Explore >> Select a destination


You are here

blog.px.dev
| | www.collabora.com
2.7 parsecs away

Travel
| | Interested in learning more about low-level specifics of the eBPF stack? Read on as we take a deep dive, from its VM mechanisms and tools, to running traces on remote, resource-constrained embedded devices.
| | blog.trailofbits.com
3.8 parsecs away

Travel
| | By Artem Dinaburg eBPF (extended Berkeley Packet Filter) has emerged as the de facto Linux standard for security monitoring and endpoint observability. It is used by technologies such as BPFTrace, Cilium, Pixie, Sysdig, and Falco due to its low overhead and its versatility. There is, however, a dark (but open) secret: eBPF was never intended...
| | blogs.igalia.com
3.0 parsecs away

Travel
| | [AI summary] The article provides an introduction to XDP (eXpress Data Path) and eBPF (extended Berkeley Packet Filter), explaining their roles in improving packet processing performance in Linux. It discusses the limitations of kernel bypass techniques and how XDP addresses them by executing network functions within the kernel. The article also delves into the history and evolution of BPF, highlighting its transition from a packet filtering tool to a versatile virtual machine used for various kernel tasks. Examples of eBPF usage, such as the tracex4 program, are provided to illustrate its capabilities.
| | www.sonatype.com
20.1 parsecs away

Travel
| The Biden administration announced a new, historic National Cybersecurity Strategy calling for cybersecurity liability and increased investment.