kernellogger, to linux
@kernellogger@fosstodon.org avatar

The @LWN article about the latest push of the extensible scheduler class (or "") for is now freely available: https://lwn.net/Articles/972710/

"'[…] Despite having attracted a fair amount of interest from the development community, sched_ext has run into considerable opposition and seems far from acceptance into the mainline. The posting by Tejun Heo of a new version of the sched_ext series at the beginning of May has restarted this long-running discussion[…]'"

kernellogger, to linux
@kernellogger@fosstodon.org avatar

The latest #LKML discussion about the #BPF extensible scheduler class (or "sched_ext") for the #Linux #kernel since yesterday is active again after a post from peterz:

https://lore.kernel.org/all/20240513080359.GI30852@noisy.programming.kicks-ass.net/t/#u

"'That is, from where I am sitting I see $vendor mandate their $enterprise product needs their $BPF scheduler. At which point $vendor will have no incentive to ever contribute back.

[…]

[…] GPL forces people to contribute back […] And I see the whole BPF thing as a run-around on that. '" #LinuxKernel

kernellogger, to linux
@kernellogger@fosstodon.org avatar

udev-hid-bpf: quickstart tooling to fix your HID [Human Interface Devices] devices with #eBPF:

https://who-t.blogspot.com/2024/04/udev-hid-bpf-quickstart-tooling-to-fix.html

@whot writes:

"'[…] been working on and polishing a little tool called udev-hid-bpf [1]. This is the scaffolding required quickly and easily write, test and eventually fix your HID input devices (mouse, keyboard, etc.) via a BPF program instead of a full-blown custom kernel driver or a semi-full-blown #kernel patch.'"

[1] https://libevdev.pages.freedesktop.org/udev-hid-bpf/index.html

#Linux #LinuxKernel #BPF

kernellogger, to linux
@kernellogger@fosstodon.org avatar

#DTrace for #Linux 2.0.0-1.14 is out https://lore.kernel.org/all/ZhBRSM2j0v7cOLn%2F@oracle.com/

"[…] based on #BPF and other #LinuxKernel tracing features and
is implemented entirely as a userspace application. […]

DTrace for Linux makes use of 2 optional #kernel features that are not commonly available in Linux kernels:

  • CTF data generation at compile time […]

  • Module symbol address range data […]

DTrace for Linux can be used for tracing without these patches, albeit with some limitations."'"

kernellogger, to linux
@kernellogger@fosstodon.org avatar

Announcing #bpftop: Streamlining #eBPF performance optimization

https://netflixtechblog.com/announcing-bpftop-streamlining-ebpf-performance-optimization-6a727c1ae2e5

"'"bpftop provides a dynamic real-time view of running eBPF programs. It displays the average execution runtime, events per second, and estimated total CPU % for each program. This tool minimizes overhead by enabling performance statistics only while it is active."'"

#Linux #kernel #LinuxKernel #BPF

kernellogger, (edited ) to linux
@kernellogger@fosstodon.org avatar

Andrea Righi, #LinuxKernel engineer @ Canonical, published "Writing a scheduler for Linux in Rust that runs in user-space"

https://arighi.blogspot.com/2024/02/writing-scheduler-for-linux-in-rust.html

"'"I’ve decided to start a series of blog posts to cover some details about scx_rustland, my little #Linux scheduler written in #Rust that runs in user-space.

[…]

The connection with the #kernel happens thanks to #eBPF and sched-ext: together they allow to channel all the scheduling events to a user-space program, which then […]"'"

#RustLang #BPF

kernellogger, to random
@kernellogger@fosstodon.org avatar

"[…] I learn how stuff works by building things with the aforementioned stuff. To get a proper grasp on #eBPF, I'll build a program that leverages eBPF to intercept SSL traffic in user-space, capturing data before it is encrypted (outgoing messages) and after it is decrypted (incoming messages). This'll let us read wire-encrypted SSL traffic on our local system without proxies, or having to meddle directly with the processes involved.[…]"

https://blog.scottgerring.com/adventures-in-ebpf/ (from Scott Gerring) #BPF

kernellogger, (edited ) to linux
@kernellogger@fosstodon.org avatar

The "#eBPF for #Linux Admins" series from Ansil Hameed grew and right now contains seven parts.

It among others covers how to write a "eBPF program to block all packets via XDP"[1] and how to "block a TCP port of an interface instead of all packet"[2].

This article series based on his "journey to demystify eBPF" also covers some eBPF basics and things related to it: https://ansilh.com/tags/ebpf/

[1] https://ansilh.com/posts/04-ebpf-for-linux-admins-part4/
[2] https://ansilh.com/posts/05-ebpf-for-linux-admins-part5/

#LinuxKernel #kernel #BPF

kernellogger, to random
@kernellogger@fosstodon.org avatar

"[…] The lack of unbounded loops in [#eBPF] and some other freely expressible way of manipulating data mean that extra thought has to be given when looking and parsing application data. But with a thoughtful approach I don’t see why most protocols can’t be processed by eBPF, today we need to bind programs to TC (Traffic Control) but once XDP has egress support we can offload so much application processing […] #BPF

https://thebsdbox.co.uk/2024/01/15/Perfecting-Protocol-Parsing-Probably-with-eBPF/

kernellogger, to linux
@kernellogger@fosstodon.org avatar

The network subsystem changes for #Linux #kernel 6.8 were merged: https://git.kernel.org/torvalds/c/3e7aeb78ab01c2c2f0e1f784e5ddec88fcd3d106

1/ That merge contains way to many interesting things to mentioned here, so let me just pick a few of them in this thread:

#LinuxKernel

kernellogger,
@kernellogger@fosstodon.org avatar

3/

  • tons of #eBPF/#BPF verifier improvements

  • Remove deprecated bpfilter kernel leftovers given the project is developed in user-space (https://github.com/facebook/bpfilter )

  • Add initial TX metadata implementation for AF_XDP

  • Support for VLAN tag in XDP hints

  • Support uid/gid options when mounting bpffs

kernellogger, to Java
@kernellogger@fosstodon.org avatar

"'"[…] #eBPF programs are compiled down to eBPF bytecode and attached to hooks in the kernel via a syscall. This is tedious; so many libraries for eBPF allow you to write applications using and interacting with eBPF in C++, Rust, Go, Python, and even Lua.

But there are none for #Java, which is a pity. So… I decided to write bindings using the new Foreign Function API (Project Panama, preview in 21) and #bcc […]"'"

https://mostlynerdless.de/blog/2023/12/31/hello-ebpf-developing-ebpf-apps-in-java-1/ #Linux #kernel #BPF #LinuxKernel

blainsmith, to linux
@blainsmith@fosstodon.org avatar

Working ICMP filter CLI you can attach to any interface you give it.

> ./sniff -i 3

https://git.sr.ht/~blainsmith/hare-bpf/tree/main/item/cmd/sniff/main.ha

#HareLang #BPF #Linux

keen456, to linux

This post from @davidrevoy is a deep look into styluses, drawing tablets and how a bug got fixed.
https://www.davidrevoy.com/article1002/how-a-kernel-developer-made-my-styluses-work-again/ #linux #hid #bpf

shunghsiyu, to random

bpftool got a new logo and mascot, Hannah the Honeyguide, and she look amazing

@qeole honestly set the bar quite high for all future #bpf project logos

(image converted from the original svg in https://github.com/libbpf/bpftool/tree/main/.github/assets)

YourAnonRiots, to random Japanese

Cybercriminals started using #BPF as an attack vector to run code in the operating systems of popular cloud-computing platforms to target specific industries.

Read our report to know how you can detect such threats:
https://www.trendmicro.com/vinfo/us/security/news/threat-landscape/how-bpf-enabled-malware-works-bracing-for-emerging-threats?utm_source=trendmicroresearch&utm_medium=smk&utm_campaign=1023_bpf

kernellogger, to linux
@kernellogger@fosstodon.org avatar

Despite strong backlash[1], work on the #BPF extensible scheduler class for the #Linux #kernel's task scheduler continues, as Tejun just posted v5: https://lore.kernel.org/all/20231111024835.2164816-1-tj@kernel.org/

[1] see for example https://lore.kernel.org/all/20230726091752.GA3802077@hirez.programming.kicks-ass.net/ and https://lore.kernel.org/all/20230926092020.3alsvg6vwnc4g3td@suse.de/

kernellogger, to linux
@kernellogger@fosstodon.org avatar

Now out: #eBPF: Unlocking the #Kernel [OFFICIAL DOCUMENTARY]

https://www.youtube.com/watch?v=Wb_vD3XZYOA

#BPF #Linux #LinuxKernel

kernellogger, to linux
@kernellogger@fosstodon.org avatar

#BPF aka #eBPF highlights from the main net merge for #Linux #kernel 6.7 (https://git.kernel.org/torvalds/c/89ed67ef126c4160349c1b96fdb775ea6170ac90):

  • Support exceptions (https://lwn.net/Articles/938435/ )

  • Add support for local per-cpu kptr, allow allocating and storing per-cpu objects in maps.

  • Extend cgroup BPF sockaddr hooks for UNIX sockets. The use case is for systemd to […]

  • Add new veth-like netdevice where BPF program defines the logic of the xmit routine

  • Add BPF v4 CPU instruction support for arm32 and s390x.

kernellogger, to linux
@kernellogger@fosstodon.org avatar

#Linux #kernel developer Mel Gorman on the #BPF extensible scheduler class" from Tejun and other Meta devs:

"""I view pluggable scheduler as something that would be a future maintenance nightmare […]

I generally worry that certain things may not have existed in the shipped scheduler if plugging was an option including EAS, throttling control, schedutil integration, big.Little, adapting to chiplets and picking preferred SMT siblings for turbo boost. […]"""

https://lore.kernel.org/all/20230926092020.3alsvg6vwnc4g3td@suse.de/ #LinuxKernel

kernellogger, (edited ) to linux
@kernellogger@fosstodon.org avatar

TWIMC, the discussion about the #BPF extensible #scheduler class for the #Linux #kernel that Peterz rejected[1] slowly continues:

Mel Gorman recently shared his view and is "opposed to it conceptually": https://lore.kernel.org/all/20230817124457.b5dca734zcixqctu@suse.de/

Josh Don meanwhile "reiterated Google’s support for this proposal": https://lore.kernel.org/all/CABk29Nt_iCv=2nbDUqFHnszMmDYNC7xEm1nNQXibnPKUxhsN_g@mail.gmail.com/

[1] https://lore.kernel.org/all/20230726091752.GA3802077@hirez.programming.kicks-ass.net/ #LinuxKernel

kernellogger, to linux
@kernellogger@fosstodon.org avatar

LOL:


- it is not in #BPF, we cannot talk about it at netdev conf. […]```

/me wonders what this kind of argument should be called; "appeal to cool technology" maybe?

Source: "[RFC bpf-next 0/8] BPF 'force to MPTCP'"  
<https://lore.kernel.org/mptcp/cover.1688616142.git.geliang.tang@suse.com/> #Linux #kernel #eBPF #LinuxKernel #MPTCP
brauner, to linux

I'm really surprised by this #bpf claim in Documentation/bpf/kfuncs.rst:

"Unlike with regular kernel symbols, this is expected behavior for BPF symbols, and out-of-tree BPF programs that use kfuncs should be considered relevant to discussions and decisions around modifying and removing those kfuncs. The BPF community will take an active role in participating in upstream discussions when necessary to ensure that the perspectives of such users are taken in"

#linux #kernel #bpf

kernellogger, to linux
@kernellogger@fosstodon.org avatar

Introducing bpftune for lightweight, always-on auto-tuning of system behaviour – https://blogs.oracle.com/linux/post/introducing-bpftune

Alan Maguire writes:

Introducing bpftune, an automatic configurator that monitors your workloads and sets the correct [#Linux] #kernel parameter values! […] using #BPF […] pluggable infrastructure that is open to contributions. […] #eBPF #LinuxKernel

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • GTA5RPClips
  • ethstaker
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • tacticalgear
  • anitta
  • provamag3
  • Leos
  • cisconetworking
  • lostlight
  • All magazines