From: Hou Tao Date: Sun, 30 Jan 2022 09:29:15 +0000 (+0800) Subject: bpf, arm64: Enable kfunc call X-Git-Tag: v6.1-rc5~1746^2~392^2~17 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=b5e975d256dbfebd62413eb04fbff6803f02a43c;p=platform%2Fkernel%2Flinux-starfive.git bpf, arm64: Enable kfunc call Since commit b2eed9b58811 ("arm64/kernel: kaslr: reduce module randomization range to 2 GB"), for arm64 whether KASLR is enabled or not, the module is placed within 2GB of the kernel region, so s32 in bpf_kfunc_desc is sufficient to represente the offset of module function relative to __bpf_call_base. The only thing needed is to override bpf_jit_supports_kfunc_call(). Signed-off-by: Hou Tao Signed-off-by: Daniel Borkmann Link: https://lore.kernel.org/bpf/20220130092917.14544-2-hotforest@gmail.com --- diff --git a/arch/arm64/net/bpf_jit_comp.c b/arch/arm64/net/bpf_jit_comp.c index e96d4d87291f..74f9a9b6a053 100644 --- a/arch/arm64/net/bpf_jit_comp.c +++ b/arch/arm64/net/bpf_jit_comp.c @@ -1143,6 +1143,11 @@ out: return prog; } +bool bpf_jit_supports_kfunc_call(void) +{ + return true; +} + u64 bpf_jit_alloc_exec_limit(void) { return VMALLOC_END - VMALLOC_START;