eBPF
Developer rooms | Room: K.4.201 | Day 1
Note: I'm reworking this at the moment, some things won't work.
The state of eBPF docs
K.4.201 | 15:00 | 00:20 | Dylan Reimerink
bpftrace: a path to the ultimate Linux tracing tool
K.4.201 | 15:20 | 00:20 | Viktor Malik
Bpftrace OOM Profiler
K.4.201 | 15:40 | 00:20 | Samuel Blais-Dowdy
Auto-instrumentation for GPU performance using eBPF
K.4.201 | 16:00 | 00:20 | Nikola Grcevski, Annanay Agarwal
Extracting reliable data for short-lived processes using eBPF for Linux Security Threat Analysis
K.4.201 | 16:20 | 00:20 | Ankit Garg, Meghna Vasudeva, Lakshmy A V
Latest kprobe and uprobe development
K.4.201 | 16:40 | 00:20 | Jiri Olsa
Performance evaluation of the Linux kernel eBPF verifier
K.4.201 | 17:00 | 00:20 | Julia Lawall, Maxime Derri
Using Trusted Compilation from Safe Rust to Mitigate Bugs in the eBPF Verifier
K.4.201 | 17:20 | 00:20 | Luis Gerhorst
Building your eBPF Program with Rust and Aya
K.4.201 | 17:40 | 00:20 | Daniel Mellado
Five silly things to do when benchmarking your BPF program
K.4.201 | 18:00 | 00:20 | Dmitrii Dolgov
Writing a Minimal Scheduler with eBPF, sched_ext, and C
K.4.201 | 18:20 | 00:20 | Johannes Bechberger
An Introduction to Netkit: The BPF Programmable Network Device
K.4.201 | 18:40 | 00:20 | Mike Willard