On Tue, Jul 21, 2020 at 1:16 PM Heiko Carstens <hca@xxxxxxxxxxxxx> wrote: > > Hi Alexei, > > On Tue, Jul 21, 2020 at 11:01:22AM -0700, Alexei Starovoitov wrote: > > On Wed, Jul 15, 2020 at 4:38 PM Ilya Leoshkevich <iii@xxxxxxxxxxxxx> wrote: > > > > > > This patch series implements BPF_PROBE_MEM opcode, which is used in BPF > > > programs that walk chains of kernel pointers. It consists of two parts: > > > patches 1 and 2 enhance s390 exception table infrastructure, patches 3 > > > and 4 contains the actual implementation and the test. > > > > > > We would like to take this series via s390 tree, because it contains > > > dependent s390 extable and bpf jit changes. However, it would be great > > > if someone knowledgeable could review patches 3 and 4. > > You probably missed this part? It should go upstream via the s390 > tree, plus this version is broken since it crashes immediatly if KASLR > is enabled. Ahh. sorry. will drop.