Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I have quoted the claim verbatim from the article. It is obviously the claim of the article.


It's referring to Windows security software. If you have a lot of context with eBPF, which Gregg obviously does, the notion that eBPF will subsume the entire kernel doesn't even need to be said: you can't express arbitrary programs in eBPF. eBPF is safe because the verifier rejects the vast majority of valid programs.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: