|
You are here |
blog.px.dev | ||
| | | | |
blogs.igalia.com
|
|
| | | | | [AI summary] The article provides an introduction to XDP (eXpress Data Path) and eBPF (extended Berkeley Packet Filter), explaining their roles in improving packet processing performance in Linux. It discusses the limitations of kernel bypass techniques and how XDP addresses them by executing network functions within the kernel. The article also delves into the history and evolution of BPF, highlighting its transition from a packet filtering tool to a versatile virtual machine used for various kernel tasks. Examples of eBPF usage, such as the tracex4 program, are provided to illustrate its capabilities. | |
| | | | |
debugging.works
|
|
| | | | | This blog post shows how to use bpftrace | |
| | | | |
www.collabora.com
|
|
| | | | | Interested in learning more about low-level specifics of the eBPF stack? Read on as we take a deep dive, from its VM mechanisms and tools, to running traces on remote, resource-constrained embedded devices. | |
| | | | |
blog.quarkslab.com
|
|
| | | Broadcom is one of the major vendors of wireless devices worldwide. Since these chips are so widespread they constitute a high value target to attackers and any vulnerability found in them should be considered to pose high risk. In this blog post I provide an account of my internship at Quarkslab which included obtaining, reversing and fuzzing the firmware, and finding a few new vulnerabilities. | ||