From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel Borkmann Subject: [PATCH bpf 0/2] Fix for arm64 jit Date: Mon, 26 Nov 2018 14:05:37 +0100 Message-ID: Cc: sandipan@linux.ibm.com, netdev@vger.kernel.org, Daniel Borkmann To: ast@kernel.org Return-path: Received: from www62.your-server.de ([213.133.104.62]:56324 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726411AbeKZX77 (ORCPT ); Mon, 26 Nov 2018 18:59:59 -0500 Sender: netdev-owner@vger.kernel.org List-ID: This set contains a fix for arm64 BPF JIT. First patch generalizes ppc64 way of retrieving subprog into bpf_jit_get_func_addr() as core code and uses the same on arm64 in second patch. Tested on both arm64 and ppc64. Thanks! Daniel Borkmann (2): bpf, ppc64: generalize fetching subprog into bpf_jit_get_func_addr bpf, arm64: fix getting subprog addr from aux for calls arch/arm64/net/bpf_jit_comp.c | 26 +++++++++++------- arch/powerpc/net/bpf_jit_comp64.c | 57 ++++++++++++++++++++++++++------------- include/linux/filter.h | 4 +++ kernel/bpf/core.c | 34 +++++++++++++++++++++++ 4 files changed, 93 insertions(+), 28 deletions(-) -- 2.9.5