diff options
| author | Tony Ambardar <tony.ambardar@gmail.com> | 2022-06-17 12:57:34 +0200 |
|---|---|---|
| committer | Daniel Borkmann <daniel@iogearbox.net> | 2022-06-21 18:52:04 +0200 |
| commit | 95acd8817e66d031d2e6ee7def3f1e1874819317 (patch) | |
| tree | f42808f3e806be15132e6978a1f2501eef59372b /scripts/gdb/linux/modules.py | |
| parent | b40b414ec8d971be0b2f6485c3a039b0fa7f078c (diff) | |
bpf, x64: Add predicate for bpf2bpf with tailcalls support in JIT
The BPF core/verifier is hard-coded to permit mixing bpf2bpf and tail
calls for only x86-64. Change the logic to instead rely on a new weak
function 'bool bpf_jit_supports_subprog_tailcalls(void)', which a capable
JIT backend can override.
Update the x86-64 eBPF JIT to reflect this.
Signed-off-by: Tony Ambardar <Tony.Ambardar@gmail.com>
[jakub: drop MIPS bits and tweak patch subject]
Signed-off-by: Jakub Sitnicki <jakub@cloudflare.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20220617105735.733938-2-jakub@cloudflare.com
Diffstat (limited to 'scripts/gdb/linux/modules.py')
0 files changed, 0 insertions, 0 deletions
