Daniel Borkmann ([email protected])

Number of posts: 1416 (0.42 per day)
First post: 2015-02-18 16:25:34
Last post: 2024-04-16 15:11:15

Date List Subject
2024-04-16 15:11:15 linux-kernel Re: [PATCH] bpf: btf: include linux/types.h for u32
2024-04-04 14:43:05 linux-kernel Re: [PATCH] bpf: x86: avoid link error with CONFIG_SMP=n
2024-04-03 15:24:53 linux-kernel Re: [PATCH] bpf: replace deprecated strncpy with strscpy
2024-04-03 09:24:33 linux-kernel Re: [PATCH RESEND bpf v2 0/2] x86/bpf: Fixes for the BPF JIT with retbleed=stuff
2024-04-02 13:06:48 linux-kernel Re: [PATCH bpf-next] Fix latent unsoundness in and/or/xor value tracking
2024-03-22 16:29:04 linux-kernel Re: [PATCH bpf v4] bpf: verifier: prevent userspace memory access
2024-03-22 14:47:51 linux-kernel Re: [PATCH bpf v4] bpf: verifier: prevent userspace memory access
2024-03-15 16:01:21 linux-kernel Re: [PATCH bpf-next v2] bpf: Check return from set_memory_rox() and friends
2024-03-15 14:35:45 linux-kernel Re: [PATCH bpf-next v2] bpf: Check return from set_memory_rox() and friends
2024-03-15 14:19:45 linux-kernel Re: [PATCH] MAINTAINERS: Update email address for Quentin Monnet
2024-03-14 21:14:29 linux-kernel Re: [PATCH net-next v3] Revert "net: Re-use and set mono_delivery_time bit for userspace tstamp packets"
2024-03-13 21:42:24 linux-kernel Re: [PATCH net-next v4] net: Re-use and set mono_delivery_time bit for userspace tstamp packets
2024-03-07 17:32:03 linux-kernel Re: [PATCH bpf-next RESEND v2 1/2] bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()
2024-03-04 14:19:59 linux-kernel Re: [xdp-hints] Re: [PATCH iwl-next,v3 0/2] XDP Tx Hardware Timestamp for igc driver
2024-03-04 14:00:26 linux-kernel Re: [PATCH net-next v2] net/nlmon: Cancel setting the fields of statistics to zero.
2024-03-01 14:10:25 linux-kernel Re: [PATCH net-next 2/2] net: nlmon: Simplify nlmon_get_stats64
2024-03-01 14:09:45 linux-kernel Re: [PATCH net-next 1/2] net: nlmon: Remove init and uninit functions
2024-02-28 13:35:58 linux-kernel Re: [PATCH bpf-next v8 0/2] bpf, arm64: use BPF prog pack allocator in BPF JIT
2024-02-21 17:31:02 linux-kernel Re: [PATCH bpf-next 1/2] bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()
2024-02-21 16:41:04 linux-kernel Re: [PATCH v4] bpf: Replace bpf_lpm_trie_key 0-length array with flexible array
2024-02-20 10:35:39 linux-kernel Re: [PATCH v3] bpf: Replace bpf_lpm_trie_key 0-length array with flexible array
2024-02-19 17:49:26 linux-kernel Re: [PATCH v2] bpf: Replace bpf_lpm_trie_key 0-length array with flexible array
2024-02-16 17:26:21 linux-kernel Re: [PATCH] selftests/bpf: Move test_dev_cgroup to prog_tests
2024-01-26 17:21:27 linux-kernel Re: [PATCH bpf-next] perf/bpf: Fix duplicate type check
2024-01-24 09:47:08 linux-kernel Re: linux-next: manual merge of the bpf-next tree with the mm tree
2024-01-16 16:36:24 linux-kernel Re: [PATCH v4 2/2] selftests/bpf: Add test for alu on PTR_TO_FLOW_KEYS
2024-01-08 15:27:54 linux-kernel Re: [PATCH bpf-next v2] bpf: Return -ENOTSUPP if calls are not allowed in non-JITed programs
2023-12-20 15:24:03 linux-kernel Re: [PATCH] fix null pointer dereference in bpf_object__collect_prog_relos
2023-12-20 10:02:26 linux-kernel LSF/MM/BPF: 2024: Call for Proposals
2023-12-19 15:09:45 linux-kernel Re: An invalid memory access was discovered by a fuzz test
2023-12-18 08:52:32 linux-kernel Re: [PATCH net-next 16/24] net: netkit, veth, tun, virt*: Use nested-BH locking for XDP redirect.
2023-12-06 10:57:55 linux-kernel Re: [PATCH bpf-next] netkit: Add some ethtool ops to provide information to user
2023-12-04 15:22:54 linux-kernel Re: [PATCH bpf-next] netkit: Add some ethtool ops to provide information to user
2023-12-01 15:47:05 linux-kernel Re: [PATCH] scripts/bpf_doc: add __main__ judgement before main code
2023-11-30 10:57:29 linux-kernel Re: [External] Re: [PATCH bpf-next] netkit: Add some ethtool ops to provide information to user
2023-11-27 14:29:46 linux-kernel Re: [PATCH] bpf: declare bpf_sk_storage_get_cg_sock_proto
2023-11-27 14:18:11 linux-kernel Re: [PATCH net] bpf: test_run: fix WARNING in format_decode
2023-11-22 15:29:25 linux-kernel Re: [PATCH] bpf: add __printf() to for printf fmt strings
2023-10-31 22:21:13 linux-kernel Re: [PATCH net] veth: Fix RX stats for bpf_redirect_peer() traffic
2023-10-30 14:20:11 linux-kernel Re: [PATCH net] veth: Fix RX stats for bpf_redirect_peer() traffic
2023-10-28 07:07:38 linux-kernel Re: [PATCH net] veth: Fix RX stats for bpf_redirect_peer() traffic
2023-10-17 14:16:29 linux-kernel Re: [PATCH bpf-next v4] selftests/bpf: Use pkg-config to determine ld flags
2023-10-16 12:52:45 linux-kernel Re: [PATCH bpf-next v3] selftests/bpf: Use pkg-config to determine ld flags
2023-10-16 12:47:56 linux-kernel Re: [PATCH] arch: powerpc: net: bpf_jit_comp32.c: Fixed 'instead' typo
2023-10-16 12:44:52 linux-kernel Re: [PATCH v2 2/5] seccomp, bpf: Introduce SECCOMP_LOAD_FILTER operation
2023-10-16 12:19:43 linux-kernel Re: [PATCH v2] selftests/bpf: Use pkg-config to determine ld flags
2023-10-16 11:39:41 linux-kernel Re: [PATCH bpf-next] selftests/bpf: Use pkg-config to determine ld flags
2023-10-11 14:50:38 linux-kernel Re: [PATCH bpf-next] Detect jumping to reserved code during check_cfg()
2023-10-10 15:35:38 linux-kernel Re: [PATCH bpf-next] Detect jumping to reserved code during check_cfg()
2023-10-10 15:27:37 linux-kernel Re: [PATCH bpf-next v2] bpf: Detect jumping to reserved code during check_cfg()
2023-10-10 08:33:29 linux-kernel Re: [PATCH bpf-next] Detect jumping to reserved code during check_cfg()