aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* tools: bpftool: exit doc Makefile early if rst2man is not availableQuentin Monnet2018-02-081-0/+5
* libbpf: complete list of strings for guessing program typeQuentin Monnet2018-02-081-0/+5
* nfp: bpf: fix immed relocation for larger offsetsJakub Kicinski2018-02-081-1/+1
* selftests: bpf: test_kmod.sh: check the module path before insmodNaresh Kamboju2018-02-081-3/+15
* Merge branch 'bpf-sockmap-fixes'Daniel Borkmann2018-02-064-77/+179
|\
| * bpf: sockmap, fix leaking maps with attached but not detached progsJohn Fastabend2018-02-061-5/+14
| * bpf: sockmap, add sock close() hook to remove socksJohn Fastabend2018-02-062-67/+103
| * net: add a UID to use for ULP socket assignmentJohn Fastabend2018-02-063-5/+62
|/
* tools/bpf: fix batch-mode test failure of test_xdp_redirect.shYonghong Song2018-02-062-0/+3
* bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=yYonghong Song2018-02-051-5/+26
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpfDavid S. Miller2018-02-0428-141/+1716
|\
| * Merge branch 'libbpf-xdp-support'Alexei Starovoitov2018-02-0220-128/+1632
| |\
| | * samples/bpf: use bpf_set_link_xdp_fdEric Leblond2018-02-029-126/+24
| | * libbpf: add missing SPDX-License-IdentifierEric Leblond2018-02-024-0/+8
| | * libbpf: add error reporting in XDPEric Leblond2018-02-025-2/+272
| | * libbpf: add function to setup XDPEric Leblond2018-02-023-0/+128
| | * tools: add netlink.h and if_link.h in tools uapiEric Leblond2018-02-023-0/+1200
| |/
| * bpf: fix bpf_prog_array_copy_to_user() issuesAlexei Starovoitov2018-02-031-8/+24
| * bpf: add documentation to compare clang "-target bpf" and default targetYonghong Song2018-02-021-0/+31
| * bpf: fix null pointer deref in bpf_prog_test_run_xdpDaniel Borkmann2018-02-013-0/+24
| * tools/bpf: permit selftests/bpf to be built in a different directoryYonghong Song2018-02-012-2/+3
| * netdevsim: fix overflow on the error pathJakub Kicinski2018-02-011-3/+2
* | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-02-0438-554/+977
|\ \
| * | KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed2018-02-031-0/+88
| * | KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed2018-02-033-6/+110
| * | KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIESKarimAllah Ahmed2018-02-033-1/+17
| * | KVM/x86: Add IBPB supportAshok Raj2018-02-033-3/+116
| * | KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDXKarimAllah Ahmed2018-02-032-5/+4
| * | Merge branch 'msr-bitmaps' of git://git.kernel.org/pub/scm/virt/kvm/kvm into ...Thomas Gleixner2018-02-031-254/+186
| |\ \
| | * | KVM: VMX: make MSR bitmaps per-VCPUPaolo Bonzini2018-01-311-123/+147
| | * | KVM: VMX: introduce alloc_loaded_vmcsPaolo Bonzini2018-01-271-14/+22
| | * | KVM: nVMX: Eliminate vmcs02 poolJim Mattson2018-01-271-123/+23
| * | | x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny2018-02-021-1/+1
| * | | x86/pti: Mark constant arrays as __initconstArnd Bergmann2018-02-021-2/+2
| * | | x86/spectre: Simplify spectre_v2 command line parsingKarimAllah Ahmed2018-02-021-30/+56
| * | | x86/retpoline: Avoid retpolines for built-in __init functionsDavid Woodhouse2018-02-021-1/+8
| * | | x86/kvm: Update spectre-v1 mitigationDan Williams2018-02-011-11/+9
| * | | x86/paravirt: Remove 'noreplace-paravirt' cmdline optionJosh Poimboeuf2018-01-312-16/+0
| * | | x86/speculation: Use Indirect Branch Prediction Barrier in context switchTim Chen2018-01-302-1/+34
| * | | x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on IntelDavid Woodhouse2018-01-302-19/+29
| * | | x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"Colin Ian King2018-01-301-1/+1
| * | | x86/spectre: Report get_user mitigation for spectre_v1Dan Williams2018-01-301-1/+1
| * | | nl80211: Sanitize array index in parse_txq_paramsDan Williams2018-01-301-3/+6
| * | | vfs, fdtable: Prevent bounds-check bypass via speculative executionDan Williams2018-01-301-1/+4
| * | | x86/syscall: Sanitize syscall table de-references under speculationDan Williams2018-01-301-1/+4
| * | | x86/get_user: Use pointer masking to limit speculationDan Williams2018-01-301-0/+10
| * | | x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospecDan Williams2018-01-304-14/+14
| * | | x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}Dan Williams2018-01-301-4/+4
| * | | x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospecDan Williams2018-01-301-0/+9
| * | | x86: Introduce barrier_nospecDan Williams2018-01-302-2/+5