Help
RSS
API
Feed
Maltego
Contact
Domain > bpfconf.ebpf.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-08-21
104.26.5.27
(
ClassC
)
2026-02-06
172.67.71.235
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Fri, 06 Feb 2026 16:18:58 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveNel: {report_to:cf-nel,success_fraction:0.0,max_age:604800}Age: 0Cache-Control: public,max-age0,must-revalidatecache-status: Netlify Edge; fwdmissReport-To: {group:cf-nel,max_age:604800,endpoints:{url:https://a.nel.cloudflare.com/report/v4?sl1AinEljiM8eLjpiz72IXnYPLBupBJajyve5%2BIfyhupMRrusPQdtpSniozDmnXS4wc3xtvmVC0EsL6MHjc8TKYqb7s8F1PPt4e0T69Y%3D}}Server: cloudflarestrict-transport-security: max-age31536000vary: Accept-Encodingx-nf-request-id: 01KGSVZQAW2BZF9EF1S3NXHS64cf-cache-status: DYNAMICCF-RAY: 9c9bf767de98ef18-PDXalt-svc: h3:443; ma86400 html>head> meta charsetUTF-8> base idapp-base href/bpfconf2025/> script> // If opened via file://, make relative paths resolve from this folder if (location.protocol file:) { document.getElementById(app-base).setAttribute(href, ./); } /script> title>Linux Kernel Developers bpfconf 2025/title> style> .collapsible { background: #fff; cursor: pointer; padding: 10px; width: 100%; border: 2px; text-align: left; outline: none; color: #000; text-decoration: none; font: inherit } .content { padding: 0 18px; display: none; overflow: hidden } .collapsible:after { content: \02795; font-size: 13px; color: #000; float: right; margin-left: 5px } .active:after { content: \2796 } .speaker { font-size: 11px; color: grey; display: inline; margin-left: 10px } /* --- Attendee photos --- */.photos { display: grid; grid-template-columns: repeat(auto-fit, minmax(220px, 1fr)); gap: 12px; margin: 16px 0 4px;}.photos a { display: block; border-radius: 10px; overflow: hidden; box-shadow: 0 1px 6px rgba(0,0,0,0.08); transition: transform 0.12s ease, box-shadow 0.12s ease;}.photos a:hover { transform: translateY(-2px); box-shadow: 0 6px 18px rgba(0,0,0,0.12);}.photos img { width: 100%; height: 220px; object-fit: cover; display: block;}.photos-caption { font-size: 12px; color: #666; margin-top: 6px;}@media (max-width: 520px) { .photos img { height: 180px; }} /style>/head>body bgcolor#ffffff> table border0 width850> tbody> tr> td> /td> /tr> tr> td> /td> td valigntop aligncenter colspan2> h1>Linux Kernel Developers bpfconf 2025/h1>br> img srcbpfconf2025_material/bpf_logo.png width180 altBPF logo> /td> /tr> tr> td>br>/td> /tr> tr> td>br>/td> /tr> tr> td>/td> td> bpfconf is an invitation-only technical workshop run by the Linux community in order to bring BPF core developers together, to discuss new ideas and to work out improvements to the BPF subsystem that will make their way into future mainline kernels and into the BPF compiler backends. p> The conference is purposely kept small with focus on discussion rather than just presentation. Along with the LPCs a hrefhttps://lore.kernel.org/bpf/63792467-9be4-0d84-8fd1-93f63bcee3d9@iogearbox.net/ target_blank relnoopener>BPF Track/a> which is organized and run by the same community, the goal is to allow developers to meet face to face twice per year to exchange and discuss ongoing developments in the BPF ecosystem. /p> p> The 2025 bpfconf edition is a three-days conference which is part of the a hrefhttps://events.linuxfoundation.org/lsfmm/ target_blank relnoopener>LSF/MM/BPF summit/a>. It is therefore also open to all LSF/MM/BPF attendees. /p> h2>Discussion Topics/h2> p>The following discussion topics have been brought up at this years bpfconf. In each slot below, there is a short discussion topic with a link to the corresponding slides in case slides have been used as a discussion starter. /p> p> LWN coverage of the BPF track from Jonathan Corbet can be found a hrefhttps://lwn.net/Articles/lsfmmbpf2025/ target_blank relnoopener>here/a>. !-- Raw (and incomplete) notes for some of the sessions have been collected by participants a hrefbpfconf2024_material/LSFMMBPF_2024_raw_notes.pdf target_blank relnoopener>here/a>. --> /p> table border1 cellpadding3 cellspacing1> tr> th width250>Name/th> th width550>Topic/th> /tr> tr> td>Anton Protopopov/td> td>a hrefbpfconf2025_material/2025.03_ Indirect Calls (LSF_MM_BPF 2025, Canada).pdf target_blank relnoopener>BPF Indirect calls/a>/td> /tr> tr> td>Anton Protopopov/td> td>a hrefbpfconf2024_material/2025.03_ Hashtab & Friends (LSF_MM_BPF 2025, Canada).pdf target_blank relnoopener>Hashtab Memory Optimizations & a few other topics/a>/td> /tr> tr> td>Anton Protopopo/td> td>a hrefbpfconf2025_material/2025.03_ Static Keys (LSF_MM_BPF, Canada).pdf target_blank relnoopener>Update on Static Keys/a>/td> /tr> tr> td>Alexei Starovoitov/td> td>a hrefbpfconf2025_material/Beyond 1M instructions.pdf target_blank relnoopener>Beyond 1M BPF instructions/a>/td> /tr> tr> td>Ihor Solodrai/td> td>a hrefbpfconf2025_material/BPF CI - LSF_MM 2025.pdf target_blank relnoopener>BPF CI updates/a>/td> /tr> tr> td>Martin Lau/td> td>a hrefbpfconf2025_material/bpf netdev perf and api improvements - Martin Lau.pdf target_blank relnoopener>An upgrade on some of the existing BPF/netdev implementations/a>/td> /tr> tr> td>Paul E. McKenney/td> td>a hrefbpfconf2025_material/hornet-lsm.pdf target_blank relnoopener>eBPF Code Signing and Gatekeeper Introducing Hornet LSM/a>/td> /tr> tr> td>John Fastabend, Mahé Tardy/td> td>a hrefbpfconf2025_material/kfunc for TCP rst.pdf target_blank relnoopener>kfunc for TCP reset/a>/td> /tr> tr> td>Kumar Kartikeya Dwivedi/td> td>a hrefbpfconf2025_material/Locking in BPF - LSFMMBPF 2025.pdf target_blank relnoopener>Locking in BPF/a>/td> /tr> tr> td>Eduard Zingerman/td> td>a hrefbpfconf2025_material/lsfmm25-kfuncs-inlining-eduard-zingerman.pdf target_blank relnoopener>kfuncs inlining in BPF programs/a>/td> /tr> tr> td>Daniel Borkman/td> td>a hrefbpfconf2025_material/lsfmmbpf_2025_netkit_borkmann.pdf target_blank relnoopener>netkit for VM workloads/a>/td> /tr> tr> td>Kumar Kartikeya, Dwivedi Rishabh, Iyer Sanidhya Kashyap/td> td>a hrefbpfconf2025_material/Nous - LSFMMBPF 2025.pdf target_blank relnoopener>Efficient IO-Intensive us-scale Applications using eBPF/a>/td> /tr> tr> td>Cong Wang/td> td>a hrefbpfconf2025_material/Optimizing sk_msg for Socket Map.pdf target_blank relnoopener>Optimizing sk_msg for Socket Map/a>/td> /tr> tr> td>Alexei Starovoitov/td> td>a hrefbpfconf2025_material/Reentrant kmalloc.pdf target_blank relnoopener>Reentrant kmalloc for any context/a>/td> /tr> tr> td>Santosh Nagarakatte/td> td>a hrefbpfconf2025_material/Santosh Nagarakatte-LSFMMBPF-2025.pdf target_blank relnoopener>Formal Verification of the eBPF Verifier with Agni/a>/td> /tr> tr> td>John Fastabend, Kornilios Kourtis, Mahé Tardy/td> td>a hrefbpfconf2025_material/Splicing BPF maps to the NIC.pdf target_blank relnoopener>Splicing BPF maps to the NIC/a>/td> /tr> tr> td>Cong Wang/td> td>a hrefbpfconf2025_material/Two-Phase eBPF Program Signing.pdf target_blank relnoopener>Two-Phase eBPF Program Signing/a>/td> /tr> tr> td>Mahé Tardy/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>Adding a BPF kfunc for TCP Reset/FIN/a>/td> /tr> tr> td>Srinivas Narayana/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>Verified path exploration for the eBPF verifier/a>/td> /tr> tr> td>Alan Jowett/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>Brief discussion of fuzzing the Prevail verifier/a>/td> /tr> tr> td>Emil Tsalapatis/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>sched_ext and BPF arenas/a>/td> /tr> tr> td>Amery Hung/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>uptr and kv store/a>/td> /tr> tr> td>Song Liu/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>fanotify-bpf: Use BPF programs to filter fanotify events in kernel space/a>/td> /tr> tr> td>John Fastabend/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>BPF Windows Support/a>/td> /tr> tr> td>Song Liu, Thierry Treyer/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>BTF extension for inlined kernel functions/a>/td> /tr> tr> td>Arnaldo Carvalho de Melo/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>pahole + BTF update and BTF augmenter/a>/td> /tr> tr> td>Yonghong Song/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>Uninitialized Variable In BPF Programs/a>/td> /tr> tr> td>Jose E. Marchesi, David Faust/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>Compiled BPF in general and GCC BPF in particular/a>/td> /tr> tr> td>Daniel Xu/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>Modular BPF verifier/a>/td> /tr> tr> td>Shung-Hsi Yu/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>BPF in Stable Kernels/a>/td> /tr> tr> td>Blaise Boscaccy & Cong Wang/td> td>a hrefbpfconf2025_material/ target_blank relnoopener>eBPF Code signing and Gatekeeper/a> /td> /tr> /table> h2>Conference Info/h2> table border0 cellpadding3 cellspacing1 width100%> tr> td>b>Location:/b>/td> td>Montreal, Canada, part of LSF/MM/BPF/td> /tr> tr> td>b>Committee:/b>/td> td>Daniel Borkmann, Martin Lau/td> /tr> tr> td>b>Date:/b>/td> td>March 24 - 26, 2025/td> /tr> tr> td>/td> td>a hrefhttps://docs.google.com/spreadsheets/d/1PgjzaPOnIHgRIfqgwDNiftY5Xr6aU3NLWtDs7zFoIvc/edit?gid1852749899#gid1852749899 target_blank relnoopener>Schedule/a>/td> /tr> tr> td>b>Attendees/b> (by invitation only)b>:/b>/td> td>/td> /tr> !-- attendee list unchanged --> /table> h2>Photos Attendees/h2> div classphotos> a hrefbpfconf2025_material/bpfconf2025_1.jpg target_blank relnoopener> img srcbpfconf2025_material/bpfconf2025_1.jpg altAttendees group photo 1 loadinglazy> /a> a hrefbpfconf2025_material/bpfconf2025_2.jpg target_blank relnoopener> img srcbpfconf2025_material/bpfconf2025_2.jpg altAttendees group photo 2 loadinglazy> /a> a hrefbpfconf2025_material/bpfconf2025_3.jpg target_blank relnoopener> img srcbpfconf2025_material/bpfconf2025_3.jpg altAttendees group photo 3 loadinglazy> /a> /div> div classphotos-caption>(Photos by Daniel Borkmann)/div> h2>Past Events/h2> ul> li>a href/bpfconf2024/bpfconf2024>bpfconf 2024/a>/li> li>a href/bpfconf2023/bpfconf2023>bpfconf 2023/a>/li> li>a href/bpfconf2022/bpfconf2022>bpfconf 2022/a>/li> li>bpfconf 2020/2021 (cancelled due to COVID restrictions)/li> li>a href/bpfconf2019/bpfconf2019>bpfconf 2019/a>/li> /ul> /td> /tr> /tbody> /table>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]