lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20170421.201648.1153236027978111172.davem@davemloft.net>
Date:   Fri, 21 Apr 2017 20:16:48 -0700 (PDT)
From:   David Miller <davem@...emloft.net>
To:     sparclinux@...r.kernel.org
CC:     netdev@...r.kernel.org, ast@...nel.org, daniel@...earbox.net
Subject: [PATCH v2 net-next 0/2] sparc64 eBPF JIT


This series adds an eBPF JIT for sparc64.

Sparc32 keeps having it's cBPF JIT after these changes.

Thanks to Daniel and Alexei for their invaluable feedback and review.

Signed-off-by: David S. Miller <davem@...emloft.net>
---

since v1:
 -- add tail call support
 -- fix MOD generation to not emit the same constant load several times
 -- flush icache over entire buffer properly
 -- do STACK_BIAS adjustment of FP once in prologue
 -- remove useless sanity checks
 -- generate patches with -M -C

since RFC:
 -- rework register allocation so that we don't have to emit move
    instructions to get the arguments into place for calls
 -- allow FP as source for 64-bit ALU move operations
 -- don't emit NOP instructions in prologue, instead do multiple
    passes so that all the branch offsets settle down
 -- remove unnecessary checks on imm64 loads that verifier does
 -- consistently use bpf2sparc[] instead of direct register references

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ