[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220127071532.384888-1-houtao1@huawei.com>
Date: Thu, 27 Jan 2022 15:15:30 +0800
From: Hou Tao <houtao1@...wei.com>
To: Daniel Borkmann <daniel@...earbox.net>
CC: Alexei Starovoitov <ast@...nel.org>,
Martin KaFai Lau <kafai@...com>, Yonghong Song <yhs@...com>,
Andrii Nakryiko <andrii@...nel.org>,
"David S . Miller" <davem@...emloft.net>,
Jakub Kicinski <kuba@...nel.org>,
John Fastabend <john.fastabend@...il.com>,
<netdev@...r.kernel.org>, <bpf@...r.kernel.org>,
<houtao1@...wei.com>, Zi Shen Lim <zlim.lnx@...il.com>,
Catalin Marinas <catalin.marinas@....com>,
Will Deacon <will@...nel.org>,
Ard Biesheuvel <ard.biesheuvel@....com>,
<linux-arm-kernel@...ts.infradead.org>
Subject: [PATCH bpf-next v2 0/2] bpf, arm64: enable kfunc call
Hi,
The simple patchset tries to enable kfunc call for arm64. Patch #1 just
overrides bpf_jit_supports_kfunc_call() to enable kfunc call and patch #2
add a test to ensure s32 is sufficient for kfunc offset.
Change Log:
v2:
* add a test to check whether imm will be overflowed for kfunc call
v1: https://lore.kernel.org/bpf/20220119144942.305568-1-houtao1@huawei.com
Hou Tao (2):
bpf, arm64: enable kfunc call
selftests/bpf: check whether s32 is sufficient for kfunc offset
arch/arm64/net/bpf_jit_comp.c | 5 ++
.../selftests/bpf/prog_tests/ksyms_module.c | 72 +++++++++++++++++++
2 files changed, 77 insertions(+)
--
2.27.0
Powered by blists - more mailing lists