vadorovsky, to random

Cool introduction to ebpfguard and writing Linux security policies in Rust. It's using #eBPF #LSM and https://aya-rs.dev. but without necessity to use them directly - ebpfguard is an abstraction layer built on top of them.

https://blog.cloudnativefolks.org/ebpf-for-cybersecurity-part-4?ref=twitter-share

kernellogger, to linux
@kernellogger@fosstodon.org avatar

Introducing bpftune for lightweight, always-on auto-tuning of system behaviour – https://blogs.oracle.com/linux/post/introducing-bpftune

Alan Maguire writes:

Introducing bpftune, an automatic configurator that monitors your workloads and sets the correct [#Linux] #kernel parameter values! […] using #BPF […] pluggable infrastructure that is open to contributions. […] #eBPF #LinuxKernel

lmb, to random
@lmb@fosstodon.org avatar

The recording of my talk at is now online: https://youtu.be/9p4qviq60z8 I talk about a proof of concept which explores how we could make safer without having to rely on signing BPF itself. Uses kfuncs, BPF LSM, and IMA under the hood.

kernellogger, to Java
@kernellogger@fosstodon.org avatar

"'"[…] #eBPF programs are compiled down to eBPF bytecode and attached to hooks in the kernel via a syscall. This is tedious; so many libraries for eBPF allow you to write applications using and interacting with eBPF in C++, Rust, Go, Python, and even Lua.

But there are none for #Java, which is a pity. So… I decided to write bindings using the new Foreign Function API (Project Panama, preview in 21) and #bcc […]"'"

https://mostlynerdless.de/blog/2023/12/31/hello-ebpf-developing-ebpf-apps-in-java-1/ #Linux #kernel #BPF #LinuxKernel

brancz, to random

Exciting times, we're looking for a software engineer to join Polar Signals and work on all things & profiling. Come and join an amazing team! 🧊

https://www.polarsignals.com/jobs/ebpf-engineer

lizrice, to random
@lizrice@hachyderm.io avatar

Who's coming to Open Source Summit in Vancouver next week? I'm putting the final touches to my hands-on lab for Getting Started with #eBPF. Come join me there! https://ossna2023.sched.com/event/a08aa887dac0bb3323d504b213071686 #OSSUMMIT

pchaigno, to random
pchaigno, to random

In his talk, Masami Hiramatsu provides a nice overview of the various tracing #eBPF probes, what tracing mechanism they use, and what context they have.
He proposes to use ftrace_regs across the board, to reduce overhead. #LinuxPlumbers

Slides: https://lpc.events/event/17/contributions/1588/attachments/1169/2481/LPC23_%20Use%20ftrace_regs%20for%20tracers_1.pdf
Stream: https://www.youtube.com/watch?v=zDNZY0HQOMw&t=3700s

mttaggart, to random

Here's a concrete example of why I think #eBPF is the wave of the future.

This little script, written in the training wheels bpftrace language, monitors for shell executions on the system. It reports shell invocations and full command lines, and also alerts when service users (uid < 1000) invoke a shell. It also can be invoked in KILL MODE, which will murdalize those unauthorized shells.

This effectively stops most webshells in their tracks. It's not perfect, but as a demo of what's possible, I think pretty neat!

https://github.com/mttaggart/bluebpf/blob/main/bt/shellguardian.bt

sjvn, to opensource
@sjvn@mastodon.social avatar

Netflix Releases bpftop: An eBPF-Based Application Monitor: https://thenewstack.io/netflix-releases-bpftop-an-ebpf-based-application-monitor/ by @sjvn

Besides being the streaming video champ, Netflix makes excellent #opensource software such as bpftop, a new, nifty #eBPF monitor.

HonkHase, to random German
@HonkHase@chaos.social avatar

#Bullshit Bingo vom Feinsten, ey O_o

Cisco hat #eBPF im Jahre 2024 für sich entdeckt, mit #KI Glitzer-Hypes garniert und viel Blahfasel drum herum gewirsingt... alles komplettes Tralala Hypershield HyperHyper CyberCyber 🙄🤦‍♀️

Ich möchte #AllesAnzünden 🔥
https://www.heise.de/news/l-f-Cisco-erfindet-die-Security-neu-9691102.html

triskelion, to linux
@triskelion@floss.social avatar

Suggest some beginner-friendly resources for learning about Linux kernel features like LSM (SElinux, Yama Landlock, Lockdown), Netfilter, eBPF, Cgroups, Namespaces, and KVM :D

#Linux #Kernel #SElinux #ebpf #nftables #cgroups #KVM

chris, to random German

Amazing talk by @lizrice. So much great info about tooling and the benefits of using #eBPF in #kuberntes. Lovely presentation.

#ConLife23

kernellogger, to linux
@kernellogger@fosstodon.org avatar

"'"In this blog, we'll demonstrate how #eBPF can be practically used for function #tracing. […]

We'll begin by covering the basics of eBPF and #uprobes. Following that, we'll apply these concepts in a real-world example. […]

Our example involves a user-space program calling a function with randomized parameters. Our eBPF program will track how many times each parameter is called. […]"'"

https://ddosify.com/blog/exploring-function-tracing-with-ebpf-and-uprobes/

#Linux #Kernel #LinuxKernel

mttaggart, to rust

After a couple weeks of living in #eBPF code after the sun went down, here's kind of where I'm at:

  1. I still think this technology is amazing.
  2. Hoo boy is the #Rust implementation not ready to come out of the oven.
  3. It's a shame it's at the mercy of the Linux kernel.
  4. Better tooling could make this explode
  5. It's also a shame that the main pusher of this tech is so tied to Kubernetes, because I feel like the association does eBPF a disservice.
  6. What Sysmon for Linux does with it is just scratching the surface.
kernellogger, (edited ) to linux
@kernellogger@fosstodon.org avatar

The "#eBPF for #Linux Admins" series from Ansil Hameed grew and right now contains seven parts.

It among others covers how to write a "eBPF program to block all packets via XDP"[1] and how to "block a TCP port of an interface instead of all packet"[2].

This article series based on his "journey to demystify eBPF" also covers some eBPF basics and things related to it: https://ansilh.com/tags/ebpf/

[1] https://ansilh.com/posts/04-ebpf-for-linux-admins-part4/
[2] https://ansilh.com/posts/05-ebpf-for-linux-admins-part5/

#LinuxKernel #kernel #BPF

AndiMann, to security
@AndiMann@masto.ai avatar

"@Cisco buy highlights #container #networking, #security"

Great insight on emerging #eBPF tech, and why it is getting so much attention - and money.

Love the #innovation in #observability, #cybersecurity, #monitoring!

@Mcooney59 via @NetworkWorld

https://www.networkworld.com/article/1291149/cisco-buy-highlights-container-networking-security.html

djalaltix, to random

Detect XZ backdoor thanks to #ebpf Tetragon, but yeh better upgrade or downgrade ;-) https://github.com/cilium/tetragon/pull/2276

kernellogger, to linux
@kernellogger@fosstodon.org avatar

Now out: #eBPF: Unlocking the #Kernel [OFFICIAL DOCUMENTARY]

https://www.youtube.com/watch?v=Wb_vD3XZYOA

#BPF #Linux #LinuxKernel

triskelion, to random
@triskelion@floss.social avatar

Why does podman has legacy iptables dependency? 🤔

#Podman #firewall #nftables #iptables #ebpf

GBrayUT, to webassembly

TIL there are now userspace runtimes for #eBPF. Good overview and comparison to #Wasm use cases at https://eunomia.dev/blogs/userspace-ebpf/

pchaigno, to random

Daniel Borkmann presents the new netkit Linux devices, a pair of virtual devices programmed by #eBPF.
This will replace veth devices in Cilium and bring container performance on par with the host. #LinuxPlumbers

Slides: https://lpc.events/event/17/contributions/1581/attachments/1292/2602/lpc_netkit_devs.pdf
Stream: https://www.youtube.com/watch?v=zDNZY0HQOMw&t=10755s

fuzzychef, to Kubernetes
@fuzzychef@m6n.io avatar

On Tuesday Aug 29: KBE Insider will export the future of eBPF and Kubernetes with a guest panel of eBPF experts.

https://youtube.com/live/YrieqDfcQqo

#kubernetes #eBPF #performance #linux

igalia, to random
@igalia@floss.social avatar

Second day of #OSSumit NA & #EmbeddedOSSummit and we continue with our booth E28 (come see us) and more Igalia's talks. Thread 👇🧵

igalia,
@igalia@floss.social avatar

This one was about #GamingOnLinux! Our colleague
@multics69 has been on a quest to remove stuttering from games, by going all the way down to the kernel process scheduler. He's been working on a new gaming-oriented scheduler that has potential to also improve other kinds of interactive workloads. And it's implemented in #eBPF 🤯

Same person during the talk, a convoluted graph in the slide shows dependencies among scheduling tasks and how they interact waking up each other.

Kensan, to linux
@Kensan@mastodon.social avatar

Prompted by the recent thread/inquiry by @Patricia with @HalvarFlake’s reply I went to see if somebody was now working on applying formal methods to the eBPF verifier. Turns out there are some folks at the University of Texas at Austin that released a paper titled “Formal Verification of the Linux Kernel eBPF Verifier Range Analysis”

Paper:
https://sanjit-bhat.github.io/assets/pdf/ebpf-verifier-range-analysis22.pdf

#formalmethods #linux #ebpf

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • mdbf
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • JUstTest
  • GTA5RPClips
  • ethstaker
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • tacticalgear
  • anitta
  • megavids
  • Leos
  • cisconetworking
  • lostlight
  • All magazines