On 9/17/20 11:15 AM, David Faust via Gcc-patches wrote:
> The 'mod' and 'div' operators in eBPF are unsigned, with no signed
> counterpart. xBPF adds two new ALU operations, sdiv and smod, for
> signed division and modulus, respectively. Update bpf.md with
> 'define_insn' blocks for signed div and mod to use them when targetting
> xBPF, and add new tests to ensure they are used appropriately.
>
> 2020-09-17  David Faust  <david.fa...@oracle.com>
>
> gcc/
>       * config/bpf/bpf.md: Add defines for signed div and mod operators.
>
> gcc/testsuite/
>       * gcc.target/bpf/diag-sdiv.c: New test.
>       * gcc.target/bpf/diag-smod.c: New test.
>       * gcc.target/bpf/xbpf-sdiv-1.c: New test.
>       * gcc.target/bpf/xbpf-smod-1.c: New test.

OK.  But give Jose 48hrs before committing just in case there's
something he wants to comment on.  Y'all are far more familiar with bpf
than I ;-)


jeff


Attachment: pEpkey.asc
Description: application/pgp-keys

Reply via email to