summaryrefslogtreecommitdiff
path: root/kernel/bpf
AgeCommit message (Expand)AuthorFilesLines
2018-12-21bpf: check pending signals while verifying programsAlexei Starovoitov1-0/+3
2018-12-08bpf: Prevent memory disambiguation attackAlexei Starovoitov1-4/+58
2018-12-08bpf/verifier: Pass instruction index to check_mem_access() and check_xadd()Ben Hutchings1-9/+9
2018-12-08bpf/verifier: Add spi variable to check_stack_write()Ben Hutchings1-5/+3
2018-08-03bpf: fix references to free_bpf_prog_info() in commentsJakub Kicinski1-2/+2
2018-05-09bpf: map_get_next_key to return first key on NULLTeng Qin3-13/+18
2018-03-28bpf: skip unnecessary capability checkChenbo Feng1-1/+1
2018-03-11bpf: add schedule points in percpu arrays managementEric Dumazet1-1/+4
2018-03-11bpf: fix mlock precharge on arraymapsDaniel Borkmann1-11/+18
2018-03-11bpf: fix wrong exposure of map_flags into fdinfo for lpmDaniel Borkmann2-0/+2
2018-01-31bpf: reject stores into ctx via st and xaddDaniel Borkmann1-0/+19
2018-01-31bpf: fix 32-bit divide by zeroAlexei Starovoitov1-0/+18
2018-01-31bpf: fix divides by zeroEric Dumazet1-2/+2
2018-01-31bpf: arsh is not supported in 32 bit alu thus reject itDaniel Borkmann1-0/+5
2018-01-31bpf: introduce BPF_JIT_ALWAYS_ON configAlexei Starovoitov1-0/+18
2018-01-31bpf: fix bpf_tail_call() x64 JITAlexei Starovoitov1-1/+1
2018-01-17bpf, array: fix overflow in max_entries and undefined behavior in index_maskDaniel Borkmann1-3/+15
2018-01-17bpf: prevent out-of-bounds speculationAlexei Starovoitov2-12/+61
2018-01-17bpf: refactor fixup_bpf_calls()Alexei Starovoitov1-39/+34
2018-01-17bpf: move fixup_bpf_calls() functionAlexei Starovoitov2-54/+54
2017-12-29bpf/verifier: Fix states_equal() comparison of pointer and UNKNOWNBen Hutchings1-2/+3
2017-12-25bpf: fix incorrect sign extension in check_alu_op()Daniel Borkmann1-3/+10
2017-12-25bpf: reject out-of-bounds stack pointer calculationDaniel Borkmann1-2/+20
2017-12-25bpf: fix branch pruning logicDaniel Borkmann1-0/+27
2017-12-25bpf: adjust insn_aux_data when patching insnsDaniel Borkmann1-5/+39
2017-12-14bpf: fix lockdep splatEric Dumazet1-2/+6
2017-10-12bpf/verifier: reject BPF_ALU64|BPF_ENDEdward Cree1-1/+2
2017-08-30bpf/verifier: fix min/max handling in BPF_SUBEdward Cree1-6/+15
2017-08-30bpf: fix mixed signed/unsigned derived min/max value boundsDaniel Borkmann1-14/+96
2017-08-30bpf, verifier: fix alu ops against map_value{, _adj} register typesDaniel Borkmann1-0/+1
2017-08-30bpf: adjust verifier heuristicsDaniel Borkmann1-1/+11
2017-08-30bpf, verifier: add additional patterns to evaluate_reg_imm_aluJohn Fastabend1-0/+62
2017-07-21bpf: prevent leaking pointer via xadd on unpriviledgedDaniel Borkmann1-0/+5
2017-07-05bpf: don't trigger OOM killer under pressure with map allocDaniel Borkmann4-36/+50
2017-05-14bpf: don't let ldimm64 leak map addresses on unprivilegedDaniel Borkmann1-5/+16
2017-05-14bpf: enhance verifier to understand stack pointer arithmeticYonghong Song1-0/+11
2017-05-03bpf: improve verifier packet range checksAlexei Starovoitov1-2/+3
2017-03-22bpf: fix mark_reg_unknown_value for spilled regs on map value markingDaniel Borkmann1-3/+8
2017-03-22bpf: fix regression on verifier pruning wrt map lookupsDaniel Borkmann1-3/+8
2017-03-22bpf: fix state equivalenceAlexei Starovoitov1-1/+1
2017-03-22bpf: Detect identical PTR_TO_MAP_VALUE_OR_NULL registersThomas Graf1-16/+45
2016-11-30bpf: fix states equal logic for varlen accessJosef Bacik1-2/+8
2016-11-16bpf: fix range arithmetic for bpf map accessJosef Bacik1-23/+47
2016-11-07bpf: fix map not being uncharged during map creation failureDaniel Borkmann1-1/+3
2016-11-07bpf: fix htab map destruction when extra reserve is in useDaniel Borkmann1-1/+2
2016-10-10Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds1-1/+1
2016-09-29bpf: allow access into map value arraysJosef Bacik1-18/+311
2016-09-27bpf: clean up put_cpu_var usageShaohua Li1-1/+1
2016-09-27fs: Replace CURRENT_TIME with current_time() for inode timestampsDeepa Dinamani1-1/+1
2016-09-27bpf: Set register type according to is_valid_access()Mickaël Salaün1-3/+2