-
Notifications
You must be signed in to change notification settings - Fork 59.6k
Richacl #109
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Closed
Closed
Richacl #109
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
We are going to add more flags and having them in hex format make it simpler Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Some file permission models differentiate between writing to a file (MAY_WRITE) and appending to it (MAY_WRITE | MAY_APPEND). Pass all the mask flags down to iop->check_acl so that filesystems can distinguish between writing and appending. All users of iop->check_acl pass the mask value back into posix_acl_permission(); strip off the additional mask flags there. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
When IS_POSIXACL() is true, the vfs does not apply the umask. Other acl models will need the same exception, so introduce a separate IS_ACL() test. The IS_POSIX_ACL() test is still needed so that nfsd can determine when the underlying file system supports POSIX ACLs (as opposed to some other kind). Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Introduce a new MS_RICHACL super-block flag and a new IS_RICHACL() test which file systems like nfs can use. IS_ACL() is true if IS_POSIXACL() or IS_RICHACL() is true. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
if CONFIG_FS_RICHACL is not defined optimize out the ACL check function. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Some permission models distinguish between the permission to create a non-directory and a directory. Pass this information down to inode_permission() as mask flags Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Normally, deleting a file requires write access to the parent directory. Some permission models use a different permission on the parent directory to indicate delete access. In addition, a process can have per-file delete access even without delete access on the parent directory. Introduce two new inode_permission() mask flags and use them in may_delete() Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
We will need to call iop->permission and iop->get_acl from inode_change_ok() for additional permission checks, and both take a non-const inode. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Some permission models can allow processes to take ownership of a file, change the file permissions, and set the file timestamps. Introduce new permission mask flags and check for those permissions in inode_change_ok(). Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
A richacl consists of an NFSv4 acl and an owner, group, and other mask. These three masks correspond to the owner, group, and other file permission bits, but they contain NFSv4 permissions instead of POSIX permissions. Each entry in the NFSv4 acl applies to the file owner (OWNER@), the owning group (GROUP@), literally everyone (EVERYONE@), or to a specific uid or gid. As in the standard POSIX file permission model, each process is the owner, group, or other file class. A richacl grants a requested access only if the NFSv4 acl in the richacl grants the access (according to the NFSv4 permission check algorithm), and the file mask that applies to the process includes the requested permissions. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
We need to map from POSIX permissions to NFSv4 permissions when a chmod() is done, from NFSv4 permissions to POSIX permissions when an acl is set (which implicitly sets the file permission bits), and from the MAY_READ/MAY_WRITE/MAY_EXEC/MAY_APPEND flags to NFSv4 permissions when doing an access check in a richacl. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Compute upper bound owner, group, and other file masks with as few permissions as possible without denying any permissions that the NFSv4 acl in a richacl grants. This algorithm is used when a file inherits an acl at create time and when an acl is set via a mechanism that does not specify file modes (such as via nfsd). When user-space sets an acl, the file masks are passed in as part of the xattr. When setting a richacl, the file masks determine what the file permission bits will be set to; see richacl_masks_to_mode(). Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Doing a chmod() sets the file mode, which includes the file permission bits. When a file has a richacl, the permissions that the richacl grants need to be limited to what the new file permission bits allow. This is done by setting the file masks in the richacl to what the file permission bits map to. The richacl access check algorithm takes the file masks into account, which ensures that the richacl cannot grant too many permissions. It is possible to explicitly add permissions to the file masks which go beyond what the file permission bits can grant (like the ACE4_WRITE_ACL permission). The POSIX.1 standard calls this an alternate file access control mechanism. A subsequent chmod() would ensure that those permissions are disabled again. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
As in the standard POSIX file permission model, each process is the
owner, group, or other file class. A process is
- in the owner file class if it owns the file,
- in the group file class if it is in the file's owning group or it
matches any of the user or group entries, and
- in the other file class otherwise.
Each file class is associated with a file mask.
A richacl grants a requested access if the NFSv4 acl in the richacl
grants the requested permissions (according to the NFSv4 permission
check algorithm) and the file mask that applies to the process includes
the requested permissions.
Acked-by: J. Bruce Fields <[email protected]>
Acked-by: David Howells <[email protected]>
Signed-off-by: Andreas Gruenbacher <[email protected]>
Signed-off-by: Aneesh Kumar K.V <[email protected]>
When a new file is created, it can inherit an acl from its parent directory; this is similar to how default acls work in POSIX (draft) ACLs. As with POSIX ACLs, if a file inherits an acl from its parent directory, the intersection between the create mode and the permissions granted by the inherited acl determines the file masks and file permission bits, and the umask is ignored. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
This function is used to avoid storing richacls on disk if the acl can be computed from the file permission bits. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Automatic Inheritance (AI) allows changes to the acl of a directory to recursively propagate down to files and directories in the directory. To implement this, the kernel keeps track of which permissions have been inherited, and makes sure that permission propagation is turned off when the file permission bits of a file are changed (upon create or chmod). The actual permission propagation is implemented in user space. AI works as follows: - When the ACL4_AUTO_INHERIT flag in the acl of a file is cleared, the file is not affected by AI. - When the ACL4_AUTO_INHERIT flag in the acl of a directory is set and a file or subdirectory is created in that directory, files created in the directory will have the ACL4_AUTO_INHERIT flag set, and all inherited aces will have the ACE4_INHERITED_ACE flag set. This allows user space to distinguish between aces which have been inherited, and aces which have been explicitly added. - When the ACL4_PROTECTED acl flag in the acl of a file is set, AI will not modify the acl of the file. This does not affect propagation of permissions from the file to its children (if the file is a directory). Linux does not have a way of creating files without setting the file permission bits, so all files created inside a directory with ACL4_AUTO_INHERIT set will also have the ACL4_PROTECTED flag set. This effectively disables AI. Protocols which support creating files without specifying permissions can explicitly clear the ACL4_PROTECTED flag after creating a file (and reset the file masks to "undo" applying the create mode; see richacl_compute_max_masks()). This is a workaround; a per-create or per-process flag indicating to ignore the create mode when AI is in effect would fix this problem. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Map between "system.richacl" xattrs and the in-kernel representation. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Cache richacls in struct inode so that this doesn't have to be done individually in each filesystem. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
Use IS_POSIXACL() instead of a file system specific mount flag since we have IS_POSIXACL() in the vfs already, anyway. Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]>
Support the richacl permission model in ext4. The richacls are stored in "system.richacl" xattrs.This need to be enabled by tune2fs or during mkfs.ext4 Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]> Signed-off-by: Andreas Gruenbacher <[email protected]>
This feature flag can be used to enable richacl on the file system. Once enabled the "acl" mount option will enable richacl instead of posix acl Acked-by: J. Bruce Fields <[email protected]> Acked-by: David Howells <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
This helps in easy testing of the patchset. The mount option will be later removed in favour of a feature flag. ***Should be folded before merging*** Signed-off-by: Aneesh Kumar K.V <[email protected]>
hauke
pushed a commit
to hauke/linux
that referenced
this pull request
Jul 28, 2014
Turn it into (for example): [ 0.073380] x86: Booting SMP configuration: [ 0.074005] .... node #0, CPUs: #1 #2 #3 #4 #5 torvalds#6 torvalds#7 [ 0.603005] .... node #1, CPUs: torvalds#8 torvalds#9 torvalds#10 torvalds#11 torvalds#12 torvalds#13 torvalds#14 torvalds#15 [ 1.200005] .... node #2, CPUs: torvalds#16 torvalds#17 torvalds#18 torvalds#19 torvalds#20 torvalds#21 torvalds#22 torvalds#23 [ 1.796005] .... node #3, CPUs: torvalds#24 torvalds#25 torvalds#26 torvalds#27 torvalds#28 torvalds#29 torvalds#30 torvalds#31 [ 2.393005] .... node #4, CPUs: torvalds#32 torvalds#33 torvalds#34 torvalds#35 torvalds#36 torvalds#37 torvalds#38 torvalds#39 [ 2.996005] .... node #5, CPUs: torvalds#40 torvalds#41 torvalds#42 torvalds#43 torvalds#44 torvalds#45 torvalds#46 torvalds#47 [ 3.600005] .... node torvalds#6, CPUs: torvalds#48 torvalds#49 torvalds#50 torvalds#51 #52 #53 torvalds#54 torvalds#55 [ 4.202005] .... node torvalds#7, CPUs: torvalds#56 torvalds#57 #58 torvalds#59 torvalds#60 torvalds#61 torvalds#62 torvalds#63 [ 4.811005] .... node torvalds#8, CPUs: torvalds#64 torvalds#65 torvalds#66 torvalds#67 torvalds#68 torvalds#69 #70 torvalds#71 [ 5.421006] .... node torvalds#9, CPUs: torvalds#72 torvalds#73 torvalds#74 torvalds#75 torvalds#76 torvalds#77 torvalds#78 torvalds#79 [ 6.032005] .... node torvalds#10, CPUs: torvalds#80 torvalds#81 torvalds#82 torvalds#83 torvalds#84 torvalds#85 torvalds#86 torvalds#87 [ 6.648006] .... node torvalds#11, CPUs: torvalds#88 torvalds#89 torvalds#90 torvalds#91 torvalds#92 torvalds#93 torvalds#94 torvalds#95 [ 7.262005] .... node torvalds#12, CPUs: torvalds#96 torvalds#97 torvalds#98 torvalds#99 torvalds#100 torvalds#101 torvalds#102 torvalds#103 [ 7.865005] .... node torvalds#13, CPUs: torvalds#104 torvalds#105 torvalds#106 torvalds#107 torvalds#108 torvalds#109 torvalds#110 torvalds#111 [ 8.466005] .... node torvalds#14, CPUs: torvalds#112 torvalds#113 torvalds#114 torvalds#115 torvalds#116 torvalds#117 torvalds#118 torvalds#119 [ 9.073006] .... node torvalds#15, CPUs: torvalds#120 torvalds#121 torvalds#122 torvalds#123 torvalds#124 torvalds#125 torvalds#126 torvalds#127 [ 9.679901] x86: Booted up 16 nodes, 128 CPUs and drop useless elements. Change num_digits() to hpa's division-avoiding, cell-phone-typed version which he went at great lengths and pains to submit on a Saturday evening. Signed-off-by: Borislav Petkov <[email protected]> Cc: [email protected] Cc: [email protected] Cc: [email protected] Cc: [email protected] Cc: [email protected] Cc: Linus Torvalds <[email protected]> Cc: Andrew Morton <[email protected]> Cc: Peter Zijlstra <[email protected]> Cc: Thomas Gleixner <[email protected]> Link: http://lkml.kernel.org/r/[email protected] Signed-off-by: Ingo Molnar <[email protected]>
tobetter
pushed a commit
to tobetter/linux
that referenced
this pull request
Sep 22, 2015
(re-) added Docker support
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Sep 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Sep 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 1, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 10, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 11, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 15, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 20, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 21, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 21, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 21, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 27, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 28, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Oct 30, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 3, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 5, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 5, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 7, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 15, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 16, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 20, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 22, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 23, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 23, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 23, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 25, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
guidosarducci
added a commit
to guidosarducci/linux
that referenced
this pull request
Nov 26, 2025
The function verify_perf_link_info() accepts a 'long' address to perform validation, which can sign-extend on 32-bit systems and fail checks. Use an 'unsigned long' type to avoid errors like: test_fill_link_info:PASS:skel_open 0 nsec test_fill_link_info:PASS:load_kallsyms 0 nsec test_kprobe_fill_link_info:PASS:attach_kprobe 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:get_link_info 0 nsec verify_perf_link_info:PASS:link_type 0 nsec verify_perf_link_info:PASS:perf_type_match 0 nsec verify_perf_link_info:PASS:kprobe_offset 0 nsec verify_perf_link_info:FAIL:kprobe_addr unexpected kprobe_addr: actual 3231513376 != expected -1063453920 verify_perf_link_info:PASS:kprobe_cookie 0 nsec verify_perf_link_info:PASS:name_len 0 nsec verify_perf_link_info:PASS:cmp_kprobe_func_name 0 nsec test_kprobe_fill_link_info:PASS:verify_perf_link_info 0 nsec torvalds#109/1 fill_link_info/kprobe_link_info:FAIL [...] torvalds#109/2 fill_link_info/kretprobe_link_info:FAIL torvalds#109 fill_link_info:FAIL Fixes: 23cf7aa ("selftests/bpf: Add selftest for fill_link_info") Signed-off-by: Tony Ambardar <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.