eBPF Summit 2024

Blog page

TechnologyExternal

Every Call You Make: Why Watching Traffic (and eBPF) Is the Future of Developer Tools

The “99% developers” need easier solutions for observability. Learn how eBPF may be the way to get there.

Read more
TechnologyExternal

Linux kernel's eBPF feature put to unexpected new uses

The Register's coverage of Linux Plumber's Conference where new use cases like ghOSt and HID-BPF were presented

Read more
TechnologyExternal

Porting an eBPF-based application to arm64: our experience with Inspektor Gadget

Inspektor Gadget is now available on arm64! It will enable you to debug your kubernetes cluster running on this architecture, whether it is a thousand nodes cluster hosted in the cloud or locally on your arm64-based laptop or SBC

Read more
TechnologyExternal

Why You Should Pay Attention to eBPF

Redmonk gives the heads up that eBPF is a technology to watch. Expect more analysts to follow suit

Read more
TechnologyExternal

Differentiate three types of eBPF redirections

There are three types of eBPF redirection fashions in Linux kernel that may confuse developers often: bpf_redirect_peer(), bpf_redirect_neighbor(), and bpf_redirect(). This post helps to clarify them by digging into the code in history order, and also discusses usages & related problems in real world.

Read more
TechnologyExternal

A story about AF_XDP, network namespaces and a cookie

A crash in a development version of flowtrackd (the daemon that powers our Advanced TCP Protection) highlighted the fact that libxdp (and specifically the AF_XDP part) was not Linux network namespace aware. This blogpost describes the debugging journey to find the bug, as well as a fix.

Read more
TechnologyExternal

Linux tracing/profiling 基础:符号表、调用栈、perf /bpftrace 示例等

整理一些 tracing/profiling 笔记,目前内容主要来自 Practical Linux tracing 系列几篇文章。

Read more
TechnologyExternal

Live-patching security vulnerabilities inside the Linux kernel with eBPF Linux Security Module

Learn how to patch Linux security vulnerabilities without rebooting the hardware and how to tighten the security of your Linux operating system with eBPF Linux Security Module

Read more
TechnologyExternal

BPF CO-RE reference guide

A practical reference guide to using the full power of BPF CO-RE (Compile Once – Run Everywhere).

Read more
TechnologyExternal

eBPF Instruction Sets

Not everyone who develops BPF programs knows that several versions of the instruction set exist. This isn’t really surprising given documentation on the subject is scarce. So let’s go through the different eBPF instruction sets, why they exist, and why their choice matters.

Read more