On 1/30/22 10:29 AM, Hou Tao wrote:
From: Hou Tao <houtao1@xxxxxxxxxx> Since commit b2eed9b58811 ("arm64/kernel: kaslr: reduce module randomization range to 2 GB"), for arm64 whether KASLR is enabled or not, the module is placed within 2GB of the kernel region, so s32 in bpf_kfunc_desc is sufficient to represente the offset of module function relative to __bpf_call_base. The only thing needed is to override bpf_jit_supports_kfunc_call(). Signed-off-by: Hou Tao <houtao1@xxxxxxxxxx>
Could you rebase patch 2 & 3 and resend as they don't apply to bpf-next right now. Meanwhile, applied this one, thanks a lot!