Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp2581136rwi; Tue, 11 Oct 2022 10:28:32 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7qtevP0sSRe+wj+eRFMU1ncCiX/oRNkgrzsCmob7vr46JH/Xc1mBglURSns0hMJzqAOCdC X-Received: by 2002:a17:907:1dd8:b0:78d:cbdc:ff1f with SMTP id og24-20020a1709071dd800b0078dcbdcff1fmr6406117ejc.412.1665509312445; Tue, 11 Oct 2022 10:28:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665509312; cv=none; d=google.com; s=arc-20160816; b=lFLl5khFivHU+I8+VtKpdM3r2ekaXEuCmbR1M8hZAfxFYyeJ9/iAr466Dj9guCw9hy yYRrSjddHyyCLoAsDXw7tmFwaUitIUhCYBnRxVGGs8jXpS2zbsWLai8n4DoU1w5vDsc9 Cj++AfI/RqO63ggMZFdBNv5DcgLittgl68fadjFN2PS2L+770WQuStSTtvDN2cgVv6Y7 W9ECTp3ei7P1Nw8UtlaphyppEXH4dzg6G2ccrkolReNosQWmvd7EXCbOVfx7G9sa/3Y+ rKy9akCR/Kql7oxaqtk1KWH5g/TnaeRaA12+Ly3INlTPl/BbX+IZWd2stEa9+uX7nokt /aQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=WTMCqBJcWlheVxREFGrHyJFbq6EJGjzp9d5HiplakiQ=; b=FTpfVP/pqN+9t5x+NMBU5UQJSOWomO5AaS2L87lHBI+3MSo0WlvoL2UxosFw1RxDRl 3i3Vb4Ha8qwK6wUZrZTQjPZ40Kegqbj3FIDw91A+urWN8qo8e/L5Z3QQpiboQiYbFYeX jNkeRLjZcpEpSDb2Tay1EWi9SEXf2v9VhK7tioOn0MhRWFyA/3qTl5ckM5NO/O9CNfHF /hAeMK4zFuZuqIK2i7LK+ayrhBz94bqvnZ6cqaNPmDLTZNyrDh6fV8bvavdvdkG1+5P9 TC821Bu9GD5qkopkic2KmUo7MAjALH6ToTkL31R+12xPuOb2acMn2Du63ff52mJDNJt/ JrGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@posteo.net header.s=2017 header.b=EPC9wY55; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=posteo.net Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x2-20020a05640225c200b00457f9c97f13si14891473edb.581.2022.10.11.10.28.05; Tue, 11 Oct 2022 10:28:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@posteo.net header.s=2017 header.b=EPC9wY55; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=posteo.net Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229589AbiJKROL (ORCPT + 99 others); Tue, 11 Oct 2022 13:14:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57648 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229768AbiJKROK (ORCPT ); Tue, 11 Oct 2022 13:14:10 -0400 Received: from mout02.posteo.de (mout02.posteo.de [185.67.36.66]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CD2ECAA35D for ; Tue, 11 Oct 2022 10:14:08 -0700 (PDT) Received: from submission (posteo.de [185.67.36.169]) by mout02.posteo.de (Postfix) with ESMTPS id 1C1D4240107 for ; Tue, 11 Oct 2022 19:14:07 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.net; s=2017; t=1665508447; bh=IJDuhM6ycXMNiopSGZ9ArNUqlqTG10DcMSCuyC1WOd4=; h=Date:From:To:Cc:Subject:From; b=EPC9wY551FVW4/pHk6EXOvlxOVU/oxkDCWzVgzq7kc76RH0NywtEvhMyx0xGdO96o 2oY2ni7KU7p5K1wIw80ryTdITbg8FKwvWSSFRkG+WoRLKJbxBjsVBXy//nNfprzqfl reIxEAD7KvDJ578dT5dQO2cKm9f1OoV3yRyXlRj7WdIbPgclZqdjVJI8K3dWO104ON q6kw2kxpaXFBtRvqjthE2XHOwxRxesf8/wFCMVBOxSPU0ljQ9EIxRjSz1AwLTARxLF HJR1DQHk/nmYXTdvCLA+8wflUJWFyYpHQoJFjgWqcMWGjxlnBWrsGXNYtHlunnIDt0 g7wD0Jn5tRsig== Received: from customer (localhost [127.0.0.1]) by submission (posteo.de) with ESMTPSA id 4Mn2SS4wwYz6tq1; Tue, 11 Oct 2022 19:14:00 +0200 (CEST) Date: Tue, 11 Oct 2022 17:13:57 +0000 From: Daniel =?utf-8?Q?M=C3=BCller?= To: David Vernet Cc: bpf@vger.kernel.org, andrii@kernel.org, ast@kernel.org, daniel@iogearbox.net, martin.lau@linux.dev, haoluo@google.com, john.fastabend@gmail.com, jolsa@kernel.org, kpsingh@kernel.org, sdf@google.com, song@kernel.org, yhs@fb.com, kernel-team@fb.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH] selftests/bpf: Alphabetize DENYLISTs Message-ID: <20221011171357.dqecmkyjinxy2m7u@muellerd-fedora-MJ0AC3F3> References: <20221011165255.774014-1-void@manifault.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20221011165255.774014-1-void@manifault.com> X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 11, 2022 at 11:52:55AM -0500, David Vernet wrote: > The DENYLIST and DENYLIST.s390x files are used to specify testcases > which should not be run on CI. Currently, testcases are appended to the > end of these files as needed. This can make it a pain to resolve merge > conflicts. This patch alphabetizes the DENYLIST files to ease this > burden. > > Signed-off-by: David Vernet > --- > tools/testing/selftests/bpf/DENYLIST | 2 +- > tools/testing/selftests/bpf/DENYLIST.s390x | 40 +++++++++++----------- > 2 files changed, 21 insertions(+), 21 deletions(-) > > diff --git a/tools/testing/selftests/bpf/DENYLIST b/tools/testing/selftests/bpf/DENYLIST > index 939de574fc7f..5a07ecacd7b0 100644 > --- a/tools/testing/selftests/bpf/DENYLIST > +++ b/tools/testing/selftests/bpf/DENYLIST > @@ -1,6 +1,6 @@ > # TEMPORARY > get_stack_raw_tp # spams with kernel warnings until next bpf -> bpf-next merge > -stacktrace_build_id_nmi > stacktrace_build_id > +stacktrace_build_id_nmi > task_fd_query_rawtp > varlen > diff --git a/tools/testing/selftests/bpf/DENYLIST.s390x b/tools/testing/selftests/bpf/DENYLIST.s390x > index beef1232a47a..19d6f534e5be 100644 > --- a/tools/testing/selftests/bpf/DENYLIST.s390x > +++ b/tools/testing/selftests/bpf/DENYLIST.s390x > @@ -1,13 +1,17 @@ > # TEMPORARY > atomics # attach(add): actual -524 <= expected 0 (trampoline) > -bpf_iter_setsockopt # JIT does not support calling kernel function (kfunc) > bloom_filter_map # failed to find kernel BTF type ID of '__x64_sys_getpgid': -3 (?) > -bpf_tcp_ca # JIT does not support calling kernel function (kfunc) > +bpf_cookie # failed to open_and_load program: -524 (trampoline) > +bpf_iter_setsockopt # JIT does not support calling kernel function (kfunc) > bpf_loop # attaches to __x64_sys_nanosleep > bpf_mod_race # BPF trampoline > bpf_nf # JIT does not support calling kernel function > +bpf_tcp_ca # JIT does not support calling kernel function (kfunc) > +cb_refs # expected error message unexpected error: -524 (trampoline) > +cgroup_hierarchical_stats # JIT does not support calling kernel function (kfunc) > core_read_macros # unknown func bpf_probe_read#4 (overlapping) > d_path # failed to auto-attach program 'prog_stat': -524 (trampoline) > +deny_namespace # failed to attach: ERROR: strerror_r(-524)=22 (trampoline) > dummy_st_ops # test_run unexpected error: -524 (errno 524) (trampoline) > fentry_fexit # fentry attach failed: -524 (trampoline) > fentry_test # fentry_first_attach unexpected error: -524 (trampoline) > @@ -18,19 +22,28 @@ fexit_test # fexit_first_attach unexpected error: > get_func_args_test # trampoline > get_func_ip_test # get_func_ip_test__attach unexpected error: -524 (trampoline) > get_stack_raw_tp # user_stack corrupted user stack (no backchain userspace) > +htab_update # failed to attach: ERROR: strerror_r(-524)=22 (trampoline) > kfree_skb # attach fentry unexpected error: -524 (trampoline) > kfunc_call # 'bpf_prog_active': not found in kernel BTF (?) > +kfunc_dynptr_param # JIT does not support calling kernel function (kfunc) > +kprobe_multi_test # relies on fentry > ksyms_module # test_ksyms_module__open_and_load unexpected error: -9 (?) > ksyms_module_libbpf # JIT does not support calling kernel function (kfunc) > ksyms_module_lskel # test_ksyms_module_lskel__open_and_load unexpected error: -9 (?) > +libbpf_get_fd_by_id_opts # failed to attach: ERROR: strerror_r(-524)=22 (trampoline) > +lookup_key # JIT does not support calling kernel function (kfunc) > +lru_bug # prog 'printk': failed to auto-attach: -524 > +map_kptr # failed to open_and_load program: -524 (trampoline) > modify_return # modify_return attach failed: -524 (trampoline) > module_attach # skel_attach skeleton attach failed: -524 (trampoline) > mptcp > -kprobe_multi_test # relies on fentry > netcnt # failed to load BPF skeleton 'netcnt_prog': -7 (?) > probe_user # check_kprobe_res wrong kprobe res from probe read (?) > recursion # skel_attach unexpected error: -524 (trampoline) > ringbuf # skel_load skeleton load failed (?) > +select_reuseport # intermittently fails on new s390x setup > +send_signal # intermittently fails to receive signal > +setget_sockopt # attach unexpected error: -524 (trampoline) > sk_assign # Can't read on server: Invalid argument (?) > sk_lookup # endianness problem > sk_storage_tracing # test_sk_storage_tracing__attach unexpected error: -524 (trampoline) > @@ -52,28 +65,15 @@ timer_mim # failed to auto-attach program 'test1' > trace_ext # failed to auto-attach program 'test_pkt_md_access_new': -524 (trampoline) > trace_printk # trace_printk__load unexpected error: -2 (errno 2) (?) > trace_vprintk # trace_vprintk__open_and_load unexpected error: -9 (?) > +tracing_struct # failed to auto-attach: -524 (trampoline) > trampoline_count # prog 'prog1': failed to attach: ERROR: strerror_r(-524)=22 (trampoline) > +unpriv_bpf_disabled # fentry > +user_ringbuf # failed to find kernel BTF type ID of '__s390x_sys_prctl': -3 (?) > verif_stats # trace_vprintk__open_and_load unexpected error: -9 (?) > +verify_pkcs7_sig # JIT does not support calling kernel function (kfunc) > vmlinux # failed to auto-attach program 'handle__fentry': -524 (trampoline) > xdp_adjust_tail # case-128 err 0 errno 28 retval 1 size 128 expect-size 3520 (?) > xdp_bonding # failed to auto-attach program 'trace_on_entry': -524 (trampoline) > xdp_bpf2bpf # failed to auto-attach program 'trace_on_entry': -524 (trampoline) > -map_kptr # failed to open_and_load program: -524 (trampoline) > -bpf_cookie # failed to open_and_load program: -524 (trampoline) > xdp_do_redirect # prog_run_max_size unexpected error: -22 (errno 22) > -send_signal # intermittently fails to receive signal > -select_reuseport # intermittently fails on new s390x setup > xdp_synproxy # JIT does not support calling kernel function (kfunc) > -unpriv_bpf_disabled # fentry > -lru_bug # prog 'printk': failed to auto-attach: -524 > -setget_sockopt # attach unexpected error: -524 (trampoline) > -cb_refs # expected error message unexpected error: -524 (trampoline) > -cgroup_hierarchical_stats # JIT does not support calling kernel function (kfunc) > -htab_update # failed to attach: ERROR: strerror_r(-524)=22 (trampoline) > -tracing_struct # failed to auto-attach: -524 (trampoline) > -user_ringbuf # failed to find kernel BTF type ID of '__s390x_sys_prctl': -3 (?) > -lookup_key # JIT does not support calling kernel function (kfunc) > -verify_pkcs7_sig # JIT does not support calling kernel function (kfunc) > -kfunc_dynptr_param # JIT does not support calling kernel function (kfunc) > -deny_namespace # failed to attach: ERROR: strerror_r(-524)=22 (trampoline) > -libbpf_get_fd_by_id_opts # failed to attach: ERROR: strerror_r(-524)=22 (trampoline) > -- > 2.38.0 Looks good to me, thanks! Not sure if we should add a comment indicating lexical ordering or solely watch out for that through review. Acked-by: Daniel M?ller