-
Khasim Syed Mohammed13/11/2023, 09:30
The automotive industry has been admirer of safeOS or realtime OS like QNX, Integrity, FreeRTOS as it gives them faster boot times, realtime predictable access to hardware, but the trends are changing as more and more OEMs now are migrating to Linux as high level operating systems.
Unfortunately, Linux still hasn't resolved few key use cases required for automotive industry, due to which...
Go to contribution page -
Miguel Ojeda, Wedson Almeida Filho13/11/2023, 10:15
Rust for Linux is the project adding support for the Rust language to the Linux kernel. Soon after LPC 2022, the initial support for Rust was merged into the kernel for v6.1.
Since then, there has been progress in several different areas, including the addition of safe abstractions around kernel functionality and subsystems, as well as infrastructure and...
Go to contribution page -
Krzysztof Kozlowski13/11/2023, 11:30
Kernel Maintainers are supposed to send pull requests with code adhering to some standards, which are not always well documented and might be difficult to figure out for new Kernel Maintainers. The talk will present current best-practices for handling the code and sending it further to the upstream Maintainer:
Go to contribution page
1. Improvements to email workflow: b4, useful simple hooks for verifying commits... -
Andrea Righi (Canonical)13/11/2023, 12:15
Testing and debugging kernels can be painfully slow: compiling the kernel, setting up a testing system (bare-metal or VM), deploying the recompiled kernel, executing tests, collect results and repeating the cycle.
Intensified by the fact that each kernel developer employs their own distinctive set of custom scripts and workflows to accomplish comparable goals can lead to inefficiencies and...
Go to contribution page -
Zeb Figura (CodeWeavers, Inc)13/11/2023, 14:30
In order to emulate Windows NT kernel synchronization primitives, Wine currently uses a single server process, which fields operations on those primitives via RPC from client processes.
This has historically worked well, but has turned out to be a severe performance bottleneck in heavily multithreaded applications such as modern games.
In this talk, I propose to emulate the complexity of...
Go to contribution page -
Ajay Kaher, Mr Vamsi Krishna Brahmajosyula13/11/2023, 15:15
Problem - Sysfs and procfs are implemented as on-demand file systems. An on-demand file system maintains meta-data about the entries and creates inodes/dentries on access and keeps them till there is enough memory available in the system.
During system boot, it was observed that about 40% of sysfs and procfs entries were accessed. This means significant number of inodes/dentries have been...
Go to contribution page -
Abel Vesa (Linaro)13/11/2023, 16:30
There is a long standing issue with devices that need any kind of powering up in order for the bus to be able to enumerate them. A device connected to such a bus will only be discovered/enumerated if resources like regulators, gpios and so on, are properly configured beforehand. This is one of the main reasons a major number of DT-based platforms are marking resources like regulators as...
Go to contribution page -
Usama Arif13/11/2023, 17:15
Maintaining an up-to-date host kernel offers significant advantages such as enhanced security, performance and reliability. One of the primary challenges in live updating the host kernel is the long downtime experienced by guest Virtual Machines (VMs). Several factors contribute to this downtime such as VM snapshot and VM restore time, the biggest one being the time taken to (kexec) reboot the...
Go to contribution page -
Mr Jagan Teki (U-Boot Allwinner, SPI, SPI Flash Maintainer, Linux DRM Bridge Contributor and Maintainer, AI/Ml-enthusiast)14/11/2023, 09:30
Display and graphic drivers in Linux are part of the Linux DRM subsystem and are using DRM resources like memory management, interrupt handling, and DMA via Kernel Mode Settings (KMS) that act as an abstraction layer to provide uniform access to applications.
Encoders are one of the key KMS components that takes pixel data from a CRTC and converts it to a format suitable for an attached...
Go to contribution page -
Luis Chamberlain (Samsung), Pankaj Raghav (Samsung)14/11/2023, 10:15
Increasing block sizes in storage devices will be one of the keys to support larger capacities, more density, and higher cost-effective SSDs in the future. Although R&D on this topic has been discussed in the Linux community for 16 years recent advances in Linux are making support for larger block sizes more easily attainable and we may soon be able to start leveraging support for it.
512...
Go to contribution page -
Cong Wang14/11/2023, 11:30
Linux kernel nowadays provides thousands of parameters to users. Tuning them for optimal performance becomes more and more difficult. Most often, different workloads require different tunings for different sets of Linux kernel parameters. In large-scale data centers like ByteDance's, it has become nearly impossible to tune Linux kernel parameters manually for hundreds of different...
Go to contribution page -
Ahmed S. Darwish (Linutronix GmbH)14/11/2023, 12:15
The x86 architecture is extensive, with many features (and misfeatures) added since its first 32-bit i386 CPU, released 38 years ago.
Runtime identification of x86 CPU features occurs through the CPUID instruction. Through an input "leaf"/"sub leaf" mechanism, CPUID returns various information scattered through a vast list of output bitfields — now up to 750+ bitfields. The returned...
Go to contribution page -
Paul McKenney (Facebook)14/11/2023, 14:30
The term "heisenbug" was inspired by the Heisenberg Uncertainty Principle from quantum physics, which states that it is impossible to exactly quantify a given particle’s position and velocity at any given point in time. Any attempt to more accurately measure that particle's position will result in increased uncertainty of its velocity and vice versa. Similarly, attempts to track down the...
Go to contribution page -
David Airlie14/11/2023, 15:15
Since last year the work on nouveau to support Vulkan and use NVIDIA's firmware has moved forward a lot.
This talk will update the status of the firmware integration for newer platforms, and look at the state of the NVK driver.
One large subproject that has been developed as part of this work is a GPU driver independent virtual address space manager (GPU VA). Tracking GPU VM allocations...
Go to contribution page -
Philipp Ahmann (Robert Bosch GmbH)14/11/2023, 16:30
Demos on embedded systems using Linux are plentiful, but when it comes to reproducing them, things get complicated. Additionally, on decent embedded systems Linux is only one part of the system and interacts with real-time operating systems and virtualization solutions. This makes reproduction even harder.
Within the Linux Foundation’s ELISA project, we started to create a...
Go to contribution page -
Joel Fernandes (Google), Mr Vineeth Remanan Pillai (Google)14/11/2023, 17:15
KVM, a virtualization technology in Linux, delegates memory and virtual CPU execution management of virtual machines to the Linux kernel. This has both advantages and disadvantages. One disadvantage is that it can lead to latency issues in time-sensitive workloads in the VM (such as audio and video). This is because KVM creates one task per vCPU for the VM and then delegates the scheduling of...
Go to contribution page -
Aleksandr Nogikh (Google)15/11/2023, 09:30
Syzbot is an automated system that continuously fuzzes OS kernels and routes the reports to kernel developers. Since 2017, syzbot has already found and published more than 10000 findings in the Linux kernel.
Levels of adoption and reception of the tool differ throughout the kernel, but it has definitely had a positive impact on the Linux kernel's health. To date, more than 5500 findings...
Go to contribution page -
James Morris, Mickaël Salaün (Microsoft), Thara Gopinath (Microsoft)15/11/2023, 10:15
Linux kernel offers built-in self-protection mechanisms like control-register pinning, module/file authentication and protection restrictions; but a sophisticated kernel-level attacker can still bypass these. To get a much more effective defense, we propose to enforce such protection mechanisms via the hypervisor itself or a hypervisor-backed trusted entity. This also allows us to consider...
Go to contribution page -
Len Brown (Intel Open Source Technology Center), Rafael Wysocki (Intel Open Source Technology Center), Mr Todd Brandt (Intel Open Source Technology Center)15/11/2023, 11:30
Users demand speed, reliability, and low-power from system-suspend. To assure Linux can meet these goals, Intel's upstream kernel team built "sleepgraph" a decade ago, and we have been running and improving it ever since.
Today, Linux OEM's demand over 10,000 consecutive successful suspend iterations to demonstrate suspend reliability. And so our efforts have evolved from function and...
Go to contribution page -
Sweet Tea Dorminy (Meta)15/11/2023, 12:15
fscrypt has long been the standard subsystem for filesystems to adopt filesystem-level encryption. Traditionally fscrypt has encrypted data on a per-inode level; however, this made snapshotting or reflinking encrypted data difficult. Over the past two years, btrfs has worked to add per-extent encryption to fscrypt: encrypting on a per-extent level allows reflinking and snapshotting of...
Go to contribution page -
Michael S. Tsirkin (Red Hat), Stefan Hajnoczi (Red Hat)15/11/2023, 14:30
Can you trust your hardware? How do you know? And if not can you still use it?
These questions are not new, however linux currently lacks a comprehensive answer. The confidential computing platforms that are becoming more popular offer both a new perspective and new uses - and with them, a new sense of urgency - to efforts to answer these questions.
Being a common part of the...
Go to contribution page -
Mr Bharata Bhasker Rao (AMD)15/11/2023, 15:15
Hardware platforms have started exposing useful and actionable memory access information to the OS in various ways [1] [2]. There are sub-systems in the kernel like NUMA balancing which need such information but currently employ software methods to generate and act upon such access information. They could benefit if hardware can directly provide access information to the kernel in an easy to...
Go to contribution page -
Ian Rogers (Google), Ms Weilin Wang (Intel)15/11/2023, 16:30
Linux kernel perf events are great, however, individual events are often too low-level to understand a performance issue. For example, a metric like memory bandwidth may consist of read and write counters on multiple memory controllers, with different counters for different types of memory and with counts having additional data combined within them like acknowledgements. The Linux perf tool...
Go to contribution page -
Vishal Gupta15/11/2023, 17:15
Today’s high-performance applications heavily rely on various synchronization mechanisms, such as locks. While locks ensure mutual exclusion of shared data, their design impacts application scalability. Locks, as used in practice, move the lock-guarded shared data to the core holding it, which leads to shared data transfer among cores. This design adds unavoidable critical path latency leading...
Go to contribution page -
refereed track submission
Go to contribution page -
refereed track submission
Go to contribution page
Choose timezone
Your profile timezone: