From: Alexei Starovoitov
Date: Sat, 22 Apr 2017 08:32:35 -0700
> On Fri, Apr 21, 2017 at 08:17:11PM -0700, David Miller wrote:
>>
>> This is an eBPF JIT for sparc64. All major features are supported.
>>
>> All tests under tools/testing/selftests/bpf/ pass.
>>
>> Signed-off-by: David S. Miller
On Fri, Apr 21, 2017 at 08:17:11PM -0700, David Miller wrote:
>
> This is an eBPF JIT for sparc64. All major features are supported.
>
> All tests under tools/testing/selftests/bpf/ pass.
>
> Signed-off-by: David S. Miller
...
> + /* tail call */
> + case BPF_JMP | BPF_CALL |BPF_X:
> +
This is an eBPF JIT for sparc64. All major features are supported.
All tests under tools/testing/selftests/bpf/ pass.
Signed-off-by: David S. Miller
---
arch/sparc/Kconfig|3 +-
arch/sparc/net/bpf_jit_32.h |2 +-
arch/sparc/net/{bpf_jit_32
From: Daniel Borkmann
Date: Wed, 19 Apr 2017 11:35:39 +0200
> On 04/18/2017 08:58 PM, David Miller wrote:
>> +if (!prog || !prog->len)
>> +return orig_prog;
>
> This condition can be removed, see also 93a73d442d37
> ("bpf, x86/arm64: remove useless checks on prog"), since
> there
On 04/18/2017 08:58 PM, David Miller wrote:
This is an eBPF JIT for sparc64. All major features are supported
except for tail calls.
test_bpf passes with no failures and all tests are JIT'd, both with
and without hardening enabled.
Signed-off-by: David S. Miller
[...]
While going over the
This is an eBPF JIT for sparc64. All major features are supported
except for tail calls.
test_bpf passes with no failures and all tests are JIT'd, both with
and without hardening enabled.
Signed-off-by: David S. Miller
---
arch/sparc/Kconfig |3 +-
arch/sparc/net/bpf_jit_64.