summaryrefslogtreecommitdiffstats
path: root/kernel/bpf
Commit message (Expand)AuthorAgeFilesLines
* bpf: enable BPF_J{LT, LE, SLT, SLE} opcodes in verifierDaniel Borkmann2017-08-091-4/+58
* bpf: add BPF_J{LT,LE,SLT,SLE} instructionsDaniel Borkmann2017-08-091-0/+60
* bpf: Extend check_uarg_tail_zero() checksMickaël Salaün2017-08-081-11/+15
* bpf: Move check_uarg_tail_zero() upwardMickaël Salaün2017-08-081-26/+26
* bpf/verifier: increase complexity limit to 128kEdward Cree2017-08-081-1/+1
* bpf/verifier: more concise register state logs for constant var_offEdward Cree2017-08-081-19/+27
* bpf/verifier: track signed and unsigned min/max valuesEdward Cree2017-08-082-308/+445
* bpf/verifier: rework value trackingEdward Cree2017-08-083-807/+1139
* bpf: devmap fix mutex in rcu critical sectionJohn Fastabend2017-08-071-23/+25
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2017-08-012-8/+17
|\
| * bpf: fix bpf_prog_get_info_by_fd to dump correct xlated_prog_lenDaniel Borkmann2017-07-291-1/+1
| * bpf: don't indicate success when copy_from_user failsDaniel Borkmann2017-07-291-1/+1
| * bpf/verifier: fix min/max handling in BPF_SUBEdward Cree2017-07-241-6/+15
* | bpf: dev_map_alloc() shouldn't return NULLDan Carpenter2017-07-241-0/+1
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2017-07-212-17/+107
|\|
| * Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netLinus Torvalds2017-07-201-14/+94
| |\
| | * bpf: fix mixed signed/unsigned derived min/max value boundsDaniel Borkmann2017-07-201-14/+94
| * | Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2017-07-151-3/+13
| |\ \ | | |/ | |/|
| | * bpf: Implement show_optionsDavid Howells2017-07-061-3/+13
* | | net: add notifier hooks for devmap bpf mapJohn Fastabend2017-07-172-1/+74
* | | xdp: Add batching support to redirect mapJohn Fastabend2017-07-171-1/+83
* | | bpf: add bpf_redirect_map helper routineJohn Fastabend2017-07-172-0/+16
* | | bpf: add devmap, a map for storing net device referencesJohn Fastabend2017-07-173-0/+275
|/ /
* | Merge branch 'work.memdup_user' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2017-07-051-29/+16
|\ \
| * | bpf: don't open-code memdup_user()Al Viro2017-06-301-29/+16
* | | bpf, verifier: add additional patterns to evaluate_reg_imm_aluJohn Fastabend2017-07-031-0/+62
* | | bpf: export whether tail call has jited ownerDaniel Borkmann2017-07-031-1/+6
* | | bpf: simplify narrower ctx accessDaniel Borkmann2017-07-031-44/+34
* | | bpf: BPF support for sock_opsLawrence Brakmo2017-07-012-0/+42
* | | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2017-06-301-0/+5
|\ \ \
| * | | bpf: prevent leaking pointer via xadd on unpriviledgedDaniel Borkmann2017-06-291-0/+5
| | |/ | |/|
* | | bpf: Fix out-of-bound access on interpreters[]Martin KaFai Lau2017-06-291-1/+3
* | | bpf: Add syscall lookup support for fd array and htabMartin KaFai Lau2017-06-295-3/+67
* | | bpf: possibly avoid extra masking for narrower load in verifierYonghong Song2017-06-231-8/+21
* | | bpf: permits narrower load from bpf program context fieldsYonghong Song2017-06-141-19/+52
* | | bpf: reset id on spilled regs in clear_all_pkt_pointersDaniel Borkmann2017-06-101-2/+2
* | | bpf: reset id on CONST_IMM transitionDaniel Borkmann2017-06-101-0/+2
* | | bpf: don't check spilled reg state for non-STACK_SPILLed type slotsDaniel Borkmann2017-06-101-0/+2
* | | bpf: cgroup skb progs cannot access ld_abs/indDaniel Borkmann2017-06-061-1/+0
* | | bpf: Add BPF_OBJ_GET_INFO_BY_FDMartin KaFai Lau2017-06-061-17/+146
* | | bpf: Add BPF_MAP_GET_FD_BY_IDMartin KaFai Lau2017-06-061-10/+85
* | | bpf: Add BPF_PROG_GET_FD_BY_IDMartin KaFai Lau2017-06-061-10/+81
* | | bpf: Add BPF_(PROG|MAP)_GET_NEXT_ID commandMartin KaFai Lau2017-06-061-0/+38
* | | bpf: Introduce bpf_map IDMartin KaFai Lau2017-06-061-1/+33
* | | bpf: Introduce bpf_prog IDMartin KaFai Lau2017-06-061-1/+39
* | | perf, bpf: Add BPF support to all perf_event typesAlexei Starovoitov2017-06-041-21/+7
* | | bpf: Remove the capability check for cgroup skb eBPF programChenbo Feng2017-06-021-1/+3
* | | bpf: Allow CGROUP_SKB eBPF program to access sk_buffChenbo Feng2017-06-021-0/+1
* | | bpf: use different interpreter depending on required stack sizeAlexei Starovoitov2017-05-311-9/+31
* | | bpf: reconcile bpf_tail_call and stack_depthAlexei Starovoitov2017-05-311-0/+1