From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ingo Molnar Subject: Re: [PATCH v6 net-next 4/6] bpf: enable bpf syscall on x64 and i386 Date: Tue, 26 Aug 2014 09:46:55 +0200 Message-ID: <20140826074655.GB19799@gmail.com> References: <1409014858-1410-1-git-send-email-ast@plumgrid.com> <1409014858-1410-5-git-send-email-ast@plumgrid.com> <20140825205201.10ac5ee3@uryu.home.lan> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Stephen Hemminger , "David S. Miller" , Linus Torvalds , Andy Lutomirski , Steven Rostedt , Daniel Borkmann , Chema Gonzalez , Eric Dumazet , Peter Zijlstra , Brendan Gregg , Namhyung Kim , "H. Peter Anvin" , Andrew Morton , Kees Cook , Linux API , Network Development , LKML To: Alexei Starovoitov Return-path: Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org * Alexei Starovoitov wrote: > On Mon, Aug 25, 2014 at 8:52 PM, Stephen Hemminger > wrote: > > Per discussion at Kernel Summit. Every new syscall requires > > a manual page and test programs. We have had too many new syscalls > > that are DOA. > > There is verifier testsuite that is testing eBPF verifier from userspace > via bpf syscall. Also there are multiple examples and libbpf. > I think test coverage for bpf syscall is quite substantial already. This is in tools/bpf/, right? Thanks, Ingo