Slide 1

Slide 1 text

Liz Rice Chief Open Source Officer, Isovalent @lizrice A Beginner’s Guide to eBPF Programming for networking

Slide 2

Slide 2 text

@lizrice eBPF lets you run custom code in the kernel

Slide 3

Slide 3 text

@lizrice Attaching eBPF to events eBPF programs are event-driven and are run when the kernel or an application passes a certain hook point. Pre-defined hooks include system calls, function entry/exit, kernel tracepoints, network events, and several others. ebpf.io/what-is-ebpf/

Slide 4

Slide 4 text

@lizrice userspace kernel syscalls app “Hello world” event execve() eBPF Hello World

Slide 5

Slide 5 text

@lizrice SEC("kprobe/sys_execve") int hello(void *ctx) { bpf_printk("I'm alive!"); return 0; } eBPF Hello World $ sudo ./hello bash-20241 [004] d... 84210.752785: 0: I'm alive! bash-20242 [004] d... 84216.321993: 0: I'm alive! bash-20243 [004] d... 84225.858880: 0: I'm alive! Info about process that called execve syscall + userspace code to load eBPF program

Slide 6

Slide 6 text

@lizrice Program types enum bpf_prog_type { BPF_PROG_TYPE_UNSPEC, BPF_PROG_TYPE_SOCKET_FILTER, BPF_PROG_TYPE_KPROBE, BPF_PROG_TYPE_SCHED_CLS, BPF_PROG_TYPE_SCHED_ACT, BPF_PROG_TYPE_TRACEPOINT, BPF_PROG_TYPE_XDP, BPF_PROG_TYPE_PERF_EVENT, BPF_PROG_TYPE_CGROUP_SKB, BPF_PROG_TYPE_CGROUP_SOCK, BPF_PROG_TYPE_LWT_IN, BPF_PROG_TYPE_LWT_OUT, BPF_PROG_TYPE_LWT_XMIT, BPF_PROG_TYPE_SOCK_OPS, BPF_PROG_TYPE_SK_SKB, BPF_PROG_TYPE_CGROUP_DEVICE, BPF_PROG_TYPE_SK_MSG, BPF_PROG_TYPE_RAW_TRACEPOINT, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_PROG_TYPE_LWT_SEG6LOCAL, BPF_PROG_TYPE_LIRC_MODE2, BPF_PROG_TYPE_SK_REUSEPORT, BPF_PROG_TYPE_FLOW_DISSECTOR, /* See /usr/include/linux/bpf.h for the full list. */ };

Slide 7

Slide 7 text

@lizrice Program types enum bpf_prog_type { BPF_PROG_TYPE_UNSPEC, BPF_PROG_TYPE_SOCKET_FILTER, BPF_PROG_TYPE_KPROBE, BPF_PROG_TYPE_SCHED_CLS, BPF_PROG_TYPE_SCHED_ACT, BPF_PROG_TYPE_TRACEPOINT, BPF_PROG_TYPE_XDP, BPF_PROG_TYPE_PERF_EVENT, BPF_PROG_TYPE_CGROUP_SKB, BPF_PROG_TYPE_CGROUP_SOCK, BPF_PROG_TYPE_LWT_IN, BPF_PROG_TYPE_LWT_OUT, BPF_PROG_TYPE_LWT_XMIT, BPF_PROG_TYPE_SOCK_OPS, BPF_PROG_TYPE_SK_SKB, BPF_PROG_TYPE_CGROUP_DEVICE, BPF_PROG_TYPE_SK_MSG, BPF_PROG_TYPE_RAW_TRACEPOINT, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_PROG_TYPE_LWT_SEG6LOCAL, BPF_PROG_TYPE_LIRC_MODE2, BPF_PROG_TYPE_SK_REUSEPORT, BPF_PROG_TYPE_FLOW_DISSECTOR, /* See /usr/include/linux/bpf.h for the full list. */ }; eBPF - not just for syscalls!

Slide 8

Slide 8 text

@lizrice

Slide 9

Slide 9 text

@lizrice Also, many perf events sudo perf list

Slide 10

Slide 10 text

@lizrice Network events (a very non-comprehensive guide)

Slide 11

Slide 11 text

@lizrice Program types enum bpf_prog_type { BPF_PROG_TYPE_UNSPEC, BPF_PROG_TYPE_SOCKET_FILTER, BPF_PROG_TYPE_KPROBE, BPF_PROG_TYPE_SCHED_CLS, BPF_PROG_TYPE_SCHED_ACT, BPF_PROG_TYPE_TRACEPOINT, BPF_PROG_TYPE_XDP, BPF_PROG_TYPE_PERF_EVENT, BPF_PROG_TYPE_CGROUP_SKB, BPF_PROG_TYPE_CGROUP_SOCK, BPF_PROG_TYPE_LWT_IN, BPF_PROG_TYPE_LWT_OUT, BPF_PROG_TYPE_LWT_XMIT, BPF_PROG_TYPE_SOCK_OPS, BPF_PROG_TYPE_SK_SKB, BPF_PROG_TYPE_CGROUP_DEVICE, BPF_PROG_TYPE_SK_MSG, BPF_PROG_TYPE_RAW_TRACEPOINT, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_PROG_TYPE_LWT_SEG6LOCAL, BPF_PROG_TYPE_LIRC_MODE2, BPF_PROG_TYPE_SK_REUSEPORT, BPF_PROG_TYPE_FLOW_DISSECTOR, /* See /usr/include/linux/bpf.h for the full list. */ };

Slide 12

Slide 12 text

@lizrice Kprobes / kretprobes Entry to / exit from a kernel function Lots of kernel functions relate to networking example tcp_v4_connect() kernel function

Slide 13

Slide 13 text

@lizrice Program types enum bpf_prog_type { BPF_PROG_TYPE_UNSPEC, BPF_PROG_TYPE_SOCKET_FILTER, BPF_PROG_TYPE_KPROBE, BPF_PROG_TYPE_SCHED_CLS, BPF_PROG_TYPE_SCHED_ACT, BPF_PROG_TYPE_TRACEPOINT, BPF_PROG_TYPE_XDP, BPF_PROG_TYPE_PERF_EVENT, BPF_PROG_TYPE_CGROUP_SKB, BPF_PROG_TYPE_CGROUP_SOCK, BPF_PROG_TYPE_LWT_IN, BPF_PROG_TYPE_LWT_OUT, BPF_PROG_TYPE_LWT_XMIT, BPF_PROG_TYPE_SOCK_OPS, BPF_PROG_TYPE_SK_SKB, BPF_PROG_TYPE_CGROUP_DEVICE, BPF_PROG_TYPE_SK_MSG, BPF_PROG_TYPE_RAW_TRACEPOINT, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_PROG_TYPE_LWT_SEG6LOCAL, BPF_PROG_TYPE_LIRC_MODE2, BPF_PROG_TYPE_SK_REUSEPORT, BPF_PROG_TYPE_FLOW_DISSECTOR, /* See /usr/include/linux/bpf.h for the full list. */ };

Slide 14

Slide 14 text

@lizrice userspace kernel Network connection Socket filter IP Socket Raw socket App syscalls Qdisc TCP/UDP/ICMP

Slide 15

Slide 15 text

@lizrice Socket filter “The filtering actions include dropping packets (if the program returns 0) or trimming packets (if the program returns a length less than the original). … Note that we're not trimming or dropping the original packet which would still reach the intended socket intact; we're working with a copy of the packet metadata which raw sockets can access for observability. “ https://blogs.oracle.com/linux/post/bpf-a-tour-of-program-types

Slide 16

Slide 16 text

@lizrice Socket filter Network packet data copy Filters what gets sent to userspace, for performant observability example attach_raw_socket()

Slide 17

Slide 17 text

@lizrice Program types enum bpf_prog_type { BPF_PROG_TYPE_UNSPEC, BPF_PROG_TYPE_SOCKET_FILTER, BPF_PROG_TYPE_KPROBE, BPF_PROG_TYPE_SCHED_CLS, BPF_PROG_TYPE_SCHED_ACT, BPF_PROG_TYPE_TRACEPOINT, BPF_PROG_TYPE_XDP, BPF_PROG_TYPE_PERF_EVENT, BPF_PROG_TYPE_CGROUP_SKB, BPF_PROG_TYPE_CGROUP_SOCK, BPF_PROG_TYPE_LWT_IN, BPF_PROG_TYPE_LWT_OUT, BPF_PROG_TYPE_LWT_XMIT, BPF_PROG_TYPE_SOCK_OPS, BPF_PROG_TYPE_SK_SKB, BPF_PROG_TYPE_CGROUP_DEVICE, BPF_PROG_TYPE_SK_MSG, BPF_PROG_TYPE_RAW_TRACEPOINT, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_PROG_TYPE_LWT_SEG6LOCAL, BPF_PROG_TYPE_LIRC_MODE2, BPF_PROG_TYPE_SK_REUSEPORT, BPF_PROG_TYPE_FLOW_DISSECTOR, /* See /usr/include/linux/bpf.h for the full list. */ };

Slide 18

Slide 18 text

@lizrice XDP express data path “What if we could run eBPF on the network interface card?”

Slide 19

Slide 19 text

@lizrice kernel NIC / driver eBPF program packet arrives network stack Physical network connection XDP

Slide 20

Slide 20 text

@lizrice kernel NIC eBPF program packet arrives network stack Physical network connection XDP Only some NICs / drivers support XDP

Slide 21

Slide 21 text

@lizrice kernel eBPF program packet arrives network stack Virtual network connection XDP eth0

Slide 22

Slide 22 text

@lizrice XDP express data path Inbound packets Pass / drop / manipulate / redirect packets example attach_xdp()

Slide 23

Slide 23 text

@lizrice Program types enum bpf_prog_type { BPF_PROG_TYPE_UNSPEC, BPF_PROG_TYPE_SOCKET_FILTER, BPF_PROG_TYPE_KPROBE, BPF_PROG_TYPE_SCHED_CLS, BPF_PROG_TYPE_SCHED_ACT, BPF_PROG_TYPE_TRACEPOINT, BPF_PROG_TYPE_XDP, BPF_PROG_TYPE_PERF_EVENT, BPF_PROG_TYPE_CGROUP_SKB, BPF_PROG_TYPE_CGROUP_SOCK, BPF_PROG_TYPE_LWT_IN, BPF_PROG_TYPE_LWT_OUT, BPF_PROG_TYPE_LWT_XMIT, BPF_PROG_TYPE_SOCK_OPS, BPF_PROG_TYPE_SK_SKB, BPF_PROG_TYPE_CGROUP_DEVICE, BPF_PROG_TYPE_SK_MSG, BPF_PROG_TYPE_RAW_TRACEPOINT, BPF_PROG_TYPE_CGROUP_SOCK_ADDR, BPF_PROG_TYPE_LWT_SEG6LOCAL, BPF_PROG_TYPE_LIRC_MODE2, BPF_PROG_TYPE_SK_REUSEPORT, BPF_PROG_TYPE_FLOW_DISSECTOR, /* See /usr/include/linux/bpf.h for the full list. */ };

Slide 24

Slide 24 text

@lizrice userspace kernel Network connection Traffic control (ingress) IP Socket Raw socket App syscalls Qdisc TCP/UDP/ICMP

Slide 25

Slide 25 text

@lizrice Traffic control Traffic filters, attached to queueing disciplines Ingress / egress (separately) Pass / drop / manipulate / redirect packets example tc(“add-filter)

Slide 26

Slide 26 text

@lizrice userspace kernel Network connection Traffic control ingress - ping reply IP Socket Raw socket App syscalls Qdisc TCP/UDP/ICMP

Slide 27

Slide 27 text

@lizrice Fewer perf events using TC pingpong sudo perf trace -e “net:*” ping -c1

Slide 28

Slide 28 text

@lizrice eBPF networking enables efficiency & high performance

Slide 29

Slide 29 text

@lizrice host pod app socket veth veth eth0 iptables conntrack iptables INPUT Linux routing iptables PREROUTING mangle iptables conntrack iptables FORWARD Linux routing iptables PREROUTING nat iptables POSTROUTING mangle iptables PREROUTING mangle iptables POSTROUTING nat

Slide 30

Slide 30 text

@lizrice host pod app socket veth veth eth0 iptables conntrack iptables INPUT Linux routing iptables PREROUTING mangle Linux routing

Slide 31

Slide 31 text

@lizrice eBPF can instrument apps without any app or config changes

Slide 32

Slide 32 text

@lizrice userspace pod container sidecar container A sidecar has a view across one pod

Slide 33

Slide 33 text

@lizrice userspace pod container sidecar container my-app.yaml containers: - name: my-app ... - name: my-app-init … - name: my-sidecar ... Sidecars need YAML

Slide 34

Slide 34 text

@lizrice userspace pod container container my-app.yaml containers: - name: my-app ... - name: my-app-init … eBPF does not need app changes kernel

Slide 35

Slide 35 text

@lizrice Inspect packets → Observability Identity-aware data flows, message parsing, security forensics... Drop or modify packets → Security Network policies, encryption... Redirect packets → Networking functions Load balancing, routing, service mesh... eBPF-enabled networking capabilities

Slide 36

Slide 36 text

@lizrice eBPF enables next-gen service mesh high performance without any app or config changes

Slide 37

Slide 37 text

@lizrice Thank you github.com/lizrice/ebpf-beginners ebpf.io | cilium.io | isovalent.com