diff options
author | Brian Gerst <brgerst@gmail.com> | 2025-02-27 14:53:02 -0500 |
---|---|---|
committer | Ingo Molnar <mingo@kernel.org> | 2025-02-27 21:10:03 +0100 |
commit | 18cdd90aba794333f4c6dce39f5c3fe642af5575 (patch) | |
tree | fa261e4bc75e9ca189008817a18955535d17dce6 /tools/perf/scripts/python/task-analyzer.py | |
parent | b6762467a09ba8838c499e4f36561e82fc608ed1 (diff) |
x86/bpf: Fix BPF percpu accesses
Due to this recent commit in the x86 tree:
9d7de2aa8b41 ("Use relative percpu offsets")
percpu addresses went from positive offsets from the GSBASE to negative
kernel virtual addresses. The BPF verifier has an optimization for
x86-64 that loads the address of cpu_number into a register, but was only
doing a 32-bit load which truncates negative addresses.
Change it to a 64-bit load so that the address is properly sign-extended.
Fixes: 9d7de2aa8b41 ("Use relative percpu offsets")
Signed-off-by: Brian Gerst <brgerst@gmail.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Uros Bizjak <ubizjak@gmail.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Link: https://lore.kernel.org/r/20250227195302.1667654-1-brgerst@gmail.com
Diffstat (limited to 'tools/perf/scripts/python/task-analyzer.py')
0 files changed, 0 insertions, 0 deletions