Conveners
Birds of a Feather (BoF)
- Mike Rapoport
Birds of a Feather (BoF)
- Mike Rapoport
[Syzbot][1] is a continuous kernel fuzzing system that automatically uncovers and reports hundreds of Linux kernel findings each quarter.
The BoF session aims to facilitate open dialogue between the syzbot engineers and the kernel developers who receive the reports. We'll discuss what's working well, where more attention is needed, and how we can improve.
We'll start by highlighting the...
The Linux kernel has numerous tools to detect bugs, among them a family of dynamic program analysis called "sanitizers": Kernel Address Sanitizer (KASAN), Kernel Memory Sanitizer (KMSAN), Kernel Concurrency Sanitizer (KCSAN), and the Undefined Behaviour Sanitizer (UBSAN).
Knowing when to apply which sanitizer in the kernel development process may not always be obvious: each sanitizer is...
Attending : Geert (m68k arch maintainer), D. Jeff Dionne (Coresemi), Rob Landley (ToyBox), John Paul Adrian Glaubitz (SuperH), Ruinland (AndesTech)
It's like the Sword of Damocles every so often, people push to deprecate support for 32-bit architectures, with or without an MMU.
This year, influential voices are saying it again. Yet developers are still manufacturing, working on, and...
Monitoring NVMe devices and paths in production is currently limited to static snapshots via nvme-cli. While sufficient for basic inspection, this model falls short in NVMe-oF (fabrics) deployments, where path conditions can change dynamically due to fluctuating network latency, congestion, or link failures. Administrators troubleshooting fabric multipath environments often need continuous...
Laptops with ARM processors have become more common over the recent years. Starting with Apple Silicon and, more recently, X Elite/Plus laptops.
While a solid basic support for many of them exists, the user experience is still lacking and in-kernel as well as userspace support has major gaps compared to a X86_64 system.
Topics we want to to address and discuss in this BoF are:
-...
A Trusted Execution Environment (TEE) is an isolated execution environment running alongside the rich operating system. It provides the capability to isolate security-critical or trusted code and corresponding resources like memory, devices, etc. The isolation is backed by hardware security features such as Arm TrustZone, AMD Secure Processor, RISC-V TEE, etc.
This BoF will provide a...
Abstract
The Kernel Development Learning Pipeline (KDLP) project has grown significantly since its inception, successfully addressing the critical shortage of qualified entry-level kernel engineers. This talk will provide a quick background on KDLP, showcase its substantial growth, and outline future plans, including the creation of an open, community-driven textbook and resources for...
This microconference will center on Nova, the upstream Rust-based kernel driver for NVIDIA GPUs.
Discussion topics will include the design and evolution of the firmware API exposed by the GPU System Processor (GSP), user-space submission interfaces and compute APIs, and interactions with the core kernel (device / driver APIs; locking and lifetimes; memory management APIs). NVIDIA engineers...