On 14/07/2021 17:02, Michael wrote:
However, I'm no dev so I
have no idea what the potential for BPF harming Linux security might be.
Other more knowledgeable M/L contributors may chime in to explain better.
The main thing I know is that the verifier enforces "forward progress".
If it can't
On Sunday, 11 July 2021 14:41:08 BST caveman رَجُلُ الْكَهْفِ 穴居人 wrote:
> On Sunday, July 11th, 2021 at 13:11, Nils Freydank
wrote:
> > Hi caveman,
> >
> > you should really train your search skills :-P
>
> lel. more like train my cognition.
I could do with a bit of the same! ;-)
> > (1)
On Sunday, July 11th, 2021 at 13:11, Nils Freydank
wrote:
> Hi caveman,
>
> you should really train your search skills :-P
lel. more like train my cognition.
> (1) Just searching for "libbpf" and then for "bpf BTF" gives plenty webpages
> and
>
> links. In short:
>
> BPF: Berkeley packet
Hi caveman,
you should really train your search skills :-P
(1) Just searching for "libbpf" and then for "bpf BTF" gives plenty webpages and
links. In short:
BPF: Berkeley packet filter, e.g.:
https://en.wikipedia.org/wiki/Berkeley_Packet_Filter
libbpf: a library to use it, e.g.:
i have 2 odd isuses that i observe:
(1) i get this error when i reboot my kernel:
> libbpf: failed to find valid kernel BTF
> libbpf: error loading vmlinux BTF: -3
> libbpf: failed to load object 'iterators_bpf'
> libbpf: failed to load BPF skeleton 'iterators_bpf': -3
>
5 matches
Mail list logo