ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

35C3 - Kernel Tracing With eBPF

Автор: media.ccc.de

Загружено: 2018-12-30

Просмотров: 12623

Описание: https://media.ccc.de/v/35c3-9532-kern...

Unlocking God Mode on Linux

Have you ever wanted to trace all syscalls or dump all IPC traffic across a Linux system? Until recently, doing so may have required some significant setup involving a half-baked tracing kernel module, a custom kernel module, or even using a kernel debugger. This talk will introduce the eBPF functionality of the Linux kernel and cover practical uses of the technology beyond mere code profiling. We will show how eBPF can be used both defensively and offensively to protect, or compromise, a system.

This talk will primarily focus on using eBPF to dynamically instrument kernel functionality and gain deep insight on the workings of both kernel and userspace code across a running system. Attendees will leave with practical knowledge for using eBPF to (performantly) watch every action taken on a running system and make processes reveal their secrets.

eBPF (or "extended" Berkeley Packet Filter) is a bytecode and virtual machine used as a safe computing environment within the Linux kernel to perform arbitrary programmatic actions. It is a redesign of the original BPF bytecode VM used, typically in userspace, to power features like tcpdump filters. eBPF has an entirely different set of capabilities and instructions, with its primary goal being to serve as a JIT-able virtual machine instruction set that can be targeted by compilers of a memory-safe "restricted C" language. In the Linux kernel BPF and eBPF have been applied to various different kernel features, from programmatic syscall filtering (for sandboxing) to performing efficient custom packet processing inline on the kernel's network data plane.

In this talk, we will first introduce and briefly discuss the internals of the eBPF implementation in the Linux kernel, its features, and the current set of components that it may be integrated with. We will also briefly cover how eBPF does not intrinsically make C code secure and demonstrate how using eBPF instead of other, more mature, technologies may introduce vulnerabilities.

The majority of this talk will focus on using eBPF to trace kernel functions to inspect both kernel and userland code and the data that flows through them. In line with this goal, this talk will cover pragmatic approaches to using eBPF and the non-idiomatic coding styles required to perform useful tasks in eBPF's sandbox. Additionally, while the aim of this talk is to cover the capabilities of "vanilla" eBPF, we will also demonstrate how the kernel may be trivially modified to lift the constraints of the eBPF sandbox when one does not have the time to tiptoe around the bytecode validator (or seeks to use eBPF as a drop-in replacement for kernel modules).

Lastly, this talk will show that while eBPF may generally be "safe" for the kernel itself, it is decidedly not when applied to userspace code. We will conclude this talk by demonstrating a general purpose privilege escalation technique that may be used by privileged users to hop namespacing and escape certain container configurations using nothing but eBPF.

Jeff Dileo Andy Olsen

https://fahrplan.events.ccc.de/congre...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
35C3 -  Kernel Tracing With eBPF

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Steven Rostedt - Learning the Linux Kernel with tracing

Steven Rostedt - Learning the Linux Kernel with tracing

Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

Kernel Recipes 2017 - Perf in Netflix - Brendan Gregg

Kernel Recipes 2017 - Perf in Netflix - Brendan Gregg

See what your computer is doing with Ftrace utilities

See what your computer is doing with Ftrace utilities

35C3 -  The Layman's Guide to Zero-Day Engineering

35C3 - The Layman's Guide to Zero-Day Engineering

Mentorship Session: Linux Kernel Debugging Tricks of the Trade

Mentorship Session: Linux Kernel Debugging Tricks of the Trade

A Gentle Introduction to BPF using bpftrace

A Gentle Introduction to BPF using bpftrace

eBPF: Fueling New Flame Graphs & more • Brendan Gregg • YOW! 2022

eBPF: Fueling New Flame Graphs & more • Brendan Gregg • YOW! 2022

eBPF - Rethinking the Linux Kernel

eBPF - Rethinking the Linux Kernel

Velocity 2017: возможности анализа производительности с Linux eBPF

Velocity 2017: возможности анализа производительности с Linux eBPF

Understanding and Troubleshooting the eBPF Datapath in Cilium - Nathan Sweet, DigitalOcean

Understanding and Troubleshooting the eBPF Datapath in Cilium - Nathan Sweet, DigitalOcean

Kernelless Kernel Programming (eBPF) - Computerphile

Kernelless Kernel Programming (eBPF) - Computerphile

Debian: САМЫЙ СТАБИЛЬНЫЙ Linux и ТЁМНАЯ История Создателя

Debian: САМЫЙ СТАБИЛЬНЫЙ Linux и ТЁМНАЯ История Создателя

35C3 -  The Rocky Road to TLS 1.3 and better Internet Encryption

35C3 - The Rocky Road to TLS 1.3 and better Internet Encryption

Нейросети захватили соцсети: как казахстанский стартап взорвал все AI-тренды и стал единорогом

Нейросети захватили соцсети: как казахстанский стартап взорвал все AI-тренды и стал единорогом

Netdev 0x13 - XDP Hands On Tutorial

Netdev 0x13 - XDP Hands On Tutorial

LISA21 - Внутренние компоненты BPF

LISA21 - Внутренние компоненты BPF

Linux Performance Tools, Brendan Gregg, part 1 of 2

Linux Performance Tools, Brendan Gregg, part 1 of 2

Return to Sender - Detecting Kernel Exploits with eBPF

Return to Sender - Detecting Kernel Exploits with eBPF

Alessandro Decina - Performance profiling with eBPF

Alessandro Decina - Performance profiling with eBPF

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]