Support for signing #BPF programms has hit #Linux-next and thus is slated for inclusion in #kernel 6.18:

https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=58a5820582e4c809dd26b3f2d396cf072411d6e8

Quote from that merge commit: ""BPF Signing has gone over multiple discussions in various conferences with the kernel and BPF community and the following patch series is a culmination of the current of discussion and signed BPF programs. [โ€ฆ]

Signing also paves the way for allowing unprivileged users to load vetted BPF programs and helps in adhering to the principle of least privlege [โ€ฆ]""

See also the recent @lwn article "Possible paths for signing BPF programs": https://lwn.net/Articles/1031854/

#LinuxKernel

You could also use #bpf instead of #strace, albeit modern strace uses bpf if told so:

How to use the new Docker Seccomp profiles https://blog.jessfraz.com/post/how-to-use-new-docker-seccomp-profiles/

How to use the new Docker Seccomp profiles

Debugging and creating custom seccomp profiles for Docker containers.

Ramblings from Jessie

#Google #engineer Roman #Gushchin has proposed the ability for the #Linux #kernel to customize the out-of-memory " #OOM" behavior using #BPF programs.

https://www.phoronix.com/news/Linux-OOM-BPF-Proposal

New Linux Patches Allow Manipulating Out-Of-Memory Behavior Using BPF

Google engineer Roman Gushchin has proposed the ability for the Linux kernel to customize the out-of-memory 'OOM' behavior using BPF programs.

#Google #engineer Roman #Gushchin has proposed the ability for the #Linux #kernel to customize the out-of-memory " #OOM" behavior using #BPF programs. www.phoronix.com/news/Linux-O...

New Linux Patches Allow Manipu...
New Linux Patches Allow Manipulating Out-Of-Memory Behavior Using BPF

Google engineer Roman Gushchin has proposed the ability for the Linux kernel to customize the out-of-memory 'OOM' behavior using BPF programs.

It's been too long since the last ebpf_exporter release, so I cut v2.5.0 today.

https://github.com/cloudflare/ebpf_exporter/releases/tag/v2.5.0

#ebpf_exporter #ebpf #bpf #linux #kernel

A ๐Ÿ†• TCP-in-UDP tool is available, using eBPF ๐Ÿ to translate TCP packets into UDP ๐Ÿš‡ to avoid middleboxes interfering with some TCP extensions like MPTCP ๐Ÿ”€.

Blog post: https://blog.mptcp.dev/2025/07/14/TCP-in-UDP.html

Code and instructions: https://github.com/multipath-tcp/tcp-in-udp

#eBPF #BPF #TCP #MPTCP
Introducing TCP-in-UDP solution

The MPTCP protocol is complex, mainly to be able to survive on the Internet where middleboxes such as NATs, firewalls, IDS or proxies can modify parts of the TCP packets. Worst case scenario, an MPTCP connection should fallback to โ€œplainโ€ TCP. Today, such fallbacks are rarer than before โ€“ probably because MPTCP has been used since 2013 on millions of Apple smartphones worldwide โ€“ but they can still exist, e.g. on some mobile networks using Performance Enhancing Proxies (PEPs) where MPTCP connections are not bypassed. In such cases, a solution to continue benefiting from MPTCP is to tunnel the MPTCP connections. Different solutions exist, but they usually add extra layers, and requires setting a virtual private network (VPN) up with private IP addresses between the client and the server. Here, a simpler solution is presented: TCP-in-UDP. This solution relies on eBPF, doesnโ€™t add extra data per packet, and doesnโ€™t require a virtual private network. Read on to find out more about that!

MPTCP Linux Upstream

'"Today we are marking the celebration of Alan #Turing's 113th birthday by implementing the #Enigma machine in #eBPF. The Enigma machine was not developed by Turing himself, but it was the machine he famously broke during World War II."'

https://isovalent.com/blog/post/breaking-boundaries-implementing-the-enigma-machine-in-ebpf/

#Linux #LinuxKernel #kernel #bpf

Breaking Boundaries: Implementing the Enigma Machine in eBPF | Isovalent Blog

Today we are marking the celebration of Alan Turing's 113th birthday by implementing the Enigma machine in eBPF.

dhcpd(8): use UDP sockets instead of BPF

Before wiping the pre-installed #Windows 11 Pro on my new Beelink mini PC, I tested #WSL2 with #Fedora #Linux. I compiled my pet project, I/O Riot NG (ior), which requires many system libraries, including #BPF. Iโ€™m impressedโ€”everything works just like on native Fedora, and my tool runs and traces I/O syscalls with BPF out of the box. I might would prefer now Windows over MacOS if I had to chose between those two for work.

https://codeberg.org/snonux/ior

ior

I/O Riot NG is an experiment with BPF.

Codeberg.org
Filtering fanotify events with BPF

Linux systems can have large filesystems; trying to keep up with the stream of fanotify files [...]

LWN.net