Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp310313ybi; Wed, 29 May 2019 22:00:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqxd8RedoS/E7rwPWSN+avGHwTzAVV0EpktgHB7I5CZL4E6GKZrk+m2D9gTN/Y9BM80j8d0Y X-Received: by 2002:a17:90a:204a:: with SMTP id n68mr1698178pjc.21.1559192458869; Wed, 29 May 2019 22:00:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559192458; cv=none; d=google.com; s=arc-20160816; b=dFdJA0AZGNR3yX+PCIJmhwHeyJEO7NgOkMvqbXaHEH1WIeO4S6OQvslEEs2UIj3Cze 2rlfse3SS1fdPINlsCLzHYWb5zLjwGFv0n3GWPr2uRGDRcgE0iJOwlNCyYl30saZRlCu QdiJX6kq+TYHqUbcaom/BqpRpRhH91aQVA8eYtXSR9Tj0/FUlNAas3aNksD+dAGMjobg EJ6FBM1pmeEDR39QaG57vciv/XyhLGKmt5FBh787cJqDktVVTgcFxqX7wEhJccmJV3Nx w/Ekaj+VLlYMXSsMQv/nuv2WmWSf4Na6PBvp/P63qjZHhtOoDMoX8YqCRTZWe8KZb7eP rGtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Y3yVmUlbIx7YCiqKPtrKk1g7uSYu586oR2kCQHMJch8=; b=qN0b0FTerwHte29gAQ2qW6bekjacQfKwxfEdP0TvWzRfMwJhaFSAvQC+5q2VLKTCHx uMVg5ALNyY65v1SFGAhaOVvFdIlS1OY6JZh/WO3FFFjaLAsEoC5hSoSABsAnMo9Z7OGX 7nL+S0xJBGf5qAfCI9edQapTbdD+B12fgsxxxFMVzMG0a/ZzyCl/9gJvJO6KpLHG1f16 wbLGNcfIqHAJmXzAqaQk9EpsYgJy4BIe2PV8CMbCX6T2MVIfKcTnZR9c5bSre3Wptroo a7N9W86dkBMrNE2SBR/+zBuXvjtikrBUw6gzcLBcsk4Qi/AwaWTspqRXH4bDtl7M4r/1 DjRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HrafJyIS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p7si2371380pfn.266.2019.05.29.22.00.42; Wed, 29 May 2019 22:00:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HrafJyIS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389195AbfE3E6c (ORCPT + 99 others); Thu, 30 May 2019 00:58:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:45296 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727769AbfE3DJs (ORCPT ); Wed, 29 May 2019 23:09:48 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EDE9124494; Thu, 30 May 2019 03:09:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559185788; bh=iYzo/VRtevKekWWggl+QIhG1PwDIUuE4DzWTR6nh2n0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HrafJyIS3neoYnHPejYj65GJU+r4DN5enzJe+XdzDegTmkvDyaoDCpGJmqxPXMRDk owG0mD7/d600ay6S+aJZDo04cBI6YZfbF6b+UfLn3PKYeMW+nkuOFPztoX11IuELQd Glu6sTUL122kdxmnA/IEV8TfPVNJixZLrFA/oezU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yonghong Song , Alexei Starovoitov , Sasha Levin Subject: [PATCH 5.1 057/405] selftests/bpf: set RLIMIT_MEMLOCK properly for test_libbpf_open.c Date: Wed, 29 May 2019 20:00:55 -0700 Message-Id: <20190530030543.759081513@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030540.291644921@linuxfoundation.org> References: <20190530030540.291644921@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 6cea33701eb024bc6c920ab83940ee22afd29139 ] Test test_libbpf.sh failed on my development server with failure -bash-4.4$ sudo ./test_libbpf.sh [0] libbpf: Error in bpf_object__probe_name():Operation not permitted(1). Couldn't load basic 'r0 = 0' BPF program. test_libbpf: failed at file test_l4lb.o selftests: test_libbpf [FAILED] -bash-4.4$ The reason is because my machine has 64KB locked memory by default which is not enough for this program to get locked memory. Similar to other bpf selftests, let us increase RLIMIT_MEMLOCK to infinity, which fixed the issue. Signed-off-by: Yonghong Song Signed-off-by: Alexei Starovoitov Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/test_libbpf_open.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/testing/selftests/bpf/test_libbpf_open.c b/tools/testing/selftests/bpf/test_libbpf_open.c index 65cbd30704b5a..9e9db202d218a 100644 --- a/tools/testing/selftests/bpf/test_libbpf_open.c +++ b/tools/testing/selftests/bpf/test_libbpf_open.c @@ -11,6 +11,8 @@ static const char *__doc__ = #include #include +#include "bpf_rlimit.h" + static const struct option long_options[] = { {"help", no_argument, NULL, 'h' }, {"debug", no_argument, NULL, 'D' }, -- 2.20.1