2nd Workshop on eBPF and Kernel Extensions

Program

Time
Event
Morning Sessions
Session Chair:
09:00 am - 09:10 am
Welcome and Introduction
09:10 am - 10:30 am
eBPF and Performance: What, Why, How, and What's Next by Brendan Gregg (Intel)
It is the dawn of the eBPF superpower age, where cutting edge system-level ideas can be run safely, securely, and efficiently on production systems. In 2024, more than ever before, we need these superpowers. We need better and faster ways to improve the performance on ever-complicated systems, to reduce their ever-growing environmental footprint, and to secure them in a safe way against an ever-growing attack surface. This keynote discusses the past, present, and future of eBPF, discussing performance analysis uses in particular, including recommendations, challenges, and areas of possible research and innovation. This future work includes a new performance analysis methodology, "Fast by Friday," which aims to improve the diagnosis speed on complicated systems, and is only made practical thanks to eBPF. Imagine solving any performance issue in five days. The greater take-away here is: What would you like to imagine? There's a good chance that, with eBPF, it can be built and used in production today.
10:30 am - 10:45 am
Morning Tea
Session 2: Challenges and Advances in eBPF Development
Session Chair:
10:45 am - 11:00 am
An Empirical Study on Challenges of eBPF Application Development
Mugdha Deokar, Jingyang Men, Lucas Castanheira, Ayush Bhardwaj, Theophilus A. Benson
11:00 am - 11:15 am
Understanding Performance of eBPF Maps
Chang Liu, Byungchul Tak, Long Wang
11:15 am - 11:30 am
Kgent: Kernel Extensions Large Language Model Agent
Yusheng Zheng, Yiwei Yang, Maolin Chen, Andrew Quinn
11:30 am - 11:45 am
Eliminating eBPF Tracing Overhead on Untraced Processes
Milo Craun, Khizar Hussain, Uddhav Gautam, Zhengjie Ji, Tanuj Rao, Dan Williams
11:45 am - 12:00 pm
Honey for the Ice Bear - Dynamic eBPF in P4
Manuel Simon, Henning Stubbe, Sebastian Gallenmüller, Georg Carle
12:00 pm - 1:30 pm
Lunch
Session 3: Extending eBPF Capabilities
Session Chair:
1:30 pm - 1:45 pm
Towards Functional Verification of eBPF Programs
Dana Lu, Boxuan Tang, Michael Paper, Marios Kogias
1:45 pm - 1:55 pm
Unsafe Kernel Extension Composition via BPF Program Nesting
Siddharth Chintamaneni, Sai Roop Somaraju, Dan Williams
1:55 pm - 2:10 pm
µBPF : Using eBPF for Microcontroller Compartmentalization
Szymon Kubica, Marios Kogias
2:10 pm - 2:50 pm
Coffee Break
Session 4: Accelerating Applications with eBPF
Session Chair:
2:50 pm - 3:05 pm
BOAD: Optimizing Distributed Communication with In-Kernel Broadcast and Aggregation
Jianchang Su, Yifan Zhang, Linpu Huang, Wei Zhang
3:05 pm - 3:20 pm
hyDNS: Acceleration of DNS Through Kernel Space Resolution
Joshua Bardinelli, Yifan Zhang, Jianchang Su, Linpu Huang, Aidan Parilla, Rachel Jarvi, Sameer G. Kulkarni, Wei Zhang
3:20 pm - 3:30 pm
Unlocking Path Awareness for Legacy Applications through SCION-IP Translation in eBPF
Lars-Christian Schulz, Florian Gallrein, David Hausheer
3:30 pm - 3:40 pm
Custom Page Fault Handling With eBPF
Tal Zussman, Teng Jiang, Asaf Cidon
3:40 pm - 4:00 pm
Closing Remarks

Call for Papers

eBPF (extended Berkeley Packet Filter) is an innovative technology that has been gaining popularity in the networking and operating system community for its flexibility, safety, and efficiency in programming end-host network and OS stacks. Despite the numerous advantages of eBPF, there are several research challenges in leveraging it for novel use cases. These challenges include the difficulty in integrating eBPF into current systems, the potential performance overhead when executed in the kernel, limitations of existing programming hooks and APIs, and the programming restrictions and challenges imposed by the need for safety as enforced by the eBPF verifier. To tackle these issues, a cross-disciplinary approach is necessary, combining techniques across network protocol design, programming languages, operating systems, compilers, hardware architecture, and formal verification.

The workshop aims to bring together experts and practitioners in the field of eBPF, end-host networking, and operating systems to discuss and present the latest advances to support and apply this cutting edge technology. Submissions may show the benefits that eBPF can bring to real-world systems, explore mechanisms to improve or re-design existing eBPF mechanisms, examine the security implications of end-host programmability, or present measurement studies that reveal new and interesting directions for this ecosystem. We are looking for novel and previously unpublished ideas, systems, and measurements that address key issues and challenges in this growing area, position papers that outline directions for the research community, as well as preliminary papers from ongoing projects that could benefit from early community feedback.

Topics of Interest

We welcome submissions including, but not limited to the following topics:

Submission Instructions

The 2nd workshop on eBPF and kernel extensions solicits submissions. We are looking for two-types of submissions:

Both types of papers can use as many additional pages as necessary for citations, and should be written using the two-column 10pt ACM sigconf format (https://github.com/scyue/latex-sigcomm18). All submissions are double-blind. The program committee will review papers to determine relevance to the workshop, quality, and on the likelihood that it will elicit discussion among the attendees. At least one author from each accepted submission must attend the workshop to present and discuss their work.

Please submit your paper via https://ebpf24.hotcrp.com/

If you have any questions or problems with your submission, please get in touch with Sebastiano Miano (sebastiano.miano@polimi.it) or Srinivas Narayana Ganapathy (sn624@cs.rutgers.edu).

Important Dates

Organizers

Workshop Chairs
Sebastiano Miano Politecnico di Milano
Srinivas Narayana Rutgers University
Gianni Antichi Politecnico di Milano
Aurojit Panda New York University
Programe Committee
Yang Zhou Harvard University
Stefan Schmid TU Berlin
Marios Kogias Imperial College London
Santosh Nagarakatte Rutgers University
Kostis Kaffes Columbia University
Yu Jiang Tsinghua University
Daniel Balasubramanian Vanderbilt University
Xiaoqi Chen VMware research / Purdue University
Gábor Rétvári BME
Salvatore Pontarelli Sapienza Università di Roma
Tom Barbette UCLouvain
Tamás Lévai Budapest University of Technology and Economics
Oliver Michel Princeton University
Tianyin Xu University of Illinois Urbana-Champaign
Paul Chaignon Isovalent
Toke Høiland-Jørgensen Red Hat
Ben Pfaff Feldera
Theophilus A. Benson Carnegie Mellon University
Quentin De Coninck Université de Mons (UMONS)
Ryan Stutsman University of Utah
Dan Williams Virginia Tech
Rémi Delmas Amazon Web Services
Alireza Farshin NVIDIA
Asaf Cidon Columbia University
Alireza Sanaee Queen Mary University of London
Rishabh Iyer UC Berkeley
Ilias Marinos Microsoft Research
Luca Niccolini Meta