summaryrefslogtreecommitdiffstats
path: root/drivers/hid/hid-saitek.c
diff options
context:
space:
mode:
authorSandipan Das2018-05-24 08:56:47 +0200
committerDaniel Borkmann2018-05-24 09:20:49 +0200
commit8484ce8306f941f921cfceaf357a28d3a014f178 (patch)
tree3559abf3822f3ab6c9fa53dde98ee686fd890181 /drivers/hid/hid-saitek.c
parentbpf: powerpc64: pad function address loads with NOPs (diff)
downloadkernel-qcow2-linux-8484ce8306f941f921cfceaf357a28d3a014f178.tar.gz
kernel-qcow2-linux-8484ce8306f941f921cfceaf357a28d3a014f178.tar.xz
kernel-qcow2-linux-8484ce8306f941f921cfceaf357a28d3a014f178.zip
bpf: powerpc64: add JIT support for multi-function programs
This adds support for bpf-to-bpf function calls in the powerpc64 JIT compiler. The JIT compiler converts the bpf call instructions to native branch instructions. After a round of the usual passes, the start addresses of the JITed images for the callee functions are known. Finally, to fixup the branch target addresses, we need to perform an extra pass. Because of the address range in which JITed images are allocated on powerpc64, the offsets of the start addresses of these images from __bpf_call_base are as large as 64 bits. So, for a function call, we cannot use the imm field of the instruction to determine the callee's address. Instead, we use the alternative method of getting it from the list of function addresses in the auxiliary data of the caller by using the off field as an index. Signed-off-by: Sandipan Das <sandipan@linux.vnet.ibm.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'drivers/hid/hid-saitek.c')
0 files changed, 0 insertions, 0 deletions