Learn essential eBPF #Linux command line tools to improve your service observability with #opensource: https://t.ly/wNy6b
Check out #Coroot (we’re #FOSS!) to turn manual service analysis into instant root cause insights. Resolve issues and deploy faster with #eBPF: https://n9.cl/kfm0rw
Introducing bpflogd(8): capture packets via BPF to log files https://www.undeadly.org/cgi?action=article;sid=20250425074505 #openbsd #bpflogd #bpf #networking #logging #development #sysadmin #devops #security #platformengineering
Nice. An RFC for the Linux Kernel BPF Instruction Set Architecture.
"BPF [...] is a technology with origins in the Linux kernel that can run untrusted programs in a privileged context such as an operating system kernel."
https://www.rfc-editor.org/rfc/rfc9669.html
See this write-up by @LWN on the standardisation effort from last year [ https://lwn.net/Articles/926882/ ].
`bpftop` is now available in Fedora;a command-line tool designed to streamline the performance optimization and monitoring of eBPF programs, providing a dynamic real-time view.
Install with `sudo dnf install bpftop`
More info: https://packages.fedoraproject.org/pkgs/bpftop/bpftop/
The "#eBPF for #Linux Admins" series from Ansil Hameed grew and right now contains seven parts.
It among others covers how to write a "eBPF program to block all packets via XDP"[1] and how to "block a TCP port of an interface instead of all packet"[2].
This article series based on his "journey to demystify eBPF" also covers some eBPF basics and things related to it: https://ansilh.com/tags/ebpf/
[1] https://ansilh.com/posts/04-ebpf-for-linux-admins-part4/
[2] https://ansilh.com/posts/05-ebpf-for-linux-admins-part5/
Introducing bpftune for lightweight, always-on auto-tuning of system behaviour – https://blogs.oracle.com/linux/post/introducing-bpftune
Alan Maguire writes:
```Introducing bpftune, an automatic configurator that monitors your workloads and sets the correct [#Linux] #kernel parameter values! […] using #BPF […] pluggable infrastructure that is open to contributions. […]``` #eBPF #LinuxKernel
Our work on abusing/hardening the #Linux BPF interpreter for/against kernel exploitation has been accepted at the 2023 @usenixassociation Annual Technical Conference (USENIX ATC)! Joint work with Di Jin and Vaggelis Atlidakis
| https://cs.brown.edu/~vpk/papers/epf.atc23.pdf | #epf #cbpf #ebpf #bpf #atc23 #brownssl
The content from Netdev 0x16 (held last Oct. 22) is now online.
For a session overview see:
https://netdevconf.info/0x16/accepted-sessions.html
Video breakdown:
Day 1: https://bit.ly/netdev-0x16-day-1
Day 2: https://bit.ly/netdev-0x16-day-2
Day 3: https://bit.ly/netdev-0x16-day-3
Day 4: https://bit.ly/netdev-0x16-day-4
Day 5: https://bit.ly/netdev-0x16-day-5
#eBPF support for Human Interface Devices (HID) [e.g. mice, keyboards, …] in now in #Linux-next and thus slated for inclusion in #LinuxKernel 6.2.
If you wonder what this is about, check out this article (https://lwn.net/Articles/909109/ ), the latest submission (https://lore.kernel.org/all/20221103155756.687789-1-benjamin.tissoires@redhat.com/ ), or the docs on HID-#BPF(https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/tree/Documentation/hid/hid-bpf.rst)
Seems like #introducton is common here:
I have been working in tech for almost ~7 years now. In the past I've dived into different subsystems of #linux kernel as part of my day jobs and I was associated with #outreachy as a (volunteer) linux kernel coordinator for few years. These days I'm getting paid to work on #bpf based profilers.
I also like sharing pictures from my daily walks, general life rants and mental health related things (personal experiences) on my public social media.