Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp252141ybi; Wed, 29 May 2019 20:41:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqwNMeZJz3t2uALlvZ/kIKTGgfbVqj3TO3SSR/dfgZg/dmm/sv8VI3Vj83PwQ1w5gZ6L7L5Q X-Received: by 2002:a62:65c7:: with SMTP id z190mr1549426pfb.73.1559187684811; Wed, 29 May 2019 20:41:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559187684; cv=none; d=google.com; s=arc-20160816; b=CZ77Q0vwLfq0BHGEExjU+lhZ7KgkR+Pk5MVwwoNHn8K7+VKb2IOeGs1VVYNUjBxVm5 ctsW74q5SGrR+6ulEEc60Q8ryxG4uYvWfMq1wpfezno5cZ3kG3cMucsbW/N/ym9Oq62N tnZzX0OQBAI5KKIQyBOfdewKdpIIgdDgiwaTPOXwwFceQD2smQ4Ex+VTXssDkACF/DCl 3EVJkk8sNreqtVSpvZ3U8IfdDWBW3AOcQlO/a6XVZPQvBDNSwAijoZxVOInWuNea+3QE F7Dui+p3oP6cxXdK/QiPfUbvuMrD+uG3ORDxGLrs0D1+P32/AznNKAgydxxheOpQ5FNM RD6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/aAqu1N92d5FRvMN8mIVYejG29AzYa6By7x3RxKT42Q=; b=JXn6xe7hlvypYruo6kwTFku1XL64Ebs224HReNnteNEJSvXgKtkt5GZrDCins3IB/U XGwJgMU45kBd40CQwM6bpMoqF22LX+ALHBSkicajFu92k601289Ko23pJ1mVMz7GpM5Q OzXFO4eDSFW/DZMkkJQS9RqLPtkeMv0+TH4aieS7klssOrflWPIme9+0otn0GtSukU0l RvJhvPV4f/G9OObpiawtpIBeqHnPjd9voPWBO+hVXZ9zR9a88A+Lb6WK2Yw2z+pqqlPY DalHhHidAEKS6+FtFwT/H133SMacsIpKk4ByfIIPXV6Vk22lz0kIzrGQcf79mAYJ5nu3 3uSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=r9CSvoFf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x26si2080024pfm.241.2019.05.29.20.41.08; Wed, 29 May 2019 20:41:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=r9CSvoFf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732595AbfE3DVe (ORCPT + 99 others); Wed, 29 May 2019 23:21:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:42512 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730666AbfE3DQZ (ORCPT ); Wed, 29 May 2019 23:16:25 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B1E68245AC; Thu, 30 May 2019 03:16:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186184; bh=7uK9JClRjBpcmWQyTcy+7AOYcOvd9/bhbDUILfDQj0s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=r9CSvoFfkb7AzVS3IiqYWGDBl2L+BvLCix+F+kr3Owxy9mD2muquecwN5suod+Aww 41BF2g41+oVxejgJKfeakmmS02TXErV+z/8YkirEQCfjVmcvQxY/MYUvEyFewDPMOc P0kye5fbA8hyEnDEddKvnyKfyKLlFOoriTMDObNY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yonghong Song , Alexei Starovoitov , Sasha Levin Subject: [PATCH 4.19 051/276] selftests/bpf: set RLIMIT_MEMLOCK properly for test_libbpf_open.c Date: Wed, 29 May 2019 20:03:29 -0700 Message-Id: <20190530030528.215407626@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030523.133519668@linuxfoundation.org> References: <20190530030523.133519668@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 6cea33701eb024bc6c920ab83940ee22afd29139 ] Test test_libbpf.sh failed on my development server with failure -bash-4.4$ sudo ./test_libbpf.sh [0] libbpf: Error in bpf_object__probe_name():Operation not permitted(1). Couldn't load basic 'r0 = 0' BPF program. test_libbpf: failed at file test_l4lb.o selftests: test_libbpf [FAILED] -bash-4.4$ The reason is because my machine has 64KB locked memory by default which is not enough for this program to get locked memory. Similar to other bpf selftests, let us increase RLIMIT_MEMLOCK to infinity, which fixed the issue. Signed-off-by: Yonghong Song Signed-off-by: Alexei Starovoitov Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/test_libbpf_open.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/testing/selftests/bpf/test_libbpf_open.c b/tools/testing/selftests/bpf/test_libbpf_open.c index 8fcd1c076add0..cbd55f5f8d598 100644 --- a/tools/testing/selftests/bpf/test_libbpf_open.c +++ b/tools/testing/selftests/bpf/test_libbpf_open.c @@ -11,6 +11,8 @@ static const char *__doc__ = #include #include +#include "bpf_rlimit.h" + static const struct option long_options[] = { {"help", no_argument, NULL, 'h' }, {"debug", no_argument, NULL, 'D' }, -- 2.20.1