coolbpf's target is to build a platform for libbpf compile collection,
which is for creating efficient kernel tracing and manipulation
programs, is to wrapper main functions of libbpf for user development.
coolbpf's main function are:
1) Service for local compile, and some wraps for BPF function call.
2) Service for remote compile, it receives xx.bpf.c, and return bpf.so
to your local APP to loading. The user can focus on their main functions
and don't
care compile environment.
3) High kernel version backport to low version with kernel module, such
as 3.10 BPF support, and perf buffer replace with new feature of ring
buffer.
4) BTF auto generate.
5)Variety kernel version testing for new BPF functions and tools.
6)Support for many languags, python/go/c/rust.
Compiling libcoolbpf requires installing the following dependent libraries/tools:
- elfutils-devel
- gcc
Compiling the eBPF tool requires additional installation of the following dependent libraries/tools:
- clang
- llvm
Installation: Run ./install.sh in the coolbpf root directory.
Uninstall: Run ./uninstall.sh in the coolbpf root directory.
In the tools/examples/syscall directory, we provide examples of using libcoolbpf to develop eBPF programs. The process of compiling the syscall eBPF tool is as follows:
- Install libcoolbpf: Run
./install.shin the coolbpf root directory to install libcoolbpf - Compile syscall: run
mkdir -p build && cd build && cmake -DBUILD_EXAMPLE=on .. && makein the coolbpf root directory
The location of the final generated syscall executable program is: build/tools/examples/syscall/syscall.
In the src/agentsight directory, we provide AgentSight — a zero-instrumentation LLM agent observability tool built with eBPF. AgentSight monitors AI agent behavior through SSL/TLS traffic interception and process monitoring at the kernel level, requiring no code changes, no new dependencies, and no SDKs.
Key features:
- Zero Instrumentation: Works with any AI framework or application out of the box.
- SSL/TLS Traffic Capture: Intercepts real unencrypted requests/responses at the system boundary.
- Process Monitoring: Tracks all process behaviors, subprocess executions, and file operations.
- Real-time Visualization: Provides timeline, process tree, and event log views via a web interface.
- Low Overhead: Less than 3% CPU overhead due to optimized eBPF kernel-space data collection.
For more details, refer to src/agentsight/README.md.
In the bpf_kernel_modules directory, we provide additional kernel module implementations as libraries to supply extra kernel functions for specific types of BPF programs. To use these libraries, first compile the kernel module, then load it, and finally use the kernel functions exposed by the module in your eBPF program. For example, with eNetSTL library designed for XDP programs:
(eNetSTL Authors: Dian Shen, Bin Yang, Hanlin Yang, and Lunqi Zhao from Southeast University)
- Compiling eNetSTL: In the bpf_kernel_modules/eNetSTL directory, run
make(if the kernel was compiled with clang, usemake LLVM=1), then runsudo insmod eNetSTL.ko. - In the eBPF program,
#include "coolbpf.h"and use the APIs as needed. For details on using eNetSTL APIs, refer to src/coolbpf_bpf.h. - For usage examples of eNetSTL, refer to tools/examples/eNetSTL.