ACK: [SRU][F][PATCH] UBUNTU: SAUCE: Revert "selftests/ftrace: check for do_sys_openat2 in user-memory test"

Andrea Righi andrea.righi at canonical.com
Thu Dec 17 08:52:10 UTC 2020


On Wed, Dec 16, 2020 at 10:24:36AM -0800, Kamal Mostafa wrote:
> BugLink: https://bugs.launchpad.net/bugs/1907523
> 
> This reverts commit 9110e2f2633dc9383a3a4711a0067094f6948783.
> 
> This commit is not suitable for 5.4-stable because the openat2 system
> call does not exist in v5.4.
> 
> Signed-off-by: Kamal Mostafa <kamal at canonical.com>
> Reference: https://lore.kernel.org/stable/20201216181353.30321-1-kamal@canonical.com/

LGTM, thanks.

Acked-by: Andrea Righi <andrea.righi at canonical.com>

> ---
>  .../selftests/ftrace/test.d/kprobe/kprobe_args_user.tc        | 4 ----
>  1 file changed, 4 deletions(-)
> 
> diff --git a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_user.tc b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_user.tc
> index a753c73d869a..0f60087583d8 100644
> --- a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_user.tc
> +++ b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_user.tc
> @@ -11,16 +11,12 @@ grep -A10 "fetcharg:" README | grep -q '\[u\]<offset>' || exit_unsupported
>  :;: "user-memory access syntax and ustring working on user memory";:
>  echo 'p:myevent do_sys_open path=+0($arg2):ustring path2=+u0($arg2):string' \
>  	> kprobe_events
> -echo 'p:myevent2 do_sys_openat2 path=+0($arg2):ustring path2=+u0($arg2):string' \
> -	>> kprobe_events
>  
>  grep myevent kprobe_events | \
>  	grep -q 'path=+0($arg2):ustring path2=+u0($arg2):string'
>  echo 1 > events/kprobes/myevent/enable
> -echo 1 > events/kprobes/myevent2/enable
>  echo > /dev/null
>  echo 0 > events/kprobes/myevent/enable
> -echo 0 > events/kprobes/myevent2/enable
>  
>  grep myevent trace | grep -q 'path="/dev/null" path2="/dev/null"'
>  
> -- 
> 2.17.1
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team



More information about the kernel-team mailing list