mbox series

[bpf-next,v2,00/10] Implement cpuv4 support for s390x

Message ID 20230919101336.2223655-1-iii@linux.ibm.com (mailing list archive)
Headers show
Series Implement cpuv4 support for s390x | expand

Message

Ilya Leoshkevich Sept. 19, 2023, 10:09 a.m. UTC
v1: https://lore.kernel.org/bpf/20230830011128.1415752-1-iii@linux.ibm.com/
v1 -> v2:
- Redo Disable zero-extension for BPF_MEMSX as Puranjay and Alexei
  suggested.
- Drop the bpf_ct_insert_entry() patch, it went in via the bpf tree.
- Rebase, don't apply A-bs because there were fixed conflicts.

Hi,

This series adds the cpuv4 support to the s390x eBPF JIT.
Patches 1-3 are preliminary bugfixes.
Patches 4-8 implement the new instructions.
Patches 9-10 enable the tests.

Best regards,
Ilya

Ilya Leoshkevich (10):
  bpf: Disable zero-extension for BPF_MEMSX
  selftests/bpf: Unmount the cgroup2 work directory
  selftests/bpf: Add big-endian support to the ldsx test
  s390/bpf: Implement BPF_MOV | BPF_X with sign-extension
  s390/bpf: Implement BPF_MEMSX
  s390/bpf: Implement unconditional byte swap
  s390/bpf: Implement unconditional jump with 32-bit offset
  s390/bpf: Implement signed division
  selftests/bpf: Enable the cpuv4 tests for s390x
  selftests/bpf: Trim DENYLIST.s390x

 arch/s390/net/bpf_jit_comp.c                  | 265 +++++++++++++-----
 kernel/bpf/verifier.c                         |   2 +-
 tools/testing/selftests/bpf/DENYLIST.s390x    |  25 --
 tools/testing/selftests/bpf/cgroup_helpers.c  |  33 ++-
 .../selftests/bpf/progs/test_ldsx_insn.c      |   9 +-
 .../selftests/bpf/progs/verifier_bswap.c      |   3 +-
 .../selftests/bpf/progs/verifier_gotol.c      |   3 +-
 .../selftests/bpf/progs/verifier_ldsx.c       | 149 ++++++----
 .../selftests/bpf/progs/verifier_movsx.c      |   3 +-
 .../selftests/bpf/progs/verifier_sdiv.c       |   3 +-
 10 files changed, 331 insertions(+), 164 deletions(-)

Comments

patchwork-bot+netdevbpf@kernel.org Sept. 21, 2023, 9:30 p.m. UTC | #1
Hello:

This series was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <ast@kernel.org>:

On Tue, 19 Sep 2023 12:09:02 +0200 you wrote:
> v1: https://lore.kernel.org/bpf/20230830011128.1415752-1-iii@linux.ibm.com/
> v1 -> v2:
> - Redo Disable zero-extension for BPF_MEMSX as Puranjay and Alexei
>   suggested.
> - Drop the bpf_ct_insert_entry() patch, it went in via the bpf tree.
> - Rebase, don't apply A-bs because there were fixed conflicts.
> 
> [...]

Here is the summary with links:
  - [bpf-next,v2,01/10] bpf: Disable zero-extension for BPF_MEMSX
    https://git.kernel.org/bpf/bpf-next/c/577c06af8188
  - [bpf-next,v2,02/10] selftests/bpf: Unmount the cgroup2 work directory
    https://git.kernel.org/bpf/bpf-next/c/6cb66eca36f3
  - [bpf-next,v2,03/10] selftests/bpf: Add big-endian support to the ldsx test
    https://git.kernel.org/bpf/bpf-next/c/9873ce2e9c68
  - [bpf-next,v2,04/10] s390/bpf: Implement BPF_MOV | BPF_X with sign-extension
    https://git.kernel.org/bpf/bpf-next/c/3de55893f648
  - [bpf-next,v2,05/10] s390/bpf: Implement BPF_MEMSX
    https://git.kernel.org/bpf/bpf-next/c/738476a079bd
  - [bpf-next,v2,06/10] s390/bpf: Implement unconditional byte swap
    https://git.kernel.org/bpf/bpf-next/c/90f426d35e01
  - [bpf-next,v2,07/10] s390/bpf: Implement unconditional jump with 32-bit offset
    https://git.kernel.org/bpf/bpf-next/c/c690191e23d8
  - [bpf-next,v2,08/10] s390/bpf: Implement signed division
    https://git.kernel.org/bpf/bpf-next/c/91d2ad78e90c
  - [bpf-next,v2,09/10] selftests/bpf: Enable the cpuv4 tests for s390x
    https://git.kernel.org/bpf/bpf-next/c/48c432382dd4
  - [bpf-next,v2,10/10] selftests/bpf: Trim DENYLIST.s390x
    https://git.kernel.org/bpf/bpf-next/c/c29913bbf4ec

You are awesome, thank you!