[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fe0e9330-8ad7-4835-9ba9-adbcbe40e6a3@crowdstrike.com>
Date: Tue, 2 Dec 2025 15:56:26 -0500
From: Andrey Grodzovsky <andrey.grodzovsky@...wdstrike.com>
To: Josh Poimboeuf <jpoimboe@...nel.org>, <x86@...nel.org>
CC: <linux-kernel@...r.kernel.org>, <live-patching@...r.kernel.org>,
<bpf@...r.kernel.org>, Petr Mladek <pmladek@...e.com>,
Song Liu
<song@...nel.org>, Raja Khan <raja.khan@...wdstrike.com>,
Miroslav Benes
<mbenes@...e.cz>, Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann
<daniel@...earbox.net>,
Andrii Nakryiko <andrii@...nel.org>,
Peter Zijlstra
<peterz@...radead.org>,
DL Linux Open Source Team
<linux-open-source@...wdstrike.com>
Subject: Re: [External] [PATCH 0/2] bpf, x86/unwind/orc: Support reliable
unwinding through BPF stack frames
On 12/2/25 13:19, Josh Poimboeuf wrote:
> Fix livepatch stalls which may be seen when a task is blocked with BPF
> JIT on its kernel stack.
>
> Josh Poimboeuf (2):
> bpf: Add bpf_has_frame_pointer()
> x86/unwind/orc: Support reliable unwinding through BPF stack frames
>
> arch/x86/kernel/unwind_orc.c | 39 +++++++++++++++++++++++++-----------
> arch/x86/net/bpf_jit_comp.c | 10 +++++++++
> include/linux/bpf.h | 3 +++
> kernel/bpf/core.c | 16 +++++++++++++++
> 4 files changed, 56 insertions(+), 12 deletions(-)
>
Acked-and-tested-by: Andrey Grodzovsky<andrey.grodzovsky@...wdstrike.com>
Question - This looks to be x86 specific issue since ORC unwinding is
x86 specific and as such this has no impact on ARM, correct ?
Andrey
Powered by blists - more mailing lists