Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 13 hours ago

Rex is a safe kernel extension framework that allows Rust in the place of eBPF

https://github.com/rex-rs/rex

#HackerNews #Rex #Rust #eBPF #KernelExtension #SafeFramework #Cybersecurity

GitHub

GitHub - rex-rs/rex: Rex is a safe and usable kernel extension framework that allows loading and executing Rust kernel extension programs in the place of eBPF.

Rex is a safe and usable kernel extension framework that allows loading and executing Rust kernel extension programs in the place of eBPF. - rex-rs/rex
  • Copy link
  • Flag this post
  • Block
jbz
jbz
@jbz@indieweb.social  ·  activity timestamp 4 days ago

🐧 Rex: Proposed Safe Rust Kernel Extensions For The Linux Kernel, In Place Of eBPF // Phoronix

「 Rex is a Rust-based kernel extension framework with similar safety guarantees to eBPF. Rex relies on the safety of the Rust programming language paired with lightweight runtime protections. 」

https://www.phoronix.com/news/Linux-Kernel-Rust-Rex

#rust #kernel #eBPF #linux #opensource

Rex: Proposed Safe Rust Kernel Extensions For The Linux Kernel, In Place Of eBPF

University researchers presented Rex at this month's Linux Plumbers Conference 2025 in Tokyo
  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 weeks ago

BpfJailer: eBPF Mandatory Access Control [pdf]

https://lpc.events/event/19/contributions/2159/attachments/1833/3929/BpfJailer%20LPC%202025.pdf

#HackerNews #BpfJailer #eBPF #Mandatory #Access #Control #pdf #LinuxSecurity #eBPF #Hacking

  • Copy link
  • Flag this post
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp last month

Compte-rendu, et mise en œuvre complète, de l'atelier #eBPF au #CapitoleDuLibre, un bloqueur de pub #DNS en eBPF https://www.bortzmeyer.org/ebpf-capitole-libre.html

  • Copy link
  • Flag this post
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp last month

Trop bien, ça marche :

% sudo bpftool prog tracelog
ping-921179 [000] b..1. 177451.521295: bpf_trace_printk: Hello, world !
ping-921179 [002] b..1. 177452.522205: bpf_trace_printk: Hello, world !

#CapitoleDuLibre #CDL #eBPF

Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr replied  ·  activity timestamp last month

Et le bilan complet, une fois le programme terminé : https://www.bortzmeyer.org/ebpf-capitole-libre.html

#eBPF

  • Copy link
  • Flag this comment
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp last month

« Le vérificateur va s'assurer que le programme eBPF ne va pas jardiner n'importe où dans le noyau. »

#poésie #CDL

Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr replied  ·  activity timestamp last month

Trop bien, ça marche :

% sudo bpftool prog tracelog
ping-921179 [000] b..1. 177451.521295: bpf_trace_printk: Hello, world !
ping-921179 [002] b..1. 177452.522205: bpf_trace_printk: Hello, world !

#CapitoleDuLibre #CDL #eBPF

  • Copy link
  • Flag this comment
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp last month

Pas de wifi #CapitoleDuLibre dans l'atelier. Il se tient au troisième étage et la gravité empêche les zondes de monter.

#CDL

Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr replied  ·  activity timestamp last month

À propos de #eBPF, le #RFC : https://www.bortzmeyer.org/9669.html

Et un exemple d'utilisation pour le #DNS : https://blog.apnic.net/2025/08/04/experimental-support-for-af_xdp-sockets-in-nsd/

#CDL

  • Copy link
  • Flag this comment
  • Block
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr  ·  activity timestamp last month

La porte qui donne accès au #CapitoleDuLibre.

#CDL

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Stéphane Bortzmeyer
Stéphane Bortzmeyer
@bortzmeyer@mastodon.gougere.fr replied  ·  activity timestamp last month

Atelier « Maîtriser #eBPF et #XDP : créez un bloqueur de publicités réseau haute performance »

Je suis pas mal rouillé en C, donc n'attendez pas de miracles.

#CDL

  • Copy link
  • Flag this comment
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 months ago

Linnix – eBPF observability that predicts failures before they happen

https://github.com/linnix-os/linnix

#HackerNews #Linnix #eBPF #observability #predictive #failure #technology #monitoring

GitHub

GitHub - linnix-os/linnix: eBPF-powered Linux observability with AI incident detection. Apache-2.0 licensed.

eBPF-powered Linux observability with AI incident detection. Apache-2.0 licensed. - linnix-os/linnix
  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 months ago

An eBPF Loophole: Using XDP for Egress Traffic

https://loopholelabs.io/blog/xdp-for-egress-traffic

#HackerNews #eBPF #XDP #EgressTraffic #Networking #TechInnovation

Using XDP for Egress Traffic

XDP only works for ingress. We found a loophole that lets it work for egress. Here's how we did the impossible.
  • Copy link
  • Flag this post
  • Block
Michael Dexter boosted
NLnet Labs
NLnet Labs
@nlnetlabs@social.nlnetlabs.nl  ·  activity timestamp 4 months ago

NSD 4.13.0 is now available. The most prominent new feature of our authoritative #DNS server is support for AF_XDP sockets.

With zero-copy disabled, we see a 1.7x improvement in handled queries per second compared to UDP through the network stack. We expect the improvement to be higher with a driver that fully supports AF_XDP zero-copy mode.

Release notes:
https://github.com/NLnetLabs/nsd/releases/tag/NSD_4_13_0_REL

Blog post:
https://blog.nlnetlabs.nl/experimental-support-for-af_xdp-sockets-in-nsd/

#XDP#EBPF

  • Copy link
  • Flag this post
  • Block
NLnet Labs
NLnet Labs
@nlnetlabs@social.nlnetlabs.nl  ·  activity timestamp 4 months ago

NSD 4.13.0 is now available. The most prominent new feature of our authoritative #DNS server is support for AF_XDP sockets.

With zero-copy disabled, we see a 1.7x improvement in handled queries per second compared to UDP through the network stack. We expect the improvement to be higher with a driver that fully supports AF_XDP zero-copy mode.

Release notes:
https://github.com/NLnetLabs/nsd/releases/tag/NSD_4_13_0_REL

Blog post:
https://blog.nlnetlabs.nl/experimental-support-for-af_xdp-sockets-in-nsd/

#XDP#EBPF

  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-alpha.40 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct