Hello: This series was applied to bpf/bpf-next.git (master) by Daniel Borkmann <daniel@xxxxxxxxxxxxx>: On Thu, 12 May 2022 18:10:24 -0700 you wrote: > From: Alexei Starovoitov <ast@xxxxxxxxxx> > > The combination of jit blinding and pointers to bpf subprogs causes: > [ 36.989548] BUG: unable to handle page fault for address: 0000000100000001 > [ 36.990342] #PF: supervisor instruction fetch in kernel mode > [ 36.990968] #PF: error_code(0x0010) - not-present page > [ 36.994859] RIP: 0010:0x100000001 > [ 36.995209] Code: Unable to access opcode bytes at RIP 0xffffffd7. > [ 37.004091] Call Trace: > [ 37.004351] <TASK> > [ 37.004576] ? bpf_loop+0x4d/0x70 > [ 37.004932] ? bpf_prog_3899083f75e4c5de_F+0xe3/0x13b > > [...] Here is the summary with links: - [bpf-next,1/2] bpf: Fix combination of jit blinding and pointers to bpf subprogs. https://git.kernel.org/bpf/bpf-next/c/4b6313cf99b0 - [bpf-next,2/2] selftests/bpf: Check combination of jit blinding and pointers to bpf subprogs. https://git.kernel.org/bpf/bpf-next/c/365d519923a2 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html