#BPF

2026-03-05

[$] Reconsidering the multi-generational LRU

The multi-generational LRU (MGLRU) is an alternative memory-management algorithm that was merged for the 6.1 kernel in late 2022. It brought a promise of much-improved performance [...]

lwn.net/Articles/1060967/ #LWN #Linux #kernel #Android #Git #BPF #LSFMMBPF

2026-03-03

@yuka@s.umeyashiki.org @davidculley@hachyderm.io @sakarepmu@mstdn.party

Let's not forget
#nvme, #io_uring, #blockdev, and #bpf subsystems. Those are also maintained by #facebook employees.

2026-03-02

[$] The ongoing quest for atomic buffered writes

There are many applications that need to be able to write multi-block chunks of data to disk with the assurance that the operation will either complete successfully or fail altoget [...]

lwn.net/Articles/1060063/ #LWN #Linux #kernel #Git #PostgreSQL #PostgreSQL #XFS #BPF #io_uring

2026-02-25

[$] No hardware memory isolation for BPF programs

On February 12, Yeoreum Yun posted a suggestion for an improvement to the security of the kernel's BPF implementation: use memory protection keys to prevent unauthorized access to [...]

lwn.net/Articles/1059218/ #LWN #Linux #kernel #BPF

2026-02-23

[$] The second half of the 7.0 merge window

The 7.0 merge window closed on February 22 with 11,588 non-merge commits total, 3,893 of which came in after the article covering the first half of the merge window. The changes i [...]

lwn.net/Articles/1058664/ #LWN #Linux #kernel #Git #BPF

2026-02-16

[$] Compact formats for debugging—and more

At the 2025 Linux Plumbers Conference in Tokyo, Stephen Brennan gave a presentation on the debuginfo format, which contains the symbols and other information needed for debugging, [...]

lwn.net/Articles/1057295/ #LWN #Linux #Debian #GCC #Python #BPF #LPC

2026-02-13

[$] The first half of the 7.0 merge window

The merge window for Linux 7.0 has opened, and with it comes a number of interesting improvements and enhancements. At the time of writing, there have been 7,695 non-merge commits [...]

lwn.net/Articles/1057769/ #LWN #Linux #kernel #Clang #Rust #Git #XFS #BPF #io_uring

Christian Nollvnzn@mas.to
2026-02-11

Linux 7.0 Adds support For BPF Filtering To IO_uring (phoronix.com)

phoronix.com/news/Linux-7.0-IO

#Linux #kernel #bpf #io_uring #programming

Thorsten Leemhuis (acct. 1/4)kernellogger@hachyderm.io
2026-02-10

#io_uring #bpf filter support was merged for #Linux 7.0 by @axboe

git.kernel.org/torvalds/c/591b [update] see also: lwn.net/Articles/1054225/ and for the liburing side (which has both man pages and an extensive test case that also demonstrate how to use it) git.kernel.org/pub/scm/linux/k [/update]

""This adds support for both cBPF filters for io_uring, as well as task inherited restrictions and filters. […]

seccomp and io_uring don't play along nicely, […] As a result, things like containers and systemd that apply seccomp filters, can't filter io_uring operations.

That leaves them with just one choice if filtering is critical - filter the actual io_uring_setup(2) system call to simply disallow io_uring. That's rather unfortunate, and has limited us because of it.

io_uring already has some filtering support. […] This first adds support for cBPF filters for opcodes, which enables tighter control over what exactly a specific opcode may do. […] These filters are run post the init phase of the request […] On top of that support is added for per-task filters , meaning that any ring created with a task that has a per-task filter will get those filters applied when it's created.[…]""

#Kernel #LinuxKernel

2026-01-29

Решаем архитектурную проблему nginx с HTTP/3: опыт Angie и магия eBPF

Для пользователя может показаться, что переход с HTTP/2 на HTTP/3 — это просто замена TCP на UDP в конфиге. Но для серверного ПО с многопроцессной архитектурой этот шаг превращается в настоящую «головную боль». Классическая схема с accept() , на которой годами строилась работа с TCP‑соединениями, в мире QUIC попросту не существует. Пакеты летят в UDP‑порт, и ядро ОС больше не знает, какому именно рабочему процессу их отдать. В оригинальном nginx это привело к тому, что поддержка HTTP/3 уже долгое время остается «экспериментальной» и ограниченной: она страдает от проблем с обрывами сессий при миграции клиентов и деградации сервиса при обновлении конфигурации. Для многих это стало стоп‑фактором для внедрения протокола в реальный продакшен. В этой статье мы расскажем, как в Angie 1.11 нам удалось устранить эти фундаментальные недостатки. Мы не просто добавили поддержку протокола, а пересмотрели механику взаимодействия с ядром. Путь от простых хешей до создания полноценного аналога accept() для QUIC с помощью BPF‑программ позволил нам заявить: реализация HTTP/3 в Angie закончена, лишена «детских болезней» nginx и полностью готова к эксплуатации в высоконагруженных средах. Добро пожаловать под капот современного транспорта данных.

habr.com/ru/articles/989748/

#http3 #nginx #quic #сетевое_программирование #ebpf #bpf #angie #h3 #многопроцессность #udp

Thorsten Leemhuis (acct. 1/4)kernellogger@hachyderm.io
2026-01-15

eBPF.party – Learn eBPF through hands-on exercises. Write, compile, and run programs directly in your browser:

ebpf.party/

#Linux #LinuxKernel #kernel #ebpf #bpf

Screenshot from the top of the linked website
Thorsten Leemhuis (acct. 1/4)kernellogger@hachyderm.io
2025-12-19

""[…] eBPF (Extended Berkeley Packet Filter) lets you attach tiny, sandboxed programs directly to the #Linux #kernel, no restarts, no recompiling, no intrusive overhead. In practice, you gain X-ray vision into your system’s behavior, in real time, with almost zero performance penalty.

And thanks to the amazing CLI tools built around eBPF, you can debug problems that were previously “impossible” to catch. […]""

1. bpftrace: The ultimate custom debugger
2. execsnoop: Catching fleeting processes
3. opensnoop: Permission denied demystified
4. tcplife: Tracing microservice sessions
5. gethostlatency: Fixing intermittent slowness
6. biotop: Disk I/O task manager
7. biolatency: The I/O performance historian
8. tcpretrans: Spotting network reliability issues
9. tcpconnect: Tracing outbound connections
10. tcpaccept: Tracing inbound connections
11. biosnoop: I/O operations in detail
12. bpftool: Inspect and debug eBPF programs already running

itsfoss.com/ebpf-sysadmin-tool

#BPF #LinuxKernel

Thorsten Leemhuis (acct. 1/4)kernellogger@hachyderm.io
2025-12-16

Recordings from last week's @linuxplumbersconf 2025 are now available.🥳

You have two options to find the ones you might be interested in:

* Look through this YouTube-Playlist (youtube.com/playlist?list=PLVs)

* Find and open interesting talks via the Schedule Overview (lpc.events/event/19/timetable/) or the Detailed Schedule (lpc.events/event/19/timetable/), as the individual talk descriptions link to the videos. And as a bonus, they besides the summary usually contain links to the slides shown, too.

#Linux #kernel #LinuxPlumbersConference #LinuxPlumbersConference2025 #eBPF #BPF

Screenshot from the YouTube Playlist
2025-12-02

Мониторинг в Linux на уровне ядра. Краткое практическое введение в eBPF+Cilium

Добрый день, всем читающим данную статью. Недавно эксперементируя с eBPF для разработки нового функционала своей EDR для linux-серверов , я столкнулся с огромной проблемой: на просторах интернета есть огромный пласт статей по теории работы с eBPF, однако кратких практических статей как работать с BPF мной найдено не было. Если быть более точным, то такие статьи есть, однако, они не дают понимания функционала. В общем, в данной статье хотелось бы написать краткий гайд по работе с eBPF с уклоном в практику

habr.com/ru/articles/972602/

#eBPF #bpf #go #edr #разработка #мониторинг #трассировка #ядро #ядро_linux #linux

:radare2: radare :verified:radareorg@infosec.exchange
2025-11-28

☀️The deeply detailed talk from ulexec and secoalba from @inversive_xyz about reverse engineering #Solana #eBPF binaries with #radare2 was built on top of several improvements for the elf bin parser and the architecture support for the 64bit #BPF.

All that stuff was also included in the last r2-6.0.6 release:

- esil emulation of bytecode
- pseudo decompilation
- AI-based disassembly
- bpf-specific elf relocs
- bpf-specific analysis plugin to extract strings
- document every bpf instruction
- support multiple "cpu" models
- binary patching and assembling BPF instructions

Cook some popcorns and take notes because their presentation was really detailed! Worth watching!
🎥 youtube.com/watch?v=IAt-HgKPN88

cryptaxcryptax
2025-11-25

Je suis à Cyb'Air aujourd'hui et mes slides sont sur GitHub.com/cryptax/talks.

C'était sur des variantes de 2025 de Linux/Symbiote et BPFDoor. Avec des nouveautés sur le filtre BPF comme le support d'IPv6.

Les samples sont analysés avec r2, r2ai, r2mcp et mcpico.

N-gated Hacker Newsngate
2025-10-17

Wow, riveting stuff: a bunch of geeks decided it's finally time for a makeover with support. They gathered at the 2025 GNU Tools to talk shop—because nothing screams like a cauldron and a horde of 🧙🔧. Who knew could be this exciting? 🌟
lwn.net/Articles/1039827/

Hacker Newsh4ckernews
2025-10-17

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst