Re: [PATCH 2/2] sparc64: Add eBPF JIT.

2017-04-22 Thread David Miller
From: Alexei Starovoitov Date: Sat, 22 Apr 2017 08:32:35 -0700 > On Fri, Apr 21, 2017 at 08:17:11PM -0700, David Miller wrote: >> >> This is an eBPF JIT for sparc64. All major features are supported. >> >> All tests under tools/testing/selftests/bpf/ pass. >> >> Signed-off-by: David S. Miller

Re: [PATCH 2/2] sparc64: Add eBPF JIT.

2017-04-22 Thread Alexei Starovoitov
On Fri, Apr 21, 2017 at 08:17:11PM -0700, David Miller wrote: > > This is an eBPF JIT for sparc64. All major features are supported. > > All tests under tools/testing/selftests/bpf/ pass. > > Signed-off-by: David S. Miller ... > + /* tail call */ > + case BPF_JMP | BPF_CALL |BPF_X: > +

[PATCH 2/2] sparc64: Add eBPF JIT.

2017-04-21 Thread David Miller
This is an eBPF JIT for sparc64. All major features are supported. All tests under tools/testing/selftests/bpf/ pass. Signed-off-by: David S. Miller --- arch/sparc/Kconfig|3 +- arch/sparc/net/bpf_jit_32.h |2 +- arch/sparc/net/{bpf_jit_32

Re: [PATCH 2/2] sparc64: Add eBPF JIT.

2017-04-20 Thread David Miller
From: Daniel Borkmann Date: Wed, 19 Apr 2017 11:35:39 +0200 > On 04/18/2017 08:58 PM, David Miller wrote: >> +if (!prog || !prog->len) >> +return orig_prog; > > This condition can be removed, see also 93a73d442d37 > ("bpf, x86/arm64: remove useless checks on prog"), since > there

Re: [PATCH 2/2] sparc64: Add eBPF JIT.

2017-04-19 Thread Daniel Borkmann
On 04/18/2017 08:58 PM, David Miller wrote: This is an eBPF JIT for sparc64. All major features are supported except for tail calls. test_bpf passes with no failures and all tests are JIT'd, both with and without hardening enabled. Signed-off-by: David S. Miller [...] While going over the

[PATCH 2/2] sparc64: Add eBPF JIT.

2017-04-18 Thread David Miller
This is an eBPF JIT for sparc64. All major features are supported except for tail calls. test_bpf passes with no failures and all tests are JIT'd, both with and without hardening enabled. Signed-off-by: David S. Miller --- arch/sparc/Kconfig |3 +- arch/sparc/net/bpf_jit_64.