summaryrefslogtreecommitdiff
path: root/kernel/bpf
AgeCommit message (Expand)Author
2023-01-28Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf...Jakub Kicinski
2023-01-25bpf: Pass const struct bpf_prog * to .check_memberDavid Vernet
2023-01-25bpf: Allow BPF_PROG_TYPE_STRUCT_OPS programs to be sleepableDavid Vernet
2023-01-25bpf/docs: Document cpumask kfuncs in a new fileDavid Vernet
2023-01-25bpf: Enable cpumasks to be queried and used as kptrsDavid Vernet
2023-01-25bpf: Disallow NULLable pointers for trusted kfuncsDavid Vernet
2023-01-24bpf: Allow trusted args to walk struct when checking BTF IDsDavid Vernet
2023-01-24bpf: Enable annotating trusted nested pointersDavid Vernet
2023-01-23bpf: Support consuming XDP HW metadata from fext programsToke Høiland-Jørgensen
2023-01-23bpf: XDP metadata RX kfuncsStanislav Fomichev
2023-01-23bpf: Introduce device-bound XDP programsStanislav Fomichev
2023-01-23bpf: Reshuffle some parts of bpf/offload.cStanislav Fomichev
2023-01-23bpf: Move offload initialization into late_initcallStanislav Fomichev
2023-01-23bpf: Rename bpf_{prog,map}_is_dev_bound to is_offloadedStanislav Fomichev
2023-01-20bpf: Avoid recomputing spi in process_dynptr_funcKumar Kartikeya Dwivedi
2023-01-20bpf: Combine dynptr_get_spi and is_spi_bounds_validKumar Kartikeya Dwivedi
2023-01-20bpf: Allow reinitializing unreferenced dynptr stack slotsKumar Kartikeya Dwivedi
2023-01-20bpf: Invalidate slices on destruction of dynptrs on stackKumar Kartikeya Dwivedi
2023-01-20bpf: Fix partial dynptr stack slot reads/writesKumar Kartikeya Dwivedi
2023-01-20bpf: Fix missing var_off check for ARG_PTR_TO_DYNPTRKumar Kartikeya Dwivedi
2023-01-20bpf: Fix state pruning for STACK_DYNPTR stack slotsKumar Kartikeya Dwivedi
2023-01-20Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski
2023-01-17bpf: Do not allow to load sleepable BPF_TRACE_RAW_TP programJiri Olsa
2023-01-13bpf: Fix pointer-leak due to insufficient speculative store bypass mitigationLuis Gerhorst
2023-01-12bpf: hash map, avoid deadlock with suitable hash maskTonghao Zhang
2023-01-10bpf: btf: limit logging of ignored BTF mismatchesConnor O'Brien
2023-01-09bpf: remove the do_idr_lock parameter from bpf_prog_free_id()Paul Moore
2023-01-09bpf: restore the ebpf program ID for BPF_AUDIT_UNLOAD and PERF_BPF_EVENT_PROG...Paul Moore
2023-01-06bpf: Skip invalid kfunc call in backtrack_insnHao Sun
2023-01-05Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski
2023-01-04Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf...Jakub Kicinski
2022-12-28bpf: rename list_head -> graph_root in field info typesDave Marchevsky
2022-12-28bpf: Always use maximal size for copy_array()Kees Cook
2022-12-28bpf: keep a reference to the mm, in case the task is dead.Kui-Feng Lee
2022-12-28bpf: Fix panic due to wrong pageattr of im->imageChuang Wang
2022-12-27bpf: fix regs_exact() logic in regsafe() to remap IDs correctlyAndrii Nakryiko
2022-12-27bpf: perform byte-by-byte comparison only when necessary in regsafe()Andrii Nakryiko
2022-12-27bpf: reject non-exact register type matches in regsafe()Andrii Nakryiko
2022-12-27bpf: generalize MAYBE_NULL vs non-MAYBE_NULL ruleAndrii Nakryiko
2022-12-27bpf: reorganize struct bpf_reg_state fieldsAndrii Nakryiko
2022-12-27bpf: teach refsafe() to take into account ID remappingAndrii Nakryiko
2022-12-24Merge tag 'for-netdev' of git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpfDavid S. Miller
2022-12-22bpf: fix nullness propagation for reg to reg comparisonsHao Sun
2022-12-22bpf: Remove unused field initialization in bpf's ctl_tableRicardo Ribalda
2022-12-21Merge tag 'net-6.2-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/netd...Linus Torvalds
2022-12-21bpf: Reduce smap->elem_sizeMartin KaFai Lau
2022-12-19bpf: Remove trace_printk_lockJiri Olsa
2022-12-19bpf: Do cleanup in bpf_bprintf_cleanup only when neededJiri Olsa
2022-12-19bpf: Add struct for bin_args arg in bpf_bprintf_prepareJiri Olsa
2022-12-19bpf: Define sock security related BTF IDs under CONFIG_SECURITY_NETWORKHou Tao