On Wed, Jul 15, 2020 at 4:38 PM Ilya Leoshkevich <iii@xxxxxxxxxxxxx> wrote: > > This patch series implements BPF_PROBE_MEM opcode, which is used in BPF > programs that walk chains of kernel pointers. It consists of two parts: > patches 1 and 2 enhance s390 exception table infrastructure, patches 3 > and 4 contains the actual implementation and the test. > > We would like to take this series via s390 tree, because it contains > dependent s390 extable and bpf jit changes. However, it would be great > if someone knowledgeable could review patches 3 and 4. > > v1 -> v2: > > - Add `jit->excnt = 0` in order to fix WARNINGs and fallbacks to the > interpreter when running extra_pass. This wasn't easy to spot on > bpf-next, since tests passed anyway. However, on v5.8-rc5 this led > to panics. Applied. Thanks