Overview
Explore kernel analysis using eBPF in this informative conference talk. Delve into the extended Berkeley Packet Filter's powerful in-kernel virtual machine capabilities and its applications beyond network packets. Learn about attaching eBPF programs to probe and tracepoints for debugging and tuning. Examine a roll-your-own example program to understand how userspace leverages these mechanisms. Discover practical userspace tools for writing high-level eBPF programs and processing resulting data. Gain insights from Daniel Thompson, tech lead at Linaro, as he covers topics including eBPF background, verification, kernel examples, BC examples, power states, stack tracking, and tracing tools.
Syllabus
Introduction
Background
Inside eBPF
Verification
Code
Kernel Examples
BC
Examples
Power States
Stack Tracking
Tools Trace
Taught by
Linux Foundation