Could eBPF have spared us the Crowdstrike incident?
Briefly

"It's interesting, because there was a vulnerability in the eBPF runtime that caused a similar outage that was also triggered by CrowdStrike in a certain Red Hat kernel."
"So eBPF might be the solution, but it has also been a historical cause of these problems... fundamentally, injecting code into running kernels is a risky activity."
"The concept of eBPF is good, but the implementation - like all implementations - has bugs. Now, could you catch something like the CrowdStrike incident with eBPF? Yes. Probably."
Read at Theregister
[
]
[
|
]