summaryrefslogtreecommitdiffstats
path: root/kernel/bpf
Commit message (Expand)AuthorAgeFilesLines
* bpf: devmap memory usageYafang Shao2023-03-071-2/+24
* bpf: cpumap memory usageYafang Shao2023-03-071-0/+10
* bpf: bloom_filter memory usageYafang Shao2023-03-071-0/+12
* bpf: ringbuf memory usageYafang Shao2023-03-071-1/+19
* bpf: reuseport_array memory usageYafang Shao2023-03-071-0/+8
* bpf: stackmap memory usageYafang Shao2023-03-071-0/+14
* bpf: arraymap memory usageYafang Shao2023-03-071-0/+28
* bpf: hashtab memory usageYafang Shao2023-03-071-0/+43
* bpf: lpm_trie memory usageYafang Shao2023-03-071-0/+11
* bpf: add new map ops ->map_mem_usageYafang Shao2023-03-071-8/+7
* Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf...Jakub Kicinski2023-03-068-400/+1124
|\
| * bpf: add support for fixed-size memory pointer returns for kfuncsAndrii Nakryiko2023-03-041-0/+8
| * bpf: generalize dynptr_get_spi to be usable for itersAndrii Nakryiko2023-03-041-6/+12
| * bpf: mark PTR_TO_MEM as non-null register typeAndrii Nakryiko2023-03-041-1/+2
| * bpf: move kfunc_call_arg_meta higher in the fileAndrii Nakryiko2023-03-041-35/+35
| * bpf: ensure that r0 is marked scratched after any function callAndrii Nakryiko2023-03-041-0/+2
| * bpf: fix visit_insn()'s detection of BPF_FUNC_timer_set_callback helperAndrii Nakryiko2023-03-041-1/+1
| * bpf: clean up visit_insn()'s instruction processingAndrii Nakryiko2023-03-041-13/+12
| * bpf: honor env->test_state_freq flag in is_state_visited()Andrii Nakryiko2023-03-041-1/+2
| * bpf: improve regsafe() checks for PTR_TO_{MEM,BUF,TP_BUFFER}Andrii Nakryiko2023-03-041-1/+5
| * bpf: improve stack slot state printingAndrii Nakryiko2023-03-041-26/+49
| * bpf: allow ctx writes using BPF_ST_MEM instructionEduard Zingerman2023-03-032-77/+82
| * bpf: Use separate RCU callbacks for freeing selemKumar Kartikeya Dwivedi2023-03-031-30/+49
| * bpf: Refactor RCU enforcement in the verifier.Alexei Starovoitov2023-03-033-80/+154
| * bpf: Introduce kptr_rcu.Alexei Starovoitov2023-03-032-11/+50
| * bpf: Mark cgroups and dfl_cgrp fields as trusted.Alexei Starovoitov2023-03-031-0/+6
| * bpf: Rename __kptr_ref -> __kptr and __kptr -> __kptr_untrusted.Alexei Starovoitov2023-03-031-2/+2
| * bpf: Add support for absolute value BPF timersTero Kristo2023-03-021-2/+9
| * bpf: Make bpf_get_current_[ancestor_]cgroup_id() available for all program typesTejun Heo2023-03-022-4/+4
| * bpf: Fix bpf_dynptr_slice{_rdwr} to return NULL instead of 0Joanne Koong2023-03-011-4/+4
| * bpf: Fix doxygen comments for dynptr slice kfuncsDavid Vernet2023-03-011-16/+14
| * bpf: Support kptrs in local storage mapsKumar Kartikeya Dwivedi2023-03-013-9/+57
| * bpf: Support kptrs in percpu hashmap and percpu LRU hashmapKumar Kartikeya Dwivedi2023-03-012-22/+39
| * bpf: Add bpf_dynptr_slice and bpf_dynptr_slice_rdwrJoanne Koong2023-03-012-4/+261
| * bpf: Add xdp dynptrsJoanne Koong2023-03-012-1/+18
| * bpf: Add skb dynptrsJoanne Koong2023-03-013-14/+141
| * bpf: Add __uninit kfunc annotationJoanne Koong2023-03-011-2/+16
| * bpf: Refactor verifier dynptr into get_dynptr_arg_regJoanne Koong2023-03-011-30/+50
| * bpf: Allow initializing dynptrs in kfuncsJoanne Koong2023-03-011-45/+22
| * bpf: Refactor process_dynptr_funcJoanne Koong2023-03-011-31/+31
| * bpf: Support "sk_buff" and "xdp_buff" as valid kfunc arg typesJoanne Koong2023-03-011-0/+4
| * bpf: Fix bpf_cgroup_from_id() doxygen headerDavid Vernet2023-02-281-2/+1
| * bpf: Add bpf_cgroup_from_id() kfuncTejun Heo2023-02-231-0/+18
| * bpf: Check for helper calls in check_subprogs()Ilya Leoshkevich2023-02-221-2/+2
| * bpf: Only allocate one bpf_mem_cache for bpf_cpumask_maHou Tao2023-02-221-3/+3
| * bpf: Wrap register invalidation with a helperKumar Kartikeya Dwivedi2023-02-221-14/+14
| * bpf: Fix check_reg_type for PTR_TO_BTF_IDKumar Kartikeya Dwivedi2023-02-221-3/+20
| * bpf: Remove unused MEM_ALLOC | PTR_TRUSTED checksKumar Kartikeya Dwivedi2023-02-221-2/+0
| * bpf: Annotate data races in bpf_local_storageKumar Kartikeya Dwivedi2023-02-221-3/+13
| * bpf: Allow reads from uninit stackEduard Zingerman2023-02-221-1/+10