lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <54E0FCEF.6090701@iogearbox.net> Date: Sun, 15 Feb 2015 21:09:19 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: Denis Kirjanov <kda@...ux-powerpc.org> CC: netdev@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org, benh@...nel.crashing.org, mpe@...erman.id.au, ast@...nel.org Subject: Re: [PATCH net-next 0/6] bpf: Enable BPF JIT on ppc32 On 02/15/2015 07:06 PM, Denis Kirjanov wrote: > This patch series enables BPF JIT on ppc32. There are relatevily > few chnages in the code to make it work. > > All test_bpf tests passed both on 7447a and P2041-based machines. I'm just wondering, next to the feedback that has already been provided, would opening this up for ppc32 make it significantly more difficult in future to migrate from classic BPF JIT to eBPF JIT eventually (which is what we want long-term)? Being curious, is there any ongoing effort from ppc people? -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists