diff options
author | Zi Shen Lim <zlim.lnx@gmail.com> | 2014-08-27 06:15:30 +0200 |
---|---|---|
committer | Will Deacon <will.deacon@arm.com> | 2014-09-08 15:39:21 +0200 |
commit | e54bcde3d69d40023ae77727213d14f920eb264a (patch) | |
tree | c21f9a42c5d0d7fc8a6a65f28acb99112673f909 /security/keys | |
parent | arm64: introduce aarch64_insn_gen_logical_shifted_reg() (diff) | |
download | linux-e54bcde3d69d40023ae77727213d14f920eb264a.tar.xz linux-e54bcde3d69d40023ae77727213d14f920eb264a.zip |
arm64: eBPF JIT compiler
The JIT compiler emits A64 instructions. It supports eBPF only.
Legacy BPF is supported thanks to conversion by BPF core.
JIT is enabled in the same way as for other architectures:
echo 1 > /proc/sys/net/core/bpf_jit_enable
Or for additional compiler output:
echo 2 > /proc/sys/net/core/bpf_jit_enable
See Documentation/networking/filter.txt for more information.
The implementation passes all 57 tests in lib/test_bpf.c
on ARMv8 Foundation Model :) Also tested by Will on Juno platform.
Signed-off-by: Zi Shen Lim <zlim.lnx@gmail.com>
Acked-by: Alexei Starovoitov <ast@plumgrid.com>
Acked-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Diffstat (limited to 'security/keys')
0 files changed, 0 insertions, 0 deletions