並び順

ブックマーク数

期間指定

  • から
  • まで

161 - 179 件 / 179件

新着順 人気順

BPFの検索結果161 - 179 件 / 179件

  • The BPF extensible scheduler class [LWN.net]

    It was only a matter of time before somebody found a way to inject BPF into the CPU scheduler. This patch series, posted by Tejun Heo and containing work by David Vernet, Josh Don, and Barret Rhoden, does exactly that. The cover letter covers the motivation behind this work in detail: One of our main goals was to lower the barrier to entry for experimenting with the scheduler. sched_ext provides e

    • The Evolving eBPF Toolchain

      These days there is an ever-growing list of tools and frameworks for working with eBPF, all at varying levels of abstraction. There does seem to be a few that sit at the core of the rest of the eBPF ecosystem. However, the ecosystem is changing rapidly, and I’ve found it to be a bit difficult to navigate through the sea of information that’s out there and understand which tools are the current “st

        The Evolving eBPF Toolchain
      • Offloading BPF Implementation to FPGA-NIC したいねって話

        Career - design, adaption and diversity - for EMC I&D eventMiya Kohno

          Offloading BPF Implementation to FPGA-NIC したいねって話
        • Routing traffic in Rust using eBPF

          At InfinyOn we are seeing an increasing amount of traffic in Infinyon Cloud. Given our current projections we anticipate over 1 million edges to connect our platform in the next 12-18 months. One of bottlenecks is the compute resources needed to process ingress traffic. We have a couple of places in our cloud offering where we needed to intercept TCP network traffic, perform some analysis on the f

            Routing traffic in Rust using eBPF
          • BPF Isn’t Just About Speed

            In a recent blog post, Alban Crequy and Mauricio Vásquez benchmarked egress filtering solutions in the Linux kernel and compared iptables, ipsets, and BPF at the tc hook. That is exciting, not only because egress benchmarks are missing with everyone focusing on ingress (e.g., XDP), but also because they: included short CPU traces, allowing us to understand what is happening. provided the code and

              BPF Isn’t Just About Speed
            • Introducing ebpf_exporter

              This is an adapted transcript of a talk I gave at Promcon 2018. You can find slides with additional information on our Prometheus deployment and presenter notes here. There's also a video. Tip: you can click on the image to see the original large version. Here at Cloudflare we use Prometheus to collect operational metrics. We run it on hundreds of servers and ingest millions of metrics per second

                Introducing ebpf_exporter
              • BPF and async Rust

                With libbpf-rs, bindings to libbpf (canonical C BPF library), building BPF applications in Rust is easy. However, libbpf-rs doesn't work with async/await. Say, to send information from kernel with BPF over protocols like gRPC, you have to implement lots instead of using the existing async libraries. To address the above problem, I implemented libbpf-async, complementary to libbpf-rs, providing API

                  BPF and async Rust
                • eBPF Documentary

                  Recent posts: 17 Mar 2024 » The Return of the Frame Pointers 10 Mar 2024 » eBPF Documentary 28 Apr 2023 » eBPF Observability Tools Are Not Security Tools 01 Mar 2023 » USENIX SREcon APAC 2022: Computing Performance: What's on the Horizon 17 Feb 2023 » USENIX SREcon APAC 2023: CFP 02 May 2022 » Brendan@Intel.com 15 Apr 2022 » Netflix End of Series 1 09 Apr 2022 » TensorFlow Library Performance 19 M

                  • TIL: eBPFは素晴らしい

                    Filip Nikolovskiのブログより。 仕事でマイクロ・サービスのトレースや可観測性(Observability)について仕事で調べていた時に、Pixielabsに出くわしました。このツールは、アプリの内部にインスツルメンテーション(計器一式)や特別なコードを入れなくても、アプリのトラブルシューティングを即座に行えると宣伝していて、私には✨魔法✨のように聞こえました。だから当然、この技術が機能する理由について、もう少し詳しく知りたいと思い、サイトをスクロールしていくと、「インスツルメンテーションなし」のセクションの下に、この頭文字をとったeBPFがありました。 インターネットでさらに調べて、デザインペーパーを読んで、いくつかのビデオを見た後、この技術が私の目に留まったと言っても過言ではないので、メモを書きたいと思いました。この投稿があなたの興味をさらに刺激することを願っています。

                      TIL: eBPFは素晴らしい
                    • eBPFって何だろう|oraccha

                      eBPFには前々から興味があったので、ちょっと調べてみた。資料はいろいろある。日本語だと(会員登録が必要なので最後まで読めないが)「Berkeley Packet Filter入門」が詳しい。英語でよければ「BPF: Linux kernel code execution engine」とか。 eBPF以前オリジナルのBPF (Berkeley Packet Filter)が登場したのは90年代初頭で、tcpdumpに組み込まれているので知らずにお世話になっている人も多いかと。論文(「The BSD Packet Filter: A New Architecture for User-level Packet Capture」[USENIX93])が出版されたのが1993年で、著者の一人はEDTモデルでも言及したVan Jacobson先生。 tcpdumpやwiresharkのようなツー

                        eBPFって何だろう|oraccha
                      • BPF to transform SSH Sessions to Structured Event

                        The Teleport Access PlatformThe easiest, most secure way to access and protect your infrastructure Teleport Access On-demand, least privileged access, on a foundation of cryptographic identity and zero trust

                          BPF to transform SSH Sessions to Structured Event
                        • http://jakou.byethost6.com/?ckattempt=1

                          • Let's build a simple system calls monitoring dashboard using bpftrace and streamlit

                            % time seconds usecs/call calls errors syscall ------ ----------- ----------- --------- --------- ---------------- 49.67 0.000301 301 1 execve 14.69 0.000089 11 8 mmap 6.44 0.000039 13 3 openat 4.46 0.000027 9 3 mprotect 4.46 0.000027 6 4 newfstatat 3.47 0.000021 5 4 pread64 3.14 0.000019 19 1 munmap 2.81 0.000017 8 2 close 2.64 0.000016 5 3 brk 2.15 0.000013 6 2 read 2.15 0.000013 13 1 1 access 1

                              Let's build a simple system calls monitoring dashboard using bpftrace and streamlit
                            • BPF, eBPF, XDP and Bpfilter… What are these things and what do they mean for the enterprise? - Netronome

                              BPF, eBPF, XDP and Bpfilter… What are These Things and What do They Mean for the Enterprise? By Netronome | Apr 16, 2018 You may have been following the development of the extended Berkeley Packet Filter  (eBPF)  in the kernel community since 3.15, or you may still associate the Berkeley Packet Filter with the work Van Jacobson did in 1992. You may have used BPF for years with tcpdump, or you may

                                BPF, eBPF, XDP and Bpfilter… What are these things and what do they mean for the enterprise? - Netronome
                              • Create new page · draios/sysdig Wiki

                                Attach files by dragging & dropping, selecting or pasting them. Uploading your files… We don’t support that file type. Try again with a GIF, JPEG, JPG, MOV, MP4, PNG, SVG or WEBM. Attaching documents requires write permission to this repository. Try again with a GIF, JPEG, JPG, MOV, MP4, PNG, SVG or WEBM. We don’t support that file type. Try again with a GIF, JPEG, JPG, MOV, MP4, PNG, SVG or WEBM.

                                  Create new page · draios/sysdig Wiki
                                • libbpf-rs: eBPF for the Rust ecosystem

                                  Summary libbpf-rs provides safe Rust bindings to libbpf as well as a cargo plugin to help you develop “Compile Once - Run Everywhere” eBPF applications. Use libbpf-rs over BCC to produce smaller, more efficient, and more predictable applications. Background eBPF (BPF) programs have traditionally been written using BPF compiler collection (BCC). The application would then call into BCC using the C+

                                  • Kinvolk: Exploring BPF ELF Loaders at the BPF Hackfest

                                    Exploring BPF ELF Loaders at the BPF Hackfest By Lorenz Bauer / Alban Crequy · October 9, 2018 Just before the All Systems Go! conference, we had a BPF Hackfest at the Kinvolk office and one of the topics of discussion was to document different BPF ELF loaders. This blog post is the result of it. BPF is a new technology in the Linux kernel, which allows running custom code attached to kernel funct

                                      Kinvolk: Exploring BPF ELF Loaders at the BPF Hackfest
                                    • bccでuprobes - φ(・・*)ゞ ウーン カーネルとか弄ったりのメモ

                                      前回(LinuxのBPFとbccでデバッグする - φ(・・*)ゞ ウーン カーネルとか弄ったりのメモ)はbccを使ってkprobeでカーネル内の関数にprobeを設定したので今回はユーザーランドのほうでuprobesを使うメモ。 fork()が呼ばれたときにプロセス名、pid等を表示する。 #!/usr/bin/env python from bcc import BPF bpf_source = """ #include <uapi/linux/ptrace.h> void fork_enter(struct pt_regs *ctx) { bpf_trace_printk("fork()\\n"); } """ b = BPF(text=bpf_source) b.attach_uprobe(name="c", sym="fork", fn_name="fork_enter") wh

                                        bccでuprobes - φ(・・*)ゞ ウーン カーネルとか弄ったりのメモ
                                      • GitHub - pathtofile/bpf-pipesnoop: Example program using eBPF to log data being based in using shell pipes

                                        You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                          GitHub - pathtofile/bpf-pipesnoop: Example program using eBPF to log data being based in using shell pipes