Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp2878928rwb; Mon, 15 Aug 2022 13:10:02 -0700 (PDT) X-Google-Smtp-Source: AA6agR5wsKZbXayQcEC5C/wKEEOKffzlwYcz68BWPFb6xyWSWMdh+38y7OGDCZ3Q4G4z4ML5x0bz X-Received: by 2002:a17:90b:1e4a:b0:1f7:3769:ac18 with SMTP id pi10-20020a17090b1e4a00b001f73769ac18mr29136332pjb.228.1660594201866; Mon, 15 Aug 2022 13:10:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660594201; cv=none; d=google.com; s=arc-20160816; b=ch1/nUJDCOAgheuOmdq4dPp6KNWaKcdCRBfYtf5OpNrbbWlQRRNTkm+WHlK2/aNftd RysbszsYyvbVfVIdphXd2A7yI8jFI4tn0ChsOjGhKDpovDVQShhHXjolMAlYVBLm5qHg RFJcgU+od3ZnM8aEMqlfvRDIwLNoCQb16hG2qAjtrB/WflE08fdbZFhDakpYfDepnBKp nv/on/6z9Y3kmfOuT9wnG4GHCkPV3/OakzQlSb7lyieOrCqXwfBvs0XkC0VrHp9ELuE0 JxNeas2JBEvTy0O9Y6pnWQ93PQKGlzgoCFXM7NFilgE3gZQ7Gygoelw2fyuu+nW1vK1n dFmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=aBV0lMOaEfVxNSXdY3NtHPDezvQ8Banu07vVa3JyRW8=; b=U5XqbSdD2AfDOWYSKu+QGvk/980N2nCd+H5H2GWZWb2Kqt+IBOUnV99QaY7P3KTAiu 69NcO/E2bztrj014oyX/ux2pJHHkIL1uw7XvAejtdwjmA48rBQE+eUTPZ3JMb9Wncigf 4xqP3Js5jsSSSm5owr+f1khuB+AFH6vXnh9g90fRxdwG2i8y/smlVJAwMNurMqhAX+et Wj62n90KBJelxvKu4VPrttcTKoZFy/WHaJ/AavTC0V+iHyi4+vrCYiAfm+4e/0EdUs07 k4BTNv7AS38ztL6EPxu4ar0+JTimVvNr8EdPU64kgQzV4M4+wgzPk5iMAKFxr63AS+2l WBtA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x185-20020a6331c2000000b004228fdf0856si10761871pgx.348.2022.08.15.13.09.50; Mon, 15 Aug 2022 13:10:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344574AbiHOTnv (ORCPT + 99 others); Mon, 15 Aug 2022 15:43:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40538 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343538AbiHOTjd (ORCPT ); Mon, 15 Aug 2022 15:39:33 -0400 Received: from www62.your-server.de (www62.your-server.de [213.133.104.62]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 38906402CF; Mon, 15 Aug 2022 11:47:03 -0700 (PDT) Received: from sslproxy03.your-server.de ([88.198.220.132]) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1oNf73-000FWY-0a; Mon, 15 Aug 2022 20:46:57 +0200 Received: from [85.1.206.226] (helo=linux-4.home) by sslproxy03.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1oNf72-000MQi-PA; Mon, 15 Aug 2022 20:46:56 +0200 Subject: Re: [PATCH bpf-next] selftests/bpf: fix attach point for non-x86 arches in test_progs/lsm To: Artem Savkov , Alexei Starovoitov , Andrii Nakryiko , bpf@vger.kernel.org, netdev@vger.kernel.org Cc: linux-kernel@vger.kernel.org, =?UTF-8?Q?Daniel_M=c3=bcller?= References: <20220815122422.687116-1-asavkov@redhat.com> From: Daniel Borkmann Message-ID: <376f20c5-4b1c-efec-4dde-43d91b3d4308@iogearbox.net> Date: Mon, 15 Aug 2022 20:46:56 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20220815122422.687116-1-asavkov@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.103.6/26628/Mon Aug 15 09:51:41 2022) X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/15/22 2:24 PM, Artem Savkov wrote: > Use SYS_PREFIX macro from bpf_misc.h instead of hard-coded '__x64_' > prefix for sys_setdomainname attach point in lsm test. > > Signed-off-by: Artem Savkov > --- > tools/testing/selftests/bpf/progs/lsm.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/tools/testing/selftests/bpf/progs/lsm.c b/tools/testing/selftests/bpf/progs/lsm.c > index 33694ef8acfa..d8d8af623bc2 100644 > --- a/tools/testing/selftests/bpf/progs/lsm.c > +++ b/tools/testing/selftests/bpf/progs/lsm.c > @@ -4,6 +4,7 @@ > * Copyright 2020 Google LLC. > */ > > +#include "bpf_misc.h" > #include "vmlinux.h" > #include > #include > @@ -160,7 +161,7 @@ int BPF_PROG(test_task_free, struct task_struct *task) > > int copy_test = 0; > > -SEC("fentry.s/__x64_sys_setdomainname") > +SEC("fentry.s/" SYS_PREFIX "sys_setdomainname") > int BPF_PROG(test_sys_setdomainname, struct pt_regs *regs) > { > void *ptr = (void *)PT_REGS_PARM1(regs); > Good catch! Could you also update the comment in tools/testing/selftests/bpf/DENYLIST.s390x +46 : [...] test_lsm # failed to find kernel BTF type ID of '__x64_sys_setdomainname': -3 (?) [...] It should likely say sth like `attach fentry unexpected error: -524 (trampoline)`. Thanks, Daniel