Finding ways to make it easier and faster to mitigate an ongoing attack against a Linux system [...]| LWN.net
One of the first uses of the BPF virtual machine outside of networking was to implement access- [...]| LWN.net