<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[eBPF - The latest news, updates and articles covering eBPF and related topics.]]></title><description><![CDATA[eBPF is a revolutionary technology that can run sandboxed programs in the Linux kernel without changing kernel source code or loading a kernel module.]]></description><link>http://github.com/dylang/node-rss</link><generator>GatsbyJS</generator><lastBuildDate>Fri, 27 Feb 2026 07:43:29 GMT</lastBuildDate><item><title><![CDATA[How Nutanix AHV Uses eBPF for vNIC-IP Mapping]]></title><description><![CDATA[Nutanix AVH leverages eBPF and Ring Buffer for timely and accurate vNIC-to-IP association]]></description><link>https://www.nutanix.com/tech-center/blog/how-nutanix-ahv-uses-ebpf-for-vnic-ip-mapping</link><guid isPermaLink="false">https://www.nutanix.com/tech-center/blog/how-nutanix-ahv-uses-ebpf-for-vnic-ip-mapping</guid><pubDate>Thu, 29 Jan 2026 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Hardening eBPF for runtime security: Lessons from Datadog Workload Protection]]></title><description><![CDATA[Why Datadog chose eBPF for Workload Protection and lessons learned from implementation]]></description><link>https://www.datadoghq.com/blog/engineering/ebpf-workload-protection-lessons/</link><guid isPermaLink="false">https://www.datadoghq.com/blog/engineering/ebpf-workload-protection-lessons/</guid><pubDate>Wed, 07 Jan 2026 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Community Built! Results from eBPF Summit: Hackathon Edition 2025]]></title><description><![CDATA[Read about the winning projects of the hackathon and the new eBPF trends!]]></description><link>https://isovalent.com/blog/post/ebpf-summit-hackathon-edition-2025/</link><guid isPermaLink="false">https://isovalent.com/blog/post/ebpf-summit-hackathon-edition-2025/</guid><pubDate>Tue, 06 Jan 2026 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[The eBPF Foundation’s 2025 Year in Review]]></title><description><![CDATA[Funding everything from academic research to conferences to fellowships]]></description><link>https://ebpf.foundation/the-ebpf-foundations-2025-year-in-review/</link><guid isPermaLink="false">https://ebpf.foundation/the-ebpf-foundations-2025-year-in-review/</guid><pubDate>Thu, 18 Dec 2025 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Scaling real-time file monitoring with eBPF: How we filtered billions of kernel events per minute]]></title><description><![CDATA[Building file integrity monitoring on top of eBPF at Datadog]]></description><link>https://ebpfchirp.substack.com/p/testing-ebpf-program-compatibility</link><guid isPermaLink="false">https://ebpfchirp.substack.com/p/testing-ebpf-program-compatibility</guid><pubDate>Tue, 18 Nov 2025 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[eBPF Foundation Announces Community & Advocacy Fellowship Program]]></title><description><![CDATA[The fellowship is a six-month grant for individuals who want to dedicate their time to growing and educating the eBPF community]]></description><link>https://ebpf.foundation/ebpf-foundation-announces-community-advocacy-fellowship-program/</link><guid isPermaLink="false">https://ebpf.foundation/ebpf-foundation-announces-community-advocacy-fellowship-program/</guid><pubDate>Thu, 14 Aug 2025 11:52:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Testing eBPF Program Compatibility Across Kernels with LVH and GitHub Actions]]></title><description><![CDATA[GitHub Actions Meets Little VM Helper and eBPF]]></description><link>https://ebpfchirp.substack.com/p/testing-ebpf-program-compatibility</link><guid isPermaLink="false">https://ebpfchirp.substack.com/p/testing-ebpf-program-compatibility</guid><pubDate>Tue, 08 Jul 2025 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Breaking Boundaries: Implementing the Enigma Machine in eBPF]]></title><description><![CDATA[André Martins celebrates Alan Turing 113th posthumous birthday by implementing the Enigma machine in eBPF]]></description><link>https://isovalent.com/blog/post/breaking-boundaries-implementing-the-enigma-machine-in-ebpf/</link><guid isPermaLink="false">https://isovalent.com/blog/post/breaking-boundaries-implementing-the-enigma-machine-in-ebpf/</guid><pubDate>Mon, 23 Jun 2025 00:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Why Does My eBPF Program Work on One Kernel but Fail on Another?]]></title><description><![CDATA[Learn how to make eBPF programs portable across different Linux kernels using BPF CO-RE and BTF, and discover techniques for supporting systems without built-in BTF by embedding external BTF data.]]></description><link>https://ebpfchirp.substack.com/p/why-does-my-ebpf-program-work-on</link><guid isPermaLink="false">https://ebpfchirp.substack.com/p/why-does-my-ebpf-program-work-on</guid><pubDate>Tue, 22 Apr 2025 09:55:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[eBPF Announces Support for Tolkien Ring]]></title><description><![CDATA[eBPF revives Tolkien Ring, proving even ancient networks can be rebuilt better]]></description><link>https://ebpf.io/blog/support-for-tolkien-ring</link><guid isPermaLink="false">https://ebpf.io/blog/support-for-tolkien-ring</guid><pubDate>Tue, 01 Apr 2025 10:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;tolkien-ebee.png&quot; alt=&quot;A bee with a ring... for now&quot;&gt;&lt;/p&gt;
&lt;p&gt;Author: Bill Mulligan - Isovalent&lt;/p&gt;
&lt;p&gt;Before WiFi there was Ethernet. Before Ethernet there was &lt;a href=&quot;https://en.wikipedia.org/wiki/Token_Ring&quot;&gt;Token Ring&lt;/a&gt;. And before Token Ring there was Tolkien Ring. Before Tolkien Ring, the packets wandered without purpose, lost to the void.&lt;/p&gt;
&lt;p&gt;Now support for Tolkien Ring is coming to eBPF. Since its humble beginnings as a packet processor, eBPF has expanded to become a general purpose runtime enabling developers to extend and rebuild whole swaths of the kernel better from low overhead observability to granular security, optimized scheduling, and continuous profiling. eBPF is now returning to its roots with its most ambitious project yet, native support for the original networking protocol Tolkien Ring.&lt;/p&gt;
&lt;p&gt;For those unfamiliar, Tolkien Ring is the oldest networking protocol, established in the Days of Númenor, when the world was young and packets were not yet buried under layers of abstraction. It was the first fully decentralized, peer-to-peer network where messages were passed by whispers on the wind, encoded in runes, and secured by the strength of oaths. But as time passed, its wisdom was lost, replaced by lesser protocols constrained by mere physical wires and fleeting radio waves, forgotten by all but the wisest maintainers. Now, thanks to eBPF, this ancient technology is being restored to its former glory.&lt;/p&gt;
&lt;p&gt;“eBPF already transformed networking at Meta twice, first with &lt;a href=&quot;https://engineering.fb.com/2018/05/22/open-source/open-sourcing-katran-a-scalable-network-load-balancer/&quot;&gt;Katran&lt;/a&gt; processing millions of packets of cat pictures per second then again with &lt;a href=&quot;https://fosdem.org/2025/schedule/event/fosdem-2025-4045-an-introduction-to-netkit-the-bpf-programmable-network-device/&quot;&gt;netkit making container networking&lt;/a&gt; with isolation from orcs as fast as host networking.” said Alexei Starovoitov eBPF co-founder and co-maintainer. “We’ve also seen eBPF expand into networking use cases we never imagined like HTTP parsing in the kernel or a &lt;a href=&quot;https://github.com/kube-vm-project/eSwitch&quot;&gt;Layer 2 switch in Kubernetes for VMs&lt;/a&gt;, but bringing back Tolkien Ring was a challenge unlike any other. Half the documentation was in Elvish and the other half was a subdialect of Dwarvish last recorded in the times of Moria’s First Age maintainers. Adapting Tolkien Ring to modern infrastructure required pushing eBPF to its limits, but in the end, it was the only technology capable of binding them all.”&lt;/p&gt;
&lt;p&gt;Integrating Tolkien Ring into the kernel came with a few surprises. For example, Tolkien Ring does not retransmit packets, it simply ensures they arrive precisely when they are meant to. Packet loss is not a possibility but a matter of destiny, and unlike conventional cryptographic handshakes, Tolkien Ring’s security model is built on binding oaths, which once sworn, cannot be revoked. eBPF maintainers also had to fight hard against the Tolkien Ring Wraiths: the Nine were once features, but time and corruption had turned them into CI flakes. Happily, all fell back into order after a few additional patches, which saved everybody a trip to Mount Doom.&lt;/p&gt;
&lt;p&gt;The verifier also required substantial updates. While it was already capable of checking programs for unsafe memory access, ensuring programs run to completion and do not crash or otherwise harm the system, and allowing only privileged users to load eBPF programs, the verifier also had to account for the unique nature of Tolkien Ring itself. eBPF may be &lt;a href=&quot;https://isovalent.com/blog/post/ebpf-yes-its-turing-complete/&quot;&gt;Turing complete&lt;/a&gt;, but Tolkien Ring demanded something even stricter, Fate complete. Mutable state is forbidden, once a value is set, it can never be changed, for the past cannot be rewritten. Tolkien Ring also does not “retry” packets, if a message failed to arrive, it was simply never meant to be. The verifier had to enforce this logic, rejecting any program that attempted to interfere with the will of the network.&lt;/p&gt;
&lt;p&gt;Beyond the existing loader libraries for languages like Go, Rust, and Java, new ones had to be written for the ancient tongues Elvish, Dwarvish, and even the Black Speech of Mordor. Parsing rune encoded eBPF instructions proved particularly challenging, as some scripts changed meaning depending on the phase of the moon. The JIT compiler also had to be extended to translate these arcane instructions into efficient machine code while preserving their original intent. Miscompiling a single rune could turn a simple forwarding program into a summoning ritual! Luckily, as one of the fastest-moving subsystems of the kernel, the eBPF community proved up to the challenge.&lt;/p&gt;
&lt;p&gt;“This project is a testament to the power and flexibility of eBPF not just to build the future, but to rebuild the past, better than before,” said Thomas Graf, Chair of the eBPF Foundation and VP Isovalent at Cisco. “We’re seeing a shift across the industry as people look for alternatives to legacy platforms, and eBPF is proving to be the perfect tool for modernizing old systems without being constrained by their original limitations. Whether it’s replacing outdated networking and orchestration stacks or resurrecting protocols once thought lost to time, eBPF allows us to innovate while still honoring and leveraging the foundations of the past.”&lt;/p&gt;
&lt;p&gt;Of course, simply restoring Tolkien Ring wasn’t enough. It had to be optimized for modern workloads. Traditional implementations relied on hand-etched routing tables, often inscribed in stone or passed down through oral tradition, making updates slow and error-prone. With eBPF, these routing decisions can now be dynamically updated in real time, adapting to changing network conditions while maintaining the protocol’s original intent. Early benchmarks show a 300% increase in message throughput, though some wizards argue this is merely the will of the Valar.&lt;/p&gt;
&lt;p&gt;As always, the eBPF community remains committed to pushing the boundaries of what’s possible whether in the modern cloud native era or the forgotten networks of the First Age. Because eBPF is One bee to rebuild Tux, one JIT to run them, one verifier to judge them all, and in the kernel bind them.&lt;/p&gt;
&lt;p&gt;Where to learn more about eBPF:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=Wb_vD3XZYOA&quot;&gt;eBPF Documentary&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://cilium.isovalent.com/hubfs/Learning-eBPF%20-%20Full%20book.pdf&quot;&gt;Learning eBPF eBook&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://ebpf.io/what-is-ebpf/&quot;&gt;What is eBPF?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://ebpf.io/applications/&quot;&gt;eBPF Landscape&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://ebpf.foundation/&quot;&gt;eBPF Foundation&lt;/a&gt;&lt;/p&gt;
</content:encoded></item><item><title><![CDATA[What If CI/CD Pipelines Had Built-in Security and Observability with eBPF?]]></title><description><![CDATA[Learn how eBPF can add real-time security and observability to CI/CD pipelines like GitHub Actions, helping detect exploits and optimize workflows execution time.]]></description><link>https://ebpfchirp.substack.com/p/what-if-cicd-pipelines-had-built</link><guid isPermaLink="false">https://ebpfchirp.substack.com/p/what-if-cicd-pipelines-had-built</guid><pubDate>Thu, 27 Mar 2025 09:55:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Case Study: Polar Signals Uses eBPF to Monitor Internal Cross-Zone Network Traffic on Kubernetes, Reducing These Operating Costs by 50%]]></title><description><![CDATA[Polar Signals developed kubezonnet, an open source project designed to monitor and measure cross-zone network traffic in Kubernetes clusters. The solution leverages eBPF to trace network packets and aggregate traffic data.]]></description><link>https://ebpf.foundation/case-study-polar-signals-uses-ebpf-to-monitor-internal-cross-zone-network-traffic-on-kubernetes-reducing-these-operating-costs-by-50/</link><guid isPermaLink="false">https://ebpf.foundation/case-study-polar-signals-uses-ebpf-to-monitor-internal-cross-zone-network-traffic-on-kubernetes-reducing-these-operating-costs-by-50/</guid><pubDate>Thu, 16 Jan 2025 09:55:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Tracepoints, Kprobes, or Fprobes: Which One Should You Choose?]]></title><description><![CDATA[Tracing programs like kprobes, fprobes, and tracepoints are very popular, but their overlapping functionality can make choosing the right one confusing.]]></description><link>https://ebpfchirp.substack.com/p/tracepoints-kprobes-or-fprobes-which</link><guid isPermaLink="false">https://ebpfchirp.substack.com/p/tracepoints-kprobes-or-fprobes-which</guid><pubDate>Sat, 04 Jan 2025 09:55:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[eBPF in 2025 - Bigger Than the CrowdStrike Outage]]></title><description><![CDATA[ In 2025 eBPF adoption will expand rapidly and other predictions]]></description><link>https://thenewstack.io/ebpf-in-2025-bigger-than-the-crowdstrike-outage/</link><guid isPermaLink="false">https://thenewstack.io/ebpf-in-2025-bigger-than-the-crowdstrike-outage/</guid><pubDate>Wed, 01 Jan 2025 12:33:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[P99Conf: How eBPF Could Make Faster Database Systems]]></title><description><![CDATA[Learn about BPF-DB, an in-memory key-value data store that can be planted within the OS kernel itself via eBPF, thereby routing around the restrictions and limitations of an OS’s user space, or the space in memory where a program is typically run]]></description><link>https://thenewstack.io/p99conf-how-ebpf-could-make-faster-database-systems/</link><guid isPermaLink="false">https://thenewstack.io/p99conf-how-ebpf-could-make-faster-database-systems/</guid><pubDate>Sun, 27 Oct 2024 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Debugging Memory Leaks with eBPF]]></title><description><![CDATA[Learn how eBPF and uprobes can be combined to trace memory allocations and detect leaks]]></description><link>https://naftalyava.com/debugging-memory-leaks-using-ebpf/</link><guid isPermaLink="false">https://naftalyava.com/debugging-memory-leaks-using-ebpf/</guid><pubDate>Sat, 26 Oct 2024 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[Unit Testing eBPF Programs]]></title><description><![CDATA[Learn how to test eBPF XDP programs]]></description><link>https://ebpfchirp.substack.com/p/unit-testing-ebpf-programs</link><guid isPermaLink="false">https://ebpfchirp.substack.com/p/unit-testing-ebpf-programs</guid><pubDate>Fri, 25 Oct 2024 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[How to use eBPF for monitoring Linux thread contention?]]></title><description><![CDATA[Learn to create a minimal scheduler written with sched_ext in C]]></description><link>https://mostlynerdless.de/blog/2024/10/25/a-minimal-scheduler-with-ebpf-sched_ext-and-c/</link><guid isPermaLink="false">https://mostlynerdless.de/blog/2024/10/25/a-minimal-scheduler-with-ebpf-sched_ext-and-c/</guid><pubDate>Fri, 25 Oct 2024 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[شروع برنامه نویسی در ebpf با یک مثال ساده]]></title><description><![CDATA[درباره eBPF و نحوه نوشتن برنامه eBPF بیاموزید]]></description><link>https://virgool.io/@SeyedHosseinTafakh/%D8%B4%D8%B1%D9%88%D8%B9-%D8%A8%D8%B1%D9%86%D8%A7%D9%85%D9%87-%D9%86%D9%88%DB%8C%D8%B3%DB%8C-%D8%AF%D8%B1-ebpf-%D8%A8%D8%A7-%DB%8C%DA%A9-%D9%85%D8%AB%D8%A7%D9%84-%D8%B3%D8%A7%D8%AF%D9%87-puvqu0jqgmpn</link><guid isPermaLink="false">https://virgool.io/@SeyedHosseinTafakh/%D8%B4%D8%B1%D9%88%D8%B9-%D8%A8%D8%B1%D9%86%D8%A7%D9%85%D9%87-%D9%86%D9%88%DB%8C%D8%B3%DB%8C-%D8%AF%D8%B1-ebpf-%D8%A8%D8%A7-%DB%8C%DA%A9-%D9%85%D8%AB%D8%A7%D9%84-%D8%B3%D8%A7%D8%AF%D9%87-puvqu0jqgmpn</guid><pubDate>Thu, 24 Oct 2024 17:00:00 GMT</pubDate><content:encoded/></item><item><title><![CDATA[How to use eBPF for monitoring Linux thread contention?]]></title><description><![CDATA[Learn how to use eBPF for monitoring Linux thread contention]]></description><link>https://www.linkedin.com/pulse/how-use-ebpf-monitoring-linux-thread-contention-shiv-iyer-wpjdc/</link><guid isPermaLink="false">https://www.linkedin.com/pulse/how-use-ebpf-monitoring-linux-thread-contention-shiv-iyer-wpjdc/</guid><pubDate>Thu, 24 Oct 2024 17:00:00 GMT</pubDate><content:encoded/></item></channel></rss>