From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CE15630B500; Mon, 26 Jan 2026 04:21:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769401315; cv=none; b=R+yoIHqCZqPjvj41kNwWowtdpZaC9YOpB8VLFvErf/fK4Z+yCnLBu0Nhe/iwuQIEGidooxlfBJcYA6VMkZqUUrhF58H8YZwAQyx++fPwD40tfjM8Cg1cXNUA+NAjr4334w2tMZJYJes8tqz5yZAA4bdlBTmRJaVJROmKp5ePWx8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769401315; c=relaxed/simple; bh=Jx+su4XvEX1CZyM9jePAP3z0M6axAToPzY131VK8tko=; h=Content-Type:MIME-Version:Subject:From:Message-Id:Date:References: In-Reply-To:To:Cc; b=FssI2W2aFqYAi3Oyzioj8HB1Lu1ZxinQKiXEwzRnHybGydfJKez/ip7mDGU4Rx37OkHA/2sxhy1bnU5KAaY0Il0P38MVZi5IIzagzhUXrHtHbBVMVuuysYjFgSTK1sIvOtLiZHwRDNUD+Jii76kpeITHGoNqX+hhh+eZTcB4WiM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=PLwuS2I7; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="PLwuS2I7" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5A981C19425; Mon, 26 Jan 2026 04:21:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1769401315; bh=Jx+su4XvEX1CZyM9jePAP3z0M6axAToPzY131VK8tko=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=PLwuS2I79MVl7aCppoGfqUgjVYTb/MU+gQ8S9BJPqIrT4p2yBLk+l13sFuVdRvnGs hAEPu/Byg0EBDg0arshMBfDn0gDRnKuASHuAdUGBi3xL8uAr7XPaRDVBQ7XoS6gLBa DFa6P86HshyML1yHXQ+KGTZTsYk3AMn1SpLm9gF4koM/yfkRj6lz/Yugtl7NK2Hwgb Z0aIGIFiemuDqJt+pJaECN3MzfOogXJnTOqHdRanMGHXXzEW+m41g7couuAMnR2eVL cDGP3xfmZ1wCxim6sIrJViTG2+fXTISwqgDvi+AeczN7GCBjdTAOLo54A59nAXWBQM dijPdY1wlDI2g== Received: from [10.30.226.235] (localhost [IPv6:::1]) by aws-us-west-2-korg-oddjob-rhel9-1.codeaurora.org (Postfix) with ESMTP id 4ECDD3809A22; Mon, 26 Jan 2026 04:21:51 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH bpf v2] riscv, bpf: fix incorrect usage of BPF_TRAMP_F_ORIG_STACK From: patchwork-bot+linux-riscv@kernel.org Message-Id: <176940130985.4057692.9394372597802605336.git-patchwork-notify@kernel.org> Date: Mon, 26 Jan 2026 04:21:49 +0000 References: <20251219142948.204312-1-dongml2@chinatelecom.cn> In-Reply-To: <20251219142948.204312-1-dongml2@chinatelecom.cn> To: Menglong Dong Cc: linux-riscv@lists.infradead.org, ast@kernel.org, schwab@linux-m68k.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, bjorn@kernel.org, pulehui@huawei.com, puranjay@kernel.org, pjw@kernel.org, palmer@dabbelt.com, aou@eecs.berkeley.edu, alex@ghiti.fr, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Hello: This patch was applied to riscv/linux.git (fixes) by Alexei Starovoitov : On Fri, 19 Dec 2025 22:29:48 +0800 you wrote: > The usage of BPF_TRAMP_F_ORIG_STACK in __arch_prepare_bpf_trampoline() is > wrong, and it should be BPF_TRAMP_F_CALL_ORIG, which caused crash as > Andreas reported: > > Insufficient stack space to handle exception! > Task stack: [0xff20000000010000..0xff20000000014000] > Overflow stack: [0xff600000ffdad070..0xff600000ffdae070] > CPU: 1 UID: 0 PID: 1 Comm: systemd Not tainted 6.18.0-rc5+ #15 PREEMPT(voluntary) > Hardware name: riscv-virtio qemu/qemu, BIOS 2025.10 10/01/2025 > epc : copy_from_kernel_nofault+0xa/0x198 > ra : bpf_probe_read_kernel+0x20/0x60 > epc : ffffffff802b732a ra : ffffffff801e6070 sp : ff2000000000ffe0 > gp : ffffffff82262ed0 tp : 0000000000000000 t0 : ffffffff80022320 > t1 : ffffffff801e6056 t2 : 0000000000000000 s0 : ff20000000010040 > s1 : 0000000000000008 a0 : ff20000000010050 a1 : ff60000083b3d320 > a2 : 0000000000000008 a3 : 0000000000000097 a4 : 0000000000000000 > a5 : 0000000000000000 a6 : 0000000000000021 a7 : 0000000000000003 > s2 : ff20000000010050 s3 : ff6000008459fc18 s4 : ff60000083b3d340 > s5 : ff20000000010060 s6 : 0000000000000000 s7 : ff20000000013aa8 > s8 : 0000000000000000 s9 : 0000000000008000 s10: 000000000058dcb0 > s11: 000000000058dca7 t3 : 000000006925116d t4 : ff6000008090f026 > t5 : 00007fff9b0cbaa8 t6 : 0000000000000016 > status: 0000000200000120 badaddr: 0000000000000000 cause: 8000000000000005 > Kernel panic - not syncing: Kernel stack overflow > CPU: 1 UID: 0 PID: 1 Comm: systemd Not tainted 6.18.0-rc5+ #15 PREEMPT(voluntary) > Hardware name: riscv-virtio qemu/qemu, BIOS 2025.10 10/01/2025 > Call Trace: > [] dump_backtrace+0x28/0x38 > [] show_stack+0x3a/0x50 > [] dump_stack_lvl+0x56/0x80 > [] dump_stack+0x18/0x22 > [] vpanic+0xf6/0x328 > [] panic+0x3e/0x40 > [] handle_bad_stack+0x98/0xa0 > [] bpf_probe_read_kernel+0x20/0x60 > > [...] Here is the summary with links: - [bpf,v2] riscv, bpf: fix incorrect usage of BPF_TRAMP_F_ORIG_STACK https://git.kernel.org/riscv/c/8f3e00af8e52 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html