- Kprobe - Attach a program to the entry or exit of an arbitrary kernel symbol (function).
- kprobe - Kprobe using bpf2go.
- kprobepin - Reuse a pinned map for the kprobe example. It assumes the BPF FS is mounted at
/sys/fs/bpf
. - kprobe_percpu - Use a
BPF_MAP_TYPE_PERCPU_ARRAY
map. - ringbuffer - Use a
BPF_MAP_TYPE_RINGBUF
map.
- Uprobe - Attach a program to the entry or exit of an arbitrary userspace binary symbol (function).
- uretprobe - Uretprobe using bpf2go.
- Tracepoint - Attach a program to predetermined kernel tracepoints.
- tracepoint_in_c - Tracepoint using bpf2go.
- tracepoint_in_go - Tracepoint using the
ebpf.NewProgram
API and Go eBPF assembler.
- Cgroup - Attach a program to control groups (cgroups).
- cgroup_skb - Count packets egressing the current cgroup.
- Fentry - Attach a program to the entrypoint of a kernel function.
Like kprobes, but with better performance and usability, for kernels 5.5 and later.
- tcp_connect - Trace outgoing IPv4 TCP connections.
- tcp_close - Log RTT of IPv4 TCP connections using eBPF CO-RE helpers.
- XDP - Attach a program to a network interface to process incoming packets.
- xdp - Print packet counts by IPv4 source address.
- Add your use case(s) here!
cd ebpf/examples/
go run -exec sudo [./kprobe, ./uretprobe, ./ringbuffer, ...]
The examples are built via go generate
invoked by the Makefile in the project root.
make -C ../