Hello: This patch was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Tue, 15 Feb 2022 14:57:32 +0800 you wrote: > Now kfunc call uses s32 to represent the offset between the address of > kfunc and __bpf_call_base, but it doesn't check whether or not s32 will > be overflowed. The overflow is possible when kfunc is in module and the > offset between module and kernel is greater than 2GB. Take arm64 as an > example, before commit b2eed9b58811 ("arm64/kernel: kaslr: reduce module > randomization range to 2 GB"), the offset between module symbol and > __bpf_call_base will in 4GB range due to KASLR and may overflow s32. > > [...] Here is the summary with links: - [bpf-next,v4] bpf: reject kfunc calls that overflow insn->imm https://git.kernel.org/bpf/bpf-next/c/8cbf062a250e You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html