Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp2163389iof; Tue, 7 Jun 2022 21:52:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzXuaK2dA19g+XrmmcHwPxQ0Sq8/3Mstlx+pJj3bRsIWLtt79GPFH1T4fnr70VqbdNMhED4 X-Received: by 2002:a63:d504:0:b0:3c6:ab6b:fd2b with SMTP id c4-20020a63d504000000b003c6ab6bfd2bmr28565226pgg.437.1654663926609; Tue, 07 Jun 2022 21:52:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654663926; cv=none; d=google.com; s=arc-20160816; b=Tf1os1l6MWLVKkEdSQyf3WJJ3k6JJBCcnqNWinwtylk1YKl7EBhDvw8CzqoEtUU0ZS 62URAS/jS8Au3E52/wGd8FhbqRd9OLqjOnzPT9IY4J+hB7YCvSESd0Xll1p3i0DWGwyA 4CNXO7zawXAKkk6lIb5bD7ki+NsiwblgM2510/Zs+OaenuZIfEqKIX0yhIlwHKSBYiVk 3kvdXt2G/3m0VR8M5YaictnPqUmyPb05CGQ551eF9LUklaKUtau9gJzbSBdDD0i/bXIE 13vexbv6YqbJK3cvrUiQAlQW1R93OrvLJM5IsKGvTIX9oYfBXCjkETGnknKdZNrDB3CF nm3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3KKOmxSOfKHj3Xd+NqMIvw/0/srTRIWnSazj3cAllPc=; b=uBZ2FasWxqHLT8tNdIqNE6959+1UCBI15vmTHCROX4heA76mVcniss5+Yf3Rmzftar 67NDhIvXokb3QlsLHpEoCNV9Ja5zLnvLRdClfTed122B/voyVVEZtdJqIHZNHhrE3Mpg QL9Fy3s5/1dx0W1pOecm65W4XpDqrkgcq2EAozCYGuaNMYaG9uOFtCnyf5Z55SMP4ZGF 3oWT//WofMZ9eT8RyungSm7/XFuhF5mjUgLLluq6kW23ZOkfEtwJnDjYmHNj/hV7K+Ue N23OqdScrbtnE42JPJAjRpX5Pvlk3ZeQu9Ry+z4Gn5ckS+YbvOu626inPuuucD/hHk7t ARhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0B2md4Ta; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id y2-20020a056a00190200b0050cf64cb15csi29099794pfi.77.2022.06.07.21.52.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jun 2022 21:52:06 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0B2md4Ta; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E20ED315DDA; Tue, 7 Jun 2022 21:21:47 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344887AbiFGRY2 (ORCPT + 99 others); Tue, 7 Jun 2022 13:24:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41178 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345946AbiFGRUG (ORCPT ); Tue, 7 Jun 2022 13:20:06 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D9F3C1059CF; Tue, 7 Jun 2022 10:19:55 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3556A617C0; Tue, 7 Jun 2022 17:19:55 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3D103C385A5; Tue, 7 Jun 2022 17:19:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1654622394; bh=EI6kyMEv2r+oMfMB12oZQKomnwfH3xTNuKb7+f/Swr4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0B2md4TahkScyU5lCKEz+tYAVmui4zMZqmb5+tDCxfn6ZCiHl9NolRXxj2ugox5SI D8yhevW2f1gNQtc8FFD6utuVxILCOcKTsbogu+P9IBbwl1DiXPtqZB2JhBIFx6dSo5 zoC4fEu2CgbV2/uT7jXti8bpFLte1kM6e0bNslhY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nikolay Borisov , Andrii Nakryiko , Sasha Levin Subject: [PATCH 5.10 026/452] selftests/bpf: Fix vfs_link kprobe definition Date: Tue, 7 Jun 2022 18:58:03 +0200 Message-Id: <20220607164909.326145660@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220607164908.521895282@linuxfoundation.org> References: <20220607164908.521895282@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nikolay Borisov [ Upstream commit e299bcd4d16ff86f46c48df1062c8aae0eca1ed8 ] Since commit 6521f8917082 ("namei: prepare for idmapped mounts") vfs_link's prototype was changed, the kprobe definition in profiler selftest in turn wasn't updated. The result is that all argument after the first are now stored in different registers. This means that self-test has been broken ever since. Fix it by updating the kprobe definition accordingly. Signed-off-by: Nikolay Borisov Signed-off-by: Andrii Nakryiko Link: https://lore.kernel.org/bpf/20220331140949.1410056-1-nborisov@suse.com Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/progs/profiler.inc.h | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/bpf/progs/profiler.inc.h b/tools/testing/selftests/bpf/progs/profiler.inc.h index 4896fdf816f7..92331053dba3 100644 --- a/tools/testing/selftests/bpf/progs/profiler.inc.h +++ b/tools/testing/selftests/bpf/progs/profiler.inc.h @@ -826,8 +826,9 @@ int kprobe_ret__do_filp_open(struct pt_regs* ctx) SEC("kprobe/vfs_link") int BPF_KPROBE(kprobe__vfs_link, - struct dentry* old_dentry, struct inode* dir, - struct dentry* new_dentry, struct inode** delegated_inode) + struct dentry* old_dentry, struct user_namespace *mnt_userns, + struct inode* dir, struct dentry* new_dentry, + struct inode** delegated_inode) { struct bpf_func_stats_ctx stats_ctx; bpf_stats_enter(&stats_ctx, profiler_bpf_vfs_link); -- 2.35.1