Skip to content

Conversation

@rosellef
Copy link

No description provided.

Andreas Gruenbacher and others added 27 commits October 23, 2011 19:15
Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
We are going to add more flags and having them in hex format
make it simpler

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Some file permission models differentiate between writing to a file
(MAY_WRITE) and appending to it (MAY_WRITE | MAY_APPEND).  Pass all the
mask flags down to iop->check_acl so that filesystems can distinguish
between writing and appending.

All users of iop->check_acl pass the mask value back into
posix_acl_permission(); strip off the additional mask flags there.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
When IS_POSIXACL() is true, the vfs does not apply the umask.  Other acl
models will need the same exception, so introduce a separate IS_ACL()
test.

The IS_POSIX_ACL() test is still needed so that nfsd can determine when
the underlying file system supports POSIX ACLs (as opposed to some other
kind).

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Introduce a new MS_RICHACL super-block flag and a new IS_RICHACL() test
which file systems like nfs can use.  IS_ACL() is true if IS_POSIXACL()
or IS_RICHACL() is true.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
if CONFIG_FS_RICHACL is not defined optimize out
the ACL check function.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Some permission models distinguish between the permission to create a
non-directory and a directory.  Pass this information down to
inode_permission() as mask flags

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Normally, deleting a file requires write access to the parent directory.
Some permission models use a different permission on the parent
directory to indicate delete access.  In addition, a process can have
per-file delete access even without delete access on the parent
directory.

Introduce two new inode_permission() mask flags and use them in
may_delete()

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
We will need to call iop->permission and iop->get_acl from
inode_change_ok() for additional permission checks, and both take a
non-const inode.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Some permission models can allow processes to take ownership of a file,
change the file permissions, and set the file timestamps.  Introduce new
permission mask flags and check for those permissions in
inode_change_ok().

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
A richacl consists of an NFSv4 acl and an owner, group, and other mask.
These three masks correspond to the owner, group, and other file
permission bits, but they contain NFSv4 permissions instead of POSIX
permissions.

Each entry in the NFSv4 acl applies to the file owner (OWNER@), the
owning group (GROUP@), literally everyone (EVERYONE@), or to a specific
uid or gid.

As in the standard POSIX file permission model, each process is the
owner, group, or other file class.  A richacl grants a requested access
only if the NFSv4 acl in the richacl grants the access (according to the
NFSv4 permission check algorithm), and the file mask that applies to the
process includes the requested permissions.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
We need to map from POSIX permissions to NFSv4 permissions when a
chmod() is done, from NFSv4 permissions to POSIX permissions when an acl
is set (which implicitly sets the file permission bits), and from the
MAY_READ/MAY_WRITE/MAY_EXEC/MAY_APPEND flags to NFSv4 permissions when
doing an access check in a richacl.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Compute upper bound owner, group, and other file masks with as few
permissions as possible without denying any permissions that the NFSv4
acl in a richacl grants.

This algorithm is used when a file inherits an acl at create time and
when an acl is set via a mechanism that does not specify file modes
(such as via nfsd).  When user-space sets an acl, the file masks are
passed in as part of the xattr.

When setting a richacl, the file masks determine what the file
permission bits will be set to; see richacl_masks_to_mode().

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Doing a chmod() sets the file mode, which includes the file permission
bits.  When a file has a richacl, the permissions that the richacl
grants need to be limited to what the new file permission bits allow.

This is done by setting the file masks in the richacl to what the file
permission bits map to.  The richacl access check algorithm takes the
file masks into account, which ensures that the richacl cannot grant too
many permissions.

It is possible to explicitly add permissions to the file masks which go
beyond what the file permission bits can grant (like the ACE4_WRITE_ACL
permission).  The POSIX.1 standard calls this an alternate file access
control mechanism.  A subsequent chmod() would ensure that those
permissions are disabled again.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
As in the standard POSIX file permission model, each process is the
owner, group, or other file class.  A process is

  - in the owner file class if it owns the file,
  - in the group file class if it is in the file's owning group or it
    matches any of the user or group entries, and
  - in the other file class otherwise.

Each file class is associated with a file mask.

A richacl grants a requested access if the NFSv4 acl in the richacl
grants the requested permissions (according to the NFSv4 permission
check algorithm) and the file mask that applies to the process includes
the requested permissions.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
When a new file is created, it can inherit an acl from its parent
directory; this is similar to how default acls work in POSIX (draft)
ACLs.

As with POSIX ACLs, if a file inherits an acl from its parent directory,
the intersection between the create mode and the permissions granted by
the inherited acl determines the file masks and file permission bits,
and the umask is ignored.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
This function is used to avoid storing richacls on disk if the acl can
be computed from the file permission bits.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Automatic Inheritance (AI) allows changes to the acl of a directory to
recursively propagate down to files and directories in the directory.

To implement this, the kernel keeps track of which permissions have been
inherited, and makes sure that permission propagation is turned off when
the file permission bits of a file are changed (upon create or chmod).

The actual permission propagation is implemented in user space.

AI works as follows:

 - When the ACL4_AUTO_INHERIT flag in the acl of a file is cleared, the
   file is not affected by AI.

 - When the ACL4_AUTO_INHERIT flag in the acl of a directory is set and
   a file or subdirectory is created in that directory, files created in
   the directory will have the ACL4_AUTO_INHERIT flag set, and all
   inherited aces will have the ACE4_INHERITED_ACE flag set.  This
   allows user space to distinguish between aces which have been
   inherited, and aces which have been explicitly added.

 - When the ACL4_PROTECTED acl flag in the acl of a file is set, AI will
   not modify the acl of the file.  This does not affect propagation of
   permissions from the file to its children (if the file is a
   directory).

Linux does not have a way of creating files without setting the file
permission bits, so all files created inside a directory with
ACL4_AUTO_INHERIT set will also have the ACL4_PROTECTED flag set.  This
effectively disables AI.

Protocols which support creating files without specifying permissions
can explicitly clear the ACL4_PROTECTED flag after creating a file (and
reset the file masks to "undo" applying the create mode; see
richacl_compute_max_masks()).  This is a workaround; a per-create or
per-process flag indicating to ignore the create mode when AI is in
effect would fix this problem.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Map between "system.richacl" xattrs and the in-kernel representation.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Cache richacls in struct inode so that this doesn't have to be done
individually in each filesystem.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Use IS_POSIXACL() instead of a file system specific mount flag since we
have IS_POSIXACL() in the vfs already, anyway.

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Support the richacl permission model in ext4.  The richacls are stored
in "system.richacl" xattrs.This need to be enabled by tune2fs or during
mkfs.ext4

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
This feature flag can be used to enable richacl on
the file system. Once enabled the "acl" mount option
will enable richacl instead of posix acl

Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
This helps in easy testing of the patchset. The mount
option will be later removed in favour of a feature flag.

***Should be folded before merging***

Signed-off-by: Aneesh Kumar K.V <[email protected]>
hauke pushed a commit to hauke/linux that referenced this pull request Jul 28, 2014
Turn it into (for example):

[    0.073380] x86: Booting SMP configuration:
[    0.074005] .... node   #0, CPUs:          #1   #2   #3   #4   #5   torvalds#6   torvalds#7
[    0.603005] .... node   #1, CPUs:     torvalds#8   torvalds#9  torvalds#10  torvalds#11  torvalds#12  torvalds#13  torvalds#14  torvalds#15
[    1.200005] .... node   #2, CPUs:    torvalds#16  torvalds#17  torvalds#18  torvalds#19  torvalds#20  torvalds#21  torvalds#22  torvalds#23
[    1.796005] .... node   #3, CPUs:    torvalds#24  torvalds#25  torvalds#26  torvalds#27  torvalds#28  torvalds#29  torvalds#30  torvalds#31
[    2.393005] .... node   #4, CPUs:    torvalds#32  torvalds#33  torvalds#34  torvalds#35  torvalds#36  torvalds#37  torvalds#38  torvalds#39
[    2.996005] .... node   #5, CPUs:    torvalds#40  torvalds#41  torvalds#42  torvalds#43  torvalds#44  torvalds#45  torvalds#46  torvalds#47
[    3.600005] .... node   torvalds#6, CPUs:    torvalds#48  torvalds#49  torvalds#50  torvalds#51  #52  #53  torvalds#54  torvalds#55
[    4.202005] .... node   torvalds#7, CPUs:    torvalds#56  torvalds#57  #58  torvalds#59  torvalds#60  torvalds#61  torvalds#62  torvalds#63
[    4.811005] .... node   torvalds#8, CPUs:    torvalds#64  torvalds#65  torvalds#66  torvalds#67  torvalds#68  torvalds#69  #70  torvalds#71
[    5.421006] .... node   torvalds#9, CPUs:    torvalds#72  torvalds#73  torvalds#74  torvalds#75  torvalds#76  torvalds#77  torvalds#78  torvalds#79
[    6.032005] .... node  torvalds#10, CPUs:    torvalds#80  torvalds#81  torvalds#82  torvalds#83  torvalds#84  torvalds#85  torvalds#86  torvalds#87
[    6.648006] .... node  torvalds#11, CPUs:    torvalds#88  torvalds#89  torvalds#90  torvalds#91  torvalds#92  torvalds#93  torvalds#94  torvalds#95
[    7.262005] .... node  torvalds#12, CPUs:    torvalds#96  torvalds#97  torvalds#98  torvalds#99 torvalds#100 torvalds#101 torvalds#102 torvalds#103
[    7.865005] .... node  torvalds#13, CPUs:   torvalds#104 torvalds#105 torvalds#106 torvalds#107 torvalds#108 torvalds#109 torvalds#110 torvalds#111
[    8.466005] .... node  torvalds#14, CPUs:   torvalds#112 torvalds#113 torvalds#114 torvalds#115 torvalds#116 torvalds#117 torvalds#118 torvalds#119
[    9.073006] .... node  torvalds#15, CPUs:   torvalds#120 torvalds#121 torvalds#122 torvalds#123 torvalds#124 torvalds#125 torvalds#126 torvalds#127
[    9.679901] x86: Booted up 16 nodes, 128 CPUs

and drop useless elements.

Change num_digits() to hpa's division-avoiding, cell-phone-typed
version which he went at great lengths and pains to submit on a
Saturday evening.

Signed-off-by: Borislav Petkov <[email protected]>
Cc: [email protected]
Cc: [email protected]
Cc: [email protected]
Cc: [email protected]
Cc: [email protected]
Cc: Linus Torvalds <[email protected]>
Cc: Andrew Morton <[email protected]>
Cc: Peter Zijlstra <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Link: http://lkml.kernel.org/r/[email protected]
Signed-off-by: Ingo Molnar <[email protected]>
@rosellef rosellef closed this Jul 29, 2014
tobetter pushed a commit to tobetter/linux that referenced this pull request Sep 22, 2015
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Sep 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Sep 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 1, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 10, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 11, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 15, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 20, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 21, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 21, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 21, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 28, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Oct 30, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 3, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 5, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 5, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 7, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 15, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 16, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 20, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 22, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 23, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 23, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 23, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 25, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci added a commit to guidosarducci/linux that referenced this pull request Nov 26, 2025
The function verify_perf_link_info() accepts a 'long' address to perform
validation, which can sign-extend on 32-bit systems and fail checks. Use
an 'unsigned long' type to avoid errors like:

test_fill_link_info:PASS:skel_open 0 nsec
test_fill_link_info:PASS:load_kallsyms 0 nsec
test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:get_link_info 0 nsec
verify_perf_link_info:PASS:link_type 0 nsec
verify_perf_link_info:PASS:perf_type_match 0 nsec
verify_perf_link_info:PASS:kprobe_offset 0 nsec
verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920
verify_perf_link_info:PASS:kprobe_cookie 0 nsec
verify_perf_link_info:PASS:name_len 0 nsec
verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec
test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec
torvalds#109/1   fill_link_info/kprobe_link_info:FAIL
[...]
torvalds#109/2   fill_link_info/kretprobe_link_info:FAIL
torvalds#109     fill_link_info:FAIL

Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info")
Signed-off-by: Tony Ambardar <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants