diff options
author | Daniel Borkmann <daniel@iogearbox.net> | 2018-10-08 10:24:14 +0200 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2018-10-08 10:24:15 +0200 |
commit | a2046de99193efd870eee4f2055c33bb4e5b4fe2 (patch) | |
tree | 805eb07081b6db781ecd45da99bec51e242d512a /net/core | |
parent | 31ce8c4a1ad26852c91de900ebf6888a4d53fc1a (diff) | |
parent | e4052d06a5195b29271a7af262711d69f9ecfd04 (diff) |
Merge branch 'bpf-to-bpf-calls-nfp'
Quentin Monnet says:
====================
This patch series adds support for hardware offload of programs containing
BPF-to-BPF function calls. First, a new callback is added to the kernel
verifier, to collect information after the main part of the verification
has been performed. Then support for BPF-to-BPF calls is incrementally
added to the nfp driver, before offloading programs containing such calls
is eventually allowed by lifting the restriction in the kernel verifier, in
the last patch. Please refer to individual patches for details.
Many thanks to Jiong and Jakub for their precious help and contribution on
the main patches for the JIT-compiler, and everything related to stack
accesses.
====================
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'net/core')
0 files changed, 0 insertions, 0 deletions