Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp3388067rwa; Tue, 23 Aug 2022 04:05:11 -0700 (PDT) X-Google-Smtp-Source: AA6agR4qBgqxwIj4brl0y8xS4WZHz3LwO9jLhyz97Mjn/q6K0ZmS41XbSxzptkYWelAOBEs5viMb X-Received: by 2002:a17:906:58d1:b0:73d:6329:5e14 with SMTP id e17-20020a17090658d100b0073d63295e14mr10724664ejs.121.1661252710754; Tue, 23 Aug 2022 04:05:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661252710; cv=none; d=google.com; s=arc-20160816; b=MIfv+qfZf1Oei36VTcpilqNeV4xF36+wOU74d8rGyAxmz9iSPbfcLlTaHO9eZJQzT0 6OLG8mmnbp0RY0N9Hjl4wG0H7BfOfK89ZlxfKmRbdwLuD2a/s6UEtGnJ+7ZKp0Wz/RV8 f4cgaBtSaPu5lzElqDHq6Q01Z+24fpxSzvrZIO13n4+/RoeATg/VJThRGIqy7wTKbqif w7wVRAtabumJ5nocZwRWjQvjCGayzT8s5d098VTPHR7mafvyiuPHg+xgdAVk8GXRedIp VVPjEJw025GArOHIbRuP8ah5ZjZytCKLmEn+vNdlh2pqhS014HHJQFo+MMjt0etSdwZ8 WgjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NuBgszObrnNOncDeZY+J2UcPAZkaRaOGd136QWd2t7M=; b=SFCpNHlUbWTQU/OfeqCHoCpcOvl5L5ogtBtSfDwgtcXjVgA3MV+PXfKpIqSPRv2dlq b3Oh9ubUJciA3o/uRbTrkjogrNm9splzCZ8EVk1skKaY9J+2lv7GtbcOV4Sf2RlBHR+B TD8cKjrlcjxZj3nnAa1rxJ3Fh0MMAqFg3gHX7uVp9o1Rkfbp9R2BYPzqClBAsHgEYYfv dVcBli62o4St86zMM1LJrTGhHSEKhTMTIu2rK6efzsFJ7wtou35g2S6XiabY/EDr1Hf7 ht7yeYx/BAgm3JKF0jQ8sP6rm6FgFliSWi9PufXI2vlGwpTHZb1FSaYyM7nzHrJy3kb8 frmA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Z6tcSlBr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qb34-20020a1709077ea200b0073d80c9dc85si4630589ejc.459.2022.08.23.04.04.43; Tue, 23 Aug 2022 04:05:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Z6tcSlBr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1354311AbiHWKYx (ORCPT + 99 others); Tue, 23 Aug 2022 06:24:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36504 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353577AbiHWKLj (ORCPT ); Tue, 23 Aug 2022 06:11:39 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E44C626CC; Tue, 23 Aug 2022 01:57:25 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 80B036123D; Tue, 23 Aug 2022 08:57:25 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 786EAC433D6; Tue, 23 Aug 2022 08:57:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661245044; bh=QueCjxHMA4r1uCGTLX+Zuc00mP9QzA7Dxm10f7BgXZw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Z6tcSlBrBf5Jo9qJl+nmOTqVhoXoi8Xf914llepQBd9eNAggwtUu1tykXbFwf5PvE BhhZvF7Yoyj4TSDqk+3mg2NZ6TL1OhXoXmZxldDV85+6Lgr1rfK9cdSYNl5Kjw4sqt ZcsdkCc4ym7oBPqT7stFOBdAlPxKb5OkGlf7X+FU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Steven Rostedt (Google)" , Sasha Levin Subject: [PATCH 5.15 197/244] selftests/kprobe: Do not test for GRP/ without event failures Date: Tue, 23 Aug 2022 10:25:56 +0200 Message-Id: <20220823080106.013656702@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220823080059.091088642@linuxfoundation.org> References: <20220823080059.091088642@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steven Rostedt (Google) [ Upstream commit f5eab65ff2b76449286d18efc7fee3e0b72f7d9b ] A new feature is added where kprobes (and other probes) do not need to explicitly state the event name when creating a probe. The event name will come from what is being attached. That is: # echo 'p:foo/ vfs_read' > kprobe_events Will no longer error, but instead create an event: # cat kprobe_events p:foo/p_vfs_read_0 vfs_read This should not be tested as an error case anymore. Remove it from the selftest as now this feature "breaks" the selftest as it no longer fails as expected. Link: https://lore.kernel.org/all/1656296348-16111-1-git-send-email-quic_linyyuan@quicinc.com/ Link: https://lkml.kernel.org/r/20220712161707.6dc08a14@gandalf.local.home Signed-off-by: Steven Rostedt (Google) Signed-off-by: Sasha Levin --- .../selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc | 1 - 1 file changed, 1 deletion(-) diff --git a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc index fa928b431555..7c02509c71d0 100644 --- a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc +++ b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc @@ -21,7 +21,6 @@ check_error 'p:^/bar vfs_read' # NO_GROUP_NAME check_error 'p:^12345678901234567890123456789012345678901234567890123456789012345/bar vfs_read' # GROUP_TOO_LONG check_error 'p:^foo.1/bar vfs_read' # BAD_GROUP_NAME -check_error 'p:foo/^ vfs_read' # NO_EVENT_NAME check_error 'p:foo/^12345678901234567890123456789012345678901234567890123456789012345 vfs_read' # EVENT_TOO_LONG check_error 'p:foo/^bar.1 vfs_read' # BAD_EVENT_NAME -- 2.35.1