From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gate.crashing.org (gate.crashing.org [63.228.1.57]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ozlabs.org (Postfix) with ESMTPS id 2609BB6F98 for ; Sat, 25 Jun 2011 09:33:39 +1000 (EST) Subject: Re: [RFC PATCH 0/1] BPF JIT for PPC64 From: Benjamin Herrenschmidt To: Kumar Gala In-Reply-To: <750BF3E9-A788-4302-8AA1-4630614E20DC@kernel.crashing.org> References: <4E042867.5020902@ozlabs.org> <750BF3E9-A788-4302-8AA1-4630614E20DC@kernel.crashing.org> Content-Type: text/plain; charset="UTF-8" Date: Sat, 25 Jun 2011 09:33:31 +1000 Message-ID: <1308958411.32158.335.camel@pasglop> Mime-Version: 1.0 Cc: netdev@vger.kernel.org, linuxppc-dev , Matt Evans List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Fri, 2011-06-24 at 04:16 -0500, Kumar Gala wrote: > > Tested in-situ (tcpdump with varying complexity filters) and with a random BPF > > generator; I haven't verified loads from the fall back skb_copy_bits path. Bug > > reports/testing would be very welcome. > > Would be nice to get PPC32 support as well. Patches welcome :-) Cheers, Ben.