eCHO Episode 203: eBPF Hookpoint Gotchas
Details
eBPF programs often behave differently than developers expect, not because of incorrect logic, but because of subtle behaviours of the hookpoints themselves.
Join Donia Chaiehloudj to run through commonly misunderstood attachment types like kprobes/fentry, tracepoints and uprobes, and real-world gotchas that routinely affect production tools. Learn why they occur and how to work around them.
Show notes: [https://hackmd.io/@echo-live](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbXJleHlQcnVEVmo0Q1NCN0JvS05acmR0Y3Bxd3xBQ3Jtc0trbHRoV184d2tCOFlGeWxDMzZxNG11ZG1aQkw2U3JWNktoTG5sSmNQYnQtSXNucXhaOHU0X2RBOEg1RFA5YjNOWDFORDVyN0lTckphOU03QS1KX29iQ0M3LVBpaVJqZ1NiMGFrVkw3em4yT0hWT2I0OA&q=https%3A%2F%2Fhackmd.io%2F%40echo-live&v=JMnG5Hfr0pk)
Join us live at 3pm CET: LINK
*eBPF & Cilium Office Hours - a weekly livestream. Join us live, we would love to hear your questions and comments! Find out more at: https://github.com/isovalent/eCHO*
