forked from luck/tmp_suning_uos_patched
02088d9b39
When an eBPF program tail-calls another eBPF program, it enters it after
the prologue to avoid having complex stack manipulations. This can lead
to kernel oopses, and similar.
Resolve this by always using a fixed stack layout, a CPU register frame
pointer, and using this when reloading registers before returning.
Fixes:
|
||
---|---|---|
.. | ||
bpf_jit_32.c | ||
bpf_jit_32.h | ||
Makefile |