From: Daniel Borkmann
Date: Tue, 28 Jul 2015 15:26:36 +0200
> With eBPF JIT compiler enabled on x86_64, I was able to reliably trigger
> the following general protection fault out of an eBPF program with a simple
> tail call, f.e. tracex5 (or a stripped down version of it):
...
> Changing the em
On 07/28/2015 07:02 PM, Alexei Starovoitov wrote:
On 7/28/15 6:26 AM, Daniel Borkmann wrote:
After patch, disassembly:
[...]
9e: lea0x80(%rsi,%rdx,8),%rax <--- CONFIG_LOCKDEP/CONFIG_LOCK_STAT
48 8d 84 d6 80 00 00 00
a6: mov(%rax),%rax
48 8b 00
[...]
On 7/28/15 6:26 AM, Daniel Borkmann wrote:
After patch, disassembly:
[...]
9e: lea0x80(%rsi,%rdx,8),%rax <--- CONFIG_LOCKDEP/CONFIG_LOCK_STAT
48 8d 84 d6 80 00 00 00
a6: mov(%rax),%rax
48 8b 00
[...]
[...]
9e: lea0x50(%rsi,%rdx,8),%rax <
With eBPF JIT compiler enabled on x86_64, I was able to reliably trigger
the following general protection fault out of an eBPF program with a simple
tail call, f.e. tracex5 (or a stripped down version of it):
[ 927.097918] general protection fault: [#1] SMP DEBUG_PAGEALLOC
[...]
[ 927