Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751900AbaGIFL4 (ORCPT ); Wed, 9 Jul 2014 01:11:56 -0400 Received: from mail-qg0-f47.google.com ([209.85.192.47]:40684 "EHLO mail-qg0-f47.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751268AbaGIFLz (ORCPT ); Wed, 9 Jul 2014 01:11:55 -0400 MIME-Version: 1.0 In-Reply-To: References: <1404803213-10653-1-git-send-email-zlim.lnx@gmail.com> Date: Tue, 8 Jul 2014 22:11:54 -0700 Message-ID: Subject: Re: [PATCH RFCv2] arm64: eBPF JIT compiler From: Z Lim To: Alexei Starovoitov Cc: Catalin Marinas , Will Deacon , "David S. Miller" , Daniel Borkmann , Chema Gonzalez , LKML , "linux-arm-kernel@lists.infradead.org" , Network Development Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 8, 2014 at 2:24 AM, Alexei Starovoitov wrote: > On Tue, Jul 8, 2014 at 12:06 AM, Zi Shen Lim wrote: [...] >> Also, per discussion with Alexei, and additional suggestion from >> Daniel: >> - moved load_pointer() from net/core/filter.c into filter.h >> as bpf_load_pointer() >> which is done as a separate preparatory patch. [1] >> >> [1] http://patchwork.ozlabs.org/patch/366906/ > > Just to clarify. This patch is on top of [1] Yes, that's correct. This patch uses bpf_load_pointer() from [1]. BTW, looks like David has applied it in net-next 9f12fbe603f7 ("net: filter: move load_pointer() into filter.h"). [...] >> + case BPF_DW: > > this case can be removed too. Thanks for catching this :) I've removed it. > > Acked-by: Alexei Starovoitov > > Great work. Thanks. Thanks for your time and feedback! -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/