Re: [PATCH net] ebpf, x86: fix general protection fault when tail call is invoked

2015-07-29 Thread David Miller
From: Daniel Borkmann Date: Tue, 28 Jul 2015 15:26:36 +0200 > With eBPF JIT compiler enabled on x86_64, I was able to reliably trigger > the following general protection fault out of an eBPF program with a simple > tail call, f.e. tracex5 (or a stripped down version of it): ... > Changing the em

Re: [PATCH net] ebpf, x86: fix general protection fault when tail call is invoked

2015-07-28 Thread Daniel Borkmann
On 07/28/2015 07:02 PM, Alexei Starovoitov wrote: On 7/28/15 6:26 AM, Daniel Borkmann wrote: After patch, disassembly: [...] 9e: lea0x80(%rsi,%rdx,8),%rax <--- CONFIG_LOCKDEP/CONFIG_LOCK_STAT 48 8d 84 d6 80 00 00 00 a6: mov(%rax),%rax 48 8b 00 [...]

Re: [PATCH net] ebpf, x86: fix general protection fault when tail call is invoked

2015-07-28 Thread Alexei Starovoitov
On 7/28/15 6:26 AM, Daniel Borkmann wrote: After patch, disassembly: [...] 9e: lea0x80(%rsi,%rdx,8),%rax <--- CONFIG_LOCKDEP/CONFIG_LOCK_STAT 48 8d 84 d6 80 00 00 00 a6: mov(%rax),%rax 48 8b 00 [...] [...] 9e: lea0x50(%rsi,%rdx,8),%rax <

[PATCH net] ebpf, x86: fix general protection fault when tail call is invoked

2015-07-28 Thread Daniel Borkmann
With eBPF JIT compiler enabled on x86_64, I was able to reliably trigger the following general protection fault out of an eBPF program with a simple tail call, f.e. tracex5 (or a stripped down version of it): [ 927.097918] general protection fault: [#1] SMP DEBUG_PAGEALLOC [...] [ 927