From ef8e70d9f614f0c9d11393f43cc23c4b74f5b3d0 Mon Sep 17 00:00:00 2001 From: Luciano Carvalho Date: Thu, 5 Dec 2024 21:04:10 -0300 Subject: [PATCH] Fix eBPF instruction set URL in docs (#1432) --- docs/sources/_index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/sources/_index.md b/docs/sources/_index.md index 7267baf3b..399a889b5 100644 --- a/docs/sources/_index.md +++ b/docs/sources/_index.md @@ -45,7 +45,7 @@ Beyla offers the following features: eBPF allows you to attach applications to different points of the Linux Kernel. eBPF applications run in privileged mode and allow you to specify the runtime information of the Linux Kernel: system calls, network stack, as well as inserting probes in user space applications. -The eBPF applications are safe and compiled for their own [Virtual Machine instruction set](https://docs.kernel.org/bpf/instruction-set.html) and run in a sandboxed environment that verifies each loaded eBPF program for memory access safety and finite execution time. Unlike previous technologies, such as natively compiled kernel modules, there is no chance that a poorly programmed probe can cause the Linux Kernel to hang. +The eBPF applications are safe and compiled for their own [Virtual Machine instruction set](https://docs.kernel.org/bpf/standardization/instruction-set.html) and run in a sandboxed environment that verifies each loaded eBPF program for memory access safety and finite execution time. Unlike previous technologies, such as natively compiled kernel modules, there is no chance that a poorly programmed probe can cause the Linux Kernel to hang. eBPF binaries get verified and compiled with a Just-In-Time (JIT) compiler for the native host architecture such as x86-64 or ARM64 for efficient and fast execution.