fails. The skipped test is >> indicated in the output. > > Hi, this patch added in 4.19.34 causes test_verifier build failure, as > bpf_probe_prog_type() is not available: > > gcc -Wall -O2 -I../../../include/uapi -I../../../lib -I../../../lib/bpf > -I../../../../include/generated -DHAVE_GENHDR > -I../../../include test_verifier.c /root/linux- > 4.19.44/tools/testing/selftests/bpf/libbpf.a -lcap -lelf -lrt -lpthread > -o /root/linux-4.19.44/tools/testing/selftests/bpf/test_verifier > test_verifier.c: In function ‘do_test_single’: > test_verifier.c:12775:22: warning: implicit declaration of function > ‘bpf_probe_prog_type’; did you mean ‘bpf_program__set_type’? [- > Wimplicit-function-declaration] > if (fd_prog < 0 && !bpf_probe_prog_type(prog_type, 0)) { > ^~~~~~~~~~~~~~~~~~~ > bpf_program__set_type > /usr/bin/ld: /tmp/ccEtyLhk.o: in function `do_test_single': > test_verifier.c:(.text+0xa19): undefined reference to > `bpf_probe_prog_type' > collect2: error: ld returned 1 exit status > make[1]: *** [../lib.mk:152: /root/linux- > 4.19.44/tools/testing/selftests/bpf/test_verifier] Error 1 Looks like this kselftest one got auto-selected for stable? It's not strictly needed, so totally fine to drop. Thanks, Daniel