summaryrefslogtreecommitdiffstats
path: root/net/sched/cls_bpf.c
AgeCommit message (Expand)AuthorFilesLines
2016-12-05bpf: add prog_digest and expose it via fdinfo/netlinkDaniel Borkmann1-0/+8
2016-12-05bpf, cls: consolidate prog deletion pathDaniel Borkmann1-17/+13
2016-12-03Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-4/+0
2016-11-28net, sched: respect rcu grace period on cls destructionDaniel Borkmann1-4/+0
2016-11-27bpf: drop useless bpf_fd member from cls/actDaniel Borkmann1-8/+1
2016-10-29netlink: Add nla_memdup() to wrap kmemdup() use on nlattrThomas Graf1-3/+1
2016-09-21net: cls_bpf: allow offloaded filters to update statsJakub Kicinski1-0/+11
2016-09-21net: cls_bpf: add support for marking filters as hardware-onlyJakub Kicinski1-9/+25
2016-09-21net: cls_bpf: limit hardware offload by software-only flagJakub Kicinski1-2/+20
2016-09-21net: cls_bpf: add hardware offloadJakub Kicinski1-0/+70
2016-09-19net sched: stylistic cleanupsJamal Hadi Salim1-2/+4
2016-09-15bpf: drop unnecessary test in cls_bpf_classify and tcf_bpfDaniel Borkmann1-3/+0
2016-08-22net_sched: properly handle failure case of tcf_exts_init()WANG Cong1-10/+17
2016-07-01bpf: refactor bpf_prog_get and type check into helperDaniel Borkmann1-6/+1
2016-05-06bpf: wire in data and data_end for cls_act_bpfAlexei Starovoitov1-0/+2
2016-03-18cls_bpf: reset class and reuse major in daDaniel Borkmann1-5/+8
2016-01-10net, sched: add clsact qdiscDaniel Borkmann1-1/+1
2016-01-10net, sched: add skb_at_tc_ingress helperDaniel Borkmann1-5/+1
2015-10-03sched, bpf: add helper for retrieving routing realmsDaniel Borkmann1-2/+6
2015-09-23cls_bpf: further limit exec opcodes subsetDaniel Borkmann1-3/+0
2015-09-23cls_bpf: make binding to classid optionalDaniel Borkmann1-9/+8
2015-09-23cls_bpf: also dump TCA_BPF_FLAGSDaniel Borkmann1-3/+8
2015-09-17bpf: add bpf_redirect() helperAlexei Starovoitov1-0/+1
2015-09-17cls_bpf: introduce integrated actionsDaniel Borkmann1-11/+49
2015-07-21sched: cls_bpf: fix panic on filter replaceDaniel Borkmann1-1/+1
2015-06-07bpf: make programs see skb->data == L2 for ingress and egressAlexei Starovoitov1-1/+15
2015-04-16bpf: fix bpf helpers to use skb->mac_header relative offsetsAlexei Starovoitov1-0/+3
2015-03-12cls_bpf: do eBPF invocation under non-bh RCU lock variant for mapsDaniel Borkmann1-3/+6
2015-03-09net_sched: destroy proto tp when all filters are goneCong Wang1-1/+5
2015-03-01cls_bpf: add initial eBPF support for programmable classifiersDaniel Borkmann1-52/+154
2015-01-27Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-2/+13
2015-01-26net: cls_bpf: fix auto generation of per list handlesDaniel Borkmann1-2/+8
2015-01-26net: cls_bpf: fix size mismatch on filter preparationDaniel Borkmann1-0/+5
2015-01-17tc: cls_bpf: rename bpf_len to bpf_num_opsJiri Pirko1-9/+9
2014-12-09net: sched: cls: remove unused op put from tcf_proto_opsJiri Pirko1-5/+0
2014-12-08net_sched: cls_bpf: remove faulty use of list_for_each_entry_rcuJiri Pirko1-2/+2
2014-12-08net_sched: cls_bpf: remove unnecessary iteration and use passed argJiri Pirko1-12/+5
2014-10-06net: sched: do not use tcf_proto 'tp' argument from call_rcuJohn Fastabend1-1/+3
2014-09-28net_sched: remove the first parameter from tcf_exts_destroy()WANG Cong1-2/+2
2014-09-15net_sched: fix suspicious RCU usage in cls_bpf_classify()WANG Cong1-1/+1
2014-09-13net: sched: rcu'ify cls_bpfJohn Fastabend1-47/+47
2014-08-02net: filter: split 'struct sk_filter' into socket and bpf partsAlexei Starovoitov1-6/+6
2014-05-23net: filter: let unattached filters use sock_fprog_kernDaniel Borkmann1-2/+2
2014-04-27sched, cls: check if we could overwrite actions when changing a filterCong Wang1-5/+5
2014-01-13net_sched: add struct net pointer to tcf_proto_ops->dumpWANG Cong1-1/+1
2013-12-18net_sched: cls: refactor out struct tcf_ext_mapWANG Cong1-9/+5
2013-12-18net_sched: act: use standard struct list_headWANG Cong1-0/+1
2013-12-10net_sched: cls_bpf: use tabs to do indentYang Yingliang1-1/+1
2013-10-29net: sched: cls_bpf: add BPF-based classifierDaniel Borkmann1-0/+385