Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp3409809rwa; Tue, 23 Aug 2022 04:25:41 -0700 (PDT) X-Google-Smtp-Source: AA6agR7ggW/3HI5uWXeMOkQa8yvR1L+4KcBILY/PNEvb2G+qygoysJ7JXqm/X5bR4b1t+m3aq7wf X-Received: by 2002:a17:902:7c03:b0:172:56b1:8152 with SMTP id x3-20020a1709027c0300b0017256b18152mr24238558pll.16.1661253941405; Tue, 23 Aug 2022 04:25:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661253941; cv=none; d=google.com; s=arc-20160816; b=ah94vqVRVhFBkhUsuSYNu74Zf+qZ4Gf9aVGourTkEXiJQG7ghjOTOwRr9n5QQkB12j WUBI8tTn9Di1BFV6dur2GGkQ5bENHCytgBuUReXnv1BaepcazF7NeDC2gLcZxIuqoNHt mYzDaw4OSTjM/EV0U9wkxb2EEidi8ljOV70l56mTXXbScHHyKvD/TZUAmkEuRCQM4BKc rqoUaRI0N2aKw4FRPDZpBORUoqMKCCmy/p1YBWFy7w6NzGrU9Dg1AIbrHCekdAv4vR64 x+eCb6pKmFzoXD7ayfSGFyy6ID03FMOO+9V3Ru2fhfPvrc8yttcNlp4jkCnaaUGtGggl pXRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NuBgszObrnNOncDeZY+J2UcPAZkaRaOGd136QWd2t7M=; b=QErKlD6hAcgRDLQT9AOK7ttRnfCSfv3v+0tuRPJ/wgxWaGSBXNMukkWQiThf7u9EQ/ +sXVdRqvI0lniywoB2YTWqYlBm+FgH+qgRqklVBmMHrBpzt6JZcDMBkCHyOXgLutftO6 eQ6OGzOA7PBrYDRC03+1UkGGFCGyzjcfVSrALr9XKwWAXOdhzVY26VuLX6kzeEhqZFxR N38/g7r3EKDw1CXOW+m7p3xDlNK1sExbIhRgypoUYEznyEqmnWpECtDlXFtNvZLB1rPr G/1sk2Qcb31bTzTU1dzcsfCKxUPJKo2507Rp6GqjS2o/+E5pdKkj1JpDasOPUMud+7M/ +VNg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PqXSKpks; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i10-20020a17090acf8a00b001fa99b4efc7si16247024pju.127.2022.08.23.04.25.30; Tue, 23 Aug 2022 04:25:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PqXSKpks; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232496AbiHWJZN (ORCPT + 99 others); Tue, 23 Aug 2022 05:25:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38056 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349548AbiHWJXK (ORCPT ); Tue, 23 Aug 2022 05:23:10 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D17EC8F957; Tue, 23 Aug 2022 01:35:21 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id CEC8BB81C4D; Tue, 23 Aug 2022 08:33:41 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1C094C433D6; Tue, 23 Aug 2022 08:33:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661243620; bh=QueCjxHMA4r1uCGTLX+Zuc00mP9QzA7Dxm10f7BgXZw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PqXSKpksgWG8R7v1zUdqXT8EDTGqslS7q/aTqOJl3pscTNFxzW3Yn4+K3dkluPZVP oGg3MWY9GW/1EFcN7bbXX5Wnj/Z6ZbljPUCiYf/7ICAOkwEVDTOkrhyfoJN4mjKsAq Z5xR3NJhbxo4+Z0FoXylhpoRUCpN27+jJcKl8dEQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Steven Rostedt (Google)" , Sasha Levin Subject: [PATCH 5.19 305/365] selftests/kprobe: Do not test for GRP/ without event failures Date: Tue, 23 Aug 2022 10:03:26 +0200 Message-Id: <20220823080130.954139426@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220823080118.128342613@linuxfoundation.org> References: <20220823080118.128342613@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steven Rostedt (Google) [ Upstream commit f5eab65ff2b76449286d18efc7fee3e0b72f7d9b ] A new feature is added where kprobes (and other probes) do not need to explicitly state the event name when creating a probe. The event name will come from what is being attached. That is: # echo 'p:foo/ vfs_read' > kprobe_events Will no longer error, but instead create an event: # cat kprobe_events p:foo/p_vfs_read_0 vfs_read This should not be tested as an error case anymore. Remove it from the selftest as now this feature "breaks" the selftest as it no longer fails as expected. Link: https://lore.kernel.org/all/1656296348-16111-1-git-send-email-quic_linyyuan@quicinc.com/ Link: https://lkml.kernel.org/r/20220712161707.6dc08a14@gandalf.local.home Signed-off-by: Steven Rostedt (Google) Signed-off-by: Sasha Levin --- .../selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc | 1 - 1 file changed, 1 deletion(-) diff --git a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc index fa928b431555..7c02509c71d0 100644 --- a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc +++ b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_syntax_errors.tc @@ -21,7 +21,6 @@ check_error 'p:^/bar vfs_read' # NO_GROUP_NAME check_error 'p:^12345678901234567890123456789012345678901234567890123456789012345/bar vfs_read' # GROUP_TOO_LONG check_error 'p:^foo.1/bar vfs_read' # BAD_GROUP_NAME -check_error 'p:foo/^ vfs_read' # NO_EVENT_NAME check_error 'p:foo/^12345678901234567890123456789012345678901234567890123456789012345 vfs_read' # EVENT_TOO_LONG check_error 'p:foo/^bar.1 vfs_read' # BAD_EVENT_NAME -- 2.35.1