summaryrefslogtreecommitdiff
path: root/net/sched/cls_bpf.c
AgeCommit message (Expand)AuthorFilesLines
2017-11-09cls_bpf: use tcf_exts_get_net() before call_rcu()Cong Wang1-1/+6
2017-10-29net_sched: use tcf_queue_work() in bpf filterCong Wang1-2/+17
2017-08-31net_sched: add reverse binding for tc classCong Wang1-0/+9
2017-08-11net: sched: remove cops->tcf_cl_offloadJiri Pirko1-2/+2
2017-08-07net_sched: use void pointer for filter handleWANG Cong1-15/+12
2017-08-07net: sched: get rid of struct tc_to_netdevJiri Pirko1-12/+9
2017-08-07net: sched: push cls related args into cls_common structureJiri Pirko1-5/+2
2017-08-07net: sched: make type an argument for ndo_setup_tcJiri Pirko1-2/+2
2017-08-04net: sched: cls_bpf: no need to call tcf_exts_change for newly allocated structJiri Pirko1-19/+6
2017-08-04net: sched: cls_bpf: rename cls_bpf_modify_existing functionJiri Pirko1-6/+4
2017-06-21bpf: expose prog id for cls_bpf and act_bpfDaniel Borkmann1-0/+3
2017-06-08net: propagate tc filter chain index down the ndo_setup_tc callJiri Pirko1-0/+1
2017-06-06net: sched: introduce a TRAP control actionJiri Pirko1-0/+1
2017-04-21net_sched: move the empty tp check from ->destroy() to ->delete()WANG Cong1-6/+5
2017-04-13netlink: pass extended ACK struct to parsing functionsJohannes Berg1-1/+2
2017-02-17net/sched: cls_bpf: Reflect HW offload statusOr Gerlitz1-2/+11
2017-01-16bpf: rework prog_digest into prog_tagDaniel Borkmann1-2/+2
2016-12-05bpf: add prog_digest and expose it via fdinfo/netlinkDaniel Borkmann1-0/+8
2016-12-05bpf, cls: consolidate prog deletion pathDaniel Borkmann1-17/+13
2016-12-03Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-4/+0
2016-11-28net, sched: respect rcu grace period on cls destructionDaniel Borkmann1-4/+0
2016-11-27bpf: drop useless bpf_fd member from cls/actDaniel Borkmann1-8/+1
2016-10-29netlink: Add nla_memdup() to wrap kmemdup() use on nlattrThomas Graf1-3/+1
2016-09-21net: cls_bpf: allow offloaded filters to update statsJakub Kicinski1-0/+11
2016-09-21net: cls_bpf: add support for marking filters as hardware-onlyJakub Kicinski1-9/+25
2016-09-21net: cls_bpf: limit hardware offload by software-only flagJakub Kicinski1-2/+20
2016-09-21net: cls_bpf: add hardware offloadJakub Kicinski1-0/+70
2016-09-19net sched: stylistic cleanupsJamal Hadi Salim1-2/+4
2016-09-15bpf: drop unnecessary test in cls_bpf_classify and tcf_bpfDaniel Borkmann1-3/+0
2016-08-22net_sched: properly handle failure case of tcf_exts_init()WANG Cong1-10/+17
2016-07-01bpf: refactor bpf_prog_get and type check into helperDaniel Borkmann1-6/+1
2016-05-06bpf: wire in data and data_end for cls_act_bpfAlexei Starovoitov1-0/+2
2016-03-18cls_bpf: reset class and reuse major in daDaniel Borkmann1-5/+8
2016-01-10net, sched: add clsact qdiscDaniel Borkmann1-1/+1
2016-01-10net, sched: add skb_at_tc_ingress helperDaniel Borkmann1-5/+1
2015-10-03sched, bpf: add helper for retrieving routing realmsDaniel Borkmann1-2/+6
2015-09-23cls_bpf: further limit exec opcodes subsetDaniel Borkmann1-3/+0
2015-09-23cls_bpf: make binding to classid optionalDaniel Borkmann1-9/+8
2015-09-23cls_bpf: also dump TCA_BPF_FLAGSDaniel Borkmann1-3/+8
2015-09-17bpf: add bpf_redirect() helperAlexei Starovoitov1-0/+1
2015-09-17cls_bpf: introduce integrated actionsDaniel Borkmann1-11/+49
2015-07-21sched: cls_bpf: fix panic on filter replaceDaniel Borkmann1-1/+1
2015-06-07bpf: make programs see skb->data == L2 for ingress and egressAlexei Starovoitov1-1/+15
2015-04-16bpf: fix bpf helpers to use skb->mac_header relative offsetsAlexei Starovoitov1-0/+3
2015-03-12cls_bpf: do eBPF invocation under non-bh RCU lock variant for mapsDaniel Borkmann1-3/+6
2015-03-09net_sched: destroy proto tp when all filters are goneCong Wang1-1/+5
2015-03-01cls_bpf: add initial eBPF support for programmable classifiersDaniel Borkmann1-52/+154
2015-01-27Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-2/+13
2015-01-26net: cls_bpf: fix auto generation of per list handlesDaniel Borkmann1-2/+8
2015-01-26net: cls_bpf: fix size mismatch on filter preparationDaniel Borkmann1-0/+5