Re: [PATCH bpf-next v1 0/3] bpf: allow void* cast using bpf_rdonly_cast()
[
Date Prev
][
Date Next
][
Thread Prev
][Thread Next][
Date Index
][
Thread Index
]
Subject
: Re: [PATCH bpf-next v1 0/3] bpf: allow void* cast using bpf_rdonly_cast()
From
: Eduard Zingerman <eddyz87@xxxxxxxxx>
Date
: Tue, 24 Jun 2025 17:07:06 -0700
Cc
: daniel@xxxxxxxxxxxxx, martin.lau@xxxxxxxxx, kernel-team@xxxxxx, yonghong.song@xxxxxxxxx
In-reply-to
: <
20250625000520.2700423-1-eddyz87@gmail.com
>
User-agent
: Evolution 3.56.2 (3.56.2-1.fc42)
Messed up the subject. This should be v2. Can resend, if necessary.
References
:
[PATCH bpf-next v1 0/3] bpf: allow void* cast using bpf_rdonly_cast()
From:
Eduard Zingerman
Prev by Date:
[PATCH bpf-next v1 3/3] selftests/bpf: check operations on untrusted ro pointers to mem
Next by Date:
Re: [PATCH bpf-next v1 2/3] bpf: allow void* cast using bpf_rdonly_cast()
Previous by thread:
[PATCH bpf-next v1 3/3] selftests/bpf: check operations on untrusted ro pointers to mem
Index(es):
Date
Thread
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux Actions SoC]
[Linux for Synopsys ARC Processors]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux Audio Users]
[Yosemite News]
[Linux Kernel]
[Linux SCSI]