eBPF

Developer rooms | Room: K.4.201 | Day 1


Note: I'm reworking this at the moment, some things won't work.

  • The state of eBPF docs

    K.4.201 | 15:00 | 00:20 | Dylan Reimerink

  • bpftrace: a path to the ultimate Linux tracing tool

    K.4.201 | 15:20 | 00:20 | Viktor Malik

  • Bpftrace OOM Profiler

    K.4.201 | 15:40 | 00:20 | Samuel Blais-Dowdy

  • Auto-instrumentation for GPU performance using eBPF

    K.4.201 | 16:00 | 00:20 | Nikola Grcevski, Annanay Agarwal

  • Extracting reliable data for short-lived processes using eBPF for Linux Security Threat Analysis

    K.4.201 | 16:20 | 00:20 | Ankit Garg, Meghna Vasudeva, Lakshmy A V

  • Latest kprobe and uprobe development

    K.4.201 | 16:40 | 00:20 | Jiri Olsa

  • Performance evaluation of the Linux kernel eBPF verifier

    K.4.201 | 17:00 | 00:20 | Julia Lawall, Maxime Derri

  • Using Trusted Compilation from Safe Rust to Mitigate Bugs in the eBPF Verifier

    K.4.201 | 17:20 | 00:20 | Luis Gerhorst

  • Building your eBPF Program with Rust and Aya

    K.4.201 | 17:40 | 00:20 | Daniel Mellado

  • Five silly things to do when benchmarking your BPF program

    K.4.201 | 18:00 | 00:20 | Dmitrii Dolgov

  • Writing a Minimal Scheduler with eBPF, sched_ext, and C

    K.4.201 | 18:20 | 00:20 | Johannes Bechberger

  • An Introduction to Netkit: The BPF Programmable Network Device

    K.4.201 | 18:40 | 00:20 | Mike Willard