Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp8655imw; Tue, 12 Jul 2022 13:30:29 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vm7BK6pd1Yxe43bxw9IWE6hs/uYcp6kc3JUVyNNo2st9I16nLBlw42WlGVI/2HAICSow2l X-Received: by 2002:a05:6402:b9b:b0:43a:5aac:ed6 with SMTP id cf27-20020a0564020b9b00b0043a5aac0ed6mr34138326edb.131.1657657829763; Tue, 12 Jul 2022 13:30:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657657829; cv=none; d=google.com; s=arc-20160816; b=undvdeCBU8XtocbBB6hbmKje5B/+tP/fQ834Sjg4gufvRCjueqLu0vp2H33IHtuzPB /sWeFyZtq3PlKDjKDrvD90q6F8nwqLYFNltVBHnWCPHCgUPsFihSj8q4k5pgBSsH7eJ0 Fw9txMXqyis3fGnvqx/tO6VEk9zvTUit2k6xpWRgB0p1r/J8L4Yh0E/BlS9q5HsDLMxf TjVSmWgjY0PMbn2EpiBQIqTLpphqekJgv3CMoprClkUJTZYW+MBHxEfgVmb2vUiv2yD+ FKYr6YOysqxW1uAS/WaR3CUzCOh5PR65nRG1hfCaS5LZ23KIPkCarREynUSE/tbb0lv4 00Lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:subject:cc:to:from:date; bh=mihhL8Tf6Xa6mdjxW8xZISbS3mksSzvxxAhOEn0JlP4=; b=gI9+Ty4rKfwU16TB+xAak4OXnIK3Ekz2UvAtYpbLCq7hXEEPJybubbA5P6t7P/MSjf B0lJiZtAoyRgVepwJFyVICVjgoalGkeK3Bq/zlX6msg/K9wgSYwAaoM3FZV3wsbNHPl7 JRaRCcFMErheBFoqoYiNRxPAfwqjIr2bJ/8aClv5rEqb8XjA/QcUVuwtojj6au9pL8X7 P7Mo5GfYrzdV7nTp6XAUaDc+0zwzfo0sKf6iTy4sKTfAUywuUAY1dCuhytU4IqUMQf/I kAr1/piw+qdOwyaWPOmQ/hhQDWm3yUXRd7F1vetIpR0JFaYNh01K0xNAWdLdzEhsg5Nh Psbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qb25-20020a1709077e9900b00722f48fa044si13460306ejc.192.2022.07.12.13.29.58; Tue, 12 Jul 2022 13:30:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233375AbiGLURT (ORCPT + 99 others); Tue, 12 Jul 2022 16:17:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55924 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230051AbiGLURL (ORCPT ); Tue, 12 Jul 2022 16:17:11 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E9CEAC48E5 for ; Tue, 12 Jul 2022 13:17:10 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 86BD661A10 for ; Tue, 12 Jul 2022 20:17:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2B993C3411C; Tue, 12 Jul 2022 20:17:09 +0000 (UTC) Date: Tue, 12 Jul 2022 16:17:07 -0400 From: Steven Rostedt To: LKML Cc: Ingo Molnar , Andrew Morton , Masami Hiramatsu , Linyu Yuan Subject: [PATCH] selftests/kprobe: Do not test for GRP/ without event failures Message-ID: <20220712161707.6dc08a14@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Steven Rostedt (Google)" A new feature is added where kprobes (and other probes) do not need to explicitly state the event name when creating a probe. The event name will come from what is being attached. That is: # echo 'p:foo/ vfs_read' > kprobe_events Will no longer error, but instead create an event: # cat kprobe_events p:foo/p_vfs_read_0 vfs_read This should not be tested as an error case anymore. Remove it from the selftest as now this feature "breaks" the selftest as it no longer fails as expected. Link: https://lore.kernel.org/all/1656296348-16111-1-git-send-email-quic_linyyuan@quicinc.com/ Signed-off-by: Steven Rostedt (Google) --- .../selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc | 1 - 1 file changed, 1 deletion(-) diff --git a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc index fa928b431555..7c02509c71d0 100644 --- a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc +++ b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc @@ -21,7 +21,6 @@ check_error 'p:^/bar vfs_read' # NO_GROUP_NAME check_error 'p:^12345678901234567890123456789012345678901234567890123456789012345/bar vfs_read' # GROUP_TOO_LONG check_error 'p:^foo.1/bar vfs_read' # BAD_GROUP_NAME -check_error 'p:foo/^ vfs_read' # NO_EVENT_NAME check_error 'p:foo/^12345678901234567890123456789012345678901234567890123456789012345 vfs_read' # EVENT_TOO_LONG check_error 'p:foo/^bar.1 vfs_read' # BAD_EVENT_NAME -- 2.35.1