Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp yesterday

psc: The ps utility, with an eBPF twist and container context

https://github.com/loresuso/psc

#HackerNews #psc #ps #utility #eBPF #containers #technology

GitHub

GitHub - loresuso/psc: the ps utility, with an eBPF twist and container context

the ps utility, with an eBPF twist and container context - loresuso/psc
  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 days ago

Interactive eBPF

https://ebpf.party/

#HackerNews #Interactive #eBPF #eBPF #Technology #Cybersecurity #Programming #Innovation

  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 weeks ago

Zero-Code Instrumentation of an Envoy TCP Proxy Using eBPF

https://sergiocipriano.com/beyla-envoy.html

#HackerNews #ZeroCodeInstrumentation #EnvoyTCPProxy #eBPF #TechInnovation #OpenSource #Networking

Zero-Code Instrumentation of an Envoy TCP Proxy using eBPF

  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 3 weeks ago

Rex is a safe kernel extension framework that allows Rust in the place of eBPF

https://github.com/rex-rs/rex

#HackerNews #Rex #Rust #eBPF #KernelExtension #SafeFramework #Cybersecurity

GitHub

GitHub - rex-rs/rex: Rex is a safe and usable kernel extension framework that allows loading and executing Rust kernel extension programs in the place of eBPF.

Rex is a safe and usable kernel extension framework that allows loading and executing Rust kernel extension programs in the place of eBPF. - rex-rs/rex
  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp last month

BpfJailer: eBPF Mandatory Access Control [pdf]

https://lpc.events/event/19/contributions/2159/attachments/1833/3929/BpfJailer%20LPC%202025.pdf

#HackerNews #BpfJailer #eBPF #Mandatory #Access #Control #pdf #LinuxSecurity #eBPF #Hacking

  • Copy link
  • Flag this post
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp 2 months ago

Compte-rendu, et mise en œuvre complète, de l'atelier #eBPF au #CapitoleDuLibre, un bloqueur de pub #DNS en eBPF https://www.bortzmeyer.org/ebpf-capitole-libre.html

  • Copy link
  • Flag this post
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp 2 months ago

Trop bien, ça marche :

% sudo bpftool prog tracelog
ping-921179 [000] b..1. 177451.521295: bpf_trace_printk: Hello, world !
ping-921179 [002] b..1. 177452.522205: bpf_trace_printk: Hello, world !

#CapitoleDuLibre #CDL #eBPF

Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr replied  ·  activity timestamp 2 months ago

Et le bilan complet, une fois le programme terminé : https://www.bortzmeyer.org/ebpf-capitole-libre.html

#eBPF

  • Copy link
  • Flag this comment
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp 2 months ago

« Le vérificateur va s'assurer que le programme eBPF ne va pas jardiner n'importe où dans le noyau. »

#poésie #CDL

Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr replied  ·  activity timestamp 2 months ago

Trop bien, ça marche :

% sudo bpftool prog tracelog
ping-921179 [000] b..1. 177451.521295: bpf_trace_printk: Hello, world !
ping-921179 [002] b..1. 177452.522205: bpf_trace_printk: Hello, world !

#CapitoleDuLibre #CDL #eBPF

  • Copy link
  • Flag this comment
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp 2 months ago

Pas de wifi #CapitoleDuLibre dans l'atelier. Il se tient au troisième étage et la gravité empêche les zondes de monter.

#CDL

Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr replied  ·  activity timestamp 2 months ago

À propos de #eBPF, le #RFC : https://www.bortzmeyer.org/9669.html

Et un exemple d'utilisation pour le #DNS : https://blog.apnic.net/2025/08/04/experimental-support-for-af_xdp-sockets-in-nsd/

#CDL

  • Copy link
  • Flag this comment
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp 2 months ago

La porte qui donne accès au #CapitoleDuLibre.

#CDL

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr replied  ·  activity timestamp 2 months ago

Atelier « Maîtriser #eBPF et #XDP : créez un bloqueur de publicités réseau haute performance »

Je suis pas mal rouillé en C, donc n'attendez pas de miracles.

#CDL

  • Copy link
  • Flag this comment
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 months ago

Linnix – eBPF observability that predicts failures before they happen

https://github.com/linnix-os/linnix

#HackerNews #Linnix #eBPF #observability #predictive #failure #technology #monitoring

GitHub

GitHub - linnix-os/linnix: eBPF-powered Linux observability with AI incident detection. Apache-2.0 licensed.

eBPF-powered Linux observability with AI incident detection. Apache-2.0 licensed. - linnix-os/linnix
  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 months ago

An eBPF Loophole: Using XDP for Egress Traffic

https://loopholelabs.io/blog/xdp-for-egress-traffic

#HackerNews #eBPF #XDP #EgressTraffic #Networking #TechInnovation

Using XDP for Egress Traffic

XDP only works for ingress. We found a loophole that lets it work for egress. Here's how we did the impossible.
  • Copy link
  • Flag this post
  • Block
Michael Dexter boosted
NLnet Labs
NLnet Labs
@nlnetlabs@social.nlnetlabs.nl  ·  activity timestamp 4 months ago

NSD 4.13.0 is now available. The most prominent new feature of our authoritative #DNS server is support for AF_XDP sockets.

With zero-copy disabled, we see a 1.7x improvement in handled queries per second compared to UDP through the network stack. We expect the improvement to be higher with a driver that fully supports AF_XDP zero-copy mode.

Release notes:
https://github.com/NLnetLabs/nsd/releases/tag/NSD_4_13_0_REL

Blog post:
https://blog.nlnetlabs.nl/experimental-support-for-af_xdp-sockets-in-nsd/

#XDP#EBPF

  • Copy link
  • Flag this post
  • Block
NLnet Labs
NLnet Labs
@nlnetlabs@social.nlnetlabs.nl  ·  activity timestamp 4 months ago

NSD 4.13.0 is now available. The most prominent new feature of our authoritative #DNS server is support for AF_XDP sockets.

With zero-copy disabled, we see a 1.7x improvement in handled queries per second compared to UDP through the network stack. We expect the improvement to be higher with a driver that fully supports AF_XDP zero-copy mode.

Release notes:
https://github.com/NLnetLabs/nsd/releases/tag/NSD_4_13_0_REL

Blog post:
https://blog.nlnetlabs.nl/experimental-support-for-af_xdp-sockets-in-nsd/

#XDP#EBPF

  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-beta.35 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct