Age | Commit message (Expand) | Author | Files | Lines |
2017-08-09 | bpf, arm64: implement jiting of BPF_J{LT, LE, SLT, SLE} | Daniel Borkmann | 2 | -0/+24 |
2017-07-05 | Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux | Linus Torvalds | 1 | -3/+3 |
2017-06-30 | arm64: fix endianness annotation for 'struct jit_ctx' and friends | Luc Van Oostenryck | 1 | -3/+3 |
2017-06-15 | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net | David S. Miller | 1 | -2/+5 |
2017-06-11 | bpf, arm64: take advantage of stack_depth tracking | Daniel Borkmann | 1 | -11/+11 |
2017-06-07 | bpf, arm64: use separate register for state in stxr | Daniel Borkmann | 1 | -2/+5 |
2017-06-06 | bpf: Add jited_len to struct bpf_prog | Martin KaFai Lau | 1 | -0/+1 |
2017-05-31 | bpf: free up BPF_JMP | BPF_CALL | BPF_X opcode | Alexei Starovoitov | 1 | -1/+1 |
2017-05-11 | bpf, arm64: fix faulty emission of map access in tail calls | Daniel Borkmann | 1 | -2/+3 |
2017-05-08 | arm64: use set_memory.h header | Laura Abbott | 1 | -0/+1 |
2017-05-02 | bpf, arm64: fix jit branch offset related to ldimm64 | Daniel Borkmann | 1 | -4/+4 |
2017-05-02 | bpf, arm64: implement jiting of BPF_XADD | Daniel Borkmann | 2 | -5/+30 |
2017-04-28 | bpf, x86_64/arm64: remove old ldimm64 artifacts from jits | Daniel Borkmann | 1 | -9/+0 |
2017-02-21 | bpf: fix unlocking of jited image when module ronx not set | Daniel Borkmann | 1 | -1/+1 |
2017-02-17 | bpf: make jited programs visible in traces | Daniel Borkmann | 1 | -15/+0 |
2017-02-17 | bpf: remove stubs for cBPF from arch code | Daniel Borkmann | 1 | -5/+0 |
2016-06-10 | arm64: bpf: optimize LD_ABS, LD_IND | Zi Shen Lim | 1 | -3/+0 |
2016-06-10 | arm64: bpf: optimize JMP_CALL | Zi Shen Lim | 1 | -3/+0 |
2016-06-10 | arm64: bpf: implement bpf_tail_call() helper | Zi Shen Lim | 2 | -10/+98 |
2016-05-17 | bpf: arm64: remove callee-save registers use for tmp registers | Yang Shi | 1 | -29/+5 |
2016-05-16 | bpf, arm64: add support for constant blinding | Daniel Borkmann | 1 | -12/+40 |
2016-05-16 | bpf: prepare bpf_int_jit_compile/bpf_prog_select_runtime apis | Daniel Borkmann | 1 | -3/+4 |
2016-05-16 | bpf, x86/arm64: remove useless checks on prog | Daniel Borkmann | 1 | -3/+0 |
2016-05-14 | arm64: bpf: jit JMP_JSET_{X,K} | Zi Shen Lim | 1 | -0/+1 |
2016-01-17 | arm64: bpf: add extra pass to handle faulty codegen | Zi Shen Lim | 1 | -1/+21 |
2015-12-18 | bpf: move clearing of A/X into classic to eBPF migration prologue | Daniel Borkmann | 1 | -6/+0 |
2015-12-03 | arm64: bpf: add 'store immediate' instruction | Yang Shi | 1 | -1/+19 |
2015-11-18 | arm64: bpf: fix buffer pointer | Zi Shen Lim | 1 | -14/+13 |
2015-11-17 | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net | Linus Torvalds | 1 | -7/+41 |
2015-11-17 | arm64: bpf: make BPF prologue and epilogue align with ARM64 AAPCS | Yang Shi | 1 | -5/+39 |
2015-11-16 | bpf, arm64: start flushing icache range from header | Daniel Borkmann | 1 | -1/+1 |
2015-11-16 | arm64: bpf: fix JIT frame pointer setup | Yang Shi | 1 | -3/+3 |
2015-11-12 | Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux | Linus Torvalds | 2 | -19/+38 |
2015-11-06 | arm64: bpf: fix mod-by-zero case | Zi Shen Lim | 1 | -8/+13 |
2015-11-06 | arm64: bpf: fix div-by-zero case | Zi Shen Lim | 2 | -13/+27 |
2015-10-03 | ebpf: migrate bpf_prog's flags to bitfield | Daniel Borkmann | 1 | -1/+1 |
2015-06-26 | arm64: bpf: fix endianness conversion bugs | Xi Wang | 2 | -2/+24 |
2015-06-25 | arm64: bpf: fix out-of-bounds read in bpf2a64_offset() | Xi Wang | 1 | -3/+4 |
2015-05-08 | arm64: bpf: fix signedness bug in loading 64-bit immediate | Xi Wang | 1 | -1/+1 |
2014-12-03 | arm64: bpf: lift restriction on last instruction | Zi Shen Lim | 1 | -5/+8 |
2014-10-20 | net: bpf: arm64: minor fix of type in jited | Daniel Borkmann | 1 | -1/+1 |
2014-10-20 | arm64: bpf: add 'load 64-bit immediate' instruction | Zi Shen Lim | 1 | -0/+31 |
2014-10-20 | arm64: bpf: add 'shift by register' instructions | Zi Shen Lim | 2 | -2/+18 |
2014-10-20 | net: bpf: arm64: address randomize and write protect JIT code | Daniel Borkmann | 1 | -9/+30 |
2014-09-12 | net: bpf: arm64: fix module memory leak when JIT image build fails | Daniel Borkmann | 1 | -1/+3 |
2014-09-08 | arm64: eBPF JIT compiler | Zi Shen Lim | 3 | -0/+850 |