Bpf -- Discussion of BPF/eBPF standardization efforts within the IETF | |
|
|
About Bpf | |
BPF/eBPF (which is no longer an acronym for anything) is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in a privileged context such as the operating system kernel. It is used to safely and efficiently extend the capabilities of the kernel without requiring to change kernel source code or load kernel modules.
To see the collection of prior postings to the list, visit the Bpf Archives. |
|
Using Bpf | |
To post a message to all the list members, send email to
bpf@ietf.org.
You can subscribe to the list, or change your existing subscription, in the sections below. |
|
Subscribing to Bpf | |
Subscribe to Bpf by filling out the following form. You will be sent email requesting confirmation, to prevent others from gratuitously subscribing you. This is a private list, which means that the list of members is not available to non-members. | |
Bpf Subscribers | |
|
![]() version 2.1.39 |
![]() |
![]() |