root@qnap:~# test_bpf: #0 TAX jited:0 241 466 241 PASS test_bpf: #1 TXA jited:1 51 117 51 PASS test_bpf: #2 ADD_SUB_MUL_K jited:0 167 PASS test_bpf: #3 DIV_MOD_KX jited:0 571 PASS test_bpf: #4 AND_OR_LSH_K jited:1 54 54 PASS test_bpf: #5 LD_IMM_0 jited:1 45 PASS test_bpf: #6 LD_IND jited:0 143 143 143 PASS test_bpf: #7 LD_ABS jited:0 120 133 120 PASS test_bpf: #8 LD_ABS_LL Unable to handle kernel paging request at virtual address 9e096420 pgd = daa30000 [9e096420] *pgd=00000000 Internal error: Oops: 805 [#1] PREEMPT ARM Modules linked in: test_bpf(+) [last unloaded: test_bpf] CPU: 0 PID: 1886 Comm: modprobe Not tainted 4.12.0-rc2-00275-g17a0ff4ded06-dirty #1784 Hardware name: Marvell Kirkwood (Flattened Device Tree) task: df7d4ba0 task.stack: de738000 PC is at imm_offset+0xa4/0x108 LR is at 0x8 pc : [<c0015080>] lr : [<00000008>] psr: 60000013 sp : de739c6c ip : 0000002c fp : 00000003 r10: de739cf8 r9 : e1356000 r8 : 0000001c r7 : de59c840 r6 : de59c840 r5 : bf2c2944 r4 : 00000000 r3 : dedd3adc r2 : dedd3adc r1 : de739cf8 r0 : ffe00000 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 0005397f Table: 1aa30000 DAC: 00000051 Process modprobe (pid: 1886, stack limit = 0xde738190) Stack: (0xde739c6c to 0xde73a000) 9c60: 00000001 00000030 00000003 c05c5d5e c001a560 9c80: de739cf4 00000000 e1356038 00000000 c05c5d34 ffe00000 c05c5d42 00000000 9ca0: 00000000 0000001a e1356000 00000000 5e3b2a64 00000f04 00000000 e1356000 9cc0: e1356000 c078105c 00000000 000000f8 bf2c2000 00000000 bf1661c0 c001c64c 9ce0: de57f0c8 00000008 00000002 de739d54 00000eec bf2c2944 e1356000 0000001c 9d00: 0000002c 00000038 00000001 00000000 de59c9a0 bf2c2944 00040008 de59c840 9d20: e1356000 de739d50 de57f0c0 00000005 de59c9a0 0000ffff 00000001 c008fb98 9d40: e1356000 e1356000 de57f0c0 c04a8384 00000000 00000008 e1356000 de739dd8 9d60: 00000000 e1356000 00000028 de739dd4 bf165140 00000000 bf1661c0 c04a84d0 9d80: 00000005 e1354000 bf1651c8 00000000 e1354000 bf2af218 dedcfd20 ffffe000 9da0: df45ef80 bf1651c4 00000008 00000008 00000003 00000008 00000003 00000000 9dc0: bf1650a5 bf165144 79f5179d 0000004e 00000000 e1354000 00000005 bf1651c8 9de0: 00000000 ffffe000 bf2af000 00000000 de57f9e4 00000001 bf2acee0 c007aa88 9e00: 00000124 c0009738 ffffffff 00000000 00000001 dfbe78b0 c07c25ac 0080007f 9e20: dfbe78a4 00000000 00000000 0000001f 00000000 dffc3d60 de738000 df401f00 9e40: de56b080 c007d6e0 00016acf c007aa88 bf2acee0 00000001 de59c280 00000001 9e60: bf2acee0 c00a1548 00000001 de57f9c0 de739f54 00000001 de57f9c0 c007d6e8 9e80: bf2aceec 00007fff bf2acee0 c007afd4 de739f48 00000000 bf2acf28 00000000 9ea0: 00000000 bf2ad074 e1344928 c05c76a8 bf2aceec 00000000 de739f44 c00f6fa8 9ec0: 001879a0 00000000 c00f7684 00000000 00000000 00000000 00000000 00000000 9ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9f00: 00000000 00000000 7fffffff 00000000 00000003 7f59f510 0000017b c000a544 9f20: de738000 00000000 00000000 c007de58 7fffffff 00000000 00000003 00000000 9f40: 00000000 e11bd000 001879a0 00000000 00000874 e11bd000 001879a0 e13441d0 9f60: e1343ff0 e1337960 00154550 001547c0 00000000 00000000 00000000 000014ec 9f80: 0000002f 00000030 0000001b 00000000 00000015 00000000 ca81c300 7f5b2810 9fa0: 00000000 c000a3a0 ca81c300 7f5b2810 00000003 7f59f510 00000000 7f59fd00 9fc0: ca81c300 7f5b2810 00000000 0000017b 7f59f510 00000000 7f5b21d0 00000000 9fe0: bee273a0 bee27390 7f593acc b6ed1130 60000010 00000003 00000000 00000000 [<c0015080>] (imm_offset) from [<c001a560>] (build_body+0x5164/0x70ec) [<c001a560>] (build_body) from [<c001c64c>] (bpf_int_jit_compile+0x160/0x314) [<c001c64c>] (bpf_int_jit_compile) from [<c008fb98>] (bpf_prog_select_runtime+0x14/0x124) [<c008fb98>] (bpf_prog_select_runtime) from [<c04a8384>] (bpf_prepare_filter+0x7b0/0x888) [<c04a8384>] (bpf_prepare_filter) from [<c04a84d0>] (bpf_prog_create+0x74/0xa4) [<c04a84d0>] (bpf_prog_create) from [<bf2af218>] (test_bpf_init+0x218/0x77c [test_bpf]) [<bf2af218>] (test_bpf_init [test_bpf]) from [<c0009738>] (do_one_initcall+0x40/0x178) [<c0009738>] (do_one_initcall) from [<c00a1548>] (do_init_module+0x58/0x1bc) [<c00a1548>] (do_init_module) from [<c007d6e8>] (load_module+0x1ae0/0x2050) [<c007d6e8>] (load_module) from [<c007de58>] (SyS_finit_module+0xa4/0xb8) [<c007de58>] (SyS_finit_module) from [<c000a3a0>] (ret_fast_syscall+0x0/0x38)
Looking at the .lst file: /* constants go just after the epilogue */ offset = ctx->offsets[ctx->prog->len]; c0015054: e591c000 ldr ip, [r1] c0015058: e5912018 ldr r2, [r1, #24] offset += ctx->prologue_bytes; offset += ctx->epilogue_bytes; c001505c: e1d132b0 ldrh r3, [r1, #32] offset = ctx->offsets[ctx->prog->len]; c0015060: e59ce008 ldr lr, [ip, #8] offset += ctx->epilogue_bytes; c0015064: e591c008 ldr ip, [r1, #8] c0015068: 0591501c ldreq r5, [r1, #28] offset = ctx->offsets[ctx->prog->len]; c001506c: e792210e ldr r2, [r2, lr, lsl #2] offset += ctx->epilogue_bytes; c0015070: e083300c add r3, r3, ip c0015074: e0833002 add r3, r3, r2 offset += i * 4; c0015078: e0833004 add r3, r3, r4 ctx->target[offset / 4] = k; c001507c: e3c32003 bic r2, r3, #3 c0015080: e7850002 str r0, [r5, r2] /* PC in ARM mode == address of the instruction + 8 */ imm = offset - (8 + ctx->idx * 4); Andrew