Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp4346593rwb; Tue, 6 Sep 2022 06:21:14 -0700 (PDT) X-Google-Smtp-Source: AA6agR62dtp/LbR3+39erUb8NbmWJsy4iz8dxKM4/XMs0NSOb7QvqQF+3Pv1q6HinpuMVS+9mlqg X-Received: by 2002:a05:6402:50cb:b0:440:8bac:1e02 with SMTP id h11-20020a05640250cb00b004408bac1e02mr48667432edb.336.1662470474041; Tue, 06 Sep 2022 06:21:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662470474; cv=none; d=google.com; s=arc-20160816; b=N2Qeq4T0WPW1e5hO28sPSjTh8Zk7DXLr1giOjq/MJrS+/gLG+rW/u4s/wkS0fY/bVF MeD9akcocdOpTD+Y6z7VYRh/LyyMJKbn8OY/cdSsvNk8d3ekHqtdqowh1zYMyFnE1lXb wLZjFojUDCVA/qDK1BOZgE5xezCDuFzusZwl/loBMrltfKlBBmCPJZ7WoR4OsVIUBWhp /M0qPNiOQ0T5s/as/siEQFRlAMLjDe0MphQaGBqFOJv95/8gXFzAS9b16gKJZXUjPTQW J7EU92+cLrxbi3bbqt6K97fRadIXA/MiY3FO3l58NxRI2z/vQx5s65Qeh/Ocl+eN7C90 j59A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=4++Elu0EGPCbol2z4eQVmTRmHs+EtDp5AebgC+KdZxM=; b=xW8q5OO5+HoTZqG7t6eZEoDcW+jn3PjZLI8TX/BoRuBztLGIv+eVAHEmFCcxBRyYIa Nvs3QrVOo8xABRF2mwzasXqRB5NQpVqmEy8tFUfytBeNPbmYzRiP4TSJCOjiRG6f8rb8 RU/55b2M/6R337spPNHjrOYB/ZC+taOrwwTGthPBnPwslySlHY4Cr/GVyGuqaf/n2lRa uor/GDXoGonELUG2UYMe8ZkZ04SsuqZ8PzPAzpd4L0aFd7XGAXHsIru6nlqP0M/bg+MM zAc4eLP0Ifwz8yRH+zV1WXcAsJySbc3b6FougCjj4qylU3x3YYXqVv9m14PIj07kutMc /Xbg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qk6s8V0c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qw20-20020a1709066a1400b0073dbee21b05si9154005ejc.302.2022.09.06.06.20.47; Tue, 06 Sep 2022 06:21:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qk6s8V0c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240045AbiIFMpV (ORCPT + 99 others); Tue, 6 Sep 2022 08:45:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59602 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240059AbiIFMpQ (ORCPT ); Tue, 6 Sep 2022 08:45:16 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D03B3B97F; Tue, 6 Sep 2022 05:45:14 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id DE82ACE173B; Tue, 6 Sep 2022 12:45:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8EE68C433D6; Tue, 6 Sep 2022 12:45:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662468310; bh=QeHtG9X1lWUK95xHdfILY1ToyTHiAJs89SubC+l4SH0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=qk6s8V0cUJ0BGyXuuVOQdYgilVDQC6LxZvyy3NDdxZ8N7UNtVdr+/+K1oBguy6DjR +BfPlwr+lfpMoxtF76Wav1IIll4qR6GDxEUr7tDynsrFMLifWLm9kUcuVNk8NU7Q7x VDC2zGriWHp82Sppio9npowjCFJvOl5OCSwXBm6mKE8gELt90/JjjRes4ml921QH6V tWhJIyg0WSO3PhrlxxIfx4T3wfAwdlWmbMJYFVgzX4fRgY/u5yh6IyaK++vjhzVNbl mYdrzmFmOq9/WVw4VSs+NeBni88D1YEnKbiXkYvlQmD6nTOwzpnoHntBb7j2lzCY9E eqzOZ7j0gVTsA== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id 4338F404A1; Tue, 6 Sep 2022 09:45:08 -0300 (-03) Date: Tue, 6 Sep 2022 09:45:08 -0300 From: Arnaldo Carvalho de Melo To: Marco Elver Cc: Namhyung Kim , Jiri Olsa , Ingo Molnar , Peter Zijlstra , LKML , Ian Rogers , linux-perf-users@vger.kernel.org Subject: Re: [PATCH] perf test: Skip sigtrap test on old kernels Message-ID: References: <20220903000210.1112014-1-namhyung@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Url: http://acmel.wordpress.com X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em Sat, Sep 03, 2022 at 08:52:01AM +0200, Marco Elver escreveu: > On Sat, 3 Sept 2022 at 02:02, Namhyung Kim wrote: > > > > If it runs on an old kernel, perf_event_open would fail because of the > > new fields sigtrap and sig_data. Just skip the test if it failed. > > > > Cc: Marco Elver > > Signed-off-by: Namhyung Kim > > --- > > tools/perf/tests/sigtrap.c | 1 + > > 1 file changed, 1 insertion(+) > > > > diff --git a/tools/perf/tests/sigtrap.c b/tools/perf/tests/sigtrap.c > > index e32ece90e164..7057566e6ae4 100644 > > --- a/tools/perf/tests/sigtrap.c > > +++ b/tools/perf/tests/sigtrap.c > > @@ -140,6 +140,7 @@ static int test__sigtrap(struct test_suite *test __maybe_unused, int subtest __m > > fd = sys_perf_event_open(&attr, 0, -1, -1, perf_event_open_cloexec_flag()); > > if (fd < 0) { > > pr_debug("FAILED sys_perf_event_open(): %s\n", str_error_r(errno, sbuf, sizeof(sbuf))); > > + ret = TEST_SKIP; > > Wouldn't we be interested if perf_event_open() fails because it could > actually be a bug? By skipping we'll be more likely to miss the fact > there's a real problem. > > That's my naive thinking at least - what do other perf tests usually > do in this case? Yeah, I was going to try and check if this is the only way that, with the given arguments, perf_event_open would fail, but its better to at least check errno against -EINVAL or something? - Arnaldo