-
19/09/2024, 10:00
At Microsoft, we are working on a project called openHCL, which is a Linux-based paravisor featuring a user-mode virtualization stack.
For more details, you can check out this micro conference: LPC Event.The paravisor is upgraded using a servicing operation where the old paravisor is shutdown and the new paravisor is booted into. Our goal...
Go to contribution page -
19/09/2024, 12:45
A topic rife with misinformation and emotional reactions, it's time to give another opportunity for folks to ask questions about and discuss GPL and LGPL enforcement together. The last BoF at Plumbers, in 2016 had lively discussion and great input that informed Software Freedom Conservancy's efforts in the following years. At that BoF, and privately since then, Software Freedom Conservancy...
Go to contribution page -
Lukas Wunner, Jonathan Cameron (Huawei Technologies R&D (UK))19/09/2024, 15:00
PCIe 6.0 introduced device authentication and encryption (sec 6.31 and 6.33). We are bringing up kernel support, seeking consensus with the community at past Plumbers installments ([2023][1], [2022][2], [2021][3]).
We would like to continue this fine tradition by presenting our progress since last year's Plumbers and having an open discussion on the next steps towards mainline.
An...
Go to contribution page -
19/09/2024, 15:45
This BoF will be an opportunity to discuss Linux kernel debugging tools, with a primary focus on Drgn. Discussion will be attendee-driven, some example discussion topics could be:
- Ready-made examples of using drgn to debug a vmcore or live kernel built with virtme-ng.
- Discussion on writing good drgn...
-
Joerg Roedel (SUSE)19/09/2024, 17:00
The COCONUT-SVSM community wants to get in contact with the wider Linux and virtualisation community and gather ideas, discuss problems and get input for the next year of development.
Therefore we invite everyone interested in Confidential Computing and the SVSM to join us in this BoF.
Go to contribution page -
Alexander Graf, James Gowans (Amazon EC2), Mike Rapoport19/09/2024, 17:45
There are several efforts to support memory persistence over kexec:
-
PKRAM [1]: Tmpfs-style filesystem which dynamically allocates memory which can be used for guest RAM and is preserved across kexec by passing a pointer to the root page.
-
Kexec Hand Over (KHO) [2]: This is a generic mechanism to pass kernel state across kexec. It also supports specifying persisted memory page which...
-
-
Paul Moore20/09/2024, 10:00
An open forum to discuss issues related to the Linux Security Module (LSM) framework and it's relation to the rest of the Linux kernel and low level userspace applications. Topics such as LSM stacking, LSM APIs (both kernel and userspace), and cross-subsystem issues are all welcome.
Go to contribution page -
Mr Krzysztof Kozlowski (Linaro)20/09/2024, 10:00
Birds of Feather session around Devicetree in Linux kernel. Few topics from the top of my head:
Go to contribution page
1. Devicetree and firmware-abstracted hardware. Fore example consider some resources like clocks and regulators hidden behind SCMI interface. See also: https://lore.kernel.org/all/be31801e-bb21-426b-f7aa-2b52727de646@quicinc.com/
2. Devicetree bindings for virtual systems and their devices.
3.... -
20/09/2024, 10:45
This BoF will discuss topics such as:
Go to contribution page
* The state of fuse-over-io-uring and future plans
* Improving writeback performance
* famfs port into FUSE
* Extended write buffer sizes -
Tomeu Vizoso (Independent contractor)20/09/2024, 10:45
As of today, the vast majority of accelerators for machine learning (NPUs, TPUs, DLAs, etc) lack a presence in the mainline kernel.
These accelerators can be used only with out-of-tree kernel drivers and binary-only userspace stacks, often forks of one or more open-source machine-learning frameworks. Companies are prey to vendor lock-in.
Companies selling accelerators are starting to...
Go to contribution page -
Dan Carpenter (Oracle), Justin Stitt (Google), Kees Cook (Google)20/09/2024, 10:45
Integer overflows are a constant source of security problems. Someone needs to do something about it. We'll discuss new approaches using static analysis and runtime sanitizers. These approaches will require creating new rules for writing safe code. Most integer overflows are "harmless". For example, we used to have repeated security issues related to passing negative sizes to...
Go to contribution page -
Enrico Bravi20/09/2024, 12:00
The IMA namespace has been proposed a while ago but, despite many attempts at
Go to contribution page
addressing maintainers' concerns, it didn't get upstreamed yet. Our work tries
to determine if the IMA namespace fulfils the integrity requirements we
initially defined, and proposes a few suggestions on how to improve it. -
Daniel Lezcano (Linaro), Rafael Wysocki (Intel Open Source Technology Center)20/09/2024, 12:00
The userspace which has a complex logic to manage the thermal envelope of the platform is often platform specific because custom kernels export clumsily interfaces to act on PM. Therefore, the userspace is often unusable when we want to support mainline kernels. That leads to more work as there are multiple userspace implementation to achieve the same goal. The objective of the discussion /...
Go to contribution page -
Kamalesh Babulal, Tom Hromatka20/09/2024, 12:00
We frequently are asked to triage and resolve "cgroup" bugs - from both
internal customers and Oracle Linux users. Cgroups are intertwined throughout
the entire kernel, and so users are often interacting with cgroups when they
encounter an issue. But rarely do the problems end up being a cgroup issue.
This has been a significant time sink for us.To combat this, we've developed an...
Go to contribution page -
Damiano Melotti (Google)20/09/2024, 12:45
With the Linux Foundation becoming a CNA (https://docs.kernel.org/process/cve.html), the process around CVE assignment for kernel vulnerabilities has radically changed. Organizations maintaining downstream versions of the kernel have reacted differently, and those analyzing every CVE are struggling to keep up with the high volume of commits to process. This BoF session can be an opportunity to...
Go to contribution page -
Mr Atish Patra, Björn Töpel (N/A), Mr Palmer Dabbelt20/09/2024, 12:45
The RISC-V MC is limited to 1.5-3h, so we'll definitely spill over.
This BoF will discuss:
Go to contribution page
* maintainership
* testing/CI on QEMU
* testing/CI on HW -
Helen Koike (Collabora), Sebastian Fricke, Tales da Aparecida (Red Hat)20/09/2024, 15:00
Hello everyone,
We'll have a meeting today (20th of Sep) at 3pm in room 1.34.
You're welcome to join the discussion!
Go to contribution page -
Alexander Potapenko (Google), Dmitry Vyukov (Google), Kees Cook (Google), Marco Elver (Google), Paul McKenney (Meta)20/09/2024, 15:00
The Linux kernel has numerous tools to detect bugs, among them a family of dynamic program analysis called "sanitizers": Kernel Address Sanitizer (KASAN), Kernel Memory Sanitizer (KMSAN), Kernel Concurrency Sanitizer (KCSAN), and the Undefined Behaviour Sanitizer (UBSAN).
Knowing when to apply which sanitizer in the kernel development process may not always be obvious: each sanitizer is...
Go to contribution page -
Josh Don (Google)20/09/2024, 15:00
As server machines continue to get bigger, we face all types of kernel scalability issues. We'll discuss the implications of scalability, some recent patches in the area, and open areas of interest. In particular, we'll discuss the extent to which the kernel should proactively address these issues, when the solutions are far from free.
Go to contribution page -
Boqun Feng, Frederic Weisbecker (Suse), Joel Fernandes, Neeraj Upadhyay (AMD), Paul McKenney (Facebook), Uladzislau Rezki20/09/2024, 15:45
This is the traditional RCU Q&A session. If there are no questions, topics to be covered include explanation of the array of RCU flavors, recent changes in RCU, polling RCU APIs, expediting RCU callbacks, and possible improvements in the intersection between RCU and MM reclaim.
Go to contribution page -
Aleksandr Nogikh (Google), Alexander Potapenko (Google), Dmitry Vyukov (Google), Marco Elver (Google), Taras Madan20/09/2024, 15:45
[Syzbot][1] is a continuous kernel fuzzing system which automatically uncovers and reports hundreds of Linux kernel findings each quarter.
The session aims to foster open dialogue between the kernel engineers and those who operate syzbot. We'll discuss what's working well, where attention is needed, and how we can improve.
We plan to start by highlighting the key changes over the past...
Go to contribution page -
Mr Gustavo Padovan (Collabora), Nikolai Kondrashov (Red Hat)20/09/2024, 17:00
The KernelCI community is quite lively lately, so we want to take the opportunity to bring everyone interested in kernel testing together in the same room to discuss key priorities for the community. We invite kernel maintainers and developers, product developers, CI systems developers and different projects caring about testing, regression tracking and integration of the kernel.
How to...
Go to contribution page -
Alastair Robertson, Daniel Xu (Facebook), Jonathan Haslam, Jordan Rome, Viktor Malik (Red Hat)20/09/2024, 17:00
bpftrace is a hugely popular dynamic tracing technology for the Linux platform (https://github.com/bpftrace/bpftrace) leveraging eBPF. Its simple yet powerful scripting language, BpfScript, provides the ability to gain a new and fresh understanding of the entire software stack, from high level application APIs to the bowels of the kernel. Analyzing...
Go to contribution page -
Amit Pundir, Fuad Tabba (Google), John Stultz (Google), Karim Yaghmour (Opersys inc.), Lukasz Luba, Sumit Semwal (Linaro)20/09/2024, 17:45
The Android MC Birds of a Feather allows space to further discuss important topics from the Android MC, and to also discuss some overflow topics that could not fit in the Android MC schedule.
Go to contribution page -
Chris Oo (Microsoft)20/09/2024, 17:45
Virtual Secure Mode (VSM) allows for the ability to run trusted software components within the guest. A paravisor is a trusted software component that runs inside the guest at a higher Virtual Trust Level (VTL), VTL2 that provides services for the guest running in lower VTLs. This can include providing enlightenments for unenlightened guests in a Confidential VM, or providing additional...
Go to contribution page -
The core kernel platform code will automatically switch on a power-domain associated with a device.
Some devices have multiple power-domains and in such cases are typically expected to manage those multiple power-domains themselves.
For clock controllers there are several ways to attack this problem.
- Bury it inside of the clock on/off path in a clock arch specific way
- Bury it...
-
The core kernel platform code will automatically switch on a power-domain associated with a device.
Some devices have multiple power-domains and in such cases are typically expected to manage those multiple power-domains themselves.
For clock controllers there are several ways to attack this problem.
- Bury it inside of the clock on/off path in a clock arch specific way
- Bury it...
-
Vipul Gupta
A space for folks looking for solutions to achieve the missing e2e test coverage for their Linux distributions. A Hardware in The Loop (HiTL) pipeline that can test changes directly on the hardware and provide instant feedback to any CI/CD loop. The system I intend to present can:
- Run tests on actual hardware DUTs (Device Under Test)
- Controlled from the outside using a device/jig...
-
Vipul Gupta
A space for folks looking for solutions to achieve the missing e2e test coverage for their Linux distributions. A Hardware in The Loop (HiTL) pipeline that can test changes directly on the hardware and provide instant feedback to any CI/CD loop. The system I intend to present can:
- Run tests on actual hardware DUTs (Device Under Test)
- Controlled from the outside using a device/jig...
Choose timezone
Your profile timezone: