Mar 2025
10 Mon
11 Tue
12 Wed
13 Thu
14 Fri 04:00 PM – 08:35 PM IST
15 Sat 09:00 AM – 05:50 PM IST
16 Sun 09:00 AM – 06:05 PM IST
Madhav Prabhu
Prerequisites:
The workshop structure closely resembles the first few chapters of https://eunomia.dev/en/tutorials/.
Code samples, snippets and other resources will be provided, it will be a hands on session.
Estimated time: ~180 minutes
(Duration: 25-30 minutes)
BPF is a technology that can run programs in a privileged context such as the operating system kernel. It is the successor to the Berkeley Packet Filter (BPF, with the “e” originally meaning “extended”) filtering mechanism in Linux and is also used in non-networking parts of the Linux kernel as well.
It is used to safely and efficiently extend the capabilities of the kernel at runtime without requiring changes to kernel source code or loading kernel modules. Safety is provided through an in-kernel verifier which performs static code analysis and rejects programs which crash, hang or otherwise interfere with the kernel negatively.
Broadly, the agenda would be:
(Content sourced from wikipedia)
(Duration: 10-15 minutes)
We would install and setup for enumoia-bpf
, including any other dependencies.
printk
to log events in the kernel logskprobe
fentry
tracepoints
Hosted by
{{ gettext('Login to leave a comment') }}
{{ gettext('Post a comment…') }}{{ errorMsg }}
{{ gettext('No comments posted yet') }}