Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-30 Thread Alexei Starovoitov
On Sat, Jun 28, 2014 at 8:35 AM, Andy Lutomirski wrote: > On Sat, Jun 28, 2014 at 8:21 AM, Greg KH wrote: >> On Sat, Jun 28, 2014 at 12:26:14AM -0700, Alexei Starovoitov wrote: >>> On Fri, Jun 27, 2014 at 11:28 PM, Andy Lutomirski >>> wrote: >>> > On Fri, Jun 27, 2014 at 11:12 PM, Alexei

RE: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-30 Thread David Laight
From: Alexei Starovoitov > On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski wrote: > > On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov > > wrote: > >> eBPF programs are safe run-to-completion functions with load/unload > >> methods from userspace similar to kernel modules. > >> > >> User

RE: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-30 Thread David Laight
From: Alexei Starovoitov On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski l...@amacapital.net wrote: On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov a...@plumgrid.com wrote: eBPF programs are safe run-to-completion functions with load/unload methods from userspace similar to kernel

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-30 Thread Alexei Starovoitov
On Sat, Jun 28, 2014 at 8:35 AM, Andy Lutomirski l...@amacapital.net wrote: On Sat, Jun 28, 2014 at 8:21 AM, Greg KH gre...@linuxfoundation.org wrote: On Sat, Jun 28, 2014 at 12:26:14AM -0700, Alexei Starovoitov wrote: On Fri, Jun 27, 2014 at 11:28 PM, Andy Lutomirski l...@amacapital.net

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Andy Lutomirski
On Sat, Jun 28, 2014 at 8:21 AM, Greg KH wrote: > On Sat, Jun 28, 2014 at 12:26:14AM -0700, Alexei Starovoitov wrote: >> On Fri, Jun 27, 2014 at 11:28 PM, Andy Lutomirski >> wrote: >> > On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov >> > wrote: >> > If you want to add GPL-only functions

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Greg KH
On Sat, Jun 28, 2014 at 12:26:14AM -0700, Alexei Starovoitov wrote: > On Fri, Jun 27, 2014 at 11:28 PM, Andy Lutomirski wrote: > > On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov > > wrote: > > If you want to add GPL-only functions in the future, that would be one > > thing. But if

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Alexei Starovoitov
On Fri, Jun 27, 2014 at 11:28 PM, Andy Lutomirski wrote: > On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov > wrote: >> On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski wrote: >>> On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov >>> wrote: eBPF programs are safe run-to-completion

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Andy Lutomirski
On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov wrote: > On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski wrote: >> On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov >> wrote: >>> eBPF programs are safe run-to-completion functions with load/unload >>> methods from userspace similar to

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Alexei Starovoitov
On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski wrote: > On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov wrote: >> eBPF programs are safe run-to-completion functions with load/unload >> methods from userspace similar to kernel modules. >> >> User space API: >> >> - load eBPF program >>

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Alexei Starovoitov
On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski l...@amacapital.net wrote: On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov a...@plumgrid.com wrote: eBPF programs are safe run-to-completion functions with load/unload methods from userspace similar to kernel modules. User space API: -

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Andy Lutomirski
On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov a...@plumgrid.com wrote: On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski l...@amacapital.net wrote: On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov a...@plumgrid.com wrote: eBPF programs are safe run-to-completion functions with

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Alexei Starovoitov
On Fri, Jun 27, 2014 at 11:28 PM, Andy Lutomirski l...@amacapital.net wrote: On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov a...@plumgrid.com wrote: On Fri, Jun 27, 2014 at 5:19 PM, Andy Lutomirski l...@amacapital.net wrote: On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Greg KH
On Sat, Jun 28, 2014 at 12:26:14AM -0700, Alexei Starovoitov wrote: On Fri, Jun 27, 2014 at 11:28 PM, Andy Lutomirski l...@amacapital.net wrote: On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov a...@plumgrid.com wrote: If you want to add GPL-only functions in the future, that would be

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-28 Thread Andy Lutomirski
On Sat, Jun 28, 2014 at 8:21 AM, Greg KH gre...@linuxfoundation.org wrote: On Sat, Jun 28, 2014 at 12:26:14AM -0700, Alexei Starovoitov wrote: On Fri, Jun 27, 2014 at 11:28 PM, Andy Lutomirski l...@amacapital.net wrote: On Fri, Jun 27, 2014 at 11:12 PM, Alexei Starovoitov a...@plumgrid.com

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-27 Thread Andy Lutomirski
On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov wrote: > eBPF programs are safe run-to-completion functions with load/unload > methods from userspace similar to kernel modules. > > User space API: > > - load eBPF program > prog_id = bpf_prog_load(int prog_id, bpf_prog_type, struct nlattr

[PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-27 Thread Alexei Starovoitov
eBPF programs are safe run-to-completion functions with load/unload methods from userspace similar to kernel modules. User space API: - load eBPF program prog_id = bpf_prog_load(int prog_id, bpf_prog_type, struct nlattr *prog, int len) where 'prog' is a sequence of sections (currently TEXT

[PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-27 Thread Alexei Starovoitov
eBPF programs are safe run-to-completion functions with load/unload methods from userspace similar to kernel modules. User space API: - load eBPF program prog_id = bpf_prog_load(int prog_id, bpf_prog_type, struct nlattr *prog, int len) where 'prog' is a sequence of sections (currently TEXT

Re: [PATCH RFC net-next 07/14] bpf: expand BPF syscall with program load/unload

2014-06-27 Thread Andy Lutomirski
On Fri, Jun 27, 2014 at 5:05 PM, Alexei Starovoitov a...@plumgrid.com wrote: eBPF programs are safe run-to-completion functions with load/unload methods from userspace similar to kernel modules. User space API: - load eBPF program prog_id = bpf_prog_load(int prog_id, bpf_prog_type, struct