Ayesha Kaleem

Gentle Introduction to eBPF

What if you could safely program the Linux kernel without changing its code? Discover how eBPF makes it possible for observability, security, and networking.

Gentle Introduction to eBPF
#1about 1 minute

The challenge of extending the Linux kernel

Adding new features to the Linux kernel is a slow and complex process, creating a bottleneck for developers who need new observability or security capabilities.

#2about 1 minute

Introducing eBPF as a kernel programmability solution

eBPF allows running custom programs in a sandboxed virtual machine inside the kernel, enabling new features without changing kernel source code.

#3about 1 minute

How eBPF programs are event-driven and written

eBPF programs are triggered by kernel events called hooks, and they are typically written in C or Python using libraries like BCC and compiled with LLVM.

#4about 1 minute

A practical "Hello World" eBPF code example

A simple program demonstrates how to write an eBPF function in C and use a Python script to load it and attach it to the execve system call.

#5about 1 minute

The eBPF runtime, verifier, and JIT compiler

Before execution, eBPF bytecode is validated by a verifier for safety and then compiled by a Just-In-Time (JIT) compiler into native machine code for performance.

#6about 1 minute

Using eBPF maps to share data efficiently

eBPF maps are key-value data structures that enable efficient data sharing between eBPF programs in the kernel and applications in user space.

#7about 2 minutes

Popular projects and companies using eBPF

Major open-source projects like Cilium, Falco, and Pixie leverage eBPF for networking and observability, and it is widely adopted by large tech companies.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
AG
Andre Braun, GitLab
Now is the time for industrialized software development
Now is the time for industrialized software development Recently, I received a letter from my car’s manufacturer alerting me to a recall. They had discovered a defective part and wanted to replace it. It was easily fixed, and I might have forgotten a...
Now is the time for industrialized software development
DC
Daniel Cranney
Dev Digest 188: CfP time, the risks of NPM and IKEA algorithms
Inside last week’s Dev Digest 188 . 🤖 GitHub Copilot CLI is now in public review 💻 Microsoft is bringing ‘vibe working’ to office apps 🎣 Attackers abuse AI tools to generate captchas in fishing attacks ⚠️ When LLMs autonomously attack 🧠 Common cause...
Dev Digest 188: CfP time, the risks of NPM and IKEA algorithms

From learning to earning

Jobs that call for the skills explored in this talk.

Security Engineer

Security Engineer

beqom
Charing Cross, United Kingdom

Intermediate
Azure
DevOps
Docker
Terraform
Kubernetes
+2