Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Brite)
  • No Skin
Collapse

Linux Kernel Meet

Y

Yunseong Kim

@Yunseong Kim
administrators
About
Posts
12
Topics
10
Shares
0
Groups
1
Followers
2
Following
0

Posts

Recent Best Controversial

  • DPDK Summit
    Y Yunseong Kim

    DPDK 2025-eu

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceI3ENbGEN44mBVkLtdYB0DC&si=PVEhlCf0a_dLrNG5

    Index

    • Welcome + Opening Remarks - Tim O'Driscoll, Product Manager, Intel
    • SORING: A Software Approach for Ordered Parallelism - Francesco Ciaccia & Konstantin Ananyev
    • Enhancing Multi-Process DPDK Applications With External Queues for Seamless Off... - Ori Kam, Nvidia
    • PQC-ML-DSA Processing in DPDK - Dhanalakshmi Saravanan & Venkanna Rachakonda, Marvell Technology Inc
    • Exploring Network Application Acceleration Using Regex Device Offload - Lukas Sismis, CESNET
    • Beyond Standard ASICs: Leveraging Specialized Hardware and DPDK for Next-Gen Net... - Vitaliy Ivanov
    • Flow-Get About It: Benchmarking of Flow Timeout Algorithms for Rte_hash Tables - Tobias Roeder
    • Suricata With Rte_flow: Improving the Performance of IPS an... - Adam Kiripolský & Eliška Červinková
    • Service Chaining With HW Acceleration in Virtualized Environments - Roni Bar Yanai, NVIDIA
    • Benefits of Rte_flow Groups Specialization for FPGA SmartNICs - Lukáš Kekely, DynaNIC
    • Deep Dive Into Protocol Agnostic Filter Technologies on Ethernet... - Shobhi Jain & Timothy Miskell
    • Flexible Parsing in Flow API - Dariusz Sosnowski, NVIDIA Corporation
    • Closing Remarks - Nathan Southern, Project Coordinator, The Linux Foundation
    • Welcome Back + Remarks - Ian Jolliffe, Director, Software Engineer, Red Hat
    • QoS for DPDK Based Cloud Native Router - Kiran KN & Shailender Sharma, Juniper Networks
    • How To Make a Data Center Switch Smarter With DPDK - Cristian Dumitrescu, Intel
    • Enhancing DPDK Performance and Efficiency With RISC-V Extensions - Liang Ma & Yuwei Zhang, ByteDance
    • Build System Design for ARM Platforms - Wathsala Vithanage, Arm
    • Rte_graph: Introduction To Feature Arc Abstraction - Nitin Saxena, Marvell Technology
    • Grout # What's New in 2025 - Robin Jarry, Red Hat
    • Introducing Argparse Library - Feng Chengwen, Huawei Technologies Co., Ltd
    • The DPDK Test Suite (DTS): Our Experience Running It at the DPDK Community Lab - Patrick Robb
    • Patch Smarter, Not Harder - Aaron Conole, Red Hat, Inc.
    • Leveraging AI and RAG To Enhance DPDK Application Development - Ori Kam, Nvidia
    • Closing Remarks - Thomas Monjalon, DPDK Maintainer, NVIDIA

    DPDK 2024-us

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceJDayYTXhy678fMqAWQDs-6&si=F06fCB3zo3skSU3-

    Index

    • Welcome & Opening Remarks - Robin Giller, Intel & DPDK Project
    • Extending For_each_lcore for HW Topology Lcore - Vipin Varghese & Keesang Song
    • Analyzing Packet Data Flow in Chiplet Based SoCs - Honnappa Nagarahalli, Arm
    • An API for Cache Stashing Hints - Wathsala Vithanage & Honnappa Nagarahalli, Arm
    • Running DPDK on Non-Cache Coherent Platforms: Challenges and Sol... Gagandeep Singh & Hemant Agrawal
    • Optimizing IP Camera Streaming with DPDK - Gagandeep Singh, NXP & Hemant Agrawal, NXP
    • DPDK Thash: Principles and Appliances - Eimear Morrissey, Huawei & Vladimir Medvedkin, Intel
    • DPDK CI Testing Labs: New Tools, Lab Test Coverage, and DTS - Patrick Robb & Adam Hassick
    • Grout # a Graph Router Based on DPDK - Robin Jarry & David Marchand, Red Hat
    • PTYPE Matching as a Fast Way to Steer Traffic - Alexander Kozyrev, NVIDIA Corporation
    • Continuous Packet Offloading with Update Rule - Alexander Kozyrev, NVIDIA Corporation
    • Debug Functional and Performance Issues in Rte_flow - Dariusz Sosnowski, NVIDIA Corp.
    • Getting GPUDirect to Work with Broadcom NICs - Ajit Khaparde, Broadcom Inc
    • 1.2 Tb/S Packet Processing of Radio Telescope Data on a GPU - John Romein, ASTRON
    • Code Challenge Brainstorming BoF - Stephen Hemminger, Microsoft
    • Closing Remarks - Robin Giller, Director of Software Product Management and Planning, Intel
    • Welcome Back & Remarks - Benjamin Thomas, Manager, Communications & Marketing, The Linux Foundation
    • Accelerate TLS with DPDK - Anoob Joseph & Akhil Goyal, Marvell Technology
    • New Asymmetric Crypto Algorithm in DPDK - EdDSA - Gowrishankar Muthukrishnan & Anoob Joseph
    • OpenSSL Crypto PMD - Analysis and Optimisations - Jack Bond Preston & Honnappa Nagarahalli, Arm
    • How to Write and Run Tests in the New DPDK Test Framework – Luca Vizzaro & Patrick Robb
    • Boosting the Network Performance of Confidential VM Using Userspace Stack - William Lam, ByteDance
    • Q&A with the Governing Board & Technical Board - DPDK Governing & Tech Board Members
    • Machine Learning Inference in DPDK - Srikanth Yalavarthi, Marvell Technology
    • AIE-ML dev PMD for VRAN and UPF Datapath Acceleration - Vipin Varghese & Keesang Song, AMD
    • Workshops: Topic To Be Announced - Thomas Monjalon, NVIDIA
    • Can a User-Space Protocol Stack Balance High Performance and Generality? Our Answer: B... Xiameng Hu
    • DPDK in Databases: Why Isn’t It More Common? - Owen Hilyard, University of New Hampshire
    • Automating the Deployment of DPDK-based Network Functions on Kubernetes with Fau... Manuel Rodriguez
    • Closing Remarks - Thomas Monjalon, DPDK Maintainer NVIDIA

    DPDK 2024-asia

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceIcvZaAgDHPexBBKpJ9kNZd&si=UPICsbtvNSq9CPlT

    Index

    • Welcome & Opening Remarks - Thomas Monjalon, Maintainer, NVIDIA
    • Introducing UACCE Bus of DPDK - Feng Chengwen, Huawei Technologies Co., Ltd
    • ZXDH DPU Adapter and It's Application - Lijie Shan & Wang Junlong, ZTE
    • Libtpa Introduction - Yuanhan Liu, Bytedance
    • Telecom Packet Processing and Correlation Engine Using DPDK - Ilan Raman, Aviz Networks
    • Cryptodev and Security Library Updates in DPDK - Akhil Goyal & Anoob Joseph, Marvell
    • Unified Representor with Large Scale Ports - Suanming Mou, NVIDIA Semiconductor
    • Troubleshooting Low Latency Application on CNF Deployment - Vipin Varghese & Sivaprasad Tummala, AMD
    • Suggestions to Enhance DPDK to Enable Migration of User Space Networking Applications... Vivek Gupta
    • Welcome Back - Prasun Kapoor, Associate Vice President, Marvell
    • PDCP Packet Processing Library in DPDK - Libpdcp - Anoob Joseph & Akhil Goyal, Marvell
    • Coupling Eventdev Usage with Traffic Metering & Policing (QoS) - Sachin Saxena & Apeksha Gupta, NXP
    • GRO Library Enhancements - Kumara Parameshwaran Rathinavel, Microsoft
    • Refactor Power Library for Vendor Agnostic Uncore APIs - Sivaprasad Tummala & Vipin Varghese, AMD
    • Q&A with the Governing Board & Technical Board - Wang Yong, Thomas Monjalon, Jerin Jacob
    • Rte_flow Match with Comparison Result - Suanming Mou, NVIDIA Semiconductor
    • DPDK PMD Live Upgrade - Rongwei Liu, Nvidia
    • Monitoring 400G Traffic in DPDK Using FPGA-Based SmartNIC with RTE Flow - David Vodák, Cesnet
    • Lessons Learnt from Reusing QDMA NIC to Base Band PMD - Vipin Varghese & Sivaprasad Tummala, AMD
    • Closing Remarks - Nathan Southern, Sr. Projects Coordinator, The Linux Foundation

    DPDK 2023

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceJf9p-crjGvGvn8pMWrJ_cV&si=djAeQq0qeO6rPTOk

    Index

    • Keynote Session: Welcome & Opening Remarks - Rashid Khan, Senior Director, Software Engineering
    • Augmenting P4 Software Pipelines with Accelerators. The IPsec ... Cristian Dumitrescu & Radu Nicolau
    • Using DPDK as an Offload Engine for P4 SmartNIC Applications - Sean Cummings & Chris Cummings, ESnet
    • Comparing tc-flower and rte_flow Offloading in OVS - David Marchand, Red Hat
    • Bringing rte_flow Offload to Virtio - Christophe Fontaine, Red Hat
    • VDUSE Performance: How Fast Is It? - Maxime Coquelin, Red Hat
    • Cloud Native Virtual DPDK Cell Site Router - Kiran KN & Shailender Sharma, Juniper Networks
    • 5G RAN Acceleration with GPU and DPDK - Elena Agostini, NVIDIA
    • 5G UPF Acceleration with DPDK - Gal Cohen, NVIDIA
    • ABI Versioning Explained - Ferruh Yigit, AMD
    • Integrating the CI Pipeline as a Gate: Challenges So Far, Future Roadblocks, How to... Aaron Conole
    • Using Sharable Mempools for Zero-copy Sharing Between Processes - Bruce Richardson, Intel
    • Fast and Secure: DPDK Meets Confidential Computing - Zhifei Yang, TikTok
    • Introducing New VFIO and IOMMU Framework to DPDK - Chenbo Xia & Yahui Cao, Intel
    • Arm64 SVE Concepts and its Integration into DPDK - Ruifeng Wang, Arm China
    • Challenges Faced When Building Various DPDK-based Applications - Vivek Gupta, Benison Technologies
    • Combining Rust & DPDK: Security/Stability, Good User Experience, and Performance... Harry van Haaren
    • Improving RAS with DPDK Application's Participation - Ajit Khaparde, Broadcom
    • Bytebricks - A Generic High Performance VPN Framework - William Lam, TikTok
    • High Performance Elephant Flow Detection Algorithm on DPDK - Leyi Rong, Intel
    • DPDK Graph Library Design and Implementation Details - Jerin Jacob, Marvell
    • Performance Challenges with DPDK Distro Packaging - Sivaprasad Tummala, AMD India Pvt Ltd
    • dperf: A 100Gbps Network Load Tester - Jianzhang Peng, Timeresearch
    • First Day Recap & Closing Remarks - Thomas Monjalon, DPDK Maintainer, NVIDIA
    • DTS Working Group Update - Honnappa Nagarahalli, Juraj Linkes, & Patrick Robb
    • DPI-enhanced DPDK for 5G User Plane - Tobias Roeder, ipoque, a Rohde & Schwarz company
    • Closing Remarks - Thomas Monjalon, DPDK Maintainer, NVIDIA

    DPDK 2022

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceLBwQ4QDNZ6kXwXpt6_ZAjd&si=1e4CMmHfKS4-0m-D

    Index

    • Virtualization of DPDK applications using virtio-vhost-user - Usama Arif, TikTok
    • Vhost-user Live Upgrade Optimization - ZhiHong Wang, ByteDance
    • Open DPDK to containers networking with VDUSE - Maxime Coquelin, Red Hat
    • Booting DPDK application quickly by device composition - Yahui Cao & Jingjing Wu, Intel
    • A Refined Comprehensive DPDK Cryptodev Asymmetric Cryptodev Framework - Fan Zhang & Kai Ji, Intel
    • rte_security: support for inline MACsec - Akhil Goyal, Marvell Semiconductors
    • DPDK "dmadev" Interface - The design and use of the copy-offload APIs - Bruce Richardson, Intel
    • DPDK Memory Allocation Optimization - Liang Ma, TikTok
    • Template and Asynchronous API abstract - Ori Kam, NVIDIA
    • Accelerating Suricata with DPDK - Lukas Sismis, CESNET
    • DTS Working Group Updates - Honnappa Nagarahalli, ARM
    • Heterogeneous Computing Solution - Alex Vesker, NVIDIA
    • DPDK in real-time GPU packet processing applications - Elena Agostini, NVIDIA
    • Real-time and low latency media transport stack based on DPDK - Ping Yu & Frank Du, Intel
    • Graph: introduce remote dispatch for multi-core scaling - Zhirun Yan & Jingjing Wu, Intel
    • Do not develop from scratch, simply write P4 and get DPDK - Cristian Dumitrescu, Intel
    • Using DPDK + OVS for deterministic low-latency communication - Felix Moessbauer & Henning Schild
    • DPDK and Latency : A tale of a Handmade Traffic Generator - Harry van Haaren, Intel
    • DPDK Terminal Stats Viewer - Conor Walsh, Intel
    • What RTE Flow rules can your NIC offload? - David Vodák & Kamil Vojanec, Cesnet
    • Design/Implementation/Usage of DPDK Trace subsystem - Jerin Jacob, Marvell
    • Dynamic Load Balancing and Scaling IPSEC Workloads - Declan Doherty, Intel

    DPDK 2021-us

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceLa1BRJqt1On6ECmFRmjOjf&si=Yty-9HxOzsujwTX3

    Index

    • Welcome: DPDK Summit NA 2021Virtual Experience - Arpit Joshipura
    • DPDK on RISC-V - Stanislaw Kardach, Semihalf
    • Getting Past Incubation: DPDK for Windows Platform Goes Mainstream
    • Using Virtual Functions with DPDK in OpenShift 4 - Ip Sam & Wuxin Zeng, Red Hat
    • High Density Scalable Cloud Gateway for Cloud Networking - Hongjun Ni & Pan Zhang, Intel
    • Closing Remarks - Day 1 - Ashley Weltz
    • Welcome: DPDK Summit NA 2021 - Day 2 - Ashley Weltz
    • Running P4 programs as DPDK applications - Cristian Dumitrescu & Han Wang - Intel
    • Advanced API For Rules Management - RTE Flow Next Evolution - Ori Kam, NVIDIA
    • Tools for Memory Model Simulation - Herd7 - Honnappa Nagarahalli, ARM
    • Using Zero-Copy Ring APIs to Improve Performance of DPDK Pipeline-Mode Applications- Dharmik Thakkar
    • Transitioning Flow Based ethdev Ops to rte_flow - Ajit Khaparde, Broadcom
    • Closing Remarks - DPDK Summit NA 2021 - Arpit Joshipura

    DPDK 2021-asia

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceL0lMBAtl254XYNZ4zS3Mbi&si=8ATdsypRNd_6Z8bq

    Index

    • Welcome: DPDK Summit APAC 2021 - Jim St. Leger
    • Dynamic Mempool: One of the Final Steps to Make DPDK Cloud-Native - Jielong Zhou
    • An Ideal Network IO Virtualization Solution in DPDK - Xiuchun Lu, Chenbo Xia
    • Handling Elephant Flow on a DPDK-Based Load Balancer - Hongjun Ni, Yipeng Wang, Chenmin Sun
    • OvS Tunneling and Connection Tracking Hardware Offload via Rte_flow - Xiao Wang, Rosen Xu
    • Accelerating vHost Data Plane with DMA in the CPU - Jiayu Hu
    • Closing Remarks - Day 1 - Zhaoyan Chen
    • Welcome: DPDK Summit APAC - Day 2 - Qian Xu
    • Warp Speed Cryptographic Applications - A New DPDK Cryptodev Raw Data Path API and Its... Fan Zhang
    • Introducing Hardware Content Inspection Accelerator Into the Network Securit... Kun Qiu, Harry Chang
    • Enhance SEBA-Based FTTH vCPE System with SPP vSwitch - Tri Trinh, Kentaro Ogawa
    • Memory Error Detect Enhancement for DPDK Fuzzing - Xueqin Lin, Yinan Wang
    • Using DPDK to Build PCIe Endpoint Framework - Jun Yang, Hongjun Chen

    DPDK 2020

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceJAeQAEsyDNtkBH1-WwyGXs&si=fsmM_yXNOdL-91_l

    Index

    • Welcome: DPDK Awards & 10-Year Anniversary Celebration
    • Story of perfect system tuning for latency measurement - Reshma Pattan & David Hunt, Intel
    • DPDK for ultra low latency applications - Muhammad Ahmad & Ali Rizvi, eMumba Inc.
    • Introducing flow performance application - Wisam Jaddo, NVIDIA
    • Debugging DPDK applications using rr - Dariusz Sosnowski
    • eBPF Probes in DPDK applications for troubleshooting and monitoring - Vipin Varghese & Siva Tummala
    • Cheat sheet to migrate from GNU make to meson - Vipin Varghese & Siva Tummala, Intel
    • Stateful Flow Table (SFT) - Connection tracking in DPDK - Ori Kam & Andrey Vesnovaty, Mellanox
    • Do DPDK APIs provide the highest performance? - Harry van Haaren, Intel
    • Device virtualization in DPDK - Xiuchun Lu & Chenbo Xia, Intel
    • vDPA: on the road to production- Maxime Coquelin & Adrian Moreno, Redhat
    • Key take aways from QUIC acceleration with DPDK - Siva Tummala & Vipin Varghese, Intel
    • Accelerating O-RAN fronthaul with DPDK - Shahaf Shuler & Dotan Levi, NVIDIA
    • Closing Remarks - Jim St. Leger

    DPDK 2019-us

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceIepXNAw4pnTZkZdgmniU8D&si=8QWtC33xPXXiW1UE

    Index

    • Opening Remarks
    • DPDK and PCIe Gen4 Benchmarking - Amir Ancel, Mellanox & Keesang Song, AMD
    • DPDK Unikernel with Unikraft - Sharan Santhanam, NEC Laboratories Europe GmbH
    • Running Multi-process DPDK App on Kubernetes with Operator SDK - Yasufumi Ogawa, NTT
    • DPDK & Containers: Challenges + Solutions - Wang Yong, ZTE
    • Flow Offloads for DPDK Applications: The Partial, The Full, and The Graceful - Mesut Ali Ergin
    • A Comparison Between HTM and Lock-Free Algorithms - Dharmik Thakkar, Arm
    • Rte_flow Optimization in i40e Driver - Chenmin Sun, Intel
    • Custom Meta Data in PMDs - Honnappa Nagarahalli, ARM
    • Hairpin - Offloading Load Balancer and Gateway Applications - Ori Kam, Mellanox
    • HW Offloaded Regex/DPI Appliance - Shahaf Shuler, Mellanox
    • TLDKv2: the TCP/IP Stack for Elastic and Ephemeral Serverless Apps - Jianfeng Tan, Ant Financial
    • The Design and Implementation of a New User-level DPDK TCP Stack in Rust - Lilith Stephenson
    • 4G/5G Granular RSS Challenge - Roni bar Yanai, Mellanox
    • Using DPDK APIs as the I/F between UPF-C and UPF-U - Brian Klaff & Barak Perlman, Ethernity
    • Lightning Talk - NHD
    • Lightning Talk - DPDK Perf Plug-ins for Containers Ver0
    • Lightning Talk - DPDK on WINDOWS
    • DPDK PMD for NTB - Jingjing Wu & Omkar Maslekar, Intel
    • DPDK Acceleration with GPU - Elena Agostini, Nvidia, Cliff Burdick, ViaSat & Shahaf Shuler, Mellanox
    • Transparent Container Solution for DPDK Applications
    • Offloading Context Aware Flows, OVS-DPDK Connection Tracking Use Case - Roni Bar Yanai, Mellanox
    • Stabilizing the DPDK ABI and What it Means for You. - Stephen Hemminger, Microsoft
    • Validating DPDK Application Portability in Multi-cloud/Hybrid-cloud Environments
    • OVS DPDK Pitfalls in Openstack and Kubernetes - Yi Yang, Inspur

    DPDK 2019-india

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceL6yqmPXzXq1a8ZJzIP0sz-&si=YP0fdNpojiQqK59x

    Index

    • 01 Welcome Remarks by Nivruti Rai, VP Data Center Group and GM Intel India.
    • 02 DPDK Tech Board Roadmap by Hemant Agrawal, TechBoard
    • 03 A Case Study of Developing a Software Router on DPDK, Kamuee Yashuhiro Ohara, NTT Communicati
    • 04 DPDK Kubernetes Plug Ins for Accelerated Container Networking Muthurajan Jayakumar, Intel
    • 05 QoS Management of 5G Use Case Scenarios Using DPDK Karuppusamy Marappagounder & Viswanath Ban
    • 06 Development of Cloud Native Network Functions with VPP & Ligato Shwetha Bhandari, Cisco
    • 07 Adding a New OVS Action Numan Siddique , Red Hat
    • 08 Panel: Packet processing challenges in 5G, Edge
    • 09 Eleven Minutes Debug, Troubleshoot and Analyze Issues in an Application Vipin Varghese , Intel
    • 10 DPDK Locks Optimizations and New Locks APIs Gavin Hu, ARM
    • 11 DPDK Based iPerf to Measure Layer 4 DPDK Applications Load Balancer Muthurajan Jayakumar, Int
    • 12 Crypto Security IPSec Hemanth, NXP
    • 13 Poll Mode Driver for XDP Zero Copy Sivaprasad Tummala, Intel India
    • 14 5G Infrastructure Using Containers and OVS Rajesh Guttala, TCS

    DPDK 2019-eu

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceIn_R2yhHTMqft6eq-hRUla&si=PXwpCC74IV4gq-ax

    Index

    • 1 - Introduction
    • 2 - Dynamic mbuf
    • 3 - Which Standard for Ethernet Statistics?
    • 4 - Recent Advances in DPDK IPsec
    • 5 - DPDK Regex device
    • 6 - Adding Eventdev support in IPsec-gw and other apps
    • 7 - Asynchronous CBDMA Enqueue Framework for vHost-Use
    • 8 - DPDK Thread-safe High Performance Pseudo-random Number Generation
    • 9 - Better Development with robots
    • 10 - DPDK Community Updates
    • 11 - Community survey Analysis and Conclusion
    • 12 - DPDK.org services, latest and future planned improvements
    • 13 - Introduction to the new DPDK Vulnerabilities management process
    • 14 - DPDK LTS update
    • 15 - Does DPDK need a stable ABI?
    • 16 - DPDK Awards
    • 17 - Integrating RCU library with data structures
    • 18 - Current sorry state of C11 code and suggestions to fix it
    • 19 - Arm64 WFE mechanism and use cases in DPDK
    • 20 - DPDK Build System Status and Plans
    • 21 - What is wrong with existing packet capture (and how to fix it)
    • 22 - virtio-net failover in DPDK
    • 23 - DPDK-accelerated Partial Offload for Fine-grained HQoS
    • 24 - Latest Power Enhancements in DPDK
    • 25 - Measure Software Performance of Data Plane Applications
    • 26 - rte_flow at hyper large scale toward production is really happening
    • 27 - DPDK expands into Storage domain
    • 28 - Docker VNFs and packet throughput using Lib1Net and DPDK
    • 29 - Conclusion

    DPDK 2019-china

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceIpqgEWAc6nWfaIuldgDH5h&si=YDwZEXhlmZWCuTa7

    Index

    • Opening - Speakers: Jim St. Leger
    • Archive stable high performance DPDK on modern multi-core CPU: Tao Yang & Xuekun, Intel
    • DPDK IPsec: a scalable high performance library for your IPsec application
    • DPDK Slab Allocator and applied it to zero-copy stack: Yijun Hou, Alibaba
    • DPDK based userspace TCP/IP stack testing: Shu Ma, Alibaba
    • Developing CI/CD for NICs DPDK PMD using DTS: Ben-Shahar Belkar, Toga Networks
    • Building DPDK Unikernels with Unikraft: Sharan Santhanam, NEC Laboratories Europe GmbH
    • Networking Products Based on DPDK Integrated with Kubernetes Container Networking Contiv
    • 5G Core network load test system with DPDK: Xiaohua Wang, Ericsson
    • DPDK: Accelerate Remote Rendering of Cloud Gaming: Jingjing Wu & Owen Zhang, Intel
    • Flow and HQoS DPDK Acceleration Using 100GBE Intel Programmable Acceleration
    • Balancing Application Performance and Portability: Tim O'Driscoll, Intel
    • Vhost and virtio on ARMv8 performance tuning and optimization: Joyce Kong & Gaven Hu, Arm
    • Practice of ovsdpdk in Baidu: Linsi Yuan, Baidu
    • Integrating AF_XDP into DPDK: Xiaolong Ye, Intel

    DPDK 2018-us

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceISWDa6OxsbEx2jBPaymJWL&si=efxpqI-YDLTSqq2U

    Index

    • Embracing Externally Allocated Memory - Yongseok Koh, Mellanox
    • Accelerating DPDK Para-Virtual I/O with DMA Copy Offload Engine - Jiayu Hu, Intel
    • Revise 4K Pages Performance Impact for DPDK Applications - Lei Yao & Jiayu Hu, Intel
    • DPDK IPsec Library - Declan Doherty, Intel
    • Tungsten Fabric Performance Optimization by DPDK - Lei Yao, Intel
    • DPDK Based Vswitch Upgrade - Yuanhan Liu, Tencent
    • Using New DPDK Port Representor by Switch Application like OVS - Rony Efraim, Mellanox
    • Fast Prototyping DPDK Apps in Containernet - Andrew Wang, Comcast
    • Shaping the Future of IP Broadcasting with Cisco's vMI and DPDK on Windows
    • Improving Security and Flexibility within Windows DPDK Networking Stacks
    • Use DPDK to Accelerate Data Compression for Storage Applications - Fiona Trahe & Paul Luse, Intel
    • Fine-grained Device Infrastructure for Network I/O Slicing in DPDK
    • Implementing DPDK Based Application Container Framework with SPP - Yasufumi Ogawa, NTT
    • SW Assisted vDPA for Live Migration - Xiao Wang, Intel
    • Opening Remarks
    • Using nDPI over DPDK to Classify and Block Unwanted Network Traffic - Luca Deri, ntop
    • Reclaiming Memory-Efficient and Lock-Free rte_tqs - Honnappa Nagarahalli, Arm
    • A Hierarchical SW Load Balancing Solution for Cloud Deployment - Hongjun Ni, Intel
    • DPDK Based L4 Load Balancer - M Jayakumar, Intel
    • Accelerating Telco NFV Deployments with DPDK and Smart NIC
    • NFF-Go: Bringing DPDK to the Cloud - Areg Melik-Adamyan, Intel
    • Enabing P4 in DPDK - Cristian Dumitrescu, Intel & Antonin Bas, Barefoot Networks
    • Accelerating DPDK via P4-programmable FPGA-based Smart NICs - Petr Kastovsky, Netcope Technologies
    • DPDK Tunnel Offloading - Yongseok Koh & Rony Efraim, Mellanox
    • DPDK on F5 BIG-IP Virtual ADCs - Brent Blood, F5 Networks
    • Arm’s Efforts for DPDK and Optimization Plan - Gavin Hu & Honnappa Nagarahalli, Arm
    • DPDK Flow Classification and Traffic Profiling & Measurement - Ren Wang & Yipeng Wang, Intel Labs
    • Projects using DPDK - Stephen Hemminger, Microsoft
    • DPDK Open Lab Performance Continious Integration
    • Community Q & A

    DPDK 2018-india

    Playlist

    • https://www.youtube.com/playlist?list=PLo97Rhbj4ceKN-G_iGIUcqFgaT8L3rkrj

    Index

    • Welcome & Introduction to DKDP Summit 2018
    • Technical Board and Road map
    • Ideas for Adding FPGA Accelerators to DPDK - Tianfei Zhang
    • Rte_Security: A New Crypto Offload Framework in DPDK - Hemant Agrawal & Akhil Goyal
    • Asymmetric Crypto and Compression in DPDK - Shally Verma
    • Virtio/Vhost Status Quo and Near-Term Plan - Zhihong Wang
    • Memzone Monitor - Vipin Varghese
    • DPDK – A Must Have Best Practices Checklist for NFV Platform Performance Optimizations - M Jayakumar
    • Optimal VM Dimensioning for DPDK Enabled VNFs in Core / Edge Telco Cloud - Shashi Kant Singh
    • AF_XDP - Nikhil Rao
    • Skydive - Analyzing Topology and Flows in OVS - DPDK and OVN OVS-DPDK Environments - Red Hat
    • Integrating DPDK with Storage Application - Vishnu Itta & Mayank Patel
    • Accelerating NVMe-oF target service via SPDK/DPDK - Ziye Yang
    • Empower Diverse Open Transport Layer Protocols in the Cloud Networking - George Zhao

    DPDK 2018-eu

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceJG_Jopyo6oVkIXYkP-uRly&si=_SHtiveivQfdDLGP

    Index

    • DPDK PMD for AF_XDP
    • urdma: A Remote Directory Memory Access verbs provider using DPDK
    • Tungsten Fabric DPDK Based vRouter HW Offloads
    • DPDK + eBPF
    • Soft NIC: Build Your Own NIC Pipeline in SW
    • rte_security: An Update and Introducing New Protocols (PDCP)
    • Dynamic Device Management (hotplug)
    • Introduction to the Distributed Software Event Device
    • mbuf External Buffer and Usage Examples
    • A DPDK Native IPsec Library
    • Deflate Your Data with DPDK
    • Introduction and Governing Board Update
    • Exploring the New DPDK Memory Subsystem
    • Extending DPDK Flow Classification Libraries for Determinism and Cloud Users
    • Lock-Free Read-Write Concurrency in rte_hash
    • Scaling the DPDK Community
    • DPDK CI & Open Lab
    • rte_flow for hyper scale
    • Recent Power Management Enhancements in DPDK
    • Don't Fear uid != 0
    • Supporting Cloud Native with DPDK and Containers
    • Vhost/Virtio: Past Year Achievements and Upcoming Challenges
    • A Service Assurance Solution for DPDK
    • DPDK on Hyper-V: Past, Present, Future
    • Closing Remarks
    • DPDK Usability for OVS with DPDK
    • Do Less by Default

    DPDK 2018-asia

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceIcdoZ6RDUeChDCPQwe-EoH&si=dC_TdVpJVKtIM29R

    Index

    • More Flexible, Scalable, and Applicable NFV Use Cases: Refactor of DPDK Packet Framework/IP Pipeline
    • Multiple vDPI Functions using DPDK and Hyperscan on OVS-DPDK Platform
    • Hardware-Level Performance Analysis of Platform I/O
    • Link-Level Network Slicing with DPDK
    • What's New in Virtio 1.1 - Jason Wang, Red Hat
    • DPDK Support for Vhost Acceleration
    • Zero-Copy Improvement and Best Practice
    • Practices to Achieve Ultimate Performance in Cloud Networking
    • Accelerate Virtual Switch with Intelligent Adapter
    • DPDK Multiple Sized Packet Buffer Pool - Gavin Hu
    • FPGA Acceleration and Virtualization Technology in DPDK
    • A Case for Queue APIs - Honnappa Naggrahall
    • DPDK-based Load Balancer to Support Alibaba Dual 11 Festival

    DPDK 2017-us

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceL8rcXQUucIZNIFiIDIqVf9&si=B5goJxvrj60TxiCT

    Index

    • Opening Remarks & Governing Board
    • Community Survey Feedback
    • Reducing Barriers to Adoption - Making DPDK Easier to Integrate into Your Application
    • New Command Line Interface for DPDK
    • Event Adapters - Connecting Devices to Eventdev
    • GRO/GSO Libraries: Bring Significant Performance Gains to DPDK-based Applications
    • Power Aware Packet Processing
    • Enhanced Memory Management
    • Making networking apps scream on Windows with DPDK
    • Mediated Devices: Better Userland IO
    • Mellanox bifurcated driver model
    • DPDK with KNI – Pushing the Performance of an SDWAN Gateway to Highway Limits!
    • Container Panel Discussion
    • Accelerate storage service via SPDK
    • Accelerating P4-based Dataplane with DPDK
    • DPDK as microservices in ZTE Paas
    • Accelerate Clear Container Network performance
    • The Path to Data Plane Microservices
    • Implementation and Testing of Soft Patch Panel
    • Reflections on Mirroring With DPDK
    • A network application API on top of device APIs
    • SafetyOrange – A tiny server class multi-purpose box with DPDK
    • Technical Roadmap
    • rte_raw_device: implementing programmable accelerators using generic offload
    • DPDK support for new hardware offloads
    • Flexible and Extensible support for new protocol processing using Dynamic Device Personalization
    • Serverless DPDK – How SmartNIC resident DPDK Accelerates Packet Processing
    • Enabling hardware acceleration in DPDK data plane applications
    • rte_security: enhancing IPSEC offload
    • Mellanox FPGA
    • SMARTNIC, FPGA, IPSEC Panel discussion
    • VPP Host Stack
    • DPDK's best kept secret – Micro-benchmark performance tests
    • DPDK on Microsoft Azure
    • OpenNetVM: A high-performance NFV platforms to meet future communication challenges
    • Make DPDK's software traffic manager a deployable solution for vBNG
    • testpmd: swissknife for NFV
    • OpenVswitch hardware offload over DPDK
    • Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Intel's Poll Mode Drivers (PMD)
    • DPDK Membership Library
    • Integrating and using DPDK with Open vSwitch
    • Lagopus Router
    • vSwitch Panel Discussion
    • Closing Remarks

    DPDK 2017-eu

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceJVcpgvG6_RXkenW9EQAKxq&si=Re0prouX6ZwCUtiU

    Index

    • Governing Board Presentation & Panel Discussion
    • DPDK Bus Updates
    • Ideas for adding generic HW accelerators to DPDK
    • Let’s hot plug: use uevent mechanism to practice it in DPDK
    • Proposed method for sharing a (PCI) device between multiple PMDs
    • DPDK VMBus & Azure Support
    • rte_security: the case of IPsec offload
    • DPDK Quality of Service APIs
    • Service Cores: The path to Abstracting SW/HW CPU Requirements in DPDK
    • Wireless Base Band Device (bbdev)
    • DPDK to support InfiniBand Link Layer
    • Community Activity, CI & Tools
    • ABI Stability and LTS: Current state and Future
    • Implementing an SR-IOV Hypervisor using DPDK
    • A framework for representation, configuration, and management of virtual function ports in DPDK
    • Improve VNF safety with Vhost-User/DPDK IOMMU support
    • Virtio Status Update and New Ring Layout
    • Power Aware Packet Processing
    • DPDK, VPP and pfSense 3.0
    • Rapid prototyping of DPDK applications with libmoon
    • Using DPDK with Go
    • T4P4S: When P4 meets DPDK
    • Dataplane Networking journey in Containers

    DPDK 2017-asia

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceJLfOg0x52jvQik2r4yAZZx&si=EWFMOmV5zRYR2ohw

    Index

    • Introductions Welcome and Agenda for the Day
    • DPDK Architecture and Roadmap - Kannan Babu Ramia Deepak K Jain
    • Supporting SoC devices in DPDK - Status Update
    • DPDK on an Intelligent NIC - Vamsi Attunuru
    • DPDK Cook Book - Muthurajan Jaya Kumar
    • Implementation of Flow-Based QoS Mechanism with OVS and DPDK - Karuppusamy M
    • Fast Path Programming With P4 - Ramachandran Subramoniam Vnpraveen Desu
    • Migrating from 10G to 25G - Jingjing Wu Helin Zhang
    • Dataplane For Subscriber Gateways - Natarajan Venkataraman
    • Sample VNF In OPNFV - Ramia Kannan Babu
    • Fast Data IO / Vector Packet Processor: Architecture overview - Shwetha Bhandari
    • Transport Layer Development Kit (TLDK) - Mohammad Abdul Awal
    • SFC With OVS DPDK And FDio DPDK - Prasad Gorja
    • DPDK Automation In Red Hat Openstack Platform - Saravanan KR
    • Packet Steering for Multicore Virtual Network Applications over DPDK - Priyanka Naik Mitali Yadav

    DPDK 2016-us

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceJLvnSuUIeGnWg02isKWlQr&si=5ayu1Yo4KIpKWwFR

    Index

    • DPDK on Embedded Networking SoCs - Experience & Needs
    • Introduction
    • Extending DPDK to Add an Event Driven Programming Model
    • Roadmap for Future Releases
    • High Performance Framework for Symmetric Crypto Packet Processing in DPDK
    • User Perspectives on Trying to Use DPDK for Accelerating Networking in End-system Applications
    • NFV Use-case Enablement on DPDK and FD.io
    • Intel® 40G Ethernet Controller Architecture, Application and Performance
    • Virtualization of Network Packet Monitoring Systems Using DPDK
    • Technical Panel
    • DPDK in a Box
    • Berkeley Extensible Soft Switch (BESS)
    • DPDK in Overlay Networks and How it Affects NFV Performance
    • Transport Layer Development Kit (TLDK)
    • Change Before You Have to Be Claimed [from Change Before You Have To. (Jack Welch)]
    • PISCES: A Programmable, Protocol-Independent Software Switch
    • DPDK, VPP/FD.io and Accelerated Open vSwitch
    • Understanding the Performance of DPDK as a Computer Architect
    • Putting DPDK in Production
    • Community Survey Feedback
    • Getting Your Code Upstream Into DPDK
    • Why are Open and Programmable Data Planes Critical to the Future of Networkin
    • Innovative NFV Service-Slicing Solution Powered by DPDK

    DPDK 2016-eu

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceJg7O0PwPteFPCojM8e97Iq&si=88obCrpNc73iQ6Lr

    Index

    • NFV Use-case Enablement on DPDK and FD.io
    • Transport Layer Development Kit (TLDK)
    • mOS Networking Stack: A Specialized Network Programming Library for Stateful Middleboxes
    • Mbuf Changes
    • DPDK Hyper-V Support
    • Closing Remarks
    • DPDK Roadmap
    • TRex Traffic Generator – Stateless Support
    • Testing and Continuous Integration
    • Testing and Benchmarking Applications with MoonGen
    • DPDK Project Growth
    • Cryptodev and IPsec Acceleration
    • Bridging the gap between hardware functionality in DPDK applications in open source community
    • Monitoring your DPDK Application/Interfaces with Collectd
    • Intel I40E Bifurcated Driver
    • Interworking with the Linux Kernel
    • Identifying and Fixing Performance Bottlenecks
    • An Implementation of a P4 Software Dataplane Using Open vSwitch
    • Open vSwitch DPDK Acceleration Using HW Classification
    • DPDK optimal performance everywhere (Rallying with a Formula 1)
    • Mellanox Bifurcated DPDK PMD
    • Mbuf Changes
    • Re-structuring the DPDK Device Driver Framework
    • Usability (including packaging, stable releases, LTS releases etc.)

    DPDK 2016-asia

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceKxk_20x24yRsrx-a6yU4Qk&si=DAgitndtnnYSCwbc

    Index

    • Accelerate virtio/vhost using DPDK in NFV/Cloud Environment (Chinese)
    • A high-speed user-level TCP stack on DPDK (Chinese)
    • DPDK: A journey of migration to Linux kernel (Chinese)
    • High Performance Networked Systems (Chinese)
    • Vortex from UCloud (Chinese)
    • Light and NOS (English)
    • A Deep Dive into Memory Access (English)
    • High Performance Networked Systems (English)
    • Vortex from UCloud (English)
    • DPDK: A journey of migration to Linux kernel (English)
    • When Ceph Meets DPDK (English)
    • Next Gen Virtual Switch (English)
    • A high speed user level TCP stack on DPDK (English)
    • Accelerate virtiovhost using DPDK in NFVCloud Environment (English)
    • DPDK Community Update and an Introduction to the Fast Data, FD.io, Project (English)

    DPDK 2015-us

    Playlist

    • https://www.youtube.com/playlist?list=PLo97Rhbj4ceIXRxEgLKUGNWO1pTlWt8sI

    Index

    • Aspera’s FASP Protocol Uses Standard Hardware and DPDK to Achieve 80Gbps Data Transfer
    • Evaluation and Characterization of NFV Infrastructure Solutions on Hewlett-Packard Server Platforms
    • Leveraging DPDK to Scale-Out Network Functions without Sacrificing Networking Performance
    • Design Considerations for a High-Performing Virtualized LTE Core Infrastructure
    • Future Enhancements to the DPDK Framework
    • It’s kind of fun to do the impossible with DPDK
    • DPDK Summit: Open Discussion Panel (Q&A with Speakers)

    DPDK 2015-eu

    Playlist

    • https://youtube.com/playlist?list=PLo97Rhbj4ceIdxbxhWQidCvzyiG5S6UqK&si=ToAlhZNI7XcTq3DT

    Index

    • T-Rex Stateful Packet Generator
    • Hyperscan Software Pattern Matching
    • DPDK Performance Lessons Learned in vRouter
    • A Symmetric Cryptography Framework for DPDK
    • OpenDataPlane: A Quick Introduction and Overview
    • Dynamic NFV Deployment with Port Hotplug and Virtio
    • Generic Resource Manager
    • DPDK Architecture Musings
    • DPDK Integration Journey
    • The 7 Deadly Sins of Packet Processing
    • OVS, DPDK and Software Dataplane Acceleration
    • DPDK Packet Framework
    • Project Growth and Next Steps
    Blogs

  • LSF/MM/eBPF Session Archive (2024 ~ 2022)
    Y Yunseong Kim

    LSF MM eBPF 2024

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6oj1rVTXLnV7cOuetvjKn9q

    Index

    • mm/mempolicy extentions for heterogeneous memory systems - Gregory Price
    • automating measuring memory fragmentation - Luis Chamberlain
    • mTHP reliable allocation and reclamation - Barry Song
    • MEMDESC Allocation - Matthew Wilcox
    • MM process - Akpm
    • FS lightning talks
    • Reserved afternoon for per-FS BoFs, such as bcachefs
    • statx extensions for subvol/snapshot filesystems & more - Kent Overstreet
    • BPF IETF standardization update & roadmap (Dave Thaler)
    • inode timestamps and change cookie - Jeffrey Layton
    • Revamping global socket iterator, netkit & next steps (Daniel Borkmann)
    • Removing GFP_NOFS - Matthew Wilcox
    • Dropping page cache of individual fs - Christian Brauner
    • BPF Qdisc (Amery Hung)
    • Polymorphic kfuncs (David Vernet)
    • Rethinking BPF conntrack (Aditi Ghag)
    • TAO: THP Allocator Optimizations - Yu Zhao
    • BPF struct_ops & sched_ext (Kui-Feng Lee)
    • LLVM improvements for better verification (Alan Jowett)
    • Tracing the source of errors - Miklos Szeredi
    • Compiled BPF (Jose E. Marchesi)
    • Compiled BPF, continued (David Faust)
    • Cross-platform BPF compiler issues (Dave Thaler)
    • Instruction-level BPF memory model (Paul E. McKenney)
    • BPF performance: comparison of eBPF for Windows vs Linux BPF (Alan Jowett)
    • Modernize BPF for the next 10 years (Alexei Starovoitov)
    • Next Steps for BPF LSM (KP Singh)
    • Tetragon auditing/enforcement (John Fastabend)
    • perf data type profiling and pahole update (Arnaldo Carvalho de Melo)
    • perf tools issues with BPF (Namhyung Kim)
    • BPF-NX+CFI (Maxwell Bland)
    • Implementing BPF_PROG_LOAD_FD (Neill Kapron)
    • Segmented Stacks for BPF Programs (Yonghong Song)
    • Value tracking in BPF verifier (Shung-Hsi Yu)
    • Static keys and jump labels (Anton Protopopov)
    • Fast uprobes (Jiri Olsa)
    • BPF CI in particular and kernel testing in general (Mykola Lysenko)
    • BPF local testing (Manu Bretelle)
    • BPF conformance - handling undefined opcodes (Alan Jowett)
    • Multi-kprobe Updates (Jiri Olsa)
    • linkat
    • Reclaiming & documenting page flags - Matthew Wilcox
    • Deprecate SPARSEMEM and have only SPARSEMEM_VMEMMAP - Oscar Salvador
    • CXL Development Discussions
    • mm: memcg: separate legacy cgroup v1 code and put under config option - Roman Gushchin, Shakeel Butt
    • kdevops BoF - Luis Chamberlain
    • CXL Memory Compression - Yiannis Nikolakopoulos
    • Filesystem testing - Leah Rumancik
    • Hugetlb Unifications, continued - Peter Xu
    • Mount API extensions - Christian Brauner
    • Finishing up mount API conversions; consistency & logging - Eric Sandeen
    • Saner infrastructure for tree-in-dcache filesystems - Al Viro
    • IOMAP BoF
    • Making pseudo file systems inodes/dentries more like normal file systems - Steven Rostedt
    • fanotify HSM update - Amir Goldsrein
    • Introduction Goals and Progress since last year - Daniel Borkmann, Martin Lau & all track leads
    • State Of The Page - Matthew Wilcox
    • No tears atomics & LBS - Luis Chamberlain, John Garry
    • Untorn buffered writes - Theodore Ts'o, John Garry
    • Challenges and Ideas in Transitioning EXT* and other FS to iomap - Ritesh Harjani
    • Reclamation interactions with RCU - Paul E. McKenney
    • Filesystem in Rust - Kent Overstreet
    • ASI Follow up - Brendon Jackman
    • Swap abstraction - Chris Li
    • shmem/tmpfs: large folios adoption, regression tracking and performance testing - Daniel Gomez
    • Famfs: new userspace filesystem driver vs. improving FUSE/DAX - John Groves
    • Large folios, swap and fscache - David Howells
    • General Session - Workshop Summary (Daniel Borkmann, Martin Lau & all other track leads)
    • More features and use-cases for sched_ext (David Vernet)
    • Measuring limits and enhancing buffered IO - Luis Chamberlain
    • DAMON Updates and Plans: Automation of DAMON tuning, tiering, and VM guest scaling - SeongJae Park
    • KVM vCPU Priority boosting via BPF (Vineeth Pillai)
    • SLUB: what's next? - Vlastimil Babka
    • MM mapcount madness - David Hildenbrand
    • Dynamic Growth of Kernel Stacks - Pasha Tatashin
    • Memory allocation profiling - Suren Baghdasaryan
    • Address Space Isolation - Brendan Jackman
    • Enhancements to RCU-protected VMA walks - Liam R. Howlett
    • Changing how we do file system maintenance - Josef Bacik, Christian Brauner
    • Hugetlb Unifications - Peter Xu
    • Sharing page tables across processes (mshare) - Khalid Aziz
    • Evolution of stack trace captures with BPF - Andrii Nakryiko
    • BPF Thrift Coalescing (BPF + io_uring, David Wei)
    • eBPF Foundation: ongoing work & "What can the foundation do for you?" (Joe Stringer et al.)
    • Multi-sized THP performance benchmarks and analysis on ARM64 - Yang Shi
    • Maple Tree Proposed Features - Liam Howlett
    • Highlights from the Linux Storage, Filesystem, Memory Management & BPF Summit 2024 in Salt Lake City

    LSF MM eBPF 2023

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6rlmdpJ3-oMgU_zxc1wAhjS

    Index

    • Introduction and Goals - Josef Bacik
    • [Private video]
    • fanotify HSM API / VFS write barriers - Amir Goldstein
    • Lighting talks
    • Wrap up
    • FUSE passthrough solutions and status - Miklos Szeredi / Daniel Rosenberg
    • FUSE uring request allocation and communication - Bernd Schubert
    • mount namespace monitoring - Miklos Szeredi, Amir Goldstein
    • Direct map fragmentation - Mike Rapoport
    • SMDK inspired MM changes for CXL - Kyungsan Kim
    • VM live migration over CXL memory - Dragan Stancevic
    • VM memory overcommit - T.J. Alumbaugh, Yuanchu Xie
    • DAMON updates and future plans - SeongJae Park
    • HGM for hugetlbfs - James Houghton
    • Batteries-included symbolization with blazesym - Daniel Mueller
    • Userspace Control of Memory Management - Frank van der Linde
    • What should be the anthem of BPF? - Alexei Starovoitov
    • Compiled BPF: Part 1 of 2 - Jose E. Marchesi
    • Resurrection of /dev/bpf discussion for implementing trusted unpriv BPF- Andrii Nakryiko
    • Enabling kfuncs to specific modifiers per-arg, rather than per-kfunc Allowing... - David Vernet
    • BTF function/address resolving - Jiri Olsa
    • BPF Graph Collections + Verifier Changes - David Marchevsky
    • State of the Page - Matthew Wilcox
    • Sunsetting buffer heads - Hannes Reinecke
    • Support for large block sizes (over4KB) - Luis Chamberlain
    • Lighting talks
    • Composefs vs erofs+overlay - Alexander Larsson
    • Image based read only filesystems EROFS - Xiang Gao
    • VFS topics - Christian Brauner
    • Mounting images inside userns - Christian Brauner / Lennart Poettering
    • Final hurdles with procfs magic link hardening - Aleksa Sarai
    • online repair of filesystems: what next? - Darrick Wong
    • bcachefs: when is an fs ready for upstream? - Kent Overstreet
    • fsinfo/mount namespace monitoring - Miklos Szeredi / Hou Tao
    • HW counters for hold/cold pages - Aneesh Kumar K V, Wei Xu
    • Lazy RCU memory reclaim - Joel Fernandes
    • physr discussion - Jason Gunthorpe
    • SL[OA]B removal and future of SLUB - Vlastimil Babka
    • Virtual machine memory passthrough - Pasha Tatashin
    • Sframe - Steven Rostedt, Indu Bhagat
    • Swap abstraction - Yosry Ahmed
    • Reducing zombie memcgs - T.J. Mercier, Yosry Ahmed
    • Generic BPF multi-attach API & initial implementation for tcx and XDPmeta... - Daniel Borkmann
    • XDP metadata for TX - Stanislav Fomichev
    • XDP/BPF in RDMA(RXE) - Zhu Yanjun
    • Better hash functions for BPF maps - Anton Protopopov
    • Namespace unaware BPF (sockets) iterator BPF cgroup helper enhancements... - Aditi Ghag
    • BPF and firewall: kernel support to ease more complex packets filtering - Quentin Deslandes
    • Kernel lock performance analysis using BPF - Hao Luo
    • Multi uprobe link - Jiri Olsa
    • cgroup-bpf production surprises - Martin Lau
    • Monitoring SRIOV with BPF - John Fastabend
    • BPF Turing machine - John Fastabend
    • Live Demo
    • Filesystem backporting to stable and other LTS woes- Leah Rumancik, Chandan Rajendra, Amir Goldstein
    • Limits of Development - Hannes Reinecke
    • Copy Offload - Nitesh Shetty, Chaitanya Kulkarni
    • kdevops: Advances with automation of testing with fstests and blktests - Luis Chamberlain
    • Lighting talks
    • iSCSI containerized control plane - Chris Leech, Lee Duncan
    • Removal of kthread freezer next steps - Luis Chamberlain
    • IOMAP conversion status - Luis Chamberlain
    • NFSD, folios, and biovecs - Chuck Lever
    • Improving i_version support in filesystems - Jeffrey Layton
    • Scalable pagefaults - Matthew Wilcox, Suren Baghdasaryan
    • Flexible orders anon pages - Yu Zhao, Yang Shi
    • Single owner memory - Pasha Tatashin
    • MM doc - Mike Rapoport
    • Memory profiling using code tagging - Suren Baghdasaryan, Kent Overstreet
    • Introduce a per-cpu-vmap-cache to mitigate a lock contention - Uladzislau Rezki
    • Followup, new zone + mmap flag for CXL?: - Dan Williams and Kyungsun Kim
    • Why not a existing Zone, Node, or HW?
    • Tetragon a k8s observability and security tool - John Fastabend
    • BPF signing using fsverity and LSM gatekeeper - Lorenz Bauer
    • Applicability of BPF in a Confidential Computing context - Dave Thaler
    • vmtest: reusable virtual machine testing infrastructure - Daniel Xu
    • BPF CI system discussion - Manu Bretelle, Daniel Mueller, Mykola Lysenko
    • Extend bpf-helpers to better support Kubernetes - Vinay Kulkami
    • BPF iterator for file-system - Hou Tao
    • FUSE BPF - Daniel Rosenberg
    • BPF documentation/standardization progress - Dave Thaler
    • Make bpf memory allocator more robust - Hou Tao
    • A sketch data-structure for quantiles in eBPF - Kornilios Kourtis
    • Update on the new module_alloc - Song Liu
    • SCSI Reserved Commands - Hannes Reinecke
    • CXL Fabric manager - Viacheslav A Dubeyko
    • sched ext - David Vernet
    • Compiled BPF: Part 2 of 2 - Jose E. Marchesi
    • BPF Static Keys Support: Update on Wildcard Map Including Use Cases & Restrictio... Anton Protopopov

    LSF MM eBPF 2022

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6ojOwYpczcvVLx-Resz7shx

    Index

    • Introduction and Goals - Josef Bacik
    • Amortising direct map fragmentation - Mike Rapoport
    • are we going to use ioctls forever configfd - Luis Chamberlain & James Bottomley
    • bcachefs - Kent Overstreet
    • Better algorithms and data structures for BPF - Andrii N
    • Block drivers in userspace - Gabriel Krisman Bertazi
    • Block namespaces - Hannes Reinecke
    • BoF for Zoned Storage - Luis Chamberlain
    • BPF + block devices -Hannes Reinecke
    • BPF CI - Mykola L
    • BPF Container Debugging - Song Liu
    • BPF documentation and standardization - Christoph H
    • BPF Dynamic Pointers - Joanne Koong
    • BPF for "standard interface" flexibility - KP
    • BPF for security domain - KP
    • BPF guidelines for newcomers - Brendan G
    • BPF observability tools update - Brendan G
    • BPF Roadmap Doc Review
    • Challenges with running fstests and blktests - Luis Chamberlain
    • Changes in RCU over the past few years - Paul E. McKenney
    • Changing file system resize patterns - Theodore T'so
    • Clang and BPF: what is a regression? - John F
    • Commonization of nvme transports - James Smart
    • Compass Rose - Monday Lighting talks
    • Compass Rose - Tuesday Lighting talks
    • Comprehensive kfunc support - Yonghong
    • Container CXL Memory Interface - Hongjian Fan
    • Container CXL Memory Interface - Hongjian Fan
    • Copy Offload - Chaitanya Kulkarni
    • CoW changes - David Hildenbrand
    • CXL vs iomem_resource - Ben Widawsky
    • Dealing with hot plugging composability issues created by CXL attached memories - Jon Trantham
    • DIGLIM eBPF: secure boot at application level with minimal changes to distros - Roberto Sassu
    • Disabling extent optimization - David Howells
    • Do we keep PATA support ? - Damien Le Moal
    • Dying cgroups issues - Roman Gushchin
    • Dynamically allocated pseudo file systems - Steven Rostedt
    • Enabling change notification fornetwork and cluster fs - Steve French
    • Enhanced NVMe error & status messaging - Ewan D. Milne
    • Evolving libbpf and bpftool to be cross-platform - Dave Thaler
    • Extend cgroup stats collection and interface with BPF - Hao
    • Folios - Matthew Wilcox
    • FOLL_PIN + file systems - John Hubbard
    • FS and stable trees - Amir Goldstein
    • fsinfo()/getvalues()/getxattr() - Amir Goldstein, Miklos Szeredi
    • Fstests/blktests best practices - Josef Bacik
    • Handling of VMAs - Liam Howlett
    • idmapped mounts BoF - Christian Brauner
    • Improving OOM debugging - Kent Overstreet
    • Key per I/O - Fred Knight
    • KLP and BPF - Steven Ronstedt
    • libata SCSI integration - Hannes Reinecke
    • Maintainers Don't Scale - Josef Bacik
    • making O_TMPFILE more atomic - Steve French
    • MGLRU - Yu Zhao
    • MM documentation - Mike Rapoport
    • MM process - Akpm, Willy
    • mshare - Matthew Wilcox & Khalid Aziz
    • Negative Dentries - Stephen Brennan
    • Netfs support library - David Howells
    • Network storage transports in containers - Chris Leech
    • NVMe dispersed namespaces - Hannes Reinecke
    • NVMe oF Discovery Services - John Meneghini
    • NVME Passthrough - Kanchan Joshi
    • overlayfs across cgroupfs and bpffs - Amir G
    • Page table reclaim - David Hildenbrand
    • PMD sharing - Mike Kravetz
    • Potential silent data loss caused by hwpoisoned page cache - Yang Shi
    • proactive reclaim and memory tiering - Davidlohr Bueso
    • Program signing, bpf policy - Jason Baker
    • Readahead - Matthew Wilcox, David Howells, Steven French
    • Remote users share your experience with us - Remote participants
    • Scaling iSCSI to many targets - Lee Duncan
    • Shared memory and Pooled memory - Hongjian Fan
    • Shared memory for shared file extents - Goldwyn Rodrigues
    • Sockmap Updates and New Features - John Fastabend
    • SPF - Michel Lespinasse, Suren Baghdasaryan
    • Statx, snapshots, fs identifiers - Josef Bacik
    • Subsector reads - Keith Busch
    • Supervisor Protection Keys - Ira Weiny
    • tc BPF and uveth;hook for connected UDP/TCP - Daniel B
    • The Maple Tree + Lock Scalability - Liam Howlett and Michel Lespinasse
    • TLS handshake for in kernel consumers - Hannes Reinecke
    • Unique file system identifiers - Chuck Lever Ben Coddington
    • Userspace control of memory mappings to support live update - James Gowans & David Woodhouse
    • Wrap Up - Josef Bacik
    Blogs

  • Linux Security Summit Session Archive
    Y Yunseong Kim

    LSS 2025 NA

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6pAblvRXHaIYY0VE6ZjObV9

    Index

    • Welcome + Opening Remarks - James Morris, Microsoft
    • Kernel Hardening: Ten Years Deep - Kees Cook, Google
    • Lessons Learned While Making an AppArmor Play Machine - Alexandre Pujol, Linagora
    • SeaBee: Defense for the Defense - Alan Wandke & Jacob Satterfield, National Security Agency
    • Ubuntu Permission Prompting - John Johansen, Canonical
    • Bypass Kernel Barriers: Fuzzing Linux Kernel in Userspace With LKL - Xuan Xing & Eugene Rodionov
    • Putting Together a Secure Virtualization and Containerization Platform - Stéphane Graber, Zabbly
    • Getting on the Same (Virtual Memory) Page: A Roundtable on Data-only Attack Mitigat... Maxwell Bland
    • Integrating Confidential Computing Into Cloud Infrastructure: Challenges and Opport... Carlos Bilbao
    • Welcome Back + Remarks - James Morris
    • The State and Direction of LSM Stacking - Casey Schaufler, The Smack Project
    • Binding TDISP & Platform Attestation Reports for Confidential VMs - Anna Trikalinou
    • SELinux All the Way Down: Namespaces for SELinux - Stephen Smalley, National Security Agency
    • Handling New Syscalls in Seccomp Filters - Tom Hromatka, Oracle Corporate & Paul Moore, Microsoft
    • SymBisect: Accurate Bisection for Fuzzer-Exposed Linux Vulnerabilities - Zheng Zhang, Meta
    • Layered Attestation of a Cross-Domain System - Perry Alexander, University of Kansas
    • eBPF as an Active Security Enforcement Layer Stop DNS Data Breaches : Beyond Pass... Vedang Parasnis

    LSS 2025 EU

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6rSxIlgQx8OYw74Az63TpaB

    Index

    • Welcome + Opening Remarks - Elena Reshetova, Security Architect, Intel
    • Linux and CHERI: Back to the Future - Carl Shaw, Codasip
    • IMA Update: Lessons Learned from Re-implementing IMA-measurement in User Space - Roberto Sassu
    • Prioritizing the Linux OS Hardening and CVE Mitigation - Baoli Zhang, Intel
    • Kernel Hardening With Protection Keys - Kevin Brodsky, Arm
    • AppArmor Update - John Johansen, Canonical
    • SELinux Update - Paul Moore, Microsoft
    • Opportunities and Challenges on Merging HW Security Features into Linux Mainline Kernel - Panel
    • Welcome Back + Remarks - Elena Reshetova, Security Architect, Intel
    • FineIBT Enhanced: Hardening Linux’s Microarchitectural Security on X86 - S. Constable & S. Österlund
    • Script Integrity - Mickaël Salaün, Microsoft
    • Landlock Config - Mickaël Salaün, Microsoft
    • Securing CI/CD Runners Through eBPF - Mert Coskuner, Yahoo & Cenk Kalpakoglu, Kondukto
    • Recoverable, Tamper-resistant Full-disk Encryption at the Distributed Edge - Kobus van Schoor
    • Hardening the Barebox Bootloader - Ahmad Fatoum, Pengutronix

    LSS 2024 NA

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6rbN7fu5TId8VWAC5A8v5O7

    Index

    • Welcome & Opening Remarks - James Morris, Microsoft
    • Protecting the Linux Kernel from Confidential Computing Threats... - Carlos Bilbao & Elena Reshetova
    • Securing Confidential VMs with COCONUT-SVSM - Jörg Rödel, SUSE
    • Mitigating Integer Overflow in C - Kees Cook, Google
    • Control Flow Integrity on RISC-V Linux - Deepak Gupta, Rivos Inc
    • Linux Virtualization Based Security - Anna Trikalinou, Microsoft Corporation & Thara Gopinath
    • Provenance-Aware Integrity Monitoring with Linux Security Identifiers - Fred Araujo & Teryl Taylor
    • The Digest_cache LSM - Roberto Sassu, Huawei Technologies Duesseldorf GmbH
    • Welcome Back & Check-In - James Morris, Microsoft
    • Unprivileged Access Control in AppArmor - John Johansen & Georgia Garcia, Canonical
    • Stacked LSMs and User Space - Casey Schaufler, The Smack Project
    • Snapshotting IMA Log - Tushar Sugandhi, Microsoft
    • Enhancing Kernel Bug Discovery with Large Language Models - Zahra Tarkhani, Microsoft
    • A Hybrid Alias Analysis Framework and Its Application to Protecting the Linux Kernel - Guoren Li
    • SandBox Mode (SBM) - New Execution Mode Between Kernel and User Space - Petr Tesarik, Self-employed
    • Enhancing Systemd Security Using TPM 2.0 - Bill Roberts, ARM

    LSS 2024 EU

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6pXwGwbAmhi3DgsaPKJTLde

    Index

    • Welcome & Opening Remarks - Elena Reshetova, Intel
    • SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io
    • Enabling Hardware Security Modules for Confidential Computing - Reinhard Buendgen, IBM
    • Hiding Attestation with Linux Keyring in Confidential Virtual Machines - Mikko Ylinen, Intel
    • Enabling New Security Frontiers: Deep-Dive Into Implementing Confidential Computing on RISC-V - R...
    • The Critical Path to Implant Backdoors and Potential Mitigation Techniques: Learnings from XZ...
    • Compartmentalizing Vulnerable Kernel Components Without Stopping the Machine - Qinrun Dai
    • Systemd & TPMs - Lennart Poettering, Microsoft
    • Welcome Back & Remarks - Elena Reshetova, Intel
    • Restricting Unprivileged User Namespaces in Ubuntu - John Johansen & Maxime Bélair, Canonical
    • Update on Landlock: IOCTL Support - Günther Noack, Google
    • LVBS and Advanced Kernel Integrity - Thara Gopinath, Microsoft
    • Verifying and Signing EBPF Programs with Inspektor Gadget - Francis Laniel, Microsoft
    • Safer Seccomp: Dead Syscalls Elimination - Yuan Tan & Siqi Fan, Lanzhou University; Xiao Liu

    LSS 2023 NA

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6q4vmwFP7-ZZ1LJc5mA3Hqu

    Index

    • Welcome & Opening Remarks - James Morris, Microsoft
    • Verifiable End To End Secure OCI Native Machines - Serge Hallyn & Joy Latten, Cisco
    • systemd and TPM2 - Lennart Poettering, Microsoft
    • System Calls for the Linux Security Module Infrastructure - Casey Schaufler, The Smack Project
    • How to Backdoor the Linux Kernel (and fail?) - Konstantin Ryabitsev, The Linux Foundation
    • HotBPF++: A More Powerful Memory Protection for the Linux Kernel - Zicheng Wang & Yueqi Chen
    • Controlling Script Execution - Mickaël Salaün, Microsoft
    • Welcome Back & Daily Announcements Day 02 - James Morris, Microsoft
    • MPK/PKS Linux Kernel Compartmentalization - Sebastian Österlund, Intel
    • Enforcing Runtime Integrity with Maat - Jonathan Myers & Andrew Guinn
    • Heki: Hypervisor-Enforced Kernel Integrity for Linux with KVM - Mickaël Salaün, Microsoft
    • When Confidential Containers Meet Arm CCA - Jia He, Arm China
    • Building the Largest Working Set of Apparmor Profiles - Alexandre Pujol, The Collaboratory @TUDublin
    • SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for... - Yu Hao
    • Welcome Back & Daily Announcements Day 03 - James Morris, Microsoft
    • Dynamic Key Managed PowerPC Guest Secure Boot - Sudhakar Kuppusamy & George Wilson
    • Progress On Bounds Checking in C and the Linux Kernel - Kees Cook, Google & Gustavo A.R. Silva
    • SecurityPerf: A New Open-Source Framework for Benchmarking the Performance... - Austin Gadient
    • Coupling Key-Ring and Linux Crypto-API Framework(LCF) via Crypto... - Pankaj Gupta & Varun Sethi
    • LSM Maintainers Panel - John Johansen, Mickaël Salaün, Casey Schaufler, Mimi Zohar and Paul Moore

    LSS 2023 EU

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6o_jr1fmu46zv6QytlAx9o4

    Index

    • Welcome & Opening Remarks - Elena Reshetova, Intel
    • BPF and Security. Friends and Foes - Alexei Starovoitov, Meta
    • Genmai: A Security Vulnerability Detection Framework for Linux Operating..- Gao Tong & Song Chengjin
    • Estimating Security Risk Through Repository Mining - Tamas K. Lengyel, Intel
    • A PKCS #11 Signing Provider for OpenSSL - Reinhard Buendgen, IBM
    • Enabling Hardware-Assisted Shields for Linux Security Subsystems - Zahra Tarkhani, Microsoft
    • OP-TEE: Using the ARM Trust-Zone to Control Tamper Resistant Processors - Jorge Ramirez-Ortiz
    • Welcome Back & Check-In - Elena Reshetova, Intel
    • Hardware-backed Per-process Secrets - Matthew Garrett, Aurora
    • Blueprint for Secure Boot and Data Integrity Using rustBoot... - Ulrich Matejek & Philipp Ahmann
    • LSM Updates: IMA, SELinux, AppArmor, SMACK &...- Roberto Sassu, Paul Moore, John Johansen & KP Singh
    • Update on Landlock: Audit, Debugging and Metrics - Mickaël Salaün, Microsoft
    • Landlock Workshop: Sandboxing Application for Fun and Protection - Mickaël Salaün, Microsoft

    LSS 2022 NA

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6r5PEDYCQxI3fhOy6CmAMQo

    Index

    • Welcome & Opening Remarks- James Morris & Meaningful Bounds Checking in the Linux Kernel- Kees Cook
    • Improving Container Security with System Call Interception
    • Hardening the Linux Guest for the Confidential Cloud Computing: Deep Dive and Results
    • Namespacing the Linux Integrity Measurement Architecture
    • How Can We Effectively Test Transient Execution Mitigations? - Russell Currey, IBM
    • Wide-Block Cipher Support and HCTR2 - Nathan Huckleberry, Google
    • Preparing for Zero-Day: Vulnerability Disclosure in Open Source Software
    • Welcome Back & Remarks & Code Aware Services in the Service of Vulnerability Detection
    • Cascade - A New High Level SELinux Policy Language - Daniel Burgener, Microsoft
    • PowerVM Platform Keystore - Securing Linux Credentials Locally - Nayna Jain, IBM
    • IMA Policy Support for fs-verity: A Win-win for IMA & fs-verity - Mimi Zohar, IBM
    • Establishing Trust in Linux Keyrings - Is Trust Built-in, Imputed, or Transitive?
    • Update on Landlock: Lifting the File Reparenting Limits and Supporting Network Rules
    • BPF LSM - Updates and What next? - KP Singh, Google

    LSS 2022 EU

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6q_BmgE0TN93cx7yYwsJ_Kz

    Index

    • Welcome & Opening Remarks - Elena Reshetova, Intel
    • io_uring: So Fast. It's Scary. - Paul Moore, Microsoft
    • Flexible Array Transformations and Array-bounds Checking - Gustavo A. R. Silva, The Linux Foundation
    • HotBPF - An On-demand and On-the-fly Memory Protection for the Linux Ker... Yueqi Chen & Zhenpeng Li
    • Device Attestation in Hardware TEE based Confidential Computing - Jiewen Yao & Jun Nakajima, Intel
    • AMD SEV-SNP Attestation: Establishing Trust in Guests - Jeremy Powell, Advanced Micro Devices
    • Secure and Dynamic Hardware Partitioning Management on Heterogeneous SoC - Zahra Tarkhani, Microsoft
    • Welcome Back & Remarks - Elena Reshetova, Intel
    • Sanitizing the Linux Kernel — On KASAN and other Dynamic Bug-finding Tools - Andrey Konovalov
    • Finally, a Smack Reference Policy - Casey Schaufler, The Smack Project
    • What's New in the User Namespace - Stephane Graber, Canonical Ltd. & Christian Brauner, Microsoft
    • State of Intel SGX in Linux - Jarkko Sakkinen & Roman Volosatovs, Profian Inc
    • Introducing IO Devices into Trusted Execution Environments - Jun Nakajima, Intel Corporation
    • Improving Unmodified Classic Application Confinement - John Johansen & Georgia Garcia, Canonical

    LSS 2021 NA

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6owx0I6v2MSwjxhtsRdtFzG

    Index

    • Welcome & Opening Remarks - James Morris
    • SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs - Xiaochen Zou
    • Hardening the Linux Guest for the Confidential Cloud Computing - Elena Reshetova, Intel
    • Deep Dive into Landlock Internals - Mickaël Salaün, Microsoft
    • Hardware-Assisted Fine-Grained Control-Flow Integrity: Adding Lasers to Intel's CET/IBT
    • AMD SEV-SNP Development Update - David Kaplan, Advanced Micro Devices & Brijesh Singh, SMTS
    • Device Mapper Target Measurements for Remote Attestation using IMA
    • Kernel Self-Protection Project - Kees Cook, Google
    • Securing TPM Secrets in the Datacenter - Paul Moore, Microsoft & Joy Latten, Cisco
    • Welcome Back and Remarks - Day 2 - James Morris
    • Subsystem Update: Linux Integrity Status Update - Mimi Zohar, IBM
    • Patatt: End-to-end Patch Cryptographic Attestation for Patches - Konstantin Ryabitsev
    • The Future of Code Integrity Enforcement: Extending IMA - Fan Wu, Microsoft
    • Where do Security and Safety Meet? - Elana Copperman, Mobileye/Intel
    • Triaging Kernel Out-Of-​Bounds Write Vulnerabilities - Weiteng Chen
    • /dev/random - A New Approach - Stephan Mueller, atsec information security GmbH
    • Fuzzing Linux with Xen - Tamas K Lengyel, Intel
    • Abstracting TEE Silicon Implementations with Shims - Nathaniel McCallum & Harald Hoyer, Profian
    • Welcome Back and Remarks - Day 3 - James Morris
    • Mitigating Linux Kernel Memory Corruptions with ARM Memory Tagging - Andrey Konovalov, xairy.io
    • All the Things You Can Do with ARMv8 Virtualization - Janne Karhunen & Jani Hyvönen, Digital 14
    • Finding Multiple Bug Effects for More Precise Exploitability Estimation - Zhenpeng Lin & Yueqi Chen,
    • Live Migration Architecture for Intel TDX-based Confidential VMs - Ravi Sahita & Jun Nakajima, Intel
    • CVEHound: Audit Kernel Sources for Missing CVE Fixes - Denis Efremov, Oracle
    • Analysing & Improving the Security Properties of Secret Memory - James Bottomley & Mike Rappoport
    • IPE Namespaces - Targeted Enforcement of CI - Deven Bowers, Microsoft
    • Closing Remarks - James Morris

    LSS 2021 EU

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6rph1P4IRTbLweZXE9SnHU6

    Index

    • Opening Remarks - James Morris, Kernel Developer, Microsoft
    • 10 Years of Linux Security - A Report Card - Bradley Spengler, Open Source Security, Inc.
    • Automatically Securing Linux Application Containers in Untrusted Clouds
    • Control Flow Integrity in the Linux Kernel - Kees Cook, Google
    • Encrypting Memory at Scale - Derek Chamorro & Brian Bassett, Cloudflare
    • Integrity Policy Enforcement: Full System Integrity Verification - Deven Bowers, Microsoft
    • Panel Discussion: What is Lacking in Linux Security and What Are or Should We be Doing about This
    • Panel Discussion: What is Lacking in Linux Security and What Are or Should We be Doing about This
    • SELint - An SELinux Policy Static Analysis Tool - Daniel Burgener, Microsoft

    LSS 2020 NA

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6rph1P4IRTbLweZXE9SnHU6

    Index

    • Opening Remarks - James Morris, Kernel Developer, Microsoft
    • 10 Years of Linux Security - A Report Card - Bradley Spengler, Open Source Security, Inc.
    • Automatically Securing Linux Application Containers in Untrusted Clouds
    • Control Flow Integrity in the Linux Kernel - Kees Cook, Google
    • Encrypting Memory at Scale - Derek Chamorro & Brian Bassett, Cloudflare
    • Integrity Policy Enforcement: Full System Integrity Verification - Deven Bowers, Microsoft
    • Panel Discussion: What is Lacking in Linux Security and What Are or Should We be Doing about This
    • Panel Discussion: What is Lacking in Linux Security and What Are or Should We be Doing about This
    • SELint - An SELinux Policy Static Analysis Tool - Daniel Burgener, Microsoft

    LSS 2020 EU

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6pSot_DR10OFpGh74s64DMO

    Index

    • Architectural Extensions for Hardware VM Isolation to Advance Confidential Computing in Public Cloud
    • Block Me if You Can: Subverting IMA - Tobias Mueller, University of Hamburg
    • Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students
    • Container Runtime Support for SGX and TEE Environment - Isaku Yamahata, Intel Corporation
    • Introducing TPM NV Storage with E/A Policies and TSS-FAPI - Andreas Fuchs, Fraunhofer SIT
    • Kernel Integrity Enforcement with HLAT In a Virtual Machine - Chao Gao, Intel Corporation
    • Network File System Security Overview: Securing SMB3 - Steven French, Microsoft
    • Opening Remarks - Elena Reshetova, Security Engineer, Intel Corporation
    • Overview of the Crypto-engine Improvements - Iuliana Prodan, NXP Semiconductors
    • State of the User Namespace - Stephane Graber & Christian Brauner, Canonical
    • TBOOT and Secure Boot coexistence to launch OS even more securely. - Łukasz Hawryłko, Intel

    LSS 2019 NA

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6owE2_U94_g0gmuiq4iePVr

    Index

    • Infoflow LSM - Roberto Sassu, Cyber Security and Privacy Lab (CSPL)
    • Subsystem Update: The 2019 Smack Update - Casey Schaufler, Intel
    • Subsystem Update: LSM Stacking - What You Can Do Now and What's Next - Casey Schaufler, Intel
    • Tutorial: The Why and How of libseccomp - Tom Hromatka, Oracle & Paul Moore, Cisco
    • Subsystem Update: Linux Integrity Status Update - Mimi Zohar, IBM
    • Subsystem Update: Seccomp, Yama, and LoadPin - Kees Cook, Google
    • Tutorial: Complete Platform Attestation: Remotely Verifying the... Monty Wiseman & Avani Dave
    • Subsystem Update: tpm2-Software Update and Highlights - Philip Tricca, Intel
    • Subsystem Update: AppArmor Update 2019 - John Johansen, Canonical
    • Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco
    • Subsystem Update: State of SELinux, 2019 - Paul Moore, Cisco
    • Integrity Measurements and the Cruel World - Janne Karhunen, Dark Matter LLC
    • Binary Policy with IMA and AppArmor - Eric Chiang, Google
    • Breaking and Protecting Linux Kernel Stack - Elena Reshetova, Intel
    • Using and Implementing Keyring Restrictions for Userspace - Mat Martineau, Intel
    • Writing Linux Kernel Modules in Safe Rust - Geoffrey Thomas & Alex Gaynor
    • It's Coming From Inside the House: Kernelspace Fault Injection with KRF - William Woodruff
    • Kernel Runtime Security Instrumentation - KP Singh, Google
    • Rich Authorization in a Resource Constrained Device - Kenneth Goldman, IBM
    • Making Remote Attestation Useful on Linux - Brandon Weeks & Matthew Garrett, Google
    • Making Containers Safer - Stéphane Graber & Christian Brauner, Canonical Ltd.
    • Kernel Self-Protection Project - Kees Cook, Google
    • Application Whitelisting - Steven Grubb, Red Hat
    • NFS Support for the Linux Integrity Measurement Architecture - Chuck Lever, Oracle Corporation
    • TrenchBoot - How to Nicely Boot System with Intel TXT and AMD SVM - Daniel Kiper & Daniel Smith
    • Tutorial: How to Write a Linux Security Module - Casey Schaufler, Intel
    • Keynote: Retrospective: 26 Years of Flexible MAC - Stephen Smalley, National Security Agency
    • Enarx - Attested, Secured Execution with AMD’s SEV - Nathaniel McCallum & David Kaplan
    • Welcome & Opening Remarks - James Morris, Microsoft

    LSS 2019 EU

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6rF8E5yyknJzrVQaHeYszTR

    Index

    • Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019 - Tong Lin & Luhai Chen, Intel
    • Exploiting Race Conditions Using the Scheduler - Jann Horn, Google
    • Dealing with Uninitialized Memory in the Kernel - Alexander Potapenko, Google
    • A New Proposal for Protecting Kernel Data Memory - Igor Stoppa, Huawei
    • Tracing: The Bane of You Security Folks - Steven Rostedt, VMware Inc
    • Kernel Runtime Security Instrumentation - KP Singh, Google
    • CRIU and SELinux - Adrian Reber, Red Hat
    • Using a Different LSM from the Host in a Container - John Johansen, Canonical
    • Tutorial: Using Linux Primitives to Build Your Own Containers - Stéphane Graber & Christian Brauner
    • The Linux Crypto API - Ard Biesheuvel, ARM Ltd.
    • OpenPOWER: Host OS (Linux Kernel) Secure Boot Key Management - Nayna Jain, IBM
    • Keylime - An Open Source TPM Project for Remote Trust. - Luke Hinds, Red Hat
    • Securing TPM Secrets with TXT and Kernel Signatures - Paul Moore, Cisco
    • LSM Stacking - What You Can Do Now and What's Next - Casey Schaufler, Intel
    • Upcoming x86 Technologies for Malicious Hypervisor Protection - David Kaplan, AMD
    • Zephyr Project Security Status - David Brown, Linaro
    • Address Spaces for Namespaces - Mike Rapoport, IBM
    • BoF: Simple Remote Attestation with Secure & Attested Communication Channels - Roberto Sassu, Huawei

    LSS 2018 NA

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6rOT6m50HdJFYUHyvA9lurI

    Index

    • Making C Less Dangerous - Kees Cook, Google
    • Security in Zephyr and Fuchsia - Stephen Smalley & James Carter, National Security Agency
    • Life Behind the Tinfoil: A Look at Qubes and Copperhead - Konstantin Ryabitsev, The Linux Foundation
    • STACKLEAK: A Long Way to the Linux Kernel Mainline - Alexander Popov, Positive Technologies
    • Syzbot and the Tale of Thousand Kernel Bugs - Dmitry Vyukov, Google
    • Azure Sphere: Fitting Linux Security in 4 MiB of RAM - Ryan Fairfax, Microsoft
    • The Future of Security is in Open Silicon - Joel Wittenauer, Rambus Security, Cryptography Research
    • Opening Remarks - James Morris, Microsoft
    • Sub-system Update: State of SELinux - Paul Moore, Red Hat
    • fs-verity: Native File-based Authenticity - Michael Halcrow & Eric Biggers, Google
    • Sub-system Update: Kernel Self-Protection Project - Kees Cook, Google
    • Open System Firmware Projects - Elaine Palmer, IBM Research
    • Getting Started with the TPM2 Software Stack (TSS2) - Philip Tricca, Intel
    • Year in Review: Android Kernel Security - Jeff Vander Stoep & Sami Tolvanen, Google
    • Updating Linux with TUX: Trust Update for Linux Kernel - Suhho Lee & Hyunik Kim, Dankook University
    • Project Cerberus - Bryan Kelly, Microsoft
    • Using the TPM NVRAM to Protect Secure Boot Keys in POWER9 OpenPOWER Systems - Claudio de Carvalho
    • Sub-system Update: AppArmor Update 2018 - John Johansen, Canonical
    • Linux Audit: Moving Beyond Kernel Namespaces to Audit Container IDs - Richard Guy Briggs, Red Hat
    • How to Safely Restrict Access to Files in a Programmatic Way with Landlock? - Mickaël Salaün, ANSSI
    • Sub-system Update: Linux Integrity Status Update - Mimi Zohar, IBM
    • Proactive Software Defense against Side Channel Attacks - Kristen Accardi, Intel
    • Security Module Stacks that Don't Fall Over - Casey Schaufler, Intel
    • Protected Execution Facility - Guerney D. H. Hunt, IBM Research
    • Sub-system Update: Smack Update 2018 - Casey Schaufler, Intel
    • Extending OpenPOWER Boot Security to Guests - George Wilson, IBM
    • A Canonical Event Log Structure for IMA - David Safford & Monty Wiseman, GE

    LSS 2018 EU

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6oa4x78bHssxmGAw_ns1Tm2

    Index

    • Overview and Recent Developments of Keyrings Subsystem - David Howells, Red Hat
    • AMD Encrypted Virtualization Update - David Kaplan, AMD
    • Overview and Recent Developments: TPM - Jarkko Sakkinen, Intel
    • TPM Software Stack - Enabling the TPM2.0 Ecosystem in Linux - Peter Hüwe & Joshua Lock
    • Linux Kernel Security Contributions by ANSSI - Yves-Alexis Perez, ANSSI
    • Overview and Recent Developments: Kernel Self-Protection Project - Kees Cook, Google
    • Does Making the Kernel Harder Make Making the Kernel Harder? - Casey Schaufler, The Smack Project
    • Overview and Recent Developments: Namespaces and Capabilities - Christian Brauner, Canonical Ltd.
    • Overview of the Linux Kernel Security Subsystem - James Morris, Microsoft
    • Kernel Hardening: Protecting the Protection Mechanisms - Igor Stoppa, Huawei
    • Overview and Recent Developments: Linux Integrity - Mimi Zohar, IBM
    • Tying EVM into LSM Policy - Matthew Garrett, Google
    • A Simple Protocol for Remote Attestation of System Integrity - Roberto Sassu
    • Using Linux as a Secure Boot Loader for OpenPOWER Servers - Nayna Jain, IBM & Thiago Jung Bauermann
    • Overview and Recent Developments: AppArmor - John Johansen, Canonical
    • Overview and Recent Developments: Smack - Casey Schaufler, Intel
    • Overview and Recent Developments: SELinux - Paul Moore, Cisco
    • Security Module Stacks That Don't Fall Over - Casey Schaufler, The Smack Project
    • Protected Execution Facility - Guerney D. H. Hunt, IBM Research
    • Overview and Recent Developments: seccomp and Small Linux Security Modules - Kees Cook, Google
    • Implement Android Tamper-Resistant Secure Storage and Secure it in Virtualization - Bing Zhu, Intel

    LSS 2016

    Playlist

    • https://www.youtube.com/playlist?list=PLbzoR-pLrL6pq6qCHZUuhbXsTsyz1N1c0

    Index

    • Keynote: Inside the Mind of a Coccinelle Programmer by Julia Lawall, Developer of Coccinelle
    • The State of Kernel Self Protection Project by Kees Cook, Google
    • Towards Measured Boot Out of the Box by Matthew Garrett, CoreOS
    • Current State of Kernel Audit and Linux Namespaces, Looking Ahead to Containers
    • AMD x86 Memory Encryption Technologies by David Kaplan, AMD
    • Securing Filesystem Images for Unprivileged Containers by James Bottomley, IBM
    • Minijail: Running Untrusted Programs Safely by Jorge Lucangeli Obes, Google
    • On the Way to Safe Containers by Stephane Graber, Canonical
    • Smack in 2016 by Casey Schaufler, The Smack Project
    • Integrity by Mimi Zohar
    • TPM by Jarkko Sakkinen, Intel
    • SELinux by Paul Moore
    • AppArmor by John Johansen
    • Seecomp by Kees Cook, Google
    • Design and Implementation of a Security Architecture for Critical Infrastructure
    • Android: Protecting the Kernel by Jeffrey Vander Stoep, Google
    • Opportunistic Encryption Using IPsec by Paul Wouters, Libreswan IPsec VPN Project
    • (Ab)using Linux as a Trusted Bootloader by Eric Richter, IBM
    • Integrity Protection and Access Control - Who Do You Trust? by Glenn Wurster, BlackBerry
    Blogs

  • Linux Kernel Conference Session Archive (LPC 2021 ~ 2018)
    Y Yunseong Kim

    LPC 2021

    Playlist

    • https://www.youtube.com/playlist?list=PLVsQ_xZBEyN3wA8Ej4BUjudXFbXuxhnfc

    Index

    • VFIO IOMMU PCI MC
    • Tracing MC
    • Kernel Dependability MC
    • Toolchains and Kernel MC
    • IoThree's Company MC
    • Testing and Fuzzing MC
    • System Boot and Security MC
    • GPU-media-AI Buffer Management and Interop MC
    • Scheduler MC
    • File System MC
    • RISC-V MC
    • Diversity Equity and Inclusion MC
    • Real time MC
    • Confidential Computing MC
    • User Interrupts - A faster way to Signal - Sohil Mehta
    • Performance and Scalability MC
    • BOFs Session
    • Open Printing MC
    • Android MC
    • Building a fast nvme passthrough - kanchan joshi
    • GNU tool chain for CORE-V - Jeremy B/ Jessica M/Giuseppe T/ Nazareno B/Enrico T
    • New mod/ref pass in GCC - Jan Hubicka
    • RISC-V BoF - Palmer Dabbelt/Jim Wilson/Kito Cheng
    • BoF: Register pressure sensitivity in the gcc middle end - Aaron Sawdey
    • Integrating GitLab into the Red Hat kernel workflow - Don Zickus
    • Writing fine-grained access pattern oriented kernel module using DAMON/DAMOS in 10 m - SeongJae Park
    • io_uring: BPF controlled I/O - Pavel Begunkov
    • From XDP to Socket - Udip Pant/Martin Lau
    • Protection Key Supervisor (PKS) - Rick Edgecombe
    • Linux and Zephyr interoperability - the start of a beautiful relationship - Amit Kucheria
    • The Case for Memory Segregation - Alex Markuze
    • So you want to torture RCU? - Paul McKenney
    • The forefront of the development for NVDIMM on Linux Kernel - Mr Yasunori Goto/Mr Shiyang Ruan
    • Security improvements in GCC - Qing Zhao
    • The GNU C Library BoF - Mr Carlos O'Donell
    • PowerPC BOF - Bill Schmidt/Segher Boeesenkool
    • GCC support for the Darwin AArch64 ABI - Maxim Blinov/Andrew Burgess/Iain Sandoe
    • GCC Steering Committee, GLIBC, GDB, Binutils Stewards Q&A - David Edelsohn
    • Sharing Cache - optimizing for a single core vs a multi-core system - Patrick McGehearty
    • Debugging offloaded kernels on AMD GPUs - Andrew Stubbs
    • Eliminating implicit function declarations - Florian Weimer
    • A maintainable, scalable, and verifiable SW architectural ... - Gabriele Paoloni/ Daniel Bristot O
    • The Case for Memory Segregation - Alex Markuze
    • io_uring: BPF controlled I/O - Pavel Begunkov
    • Protection Key Supervisor (PKS) - Rick Edgecombe
    • Measuring Code Review in the Linux Kernel Development Process - Ms Ba≈üak Erdamar/Lukas Bulwahn
    • systemd-oomd: PSI-based OOM kills in systemd - Anita Zhang/Dan Schatzberg/Daniel Xu/Tejun Heo
    • Guider: Linux Tracing using Python - Peace Lee
    • Compute Express Link + Linux + QEMU = Yes - Ben Widawsky
    • Bootconfig and kernel cmdline - Masami Hiramatsu
    • A proof-carrying approach to building correct and flexible BPF verifiers - Luke Nelson/Xi W/Emina T
    • Pixie's eBPF Protocol Tracer - Omid Azizi/Yaxiong Zhao/Ryan Cheng/John P Stevenson/Zain Asgar
    • BPF user experience rough edges - Jakub Sitnicki/Arthur Fabre
    • Dynamic Encapsulation Using eBPF - Brian Vazquez/ Coco Li/Stanislav Fomichev/Willem de Bruijn
    • Towards truly portable eBPF - Itay Shakury/Rafael David Tinoco
    • Translating IPv4 to IPv6 Without NAT - Kyle Anderson/Keerti Lakshminarayan/Alok Tiagi
    • Untangling DSCP, TOS and ECN bits in the kernel - Guillaume Nault
    • Automatically optimizing BPF programs using program synthesis - Qiongwen X, Michael W, Tanvi W
    • gprofng - The next generation GNU profiler - Mr Ruud van der Pas/Mr Vladimir Mezentsev
    • BPF security auditing at Google - Brendan Jackman/KP Singh
    • Enable intel LAM in linux - H.J. Lu
    • Indirect External Access - H.J. Lu
    • Bringing TSO/GRO and Jumbo frames to XDP - Eelco C, Toke H, Jesper D B, Lorenzo Bianconi
    • Understanding motivations, goals and challenges faced by the Linux Kernel... - Bianca Trinkenreich
    • Watching the super powers - John Fastabend
    • Overview of memory reclaim in the current upstream kernel - Vlastimil Babka
    • Adding features to perf using BPF - Arnaldo Carvalho de Melo/Song Liu/Namhyung Kim
    • bpfilter - BPF based firewall - Dmitrii Banshchikov
    • BPF-datapath extensions for Kubernetes workloads - Daniel Borkmann/Martynas Pumputis
    • Improving the eBPF Developer Experience with Rust - Dave Tucker/Alessandro Decina
    • Strange kernel performance changes - analysis and mitigation - Mr Feng Tang
    • Complex Divide Improvements in libgcc - Patrick McGehearty
    • Defragmenting The Loader Landscape - Lorenz Bauer & Timo Beckers
    • DSA switches: domesticating a savage beast - Vladimir Oltean
    • Ahead-of-time compiled bpftrace programs - Daniel Xu
    • Self-healing Networking with Flow Label - Alexander Azimov
    • Towards a BPF Memory Model - Paul McKenney
    • Support for the CTF and BTF debug formats in the GNU Toolchain - Indu Bhagat/David Faust/Wei-min Pan
    • DWARF extensions for optimized SIMT/SIMD (GPU) debugging - Mr Tony Tye/Zoran Zaric
    • KEYNOTE: What a long, strange trip it's been.... - Jon maddog" Hall"
    • Mount-v2 CRIU migration engine: status update - Pavel Tikhomirov
    • Simplified user namespace allocation - Stephane Graber/Christian Brauner
    • GCC's -fanalyzer option: what's new in GCC 12 - David Malcolm
    • Using the GCC regression test suite for LLVM - Mary Bennett
    • Cgroup v1/v2 Abstraction Layer - Tom Hromatka
    • Analyzing historical DejaGNU test result data with the Bunsen toolkit - Serguei Makarov
    • Fast Checkpoint Restore for GPUs - Mr Rajneesh Bhardwaj/Mr Felix Kuehling/Mr David Yat Sin
    • Alternative ways to extract information about processes - Alexander Mikhalitsyn/Andrei Vagin
    • Socket migration for SO_REUSEPORT - Kuniyuki Iwashima
    • Use of eBPF in cpu scheduler - Hao Luo/Barret Rhoden
    • Update on BPF support in the GNU Toolchain - Jose E. Marchesi/David Faust/Mr Guillermo Martinez
    • BPF & Networking Opening Session - Daniel B, David M, Alexei S, Andrii N, Jakub K, Eric D
    • bpf: mass attachment of tracing probes - Jiri Olsa
    • BPF Map Tracing: Hot Updates of Stateful Programs - Joe Burton
    • Rust for Linux - Miguel Ojeda
    • BPF tracing: exploring additional debugging capabilities - Alan Maguire
    • Doing more with lore and b4 - Konstantin Ryabitsev
    • rustc_codegen_gcc: A gcc codegen for the Rust compiler - Antoni Boucher
    • Rust in the Linux ecosystem - Miguel Ojeda
    • Consolidating representations of the physical memory - Mike Rapoport
    • GCC Front-End for Rust - Philip Herron
    • Linux kernel in Chrome OS - scaling to millions of users - Alex Levin/Mr Jesse Barnes
    • Secrets in cloned snapshots - Alexander Graf/Mr Adrian Catangiu
    • Formalizing Kernel Synchronization Primitives with PREEMPT_RT - Ahmed S. Darwish
    • Closing Session - Christian Brauner
    • Direct Map Management - Mike Rapoport
    • The RISC-V platform specification - ATISH PATRA/Mr Kumar Sankaran/Rahul Pathak/Mayuresh Chitale
    • User Interrupts - A faster way to Signal - Sohil Mehta
    • Design discussion and performance characteristics of Maple Tree - Liam Howlett
    • What Could Possibly Go Wrong? - Paul McKenney
    • The RISC-V platform specification - ATISH PATRA/Mr Kumar Sankaran/Rahul Pathak/Mayuresh Chitale
    • Direct Map Management - Mike Rapoport
    • User Interrupts - A faster way to Signal - Sohil Mehta
    • Design discussion and performance characteristics of Maple Tree - Liam Howlett
    • What Could Possibly Go Wrong? - Paul McKenney
    • LPC 2021 - Containers and Checkpoint/Restore MC

    LPC 2020

    Playlist

    • https://www.youtube.com/playlist?list=PLVsQ_xZBEyN1HgWTOCn2Q96Q-RyfBSdKs

    Index

    • Welcome and Introduction
    • Presenters' training
    • Session Leads training
    • Power Management and Thermal Control MC
    • Application Ecosystem MC
    • Open Printing MC
    • GNU Toolchain MC
    • Refereed Track - Day 5
    • Networking and BPF Summit - Day 5
    • You, Me, and IoT Two MC
    • LLVM MC
    • System Boot and Security MC
    • GNU Tools Track - Day 4
    • Networking and BPF Summit - Day 4
    • Refereed Track - Day 4
    • RISC-V MC
    • VFIO/IOMMU/PCI MC
    • Testing & Fuzzing MC
    • Networking and BPF Summit - Day 3
    • GNU Tools Track - Day 3
    • Refereed Track - Day 3
    • /linux/arch/* MC
    • Kernel Dependability & Assurance MC
    • Scheduler MC
    • Networking and BPF Summit - Day 2
    • Refereed Track - Day 2
    • GNU Tools Track - Day 2
    • Real-time MC
    • Android MC
    • GNU Tools Track - Day 1
    • Networking and BPF Summit - Day 1
    • Refereed Track - Day 1
    • Containers and Checkpoint/Restore MC

    LPC 2019

    Playlist

    • https://www.youtube.com/playlist?list=PLVsQ_xZBEyN1PDehCCAiztGf45K_D6txS

    Index

    • Distribution Kernels MC
    • Scheduler MC
    • Linux Kernel VxLan with Multicast Routing for flood handling
    • BPF packet capture helpers, libbpf interfaces
    • Multipath TCP Upstreaming
    • Programmable socket lookup with BPF
    • XDP bulk packet processing
    • LAG and hardware offload to support RDMA and IO virtualized interfaces
    • Netfilter Hardware Offloads
    • SwitchDev offload optimizations
    • oomd2 and beyond: a year of improvements
    • Core Scheduling: Taming Hyper-Threads to be secure
    • printk: Why is it so complicated?
    • What does remote attestation buy you?
    • Linux kernel fastboot on the way
    • Red Hat joins CI party, brings cookies
    • Challenges of the RDMA subsystem
    • Reworking of KVA allocator in Linux kernel
    • Touch but don’t look: Running the kernel in execute only memory
    • Maple Tree
    • The list is our process: An analysis of the kernel's email-based development process
    • Upstream Graphics: Too little, too late
    • Future ipv4 unicast extensions
    • Life at a Networking Vendor -- Keeping up with the Joneses
    • Making the Kubernetes Service Abstraction Scale using eBPF
    • Making Networking Queues a First Class Citizen in the Kernel
    • Deep Argument Inspection and Seccomp
    • Inline Encryption Support
    • Tracing MC
    • Seamless transparent encryption with BPF and Cilium
    • Ethernet Cable Diagnostic using Netlink Ethtool API
    • XDP: the Distro View
    • Power Management & Thermal - MC
    • BPF is eating the world, don't you see?
    • Maintaining out of tree patches over the long term
    • Integration of PM-runtime with System-wide Power Management
    • Kernel Address Space Isolation
    • VFIO/IOMMU/PCI MC
    • Live Patching - MC
    • RDMA - MC
    • Databases - MC
    • Decoupling ZRAM from a specific backend
    • Closing Plenary
    • Efficient Userspace Optimistic Spinning Locks
    • Malloc for everyone and beyond NUMA
    • pidfds: Process file descriptors on Linux
    • Linux Gen-Z Sub-system
    • Finding more DRAM
    • An Evaluation of Host Bandwidth Manager
    • Improving Route Scalability with Nexthop Objects
    • Traffic footprint characterization of workloads using BPF
    • Scaling container policy management with kernel features
    • BPF - MC
    • Real Time - MC
    • Android - MC
    • Open Printing - MC
    • Containers & Checkpoint/Restore - MC
    • Toolchains - MC
    • You, Me, and IoT - MC
    • RISC-V
    • Killing the mmap_sem's contention
    • Formal verification made easy (and fast)!
    • CPU controller on a single runqueue
    • Utilizing tools made for "Big Data" to analyse Ftrace data - making it fast and easy
    • Enabling TPM based system security features
    • Reflections on kernel quality, development process and testing
    • Moving the Linux ABI to userspace
    • Memory management bits in arch/*
    • KUnit - Unit Testing for the Linux Kernel
    • Replacing mmap_sem with finer grained locks
    • Discussions on kselftest
    • printk Why is it so complicated
    • System Boot & Security - MC
    • Testing and Fuzzing - MC

    LPC 2018

    Playlist

    • https://www.youtube.com/playlist?list=PLVsQ_xZBEyN2tq96cAph0Dcy6gJVq_Wqw

    Index

    • Toolchain MC
    • Thermal MC
    • Testing and Fuzzing MC
    • RISC-V MC
    • Real Time MC
    • RDMA MC
    • Power Management and Energy-awareness MC
    • Performance and Scalability MC
    • Live Kernel Patching MC
    • Device Tree MC (part 2)
    • Device Tree MC (part 1)
    • Containers MC
    • BPF MC
    • Android MC
    • WireGuard: Next-Generation Secure Kernel Network Tunnel
    • What could be done in the kernel to make strace happy
    • Untrusted File systems
    • Towards a Linux Kernel Maintainer Handbook
    • The hard work behind large physical allocations in the kernel
    • The end of time, 19 years to go
    • Task Migration at Scale Using CRIU
    • SCHED_DEADLINE desiderata and slightly crazy ideas
    • Recursive read deadlocks and Where to find them
    • Proactive Defense Against CPU Side Channel Attacks
    • Open Source GPU compute stack - Not dancing the CUDA dance
    • oomd: a userspace OOM killer
    • Mind the gap - between real-time Linux and real-time theory
    • Migrating to Gitlab
    • Managing Memory Bandwidth Antagonism at Scale
    • Improving Graphics Interactivity - It's All in the Timing
    • Heterogeneous Memory Management
    • Formal Methods for Kernel Hackers
    • Exploring New Frontiers in Container Technology
    • Enhancing perf to export processor hazard information
    • Documenting Linux MM for fun and for ... fun
    • A practical introduction to XDP
    • Android and the kernel: herding billions of penguins, one version at a time
    • ZUFS - Zero Copy User-Mode FileSystem - One Year Later
    • Who stole my CPU? Steal time mitigation at Digital Ocean
    • SoC Maintainer Group
    • Multiple Time Domains
    • Filename encoding and case-insensitive filesystems
    • Concurrency with tools/memory-model
    • Zinc: Minimal Light-weight Kernel Cryptography API
    • XArray
    • An Introduction to RISC-V
    • Elivepatch: Flexible Distributed Linux Kernel Live Patching
    • Clang+Linux
    • When eBPF meets FUSE: Improving Performance of User File Systems
    • Virtio as a universal communication format
    • Linux's Code of Conduct Panel
    • Kernel Track Welcome
    • GCMA: Guaranteed Contiguous Memory Allocator
    • Building Stable Kernel Trees with Machine Learning
    • XDP Challenges & Future Work
    • XDP 1.5 Years In Production. Evolution and Lessons Learned.
    • Whats Happened Network Junior C Nov 14
    • TC SW Datapath: A Performance Analysis
    • Phylink and SFP: Going Beyond 1G Copper PHYs
    • Optimizing UDP for Content Delivery with GSO, Pacing and Zerocopy
    • Keynote: "This Talk Is Not About XDP: From Resource Limits to SKB Lists"
    • Using eBPF as an Abstraction for Switching
    • Combining kTLS and BPF for Introspection and Policy Enforcement
    • Bringing the Power of eBPF to Open vSwitch
    • BPF Host Network Resource Management
    • XDP Acceleration Using NIC Metadata, Continued
    • Networking Track Welcome
    • Scaling Linux Bridge Forwarding Database
    • Path to DPDK speeds for AF XDP
    • P4C-XDP: Programming the Linux Kernel Forwarding Plane Using P4
    • Linux SCTP is Catching Up and Going Above!
    • Leveraging Kernel Tables with XDP
    • Experiences Evaluating DC-TCP
    • ERSPAN Support for Linux
    • eBPF / XDP Based Firewall and Packet Filtering
    • Building Socket-aware BPF Programs
    • Tuesday party - CRAFTBeer Vancouver
    • Closing plenary & kernel panel
    • The hard work behind large physical allocations in the kernel
    • oomd: a userspace OOM killer
    • Task Migration at Scale Using CRIU
    • SCHED_DEADLINE desiderata and slightly crazy ideas
    • SoC Maintainer Group
    • A practical introduction to XDP
    • eBPF / XDP Based Firewall and Packet Filtering
    • Linux SCTP is Catching Up and Going Above!
    • Clang+Linux
    • Android and the kernel: herding billions of penguins, one version at a time
    • XDP Challenges & Future Work
    • Scaling Linux Bridge Forwarding Database
    • Who stole my CPU? Steal time mitigation at Digital Ocean
    • Untrusted File systems
    • Documenting Linux MM for fun and for ... fun
    • Exploring New Frontiers in Container Technology
    • Multiple Time Domains
    • P4C-XDP: Programming the Linux Kernel Forwarding Plane Using P4
    • Formal Methods for Kernel Hackers
    • Concurrency with tools/memory-model
    • Linux's Code of Conduct Panel
    • BPF Host Network Resource Management
    • Towards a Linux Kernel Maintainer Handbook
    • Bringing the Power of eBPF to Open vSwitch
    • Mind the gap - between real-time Linux and real-time theory
    • What could be done in the kernel to make strace happy
    • Elivepatch: Flexible Distributed Linux Kernel Live Patching
    • Migrating to Gitlab
    • Open Source GPU compute stack - Not dancing the CUDA dance
    • Optimizing UDP for Content Delivery with GSO, Pacing and Zerocopy
    • Leveraging Kernel Tables with XDP
    • Proactive Defense Against CPU Side Channel Attacks
    • When eBPF meets FUSE: Improving Performance of User File Systems
    • Using eBPF as an Abstraction for Switching
    • TC SW Datapath: A Performance Analysis
    • ZUFS - Zero Copy User-Mode FileSystem - One Year Later
    • Keynote: "This Talk Is Not About XDP: From Resource Limits to SKB Lists"
    • Virtio as a universal communication format
    • Combining kTLS and BPF for Introspection and Policy Enforcement
    • The end of time, 19 years to go
    • Recursive read deadlocks and Where to find them
    • Building Socket-aware BPF Programs
    • Path to DPDK speeds for AF XDP
    • Heterogeneous Memory Management
    • Kernel Track Welcome
    • XDP 1.5 Years In Production. Evolution and Lessons Learned.
    • WireGuard: Next-Generation Secure Kernel Network Tunnel
    • Improving Graphics Interactivity - It's All in the Timing
    • XDP Acceleration Using NIC Metadata, Continued
    • Zinc: Minimal Light-weight Kernel Cryptography API
    • Filename encoding and case-insensitive filesystems
    • Networking Track Welcome
    • Enhancing perf to export processor hazard information
    • XArray
    • An Introduction to RISC-V
    • Experiences Evaluating DC-TCP
    • Phylink and SFP: Going Beyond 1G Copper PHYs
    • Whats Happened Network Junior C Nov 14
    • Building Stable Kernel Trees with Machine Learning
    • ERSPAN Support for Linux
    • GCMA: Guaranteed Contiguous Memory Allocator
    • Managing Memory Bandwidth Antagonism at Scale
    • Containers MC
    • Testing and Fuzzing MC
    • Live Kernel Patching MC
    • RDMA MC
    • RISC-V MC
    • Thermal MC
    • Android MC
    • Device Tree MC (part 1)
    • Performance and Scalability MC
    • Power Management and Energy-awareness MC
    • BPF MC
    • Real Time MC
    • Device Tree MC (part 2)
    • Toolchain MC
    • Tuesday party - CRAFTBeer Vancouver
    • Tuesday evening party
    Blogs

  • Linux Kernel Conference Session Archive (LPC 2025 ~ 2022)
    Y Yunseong Kim

    LPC 2025

    Playlist

    • https://www.youtube.com/playlist?list=PLVsQ_xZBEyN3-ZbrEgTiCpm1-Sg_ihLVF

    Index

    • Evolving genpd’s - sync_state() support - Saravana Kannan, Ulf Hansson (Linaro)
    • Multiple system-wide low power-states - Kevin Hilman (BayLibre), Ulf Hansson (Linaro)
    • Generic voting mechanism to build on top PM QoS - Daniel Lezcano (Linaro)
    • Updating Energy Model from Thermal - Lukasz Luba
    • Thermal framework issues and limitations - Daniel Lezcano (Linaro)
    • Rex and its integration with Rust-for-Linux - Jinghao Jia, Ruowen Qin
    • Kernel TEE subsystem BoF - Jens Wiklander, Sumit Garg
    • ARM Laptop BoF - Stefan Schmidt, Vinod Koul
    • Agentic AI, confidential computing and attested TLS - Muhammad Usama Sardar (TU Dresden)
    • 32bit and-or noMMU Linux BoF - Multiple Speakers
    • Kernel Sanitizers Office Hours - Aleksandr N, Alexander P, Dmitry V, Kees C, Marco E
    • Syzbot BoF: Open Discussion - Aleksandr N, Alexander P, Dmitry V, Marco E, Taras M
    • Solving Zombie Cgroups - Simple Fix or Smart Solution? - Harry Yoo, Kamalesh Babulal
    • Towards Real-Time NVMe Monitoring (nvme-top) - Daniel Wagner (SUSE), Nilay Shroff (IBM)
    • Enabling AMD 2D Hardware Acceleration for Video API and Applications - Solomon Chiu
    • From Projects to Ecosystems: Lessons from the eBPF Foundation - Bill Mulligan (Isovalent)
    • “Is Upstream Really Enough?” — Practical Realities of Using eBPF in Long-Term Supporte... Kenta Tada
    • Python-BPF: Writing eBPF programs in pure Python - Pragyansh Chaturvedi, Mr Varun Mallya
    • Extending eBPF to GPU Device and Driver Contexts - Yusheng Zheng, Tong Yu
    • Fingeprinting GPU workloads with eBPF - Jiri Gogela (Trend Micro)
    • Lessons from scaling BPF to detect RDMA Device Drivers Bugs in real time - Prankur Gupta (Meta)
    • AI flame graphs with eBPF - Brendan Gregg (Intel), Ben Olson (Intel Corporation)
    • cache_ext: Customizing the Page Cache with eBPF - Tal Zussman (Columbia University)
    • Supply true signatures to vmlinux BTF - Yonghong Song
    • uprobe optimization and override - Jiri Olsa (Isovalent)
    • bpf tracing multi-link supporting - Menglong Dong (ChinaTelecom)
    • Advanced BPF profiling techniques: how to escape the curse of NMI and fetch ELF... Andrii Nakryiko
    • Hibernation Testing Challenges and Optimization Opportunities - Srinivas Pandruvada
    • Thermal binning support - Amit Kucheria
    • Exploring a real life RCU use case for Rust - Vitaly Wool
    • Tackling challenges with HID and related device driver support in Rust - Rahul Rameshbabu
    • Initialization in Rust with pin-init - Benno Lossin
    • External locking for internally synchronized data structures - Mr Andreas Hindborg (Samsung)
    • Rust language evolutions for better kernel developer experience - Xiangfei Ding
    • Overflowing with Fear: Detecting and Mitigating Implicit Panics in Rust - Alexandre Courbot (NVIDIA)
    • How do we make a Steamdeck scheduler work on large servers - David Dai (Meta), Ryan Newton (Meta)
    • The Current Status and Future Direction of the LAVD Scheduler - Dr Changwoo Min (Igalia)
    • Accelerating AI training fleets with sched_ext - Patrick Lu, Valentin Andrei, Pat Somaru
    • Taming the Chiplet: High Performance CCX scheduling via BPF - Aniket Gattani, Josh Don
    • Scheduler composability with arena-based data structures - Emil Tsalapatis (Meta Platforms)
    • scx_chaos: Pushing the sched_ext API to schedule badly - Jake Hillion (Meta)
    • Can ProxyExec and sched_ext get along? - John Stultz (Google)
    • From Fragmentation to Integration: Enhancing sched_ext BPF Scheduler Interoperabili... Daniel Hodges
    • sched_ext: current status and future plans - Andrea Righi (NVIDIA)
    • Secure Interrupt delivery: Lessons Learned from Alternate Injection Enablement - Melody Wang (AMD)
    • A Linux Bus for SVSM Services: Build New, Reuse VIRTIO, or Both? - Stefano Garzarella (Red Hat)
    • Discussion: TDISP, VM migration, and paravisors - John Starks (Microsoft)
    • Standardization of Attested TLS Protocols - Muhammad Usama Sardar (TU Dresden)
    • PCI device authentication & encryption - Alexey Kardashevskiy (AMD), Mathieu Poirier (Linaro)
    • Toward a standard device attestation token for device assignment - Mathieu Poirier, Thomas Fossati
    • Debugging RISC-V Kernel Crashes: KDUMP, vmcore, and Crash Utility Enhancements - Austin Kim
    • Solving Pre-silicon Kernel Upstream for RISC-V First Ever - Yuning Liang (DeepComputing)
    • RISC-V QoS: CBQRI, RQSC and resctrl - Drew Fustini (Tenstorrent)
    • Finer-grained kernel control flow integrity and challenges - Mr Deepak Gupta
    • Schism: Splitting RV32 from arch/riscv - - We Could Both... "Ruinland" ChuanTzu Tsai, ChunWei Shu
    • Declaring WARL on the ISA string - Radim Krčmář (Ventana Micro Systems)
    • Preparing RISC-V Linux for RVA23 - Charlie Jenkins (Rivos)
    • Introduction - ATISH PATRA, Björn Töpel, Palmer Dabbelt
    • seccomp listeners for nested containers - Aleksandr Mikhalitsyn (Canonical)
    • Files on Unmounted Mounts - Bhavik Sachdev
    • EROFS and containers - Xiang Gao (Alibaba Cloud)
    • Guarded Control Stack on arm64: Challenges in Enabling Shadow Stack Support... Igor Svilenkov Bozic
    • Optimizing Checkpoints with Built-in Memory Page Compression - Radostin Stoyanov
    • Clean-up on Aisle "fsconfig(2)" - Aleksa Sarai (SUSE LLC)
    • A fast path to benchmarking - Mark Brown
    • KernelCI kci-dev: Closing the developer feedback loop - Arisu Tachibana
    • The singularity is here for testing: genai advancements on kdevops - Luis Chamberlain (Samsung)
    • Automating Scope-Based Resource Cleanup with Coccinelle - Erick Muthama
    • syzbot ci: continuous patch series fuzzing - Aleksandr Nogikh (Google)
    • SYZOS: Practical KVM fuzzing - Alexander Potapenko (Google)
    • KFuzzTest: Targeted Fuzzing of Internal Kernel Functions - Ethan Graham (ETH Zurich)
    • Kselftests augmented: running kernelspace tests from userspace - Ricardo Cañuelo (Igalia)
    • UAPI testing with KUnit - Thomas Weißschuh (Linutronix)
    • BASIL: Traceability as Code - Luigi Pellecchia
    • Exploring possibilities for integrating StrictDoc with ELISA's requirements temp... Tobias Deiminger
    • KUnit Testing Insufficiencies - Matthew Whitehead (The Boeing Company)
    • Defining and maintaining requirements in the Linux... Chuck Wolber, Gabriele Paoloni, Kate Stewart
    • Applying Program Verification to Linux Kernel Code: Challenges, Practices, and... Keisuke Nishimura
    • NVIDIA Approach for Achieving ASIL B Qualified Linux: minimizing expectations from up... Igor Stoppa
    • Aspects of Dependable Linux Systems - Kate Stewart, Philipp Ahmann
    • Page-level and Fleet-wide Data Access Monitoring for Meta - SeongJae Park
    • NVIDIA's Approach for Achieving ASIL B Qualified Linux - Mr Bryan Huntsman (Senior Director, NVIDIA)
    • TPMs and the Linux Kernel: unlocking a better path to hardware security - Ignat Korchagin
    • SFrame for Arm64 Reliable Stacktrace - Dylan Hatch, Weinan Liu (Google)
    • Userspace Assisted Scheduling via Sc... John Stultz, Mr Qais Yousef, Steven Rostedt, Vincent Guittot
    • More Effective Approach to Detecting Potential Deadlocks, DEPT(DEPendency Track... Mr Byungchul Park
    • One year into the new KernelCI - Mr Gustavo Padovan (Collabora)
    • TAB Q&A -Dan W, Dave H, Greg K, Jonathan C, Kees C, Miguel O, Sasha L, Shuah K, Steven R, Theodore T
    • Firmware ABI stability - Marek Vasut
    • Fixing Clock Tree Propagation in the Common Clk Framework - Mr Brian Masney (Red Hat)
    • Improving stability for TCPM using boards that are not self-powered - Sebastian Reichel (Collabora)
    • How to extract a bare metal flavor of code out of Zephyr to use in RTOS? - Khasim Syed Mohammed
    • Boot time optimization for embedded devices - Saravana Kannan
    • Reducing Android Boot Times: Evaluating Proactive File Prefetching - Akilesh Kailash
    • Guider: Lightweight Real-Time Performance & Fault Monitoring Framework for Embedded... Mr Peace Lee
    • Improving page_owner for profiling and monitoring memory usage per all... Mauricio Faria de Oliveira
    • Scaling Kernel Production Monitoring @ Meta - Vlad Poenaru (Meta)
    • Module Error Injection with eBPF - Daniel Gomez
    • Actionable Data Access Monitoring Output Data and Format - SeongJae Park
    • Reading memcg stats more efficiently - JP Kobryn (Meta)
    • From Tool To ToolBox: How bpftrace is evolving to become more composa... Adin Scannell & Jordan Rome
    • Proactive and crash-time data collection on Steam Deck - Guilherme G. Piccoli (Igalia)
    • Methodology and Practice in Observing Kernel Networking - Jason Xing (Tencent)
    • Challenges with Kernels built with LTO - Song Liu (Meta), Yonghong Song
    • GCC BPF and Linux kernel - Jose E. Marchesi (GNU Project, Oracle Inc.)
    • Enforcing PI locks by default - Mr Qais Yousef (Google)
    • Adding C library wrappers for all Linux syscalls - Mr Carlos O'Donell (Red Hat)
    • Adaptive futexes: spin if the owner is still running on another CPU - Steven Rostedt
    • Distributed ThinLTO Build Support in Kbuild - Rong Xu (Google)
    • Exciting new compiler flags for kernel security - Florent Revest (Google)
    • Security Features status update - Justin Stitt (Google), Kees Cook (Google)
    • Improving Build Time SBoMs - Joshua Watt (Garmin)
    • OpenWrt (One) build system: lessons in all the compliance and how to broadly... Denver Gingerich
    • One Config to Rule Them All: From systemd to Reliable Embedded Upgrades - Behan Webster (Linaro)
    • Enabling UEFI Secure Boot Across Modern Build Systems - Frank Vasquez (OpenEmbedded)
    • Debian Official Debug Kernel for All? - Yunseong Kim, Seonghee Jin
    • Build System Analysis for Kernel Development and Customization - Mr Alejandro Hernandez Samaniego
    • News from PREEMPT_RT - Sebastian Siewior
    • Revocable: a mechanism for preventing "classic" use-after-free bugs - Tzung-Bi Shih
    • Re-think of richACLs in AI/LLM era - Coly Li (fnnas.com)
    • drm and cgroup memory management - two great tastes - David Airlie
    • Highmem deprecation planning - Arnd Bergmann (Linaro)
    • Moving kernel swapping infrastructure to Rust - Mr Vitaly Wool
    • Implement simple local DNS server with BPF - Raman Shukhau
    • Challenges with implementing in-kernel FQDN policies using eBPF - Hemanth Malla (Microsoft)
    • Kernel-Resident Regex and Jails: DFA-powered eBPF filtering and certificate... Justin Ngai (Meta)
    • Tracking Files across the operating system using eBPF - Carl El Khoury
    • BpfJailer: eBPF based Mandatory Access Control - Liam Wisehart (Meta)
    • Discussion: What's next for BPF Signing - KP Singh
    • Introduction to eBPF Load-Acquire and Store-Release Instructions - Peilin Ye (Google LLC)
    • Fuzzing the Verifier with a Test Oracle - Paul Chaignon (Isovalent)
    • ePass: A Framework for Enhancing Flexibility and Runtime Safety of eBPF Programs - Yiming Xiang
    • Loops handling by BPF verifier and what should we do about it? - Eduard Zingerman
    • Making Sense of State Pruning - Mahé Tardy (Isovalent), Paul Chaignon (Isovalent)
    • BPF Verifier Visualizer - Ihor Solodrai (Meta Platforms, Inc.), Jordan Rome
    • Famfs Update: Status, DAX Challenges & Use Cases - John Groves (Micron)
    • Protected DMAbufs and its dynamic memory assignment woes - Sumit Garg
    • DAMON-based Pages Migration for {C,G,X}PU [un]attached NUMA nodes - SeongJae Park
    • Parallel Paths to High-Bandwidth Memory for ML/AI: Specific Purpose Me... Mr Rajneesh Bhardwaj (AMD)
    • Kernel CXL Cache (safe) support - Alejandro Lucero (AMD)
    • Unifying sources of page hotness information - Bharata Bhasker Rao (AMD)
    • CXL HDM-DB support for Linux - Davidlohr Bueso (Samsung Semiconductor)
    • Introduction and Kickoff - Adam Manzanares (Samsung Electronics), Dan Williams (Intel)
    • Memory descriptors for DEVICE_PRIVATE memory - Alistair Popple
    • Folio Restructuring for Huge Pages in guest_memfd - Ackerley Tng
    • Decoupling Large Folios from Transparent Huge Pages - Pankaj Raghav (Samsung)
    • Taming Zombie Cgroups: Should Reparenting Be Simple or Smart? - Harry Yoo & Kamalesh Babulal
    • type-based slab allocation: kmalloc_obj family - Kees Cook (Google)
    • Per-cgroup Swap Device Control - Chris Li (Google), YoungJun Park (LG Electronics)
    • Deprecating zone_reclaim_mode - Joshua Hahn (Meta)
    • The life cycle of the mm_struct - Liam Howlett (Oracle)
    • CMA allocations fail due to pinned MOVABLE pages - Juan Yescas (Google), Kalesh Singh (Google)
    • Mempolicy is dead, long live memory policy! - Gregory Price (Meta)
    • Memory Allocation Profiling upcoming features - Sourav Panda (Google) & Suren Baghdasaryan
    • Wrap up - Vincent Guittot (Linaro)
    • Paravirt Scheduling: Framework for better physical CPU utilizat... Ilya Leoshkevich, Shrikanth Hegde
    • CPU Isolation and IPI interference - Valentin Schneider (Red Hat)
    • RV and real-time properties - Gabriele Monaco (Red Hat Inc.)
    • Runtime verification monitors for real-time - Nam Cao (Linutronix)
    • Push based load-balancing for fair tasks - Prateek Nayak (AMD Inc.)
    • Enabling Push call back in Fair class - Vincent Guittot (Linaro)
    • Rethinking Android's Priority Inheritance - Carlos Llamas
    • Cache Aware Scheduling - Mr Tim Chen (Intel), Mr Yu Chen (Intel)
    • Introduction to Scheduler and RT micro-conference - Vincent Guittot (Linaro)
    • KernelSBOM: Reconstructing Linux Kernel Builds into Trusted SPDX Bills of Materi... Maximilian Huber
    • Automating Linux Kernel Documentation for Safety-Criti... Grant S, Justin S, Morgan R, Toby H, Tom I
    • Adding Testable Code Specifications in the Linux Ke... Chuck Wolber, Gabriele Paoloni & Kate Stewart
    • Path Safety in the Trenches - Aleksa Sarai (SUSE LLC)
    • RV and the deadline scheduler: how to verify your subsystem at runti... Gabriele Monaco & Juri Lelli
    • Tyr: a new Rust GPU driver - Daniel Almeida (Collabora)
    • Rust for Linux - Miguel Ojeda
    • Multikernel Architecture: Kernel-to-Kernel Isolation and Resource Management - Cong Wang
    • Beyond the Demo Kernel: Mapping BSPs to Mainline - Alessandro Carminati
    • Rethinking Linux tools with Compact Debuginfo Formats - Stephen Brennan (Oracle)
    • Perf tools updates and beyond - Namhyung Kim (Google)
    • Meminspect - Kernel memory selection and inspection mechanism - Eugen Hristev (Linaro)
    • Linux Tracing updates - Mr Masami Hiramatsu (Google)
    • A (Simple) Hazard Pointer Update - Boqun Feng, Paul McKenney (Facebook)
    • Demystifying Linux NPU Subsystem: From Vision to LLM at Edge - Mr Jagan Teki
    • Power Management and USB... Mr DARRION RAMOS, Ms VICTORIA SIVER, Dr Ken Yihang Bai, Dr Tuba Yavuz
    • Android Boot: Next Steps - Mr Dmitrii Merkurev (Google)
    • Bootloader-Based S2D(suspend to disk) Mechanism on mobile - Tengfei Fan
    • Ferrochrome: A Linux VM on Android host via AVF - Jeongik Cha (Google)
    • Ramdump for Trusted VMs: Efficient Crash Debugging Without Reboot Device - Cong Zhang
    • BPF Based Telemetry, Metrics, and Accounting on Android - T.J. Mercier
    • AOSP on taped-out RISC-V SoC without RVA22/23, I came back to finish... "Ruinland" ChuanTzu Tsai
    • Pixel 6 support upstream and on android-mainline - William McVicker
    • How do we make KUnit work for us? - Tiffany Yang (Google)
    • Cooperation between CPU and system level cache by using MPAM - Yiwei Huang
    • Android Ashmem to Memfd - Isaac Manjarres (Google)
    • The Challenge of Loading 4kB-Aligned ELFs on 16kB Systems - Juan Yescas, Kalesh Singh
    • HW/SW design recommendations for 16kb devices - Juan Yescas, Kalesh Singh (Google)
    • Kexec Handover Performance Improvements - Jason Miu
    • KSTATE as [de]serializer of kernel's state - Andrey Ryabinin
    • Managing serialization versions for LUO objects - Pratyush Yadav
    • Memory preservation using LUO - Pratyush Yadav
    • Supporting Live Update in VFIO - David Matlack (Google), Josh Hilke (KVM Team @ Google)
    • IDPF live-update support - Brian Vazquez
    • Supporting Hypervisor Kexec with Modern Devices - Adithya Jayachandran, Saeed Mahameed
    • Blackout Reduction - Pasha Tatashin
    • PCSC: Caching PCI Config Space Accesses for faster Live Updates - Evangelos Petrongonas
    • Live Update Orchestrator - Pasha Tatashin
    • IOMMU State Preservation for Kernel Liveupdate - Samiullah Khawaja
    • PCI liveupdate subsystem and PCI device - Chris Li (Google)
    • Address Space Isolation is ready - Brendan Jackman (Google)
    • Leveraging New General-Purpose Registers in the Kernel - Chang Bae (Intel Corporation)
    • The new kernel CPUID API - Ahmed S. Darwish (Linutronix GmbH)
    • Dynamic mitigations - David Kaplan (AMD)
    • Nova GPU Workshop: Nova: status update + 2026 plans - Alexandre Courbot (NVIDIA)
    • Nova GPU Workshop: GPU Firmware: status and 2026 plans - John Hubbard (NVIDIA)
    • Nova GPU Workshop: vGPU + VFIO: status and 2026 plans - ZHI WANG
    • Nova GPU Workshop: User mode command submission for GPUs - John Hubbard (NVIDIA)
    • Ultraviolet: A Code Integrity Model for Minimal Container Hosts - James Morris
    • The Future of Platform Security Measurement in Linux - Maciej Pijanowski (3mdeb)
    • Reconcilable Differences: Booting Linux on IBM PowerVM LPARs - George Wilson (IBM)
    • ReLaunch Revisited: A Refresher on TrenchBoot Late Launch - Daniel Kiper, Daniel Smith
    • Design Space and Challenges in Design of Attested TLS Protocols - Muhammad Usama Sardar (TU Dresden)
    • Oak stage0: a minimal firmware for (confidential) virtual machines - Mr Andri Saar, Kevin Hui
    • Who Authenticates Linux? Rethinking PAM & NSS in the Age of Cloud Identity - Mr David Mulder (SUSE)
    • Android Boot, DRTM, UKIs - Dmitrii Merkurev (Google), Leif Lindholm (Qualcomm), Ram Muthiah (Google)
    • Welcome to the Gaming MC! - André Almeida (Igalia), David Vernet (Meta)
    • Resource management on embedded gaming devices - Mr Stefan Bossbaly (Meta)
    • Level Up Your Game: OS Kernel and Game Interactions revealed with Perfetto - Mr Ramesh Peri (Meta)
    • A new API for robust futex list - André Almeida (Igalia)
    • Steps Towards a Gaming-Optimized Scheduler - Dr Changwoo Min (Igalia)
    • Proactive and crash-time data collection on Steam Deck - Guilherme G. Piccoli (Igalia)
    • Confidential Devices (TEE I/O): A series of modest proposals - Dan Williams (Intel)
    • iommu page table consolidation and iommufd - Mr Jason Gunthorpe (NVIDIA Networking)
    • vfio, iommufd: Enabling user space drivers to vend more granular access to client pro... Alex Mastro
    • VFIO: Very Frightening I/O? Taming Wild Guests and their PCIe Config-Space Abuse - Hubertus Franke
    • A Hyper-V Based pvIOMMU Built on Generic I/O Page Table - Yu Zhang
    • Plumbing SDXI into Linux: From DMA Engine to User‑Space Offloads - Wei Huang
    • Turning PCIe Hints into Cache Hits: Enabling Smart Data Cache Injection in Linux - Wei Huang
    • PCI Pwrctrl woes - Manivannan Sadhasivam
    • Status of DTS validation in the Linux kernel (and how to improve it) - Mr Krzysztof Kozlowski
    • Optimizing dependency tracking through DTC changes - Saravana Kannan
    • "Exclusive" resources that are not exclusive - the case of shared GPIOs in... Mr Bartosz Golaszewski
    • Power Sequencing for Enumerable Busses - What's Still Missing From the Device Tree... Chen-Yu Tsai
    • DeviceTrees - MIPI SoundWire® Device Class for Audio (SDCA) and classic ACPI-DT... Srini Kandagatla
    • DT formatter - a maintainer's and contributor's elusive dream? - Konrad Dybcio (Qualcomm)
    • Device Tree Metadata: How Bootloaders Pick DTBs and Apply Overlays - Chen-Yu Tsai (Google, LLC)
    • Networking track kick-off - Jakub Kicinski (Facebook)
    • SUPERp: Scale UP EtherRnet Protocol - Tom Herbert (XDPnet)
    • Experiments in Using AI to Enhance the Linux Spanning Tree Protocol (STP) - Stephen Hemminger
    • Locality-Aware, Self-Adjusting Data Structures: A Case Study in Linux Firewalls - Jonas Köppeler
    • ​​Congestion Signaling (CSIG) for Linux TCP Data Center Networking - Sagarika Sharma
    • Running PTP at scale - Vadim Fedorenko
    • Packet Metadata - Where Are Thee? - Jakub Sitnicki, Mr Willem Ferguson, Mr Tiago Lam
    • The case for zero-copy in containers: Accelerating... Anton Protopopov, Daniel Borkmann, David Wei
    • Kernel-Native Packet Processing on AMD GPUs: XDP Offload without Userspace Runtimes - Taehee Yoo
    • Linux Networking with MANA: RX Path Optimization and Netsh... Mr Dipayan Roy, Sri Satya Vennela Erni
    • ML applications in Linux kernel - Viacheslav Dubeyko (IBM)
    • Linux CVE workgroup - Damiano Melotti (Google)
    • KDLP: Expanding the Linux Kernel Talent Pipeline - Denis Aleksandrov, Mr Rado Vrbovksy
    • Microconference for resctrl - Fenghua Yu (NVIDIA)
    • Rust for Linux Office Hours - Alice R, Mr Andreas H, Benno L, Boqun F, Danilo K, Miguel O
    • Installing and Using the Linux-Kernel Memory Model (LKMM) - Boqun Feng
    • COCONUT-SVSM BoF - Joerg Roedel (AMD)
    • Extending Flamegraphs for Multi-Dimensional Performance Analysis - Gavin Guo
    • Kernel documentation: update and future directions - Jonathan Corbet
    • Tooling and Sharing Traceability Discussion - Luigi Pellecchia, Matthew Whitehead, Tobias Deiminger
    • Safe Systems with Linux MC Wrap up and next steps - Kate Stewart, Philipp Ahmann
    • Hardware in the loop pipelines for testing - for everyone! - Vipul Gupta
    • Improving fw_devlink dependency tracking - Saravana Kannan
    • To online or not to online CXL memory - Hannes Reinecke & Gregory Price

    LPC 2024

    Playlist

    • https://www.youtube.com/playlist?list=PLVsQ_xZBEyN0XmmLaDFQEnuEu5HKSobpy

    Index

    • ATS vs IOMMU-regroup: A journey to optimize GDRDMA in cloud scenario - Liang Yan
    • IOMMUFD and Generic Page Table - Jason Gunthorpe (NVIDIA Networking)
    • PCIe Bandwidth Controller - Ilpo Järvinen (Intel)
    • The Search for an AOSP Developer Community - Mr SIMMONDS, Chris
    • Future of Memory Protection Keys - HANSEN, Dave
    • State of CPU side-channel vulnerabilities and mitigations - GUPTA, Pawan
    • IPI deferral - Valentin Schneider
    • Demystifying Proxy Execution - John Stultz
    • Walk the line - how RT-safe application design can be supported - Jan Kiszka
    • On going development in rteval to measure real-time latency - John Kacur
    • QPW: How to improve latency and CPU Isolation without cost - Leonardo Bras Soares Passos
    • Using DL servers for FIFO tasks starvation avoidance - Thadeu Lima de Souza Cascardo
    • Current overview of PREEMPT_RT - Sebastian Siewior
    • Did you behave in real-time? A probabilistic evaluation with trace data - Benno Bielmeier
    • Guest private memory for software-based hypervisors - TABBA, Fuad
    • guest_memfd roadmap - introduction - BONZINI, Paolo
    • The UAPI Kernel API Wishlist - POETTERING, Lennart
    • Revisiting How Kernels Invoke initrds - POETTERING, Lennart
    • Kernel func tracing in the face of compiler optimization SONG, Yonghong - MAGUIRE, Alan
    • Improving bpftrace reliability - XU, Daniel
    • Lessons from the Buzz - LOPEZ JAIMEZ, Juan Jose
    • What is missing to use fexecve (fd-based execve) to launchservices?- JĘDRZEJEWSKI-SZMEK, Zbigniew
    • Making Sense of Tristate Numbers (tnum) - YU, Shung-Hsi
    • 1G page support for guest_memfd - ANNAPURVE, Vishal
    • Kubernetes Environment and Checkpoint Restore - Viktoria Spisakova
    • Generating BPF infrared decoders using finite automations - YOUNG, Sean
    • Modernizing bpftrace with libbpf - MALIK, Viktor
    • Lazy Abstraction Refinement with Proof for an Enhanced Verifier - SUN, Hao
    • The State of eBPF Fuzzing - CHAIGNON, Paul
    • fw_devlink: Device dependency tracking: Status, TODOs and how toleverage it - KANNAN, Saravana
    • More Bang for Your Bug! VELA NAVA, Eduardo - MEYER, Space
    • Pagetable-based Virtual Machine (PVM) as a PV flavor for KVM - JIANGSHAN, Lai HOU, Wenlong
    • Improving eBPF Complexity with a Hardware-backed IsolationEnvironment - WANG, Zhe
    • Mediated passthrough vPMU for KVM - ZHANG, Mingwei
    • PID FDs: where we were, where we are and were we would like to go - Mr BOCCASSI, Luca
    • Closing the script execution control gap - SALAÜN, Mickaël
    • user-space only uprobes - could (a BPF-based) vDSO help? - MAGUIRE, Alan
    • Agni: Fast Formal Verification of the Verifier's Range Analysis - CHAIGNON, Paul
    • Enhancing Trust: The Evolution of Trusted Keys in the Linux Kernel - N, Parthiban
    • Addressing Duplicated Symbol Names in kallsyms: Introducingkas_alias for S...- CARMINATI, Alessandro
    • BASIL The FuSa Spice to spot gaps in kernel testing and more - PELLECCHIA, Luigi
    • kfuncs for BPF LSM use cases LIU, SongSINGH, KP - BOBROWSKI, Matt
    • Meet the new KernelCI - ZICKUS, Don, PADOVAN, Gustavo
    • Userspace trip points - LEZCANO, Daniel
    • Enhancements and adjustments of the thermal control subsystem - WYSOCKI, Rafael
    • An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem
    • Rust for Linux - OJEDA, Miguel
    • Reduce synchronize_rcu() latency - UPADHYAY Neeraj, MCKENNEY Paul, REZKI Uladzislau
    • CXL MC: Error handling - Status and Outlook - RICHTER, Robert, THANNEERU, Srinivasulu, BOWMAN, Terry
    • Zoned storage support for QEMU - LI, Jia
    • How many CPUs do I have? ...and other perplexing questionscontainers must answer - ANDERSEN, Tycho
    • CXL Uconf Kick Off - Welc... - MANZANARES, Adam, WILLIAMS, Dan, BUESO, Davidlohr, CAMERON, Jonathan
    • Limiting Memory Use of Userspace Per-CPU Data Structures inContainers - DESNOYERS, Mathieu
    • Post-copy live migration with guest_memfd - HOUGHTON, James
    • Power / Thermal / Performance interfaces - LEZCANO, Daniel
    • Graceful Under Pressure: Prioritizing Shutdown to Protect Your Datain Embedded... - REMPEL, Oleksij
    • regressions: our workflows are the biggest enemy - LEEMHUIS, Thorsten
    • CXL benchmarking - MANZANARES Adam, DUBEYKO Viacheslav
    • libcxlmi: CXL Management Interface library - BUESO, Davidlohr
    • Dynamic Capacity Devices (status, discussion, and... - WEINY, Ira, CAMERON, Jonathan, SINGH, Navneet
    • Bringing the PuzzleFS pieces together - MICULAS, Ariel
    • Isolated user namespaces & cgroupfs - MIKHALITSYN, Aleksandr
    • Immutable process tags for container tracking - GRABER, Stéphane
    • Wattson: trace based power/energy estimation - WU, Samuel, KANNAN, Saravana
    • Introducing the power sequencing subsystem - GOLASZEWSKI, Bartosz
    • Journey of a C kernel engineer starting a Rust driver project - KRUMMRICH, Danilo
    • CXL Shared Memory: progress, challenges and usability - GROVES, John
    • Type2 support: CXL.mem status and future CXL.cache - LUCERO, Alejandro
    • Unification of RAS feature control - Enhancing - EDAC JOSE Shiju, SALVE Vandana, CAMERON Jonathan
    • Deprecating Cgroup v1 - BABULAL, Kamalesh
    • How is kernel getting along with many cgroups - KOUTNÝ, Michal
    • seccomp filtering for struct pointers - SARAI, Aleksa
    • Unsolved CRIU problems - TIKHOMIROV, Pavel
    • High-availability Seamless Redundancy (HSR) - introduction, currentLinux driver...- MAJEWSKI, Łukasz
    • Energy Efficient Ethernet in the Linux Kernel: Taming the Wild West ofImplement... - REMPEL, Oleksij
    • Hazard pointers in Linux kernel - FENG Boqun, UPADHYAY Neeraj, MCKENNEY Paul
    • A little GitLab won't hurt you - KOIKE Helen, KONDRASHOV Nikolai, DA APARECIDA Tales
    • Maintaining A Stable Real-time Kernel Patchset - SALISBURY, Joseph
    • Dealing with GPU resets - ALMEIDA, André
    • A case for using para-virtualized scheduling information withsched_ext schedulers - CHHAYA-SHAILESH
    • BASIL The FuSa Spice to spot gaps in kernel testing and more - PELLECCHIA, Luigi
    • Enhancing spatial safety: Fixing thousands of-Wflex-array-member-not-at-end warnings -SILVA, Gustavo
    • Efficient memory allocation between different subsystems
    • Optimizing Google Search and beyond with pluggable scheduling - RHODEN Barret, DON Josh
    • Representing the front-facing ports of Ethernet interfaces - CHEVALLIER, Maxime
    • Userspace memory persistence over kexec - YADAV, Pratyush
    • Auto-detecting sleeping lock calls in non-preemptible context viastatic analysis - GLOZAR, Tomas
    • Program verification for the Linux kernel: Potential costs and benefits - LAWALL, Julia
    • Supporting generic restricted dmabuf heap - GUPTA, Prakash
    • Making MIPI DSI power states fit Linux kernel - BARYSHKOV, Dmitry
    • Shipping sched-ext: Linux distributions roundtable - GHERDOVICH, Giovanni
    • Deploying and managing sched_ext schedulers in CachyOS - JUNG, Peter, GÓRSKI, Piotr
    • Supporting suspend-to-idle for legacy platforms - HANSSON, Ulf
    • What makes the panda sad in the Linux network stack today? - SITNICKI, Jakub
    • Per Netns RTNL - IWASHIMA, Kuniyuki
    • ACPI fast handover for kexec live-update - ZHENG, Fam
    • Data Placement at Scale: Landscape, Trade-Offs, and Direction - GONZALEZ, Javier
    • "Hey, psst, try this." The underground culture around custom CPU schedulers.
    • Hotplug DRM pipeline components on non-discoverable videobusses - CERESOLI, Luca
    • Using sched_ext to improve frame rates on the SteamDeck - MIN, Changwoo
    • Making Linux Fly: Towards a Certified Linux Kernel - ZHANG Wentao, REN Tingxu, JIA Jinghao, MARIN...
    • Report from the Complex Cameras Summit
    • Optimizing suspend/resume - KANNAN, Saravana
    • Challenges in scheduling virtual CPUs - HUSCHLE, Tobias
    • Runtime ownership transfer of platform devices - VADDAGIRI, Srivatsa
    • PCIe Portdrv - finding a path forwards? - CAMERON, Jonathan
    • Producing a complete Linux system with a single command (and configuration f... - KANAVIN, Alexander
    • Turtles all the way down - what about APMs? - HOLZMAYR, Josef
    • no more bootloader: please use the kernel instead - LEWANDOWSKA, Marta
    • State of the Bloat - TAHT Dave, BORSIK Frantisek (Frank)
    • Automatically reasoning about the cache usage of network stacks - IYER, Rishabh
    • SMC-ERM: A fast remote memory communication method based onSMC socket - LI, Dust
    • Reducing the Overhead of Network Virtualization: Software andHardware Solutions - ODAKI, Akihiko
    • IO Page Fault for all - GRANADOS, Joel
    • Live update: persisting IOMMU domains across kexec - GOWANS, James
    • Building for Safety in a Security and Feature Focused World - WOLBER, Chuck
    • AOSP: A case study in writing a custom build system - SIMMONDS, Chris
    • Secure Launch - DRTM solution on Arm platforms - SMITH Daniel,Mr PHILIPSON Ross
    • OF != UEFI - Mr WILSON George, JAIN Nayna
    • Using U-boot as a UEFI payload - GARRETT, Matthew
    • Common git repo for hosting Boot-firmware - MENON Nishanth, RAGHAVENDRA Vignesh
    • Orientation
    • Experiments with non-temporal writes and application architectures - DAMATO, Joe
    • PCI Endpoint Open Items Discussion - SADHASIVAM, Manivannan
    • PPC64 - Bridging the pSeries and PowerNV islands for VFIO andIOMMUFD - BHAT, Shivaprasad G
    • The role of C libraries in a modern build system - HERNANDEZ SAMANIEGO, Alejandro
    • Build systems, traceability and compliance - VANDECAPPELLE, Arnout
    • Measured Boot, Secure Attestation & co, with systemd - POETTERING, Lennart
    • Leveraging and managing SBAT revocation mechanism ondistribution level - BURMASHEV, Aleksandr
    • Accelerating Linux Kernel Boot-Up for Large Multi-Core Systems - SINGH SENGAR Saurabh, BHAT Srivatsa
    • Challenges in developing trustworthy Linux-based systems in anopen-source way - KRÓL, Piotr
    • WireGuard & GRO? - BORKMANN, Daniel
    • Netdev CI: what is being validated, and what Network subsystemscan do - BAERTS, Matthieu
    • Long-Term AOSP Maintainership - CONSTANTINESCU Serban, WEISS Luca, YAGHMOUR Karim
    • Android Kernel Support for Device Longevity - KJOS, Todd
    • BTF linking and deduplication in the Linux kernel using the toolchain - ALCOCK, Nick
    • BPF support in the GNU Toolchain - MIRANDA Cupertino, FAUST David
    • Optimizing the Linux kernel with AutoFDO including ThinLTO andPropeller - SHEN Han, Mr XU Rong
    • BOLT - Binary Optimizer for Linux Kernel - PANCHENKO, Maksim
    • Zoned Storage MC Intro - LE MOAL Damien, HOLMBERG Hans, THUMSHIRN Johannes
    • Giving Rust a chance for in-kernel codecs - ALMEIDA, Daniel
    • Paravirt-Scheduling: Limit CPU resources using dynamic capacity based on the st...- HEGDE, Shrikanth
    • Remote Build Execution for Kernel Developers - BRAZDIL, David
    • Tooling for semantic probing based on BPF and kernel tracing - VAN HEES, Kris
    • Flexible scheme of space management in ZNS SSD and/or SMR HDDstorage pool for ma... - BANELLI, Bruno
    • Zoned XFS - HOLMBERG, Hans
    • Atomics and memory model for Rust code in kernel - FENG, Boqun
    • Introduction to Rust: Quality of Life Beyond Memory Safety - LOSSIN, Benno
    • There's a blackhole in the scheduler - managing system's responsetime - Mr YOUSEF, Qais
    • Enhancing the PSI framework in Linux Kernel for predictive andaccurate workload... - KUMAR, Pintu
    • The wakeup path is not enough anymore for EAS - GUITTOT, Vincent
    • Priority Inheritance for CFS Bandwidth Control - WANG, Xi
    • Android Generic Boot Loader - Mr MERKUREV Dmitrii, Mr MUTHIAH Ram
    • First-party kernel.org build environments - TUCKER, Guillaume
    • Libabigail: ABI Analysis using BTF, CTF and DWARF - SEKETELI, Dodji
    • Security Features status update - COOK Kees, ZHAO Qing, WENDLING Bill
    • Zoned Storage BOFs - HOLMBERG, Hans - THUMSHIRN, Johannes
    • SSDFS: ZNS/FDP ready LFS file system saving your space anddecreasing TCO cost - DUBEYKO, Viacheslav
    • hrtimer Rust Abstractions - Mr HINDBORG, Andreas
    • Coccinelle for Rust LAWALL, Julia - ROY, Tathagata
    • QoS Hinting APIs: If we had them, what would they actually do?! - STULTZ, John
    • Improve scheduler debuggability - Mr YOUSEF, Qais
    • Marking Packets With Rich Metadata FABRE, Arthur - SITNICKI, Jakub
    • TAO: THP Allocator Optimizations - ZHAO Yu
    • mTHP swap-out and swap-in - SONG Barry, Mr HAN Chuanhua, Mr ZHENG Tangquan
    • Ongoing Challenges of Large Page Sizes - YESCAS Juan, SINGH Kalesh
    • Madvise lazy free - VAN RIEL, Rik
    • Poison & remedy of vmas instead of guards - HOWLETT Liam, STOAKES Lorenzo
    • DAMON: Long-term Plans for Kernel That {Just Works,Extensible} - PARK, SeongJae
    • Memory Allocation Profiling deployment results and future improvements - BAGHDASARYAN, Suren
    • Fast, Flexible, and Practical Kernel Extensions - DWIVEDI, Kumar Kartikeya
    • Introduce LUF(Lazy Unmap Flush) mechanism - PARK, Byungchul
    • Mitigating Spectre-PHT using Speculation Barriers in Linux eBPF - GERHORST Luis
    • Flying the nest - a BPF port of Doom - KISS Arpad
    • Technical Advisory Board AMA
    • Crafting a Linux kernel scheduler that runs in user-space using Rust - RIGHI, Andrea
    • Firmware-Assisted Dump, a kdump alternative to kernel dumpcapturing mechanism - BATHINI Hari
    • Fanotify - Linux filesystem notification subsystem - KARA, Jan
    • Multi-Gen LRU updates - RASMUSSEN Axel, ANBALAGANE Guru, XU Wei, XIE Yuanchu
    • Towards Better Memory Allocation for Device Drivers - TESAŘÍK, Petr
    • Product practices of large fo...- SONG Barry, Mr HAN Chuanhua, Mr LIU Hailong, SINGH Kalesh, ZHAO Yu
    • ublk based zero copy I/O - use case in Android - KAILASH, Akilesh
    • Waste-Free Per-CPU Userspace Memory Allocation - DESNOYERS, Mathieu
    • eBPF-specialized Kernel for I/O Intensive Applications - DWIVEDI, Kumar Kartikeya
    • pwru - Linux kernel and BPF-based networking debugger LIANG, Gray - PUMPUTIS, Martynas
    • BPF Instruction-Level Memory Model Progress - MCKENNEY Paul, MOHAN Puranjay
    • Multi-sized THP performance benchmarks and analysis onARM64 - SINGLA Olivier, SHI Yang
    • Unfolding the mystery of automotive audio applications for “not” usingZephyr and... - SYED MOHAMMED
    • mTHP and swap allocator - LI Chris, SONG Kairui
    • Transitioning get_user_pages (GUP) to folio based mapping - KUMAR, Kundan
    • Bringup devices with 16kb support - YESCAS Juan, Mr SINGH Kalesh
    • memcg developments for Android - MERCIER, T.J
    • Going Beyond Confidential Attestation with Trustee - PORTER Chris, CARVALHO Claudio, BUONO Daniele..
    • KTAP General Tooling "KTAP Swiss-Army Knife" - MOAR, Rae
    • Trusted I/O: Architectures and Implementations for Confidential Computing -KARDASHEVSKIY Alexey...
    • Attested TLS and Formalization - SARDAR, Muhammad Usama
    • Intel TD Partitioning and vTPM on COCONUT-SVSM - DONG Chuanxiao, CHEN Jason, Mr YAO Jiewen, FANG...
    • Improving kernel design documentation and involving experts - PAOLONI, Gabriele
    • Enabling tooling independent exchange of Requirements and other SW Engineering... - PAPPLER, Nicole
    • Verifying the Conformance of a VirtIO Driver to the VirtIO Specification - VARA LARSEN, Matias
    • Aspects of Dependable Linux Systems - STEWART Kate, AHMANN Philipp
    • Crafting a Linux kernel scheduler that runs in user-space using - Rust RIGHI, Andrea
    • A case for a generic Linux driver for connecting MCUs to MPUs - PATTON, Schuyler
    • Updates on RISC-V Confidential VM Extension (CoVE) and CoVE-IO - SAHITA, RAVI
    • Arm CCA Planes and Interplane Communication Interface Proposal - MILLER, Derek
    • Throwing Cinderblocks at Safety Engineering - WOLBER, Chuck
    • Source-based code coverage of Li..- ZHANG Wentao, REN Tingxu, JIA Jinghao, MARINOV Darko, XU Tianyin
    • Interacting with kernel test results - KOIKE Helen, CAÑUELO Ricardo
    • Measuring and Understanding Lin...- REN Tingxu, ZHANG Wentao, MARINOV Darko, JIA Jinghao, XU,Tianyin
    • KUnit for userspace - GOW, David
    • Adding benchmark results support to KTAP/kselftest - BIRD, Tim
    • hello-ebpf: Writing eBPF programs directly in Java - BECHBERGER, Johannes
    • Productizing the Linux boot time tweaks and tricks – an engineering problem! - SYED MOHAMMED, Khasim
    • 275 Beneath the Surface Analyzing Nested CVM Performance on KVMQEMU and Linux Root Partition for Mic
    • SoC peripheral TDISP - HARTLEY, David
    • OpenHCL: A Linux based paravisor for Confidential VMs - OO, Chris
    • SVSM vTPM: From Boot Attestation to Persiste...- CARVALHO Claudio, GARZARELLA Stefano, FANELLI Tyler
    • BASIL development roadmap - PELLECCHIA, Luigi
    • ks-nav - CARMINATI, Alessandro
    • Towards common mainline device testing - PRADO, Nicolas
    • HID-BPF in the kernel, 2 years later - TISSOIRES, Benjamin
    • Checkpoint/Restore In eBPF (CRIB) - DENG, Juntong
    • Integral Atomic Stack Switching for IST Exceptions - JIANGSHAN, Lai
    • Initiatives in boot time reduction - boot time markers, boot phases and profile-guided... - BIRD Tim
    • Syzbot BoF: Open Discussion
    • Discuss about an ABI for a performance capping framework - LEZCANO Daniel, WYSOCKI Rafael
    • RISC-V CoVE-IO - Jiewen Yao, Samuel Ortiz
    • FRED - ANVIN Peter, LI Xin
    • Address Space Isolation - JACKMAN, Brendan
    • Boot time testing with ftrace - NAO, Laura
    • Linux CVEs Open Discussion - MELOTTI, Damiano
    • Accelerating ML with mainline - VIZOSO, Tomeu
    • A Status Update on the x86-cpuid-db Project - DARWISH, Ahmed S.
    • Handling User Page Faults from Kernel Tracers - DESNOYERS Mathieu, JEANSON Michael
    • Utilizing type info in the perf tools - KIM, Namhyung
    • Improving the Perf event subsystem after 15 years - ROGERS, Ian
    • Kernel Sanitizers Office Hours - POTAPENKO Alexander, VYUKOV Dmitry, COOK Kees, ELVER Marco, MCKE...
    • Revisiting XSAVE: Lessons from 20 Years of Processor Context State Management - BAE, Chang
    • Attack vector controls for speculation mitigations - KAPLAN, David
    • Probes in the kernel, where it goes - Mr HIRAMATSU, Masami
    • Android MC BoF
    • Continuously testing the Linux kernel - Mr PADOVAN Gustavo, KONDRASHOV Nikola
    • Devicetree BoF - Mr KOZLOWSKI, Krzysztof
    • Runtime Verification, where to go from here - ROSTEDT, Steven
    • SIDE: A Unified User-Space Instrumentation Specification - DESNOYERS, Mathieu
    • how Linux tracing can use the net/ subsystem - ARING, Alexander
    • Integrating kas-alias into kernel build: Overcoming Challenges with Non-In...- CARMINATI, Alessandro
    • Runtime hotplug on non-discoverable busses with device treeoverlays - CERESOLI Luca, CODINA Hervé
    • Linux-CAN Subsystem: BoF - State of the Union and Outlook - KLEINE-BUDDE Marc, REMPEL Oleksij
    • Linux-wpan: SubGHz, UWB and userspace needs - SCHMIDT, Stefan

    LPC 2023

    Playlist

    • https://www.youtube.com/playlist?list=PLVsQ_xZBEyN0rGt1cmVhPn_TG79YfS_gX

    Index

    • Introduction - Palmer Dabbelt
    • Deprecating Stuff - Palmer Dabbelt
    • Run ILP32 on RV64 ISA (RV64ILP32) - Ren Guo
    • RISCV patchwork CI - Björn Töpel
    • Proposal of porting Trusted Execution Environment Provisioning (TEEP) Protocol... - Akira Tsukamoto
    • SBI Supervisor Software Events - Clément Léger
    • Perf feature improvements in RISCV - Atish Patra
    • RISC-V Vector: Current Status and Next? - Tao Chiu
    • Control Flow Integrity on RISCV - Deepak Gupta
    • RISC-V irqbypass with KVM - Andrew Jones
    • Android MC Intro
    • Driver Development Kit DDK and Vendor Workflow - John Moon
    • Simplified Android Kernel Driver Development with DDK v2 - Matthias Männich, Mr Yifan Hong
    • BPF Access Control and CO-RE in Android - Neill Kapron
    • Binder: fixing contention in buffer allocations - Carlos Llamas
    • Android Kernel testing with platform integration - Betty Zhou
    • Improving suspend/resume time and runtime PM on Android - Saravana Kannan
    • RISC-V support in Android - Curtis Galloway
    • Adding Third-Party Hypervisor to Android Virtualization Framework - Elliot Berman, Prakruthi Heragu
    • Porting Android Automotive on Xen - Leo Yan
    • Pixel 6 support on androidmainline - Peter Griffin, William McVicker
    • Can mainline Linux run on Android without vendor hooks - Qais Yousef
    • 16KB Page Size Support - Juan Yescas, Kalesh Singh (Google)
    • AOSP Devboards - Sumit Semwal
    • Welcome message and DL Server - Daniel Bristot de Oliveira
    • Do nothing fast: How to scale idle cpus? - Mathieu Desnoyers
    • system pressure on CPUs capacity and feedback to scheduler - Vincent Guittot
    • Optimizing Chromium Low-Power Workloads on Intel Notebooks - Len Brown, Ricardo Neri, Vaibhav Shanka
    • How to reduce complexity in Proxy Execution - John Stultz
    • 60 Adaptive userspace spinlocks with rseq - André Almeida, Mathieu Desnoyers
    • CPU Isolation state of the art - Frederic Weisbecker
    • Improving CPU Isolation with per-cpu spinlocks: performance cost and analysis - Leonardo Bras Soares
    • QA about PREEMP_RT - Thomas Gleixner
    • Introducing PAGEMAP_SCAN IOCTL for Windows syscalls translation... - Andrei Vagin, Muhammad Anjum
    • User namespaces with host-isolated UIDs/GIDs - Aleksandr Mikhalitsyn, Stéphane Graber
    • In Containers We Trust? Building Trust in Containerized Environments - Avery Blanchard
    • Fuse mounts recovery and Checkpoint/Restore - Aleksandr Mikhalitsyn, Stéphane Graber
    • Cgroups and Enterprise Users - Kamalesh Babulal, Tom Hromatka
    • Protecting Sensitive Data in Container Checkpoints - Adrian Reber, Radostin Stoyanov, Wesley Armour
    • Closing session - Stéphane Graber
    • Opening session - Daniel Borkmann, Jakub Kicinski
    • Evolving the BPF Type Format - Alan Maguire
    • Exceptions in BPF - Kumar Kartikeya Dwivedi
    • When BPF programs need to die: exploring the design space for early BPF... - Dan William, Raj Sahu
    • Verifying the Verifier eBPF Range Analysis Verification - Harishankar Vishwanathan
    • BPF Memory Model Two Years On - Paul McKenney
    • Overflowing the kernel stack with BPF - Dan Williams, Sai Roop Somaraju, Siddharth Chintamaneni
    • BPF for Security and LSM updates - KP Singh
    • BPF_LSM + fsverity for Binary Authorization - Song Liu, Boris Burkov
    • Sysarmor Metas eBPF Security Detection and Enforcement Tool- Liam Wisehart, Shankaran Gnanashanmugam
    • Extending Non-Repudiable Logs with eBPF - Avery Blanchard, George Almasi
    • Advancing Kernel Control Flow Integrity with eBPF - Jinghao Jia
    • Modernizing Android BPF and the Android Security Model - Neill Kapron
    • Buzzing Across Space: The Illustrated Children’s Guide to eBPF - Quentin Monnet
    • Resolve and standardize early access to hardware for automotive industry with Linux - Khasim Syed
    • Rust for Linux - Miguel Ojeda
    • Beginner Linux kernel maintainers toolbox - Krzysztof Kozlowski
    • Speeding up Kernel Testing and Debugging with virt-meng - Andrea Righi
    • Emulating NT synchronization primitives in Wine - Zeb Figura
    • Optimizing sysfs and procfs - Ajay Kaher, Vamsi Krishna Brahmajosyula
    • Powering up "discoverable bus-attached" devices on DT-based platforms - Abel Vesa
    • Improving kexec boot time - Usama Arif
    • Security Features status update - Kees Cook, Qing Zhao, Bill Wendling
    • Synthesized CFI for hand-written assembly in GNU assembler - Indu Bhagat
    • Graph-based ABI analysis for fun and profit - Matthias Männich
    • Compiling for verified targets BPF - Jose E Marchesi
    • Towards data type profiling - Namhyung Kim
    • VSCode for kernel development - Florent Revest
    • Callsite Trampolines - Mr. Aleksei Vetrov, Steven Rostedt, Suren Baghdasaryan
    • Generating BPF Verifier Friendly Code with Clang - Yonghong Song
    • Welcome - Sasha Levin, Shuah Khan
    • the path to achieve a bug-free build on the mainline - Philip Li
    • Storing and Outputting Test Information: KUnit Attributes and KTAPv2 - Rae Moar
    • Quality in embargoed patches - Sasha Levin
    • Detecting failed device probes - Laura Nao
    • Unifying and improving test regression reporting and tracking - Gustavo Padovan, Ricardo Cañuelo
    • Welcome/intro - Mr Davidlohr Bueso
    • CXL Emulation in QEMU - Progress, status and most importantly what next? - Fan Ni, Jonathan Cameron
    • CXL Type-2 core support - Ira Weiny
    • Plumbing challenges in Dynamic capacity device - Ira Weiny, Jonathan Cameron, Navneet singh
    • Adding RAS Support ​for​ CXL Port Devices​ - Terry Bowman
    • Shared CXL 3 memory what will be required - John Groves
    • CXL Memory Tiering for heterogenous computing - Ravi Kiran Gummaluri
    • A move_pages() equivalent for physical memory - Mr Gregory Price, Svetly Todorov
    • Hypervisor-Enforced Kernel Integrity (Heki) for KVM - Mickaël Salaün, Mr Madhavan Venkataraman
    • Multi-KVM Abstract - Anish Ghulati, Sean Christopherson
    • Unifying KVM API for protected VM and utilities - Isaku Yamahata
    • pkernfs: Persisting guest memory and kernel/device state safely... - Alexander Graf, James Gowans
    • Hyper-V's Virtual Secure Mode in KVM project update - Nicolas Saenz Julienne
    • Supporting guest private memory in Protected KVM on Android - Fuad Tabba
    • libside: Giving the preprocessor a break with a tracer-agnostic instrumentation API - Mathieu Desnoy
    • Graphing tools for scheduler tracing - Julia Lawall
    • Function return hook integration with Function graph tracer - Mr Masami Hiramatsu
    • pt_regs - the good the bad and the ugly - Florent Revest
    • RTLA Requests and TODOs - Daniel Bristot de Oliveira
    • Function parameters with BTF - Steven Rostedt, Mr Masami Hiramatsu
    • HiSilicon Performance Monitor Control Unit - Jie Zhan
    • DTrace and eBPF: new challenges - Kris Van Hee
    • Implementing sframes - Steven Rostedt, Indu Bhagat
    • The taming of the kernel dump - Petr Tesařík
    • drgn Writing to Memory and Breakpoints, Safely in Production? - Omar Sandoval
    • Beyond DWARF: Debugging the Kernel with Drgn BTF/CTF & kallsyms Stephen Brennan - Stephen Brennan
    • When kdump is way too much - Guilherme Piccoli
    • Minidump to debug end user device crashes - Mukesh Ojha, Elliot Berman
    • Kernel Livedump - Lukáš Hruška
    • Sensors aggregation - Alexandre Bailon, Daniel Lezcano
    • New thermal trip types - Daniel Lezcano
    • Use of Netlink for thermal kernel-user notification is problematic - Srinivas Pandruvada
    • CPUfreq/sched and VM guest workload problems - David Dai, Saravana Kannan
    • VM-CPUFreq for x86: Scaling the guest frequency for performance and power savings - Mr Wyes Karny
    • Virtualized Frequency Control for Telco Workloads - Mr Chris Macnamara, Srinivas Pandruvada
    • uclamp in CFS: Fairness, latency, and energy efficiency - Dietmar Eggemann, Morten Rasmussen
    • Make sync_state()/handoff work for the common clk framework - Stephen Boyd
    • Intel Low Power Mode Daemon on Hybrid CPUs - Rui Zhang, Srinivas Pandruvada
    • Enabling DDR segments on demand during memory pressure for DDR power reduction - Sudarshan Rajagop
    • Improving monitoring of power saving states - Mr Stanislaw Kardach (Google), Sven van Ashbrook
    • bpftime: Fast uprobes with user space BPF runtime - Yusheng Zheng
    • Make ftrace_regs a common trace interface for function entry/exit tracing - Masami Hiramatsu
    • Where have all the kprobes gone - Jiri Olsa
    • xprobes: Hybrid User/Kernel eBPF Probes for Cross-Layer Observability - Lucas Castanheira
    • BPF programmable netdevice - Daniel Borkmann
    • Application network security and observability in an encrypted future -John Fastabend
    • Safe sharing of the network with eBPF - Balasubramanian Madhavan, Prankur Gupta
    • BPF struct_ops - current status and the last developments - Kui-Feng Lee (Meta)
    • BPF Static Keys - Anton Protopopov
    • Troubles and Tidbits from Datadogs eBPF journey - Guillaume Fournier, Hemanth Malla
    • eBPF Shenanigans with Flux - Barret Rhoden
    • Developing Continuous eBPF Profiler to look Beneath the Kernel to Beyond the Clouds - Sumera
    • Towards a standardized eBPF ISA - Conformance testing - Alan Jowett
    • Standardizing Linux DRM drivers implementations by interfacing DRM Bridge as a single...- Jagan Teki
    • Enabling Large Block Size devices in Linux - Luis Chamberlain, Pankaj Raghav
    • Linux Kernel Autotuning - Cong Wang
    • Standardizing CPUID data for the open-source x86 ecosystem - Ahmed S. Darwish
    • Hunting Heisenbugs - Paul McKenney
    • nouveau and kernel GPU VMA management - David Airlie
    • Putting Linux into Context – Towards a reproducible example system with Linux... - Philipp Ahmann
    • Dynamic vCPU priority boosting in KVM for latency sensitive workloads- Joel Fernandes, Vineeth Pilla
    • RCU Office Hour - Paul McKenney
    • Improve Linux Perf tool to account for task sleep - Ajay Kaher, Alexey Makhalov
    • Powering up “discoverable bus-attached” devices on DT-based platforms - Abel Vesa
    • Installing and Using the Linux-Kernel Memory Model (LKMM) - Paul McKenney
    • kdevops sync up - Luis Chamberlain
    • Empowering Engagement: Introducing a Dynamic Dashboard for Proactive Retention Strategies
    • KDLP: Kernel Development Learning Pipeline - Joel Savitz
    • resctrl filesystem - Peter Newman
    • Securing build platforms - Joshua Lock
    • Improving UAPI Compatibility Review with Automated Tooling - John Moon
    • kernel: build system outputs and workflows (and how to balance them) - Bruce Ashfield
    • How big of a problem are Un-upstreamed patches - Jon Mason
    • Building for Heterogeneous Systems - Alejandro Hernandez Samaniego
    • Confidential Computing Microconference Introduction - Dhaval Giani, Joerg Roedel
    • COCONUT Secure VM Service Module Discussion - Joerg Roedel
    • Remote Attestation in AMD SEV-SNP Confidential VMs - Claudio Carvalho
    • Shrinking The Elephant - A Confidential Computing Attestation Sequel - Samuel Ortiz
    • How to Build a Confidential Attestation Client - Tobin Feldman-Fitzthum
    • Supporting Live Migration of Confidential VMs in KVM - Pankaj Gupta
    • Secure IO - Dan Williams, Jeremy Powell, Samuel Ortiz, Steffen Eiden, Thomas Lendacky
    • Taming the Incoherent Cache Issue in Confidential VMs - Mingwei Zhang
    • Towards unified confidential computing ABIs - Dan Williams
    • Update on RISC-V Confidential VM Extension (CoVE) - ATISH PATRA, RAVI SAHITA
    • Secure TSC for AMD SEVSNP guests - Nikunj Dadhani
    • Secure AVIC: Securing Interrupt Injection from a 'malicious' Hypervisor -Kishon Vijay Abraham I
    • Improve Xeon IRQ throughput with posted interrupt - Jacob Pan
    • PCI Endpoint Subsystem Open Items Discussion - Manivannan Sadhasivam e3
    • Non-discoverable devices in PCI devices - Lizhi Hou, Rob Herring
    • IOMMU overhead optimizations and observability - Pasha Tatashin, Yu Zhao
    • iommufd discussion - Mr Jason Gunthorpe
    • Linux-wpan updates - Mr Stefan Schmidt
    • TSCH@Zephyr: IEEE 802.15.4 SubG IIoT in the Making - Florian Grandel
    • Zephyr Retro-&-Prospective: Project Growth, Long Term Support, & Linux Interoperability - Chris Fri
    • Shared FPU Support in Zephyr for ARM64 and RISC-V - Nicolas Pitre
    • Challenges in Device Tree Sync - kernel, Zephyr, U-boot, System DT - Nishanth Menon
    • Breaking Barriers: Arduino Core API advancements in Zephyr, Linux and IoT Systems - Dhruva Gole
    • Livepatch Visibility at Scale - Breno Leitao
    • KLP for Clang LTO Kernel - Yonghong Song
    • Kbuild support for klprelocation generation - Lukáš Hruška
    • Simplify Livepatch Callbacks Shadow Variables and States handling - Petr Mladek
    • Moving livepatching module building to kselftests - Marcos de Souza
    • Arm64 live patching - Mark Rutland
    • Klint: Compile-time Detection of Atomic Context Violations for Kernel Rust Code - Dr Gary Guo
    • pin-init: Solving Address Stability in Rust - Benno Lossin e3
    • Coccinelle for Rust - Julia Lawall
    • Using Rust in the binder driver - Alice Ryhl
    • Block Layer Rust API - Mr Andreas Hindborg
    • Rust in V4L2: a status report - Daniel Almeida
    • Converting a DRM driver to Rust - Mrs Maíra Canal
    • Zero Copy Receive using io_uring - David Wei
    • Enhancing Homa Linux for Efficient RPC Transportation - Dr Xiaochun Lu
    • An introduction to the DPLL subsystem - Vadim Fedorenko
    • Unblocking the softirq lock for PREEMPT_RT - Sebastian Siewior
    • Offloading QUIC Encryption to Enabled NICs - Andy Gospodarek
    • Extending AF_XDP with hardware metadata - Stanislav Fomichev
    • connect() - why you so slow?! - Frederick Lawler
    • Container Networking: The Play of BPF and Network NS with different...- Martin Lau, Takshak Chahande
    • Evolution of Direct Server Return (DSR) implementation for containerized applications - Lalit Gupta
    • SYN Proxy at Scale with BPF - Kuniyuki Iwashima
    • bpfilter: a BPF-based packet filtering framework - Quentin Deslandes
    • Blinking Lights getting it wrong again again and again - Andrew Lunn
    • Syzbot: 7 years of continuous kernel fuzzing - Aleksandr Nogikh
    • Linux Virtualization Based Security (LVBS) - Thara Gopinath
    • Is Linux Suspend ready for the next decade - Len Brown
    • Encryption for filesystems with advanced features new fscrypt functionality - Sweet Tea Dorminy
    • Trust, confidentiality, and hardening: the virtio lessons - Michael S Tsirkin
    • Using hardware hints for optimal page placement - Mr Bharata Bhasker Rao
    • Linux perf tool metrics - Ian Rogers
    • Ship your Critical Section, Not Your Data: Enabling Transparent Delegation with... - Vishal Gupta
    • Kernel handling of CPU and memory hot un/plug events for crash - Eric DeVolder
    • A kernel documentation update - Jonathan Corbet
    • Tips and Strategies for Reducing Stress and Burnout by Creating Psychological... - Dr Gloria Chance
    • DAMON Current Status and Future Plans - SeongJae Park
    • Kernel Samepage Merging (KSM) at Meta and Future Improvements to KSM -Stefan Roesch
    • VSOCK: From Convenience to Performant VirtIO Communication - Amery Hung
    • Improving resource ownership and life-time in linux device drivers - Bartosz Golaszewski
    • How to make syzbot reports easier to debug? - Aleksandr Nogikh
    • UEFI Setvariable at runtime -- Problems status and solutions - Mr Ilias Apalodimas
    • Embedded Linux BOF - Tim Bird
    • PCI device authentication encryption - Jonathan Cameron
    • Secure IO BoF - Dhaval Giani
    • Android BOF
    • Android: memcg v1 - v2 - T.J. Mercier
    • Reporting and tracking regressions across the ecosystem - Thorsten Leemhuis
    • 16k page size support - Juan Yescas, Kalesh Singh
    • Testing Drivers with KUnit (Does hardware have to be hard?) -David Gow
    • toolchain-agnostic build time improvements - Tanzir Hasan, Google & Nick Desaulniers, Google

    LPC 2022

    Playlist

    • https://www.youtube.com/playlist?list=PLVsQ_xZBEyN0a9XC70HTwTFr-TsUtSGBY

    Index

    • The Maple Tree - Liam Howlett
    • Zettalinux: It's Not Too Late To Start - Matthew Wilcox
    • Rust - Miguel Ojeda, Wedson Almeida Filho
    • What kernel documentation could be - Jonathan Corbet
    • Current Status and Future Plans of DAMON - SeongJae Park
    • Why is devm_kzalloc() harmful and what can we do about it - Laurent Pinchart
    • Modernizing the kdump dump tools - Philipp Rudo
    • Regression tracking & fixing: current state, problems, and next steps - Thorsten Leemhuis
    • nouveau in the times of nvidia firmware and open source kernel module - David Airlie
    • Meta’s CXL Journey and Learnings in Linux - Jonathan Zhang
    • TCP memory isolation on multi-tenant servers - Christian Warloe, Shakeel Butt, Wei Wang
    • Kernel Live Patching at Scale - Song Liu, Rik van Riel, David Vernet
    • Live in a world with multiple memory types - Ying Huang
    • Inside the Linux Kernel Random Number Generator - Jason Donenfeld
    • Profiling data structures - Arnaldo Carvalho de Melo
    • PREEMPT_RT - how not to break it. - Sebastian Siewior
    • Launching new processes with io_uring_spawn for fast builds - Josh Triplett
    • Exercising the Linux scheduler with Yogini - Len Brown
    • OS Scheduling with Nest: Keeping Tasks Close Together on Warm Cores - Julia Lawall
    • RV: where are we? - Daniel Bristot de Oliveira
    • Modularization for Lockdep - Boqun Feng
    • Make RCU do less (save power)! - Joel Fernandes, Rushikesh Kadam, Uladzislau Rezki
    • Restartable Sequences: Scheduler-Aware Scaling of Memory Use on Many-Core Systems- Mathieu Desnoyers
    • How I started chasing speculative type confusion bugs in the kernel and ended up wi... Jakob Koschel
    • The journey of BPF from restricted C language towards extended and safe C. - Alexei Starovoitov
    • HID-BPF - Benjamin Tissoires
    • eBPF Kernel Scheduling with Ghost - Barret Rhoden
    • Can the Linux networking stack be used with very high speed applications? - David Ahern
    • Overview of the BPF networking hooks and user experience in Meta - Martin Lau
    • BPF Signing and IMA integration - KP Singh
    • Revisiting eBPF Seccomp Filters - Jinghao Jia, Tianyin Xu
    • State of kprobes/trampolines batch attachment - Jiri Olsa
    • Developing eBPF profiler for polyglot cloud-native appli... Vaishali Thakkar, Javier Honduvilla Coto
    • Performance insights into eBPF step by step - Dmitrii Dolgov
    • Tuning in-kernel routines on RISC-V - Heiko Stuebner
    • Confidential Computing for RISC-V-based Platforms - RAVI SAHITA
    • What to do with kconfig.socs? - Conor Dooley
    • RISC-V ACPI and UEFI Updates - Sunil V L
    • The Odyssey of HWCAP on RISC-V platforms - "Ruinland" ChuanTzu Tsai
    • Intro - ATISH PATRA, Palmer Dabbelt
    • Make LL/SC arch has a strict forward guarantee - Ren Guo
    • Extending EFI support in Linux to new architectures - Ard Biesheuvel, Ilias Apalodimas
    • LoongArch: What we will do next - Huacai Chen, Jianmin Lv, Xuerui WANG
    • Consolidating representations of the physical memory - Mike Rapoport
    • Mitigating speculative execution attacks with ASI - follow up - Junaid Shahid, Ofir Weisse
    • High memory management API changes - Ira Weiny
    • New design for initrds - Zbigniew Jędrzejewski-Szmek
    • Towards Secure Unified Kernel Images for Generic Linux Distributions and Every... Lennart Poettering
    • Slimming down the journal - Daan De Meyer
    • #snapsafe: restoring uniqueness in Virtual Machine clones - Babis Chalios
    • systemd cgroup delegation and control processes - Michal Koutný
    • Integrated PCIe monitoring and tracing facilities - Yicong Yang
    • Exposing PCIe topology to Guest OS for peer-to-peer - Oded Gabbay
    • Instant Detection of Virtual Devices - Ajay Kaher
    • PCIe Endpoint Subsystem Open Items Discussion - Kishon Vijay Abraham I, Manivannan Sadhasivam
    • Cooperative DMA in a memory-oversubscribed environment - James Gowans
    • IOMMUFD Discussion - Jason Gunthorpe
    • Isolation for broken hardware during system suspend - Rui Zhang
    • Fine grain frequency control with kernel governors - Ray Huang
    • Linux per cpu idle injection - Srinivas Pandruvada
    • CPUfreq/sched and VM guest workload problems - Saravana Kannan
    • A generic energy model description - Daniel Lezcano
    • Energy model accuracy - Morten Rasmussen
    • Combining DTPM with the thermal control framework - Daniel Lezcano
    • Frequency-invariance gaps in current kernel - Rui Zhang
    • Libre Silicon in IoT - Michael Welling
    • All types of wireless in Linux are terrible and why the vendors should feel bad - Peter Robinson
    • Linux IEEE 802.15.4 MLME improvements - Miquèl Raynal
    • libgpiod V2: New Major Release with a Ton of New Features - Bartosz Golaszewski
    • Abusing zephyr and meta-zephyr - Eilís Ní Fhlannagáin
    • Open source FPGA NVMe accelerator platform for BPF driven ML processing with Linux/... Karol Gugala
    • Putting firmware on the device: a Zephyr+Yocto+Mender hike - Josef Holzmayr
    • Percpu hashtab traversal measurement study - Brian Vazquez
    • MPTCP: Extending kernel functionality with eBPF and Netlink - Matthieu Baerts
    • Socket termination for policy enforcement and load-balancing - Aditi Ghag
    • FW centric devices, NIC customization - Saeed Mahameed, Mark Bloch
    • XDP gaining access to NIC hardware hints via BTF - Jesper Dangaard Brouer
    • Bringing packet queueing to XDP - Toke Høiland-Jørgensen
    • eBPF Standardization - Dave Thaler
    • Networking resource control with per-cgroup LSM - Stanislav Fomichev
    • How to share IPv4 addresses by partitioning the port space - Jakub Sitnicki, Marek Majkowski
    • A BPF map for online packet classification - Anton Protopopov
    • Cilium's BPF kernel datapath revamped - Daniel Borkmann
    • Machine reable description for netlink protocols (YAML?) - Jakub Kicinski
    • Copy On Write, Get User Pages, and Mysterious Counters - David Hildenbrand
    • Linux Kernel Control-Flow Integrity Sup... Joao Moreira, Mark Rutland, Peter Zijlstra, Sami Tolvanen
    • Toolchain support for objtool in the Linux kernel - Josh Poimboeuf
    • CTF Frame in the Linux kernel - Indu Bhagat
    • GCC's -fanalyzer and the Linux kernel - David Malcolm
    • Kernel ABI Monitoring a... Dodji Seketeli, Giuliano Procida, Guillermo E. Martinez, Matthias Männich
    • Programmable debuggers and the Linux kernel (drg... Elena Zannoni, Jose E. Marchesi, Stephen Brennan
    • Status Report: Broken Dependency Orderings in the Linux Kernel - Marco Elver, Paul Heidekrüger
    • Where are we on security features? - Kees Cook, Qing Zhao
    • Toolchain Track Welcome - Jose E. Marchesi, Nick Desaulniers
    • PREEMPT_RT Q&A with tglx - Thomas Gleixner
    • Linux needs a Scheduler QOS API -- and it isn't nice(2) - Len Brown
    • Limit the idle CPU search depth and use CPU filter during task wake up - Chen Yu, Yun Wu
    • Linux Kernel Scheduling and split-LLC architectures: Overview, Ch... Gautham R Shenoy, Prateek Nayak
    • Latency hints for CFS task - Vincent Guittot
    • Latency hints for CFS task - Vincent Guittot
    • Bringing Energy-Aware Scheduling to x86 - Len Brown, Ricardo Neri
    • rtla: what is next? - Daniel Bristot de Oliveira
    • rtla osnoise: what is missing? - Daniel Bristot de Oliveira
    • CPU isolation vs jailbreaking IPIs - Valentin Schneider
    • Make RCU do less (and disturb CPUs less)! - Joel Fernandes, Rushikesh Kadam, Uladzislau Rezki
    • Isolation aware smp_call_function/queue_work_on APIs - Marcelo Tosatti
    • CPU isolation tuning through cpuset - Frederic Weisbecker
    • Simple KernelCI Labs with Labgrid - Jan Lübbe
    • How to introduce KUnit to physical... Isabella Basso , Magali Lemes, Maíra Canal, Tales da Aparecida
    • KUnit: Function Redirection and More - Brendan Higgins, David Gow
    • The emerging of the virtual QA team for Linux kernel - philip li
    • Designing UAPI for Fuzz-ability - Dmitry Vyukov
    • Making syzbot reports more developer-friendly - Aleksandr Nogikh
    • Checking your work: Linux kernel testing and CI - David Vernet
    • Integrating testing with maintainer flows - Mark Brown, Veronika Kabatova
    • TrenchBoot Update - Daniel Smith
    • Remote Attestation of IoT devices using a discrete TPM 2.0 - Dimitar Tomov, Svetlozar Kalchev
    • Kernel TEE subsystem evolution - Sumit Garg
    • Secure Boot auto enrollment - vincent dagonneau
    • Secure bootloader for Confidential Computing - Ken Lu, Jiewen Yao
    • Sandboxing/Containerizing alternatives to Snap fo... Michael Sweet, Till Kamppeter, Valentin Viennot
    • Documentation for OpenPrinting projects - Till Kamppeter, Aveek Basu
    • Testing and CI for OpenPrinting projects - Michael Sweet, Till Kamppeter
    • CUPS 2.5 and 3.0 Development - Michael Sweet
    • Experiences implementing zonefs support in ZenFS - Jorgen Hansen
    • Btrfs RAID on zoned devices - Johannes Thumshirn
    • Zonefs: Features Roadmap - Damien Le Moal
    • Supporting non-power of 2 zoned devices - Pankaj Raghav
    • Object caching on Zoned Storage - Hans Holmberg
    • Improving data placement for Zoned Linux File systems - Hans Holmberg
    • SSDFS: ZNS SSD ready file system with zero GC overhead - Viacheslav Dubeyko
    • A zone-aware cache system for distributed databases - Kuankuan Guo
    • Zoned MC Conference Kick Off - Adam Manzanares, Matias Bjørling
    • RISC-V ftrace: working with preemption - Tao Chiu
    • CXL 2.0+ Emulation With QEMU Status, requirements and roadmap. - Jonathan Cameron
    • Linux plumbing of CXL error reporting - Robert Richter, Yazen Ghannam
    • CXL hotplug: spec to reality - PJ Waskiewicz
    • Design and implementation of Autocaching for CXLSSD - Heekwon Park
    • CXL and confidential computing - Jérôme Glisse
    • CXL Dynamic Capacity MM - Jonathan Cameron, Navneet Singh
    • CXL Type-3 device discovery, configuration in firmware and prepare ACPI tables... Sayanta Pattanayak
    • CXL MC Welcome and Kickoff - Adam Manzanares, Dan Williams
    • Closing session - Christian Brauner
    • Bringing up FUSE mounts C/R support - Alexander Mikhalitsyn
    • Restartable Sequences: Scaling Per-Core Shared Memory Use in Containers - Mathieu Desnoyers
    • Unprivileged CRIU - Younes Manton
    • cgroup rstat's advanced adoption - Michal Koutný
    • How can we make procfs safe? - Aleksa Sarai
    • Restoring process trees with child-sub-reapers, nested pid-namespaces and inheri... Pavel Tikhomirov
    • Tracer namespaces - Mathieu Desnoyers
    • Opening session - Stéphane Graber
    • Dynamic Energy Model to handle leakage power - Lukasz Luba
    • (Impact of) Recent CPU topology changes - Dietmar Eggemann, Ionela Voinescu
    • io_uring in Android - Akilesh Kailash
    • MGLRU results on Android - Kalesh Singh
    • EROFS as a replacement for EXT4 and Squashfs - David Anderson
    • eBPF-based FUSE - Paul Lawrence
    • Cuttlefish and Kernel Dev - Ram Muthiah
    • Virtualization in Android - David Brazdil, Serban Constantinescu
    • fw_devlink and parallelization updates - Saravana Kannan
    • STG for ABI monitoring - Giuliano Procida
    • Hermetic builds with Bazel - Matthias Männich
    • Technical debt - Matthias Männich
    • GKI Experience - Elliot Berman
    • Interrupt Security for AMD SEV-SNP - Ashish Kalra
    • Testing Intel TDX functionality with new set of self tests - Sagi Shahar
    • Identifying and Eliminating Contention from Booting Concurrent SNP VMs - Jacky Li, Marc Orr
    • The elephants in the confidential room: Attestation and verification - Samuel Ortiz
    • Hardening Linux guest kernel for CC - Elena Reshetova
    • Using DICE Attestation for SEV and SNP Hardware Rooted Attestation - Peter Gonda
    • Unmapped Private Memory for Confidential Guests - Michael Roth
    • Upstream & Guest Distro support for Confidential Compute - Jianxiong Gao
    • Rust in the Kernel (via eBPF) - Dave Tucker, Michal Rostecki
    • The Integration of Rust with Kernel Testing Service - Yujie Liu
    • Linux Rust NVMe Driver Status Update - Andreas Hindborg
    • Rust for Linux: Status Update - Miguel Ojeda, Wedson Almeida Filho
    • rustc_codegen_gcc: A gcc codegen for the Rust compiler - Antoni Boucher
    • Rust GCC Front-end - Philip Herron, David Faust
    • The slab allocators of past, present, and future - Vlastimil Babka
    • Low-overhead memory allocation tracking - Kent Overstreet, SUREN BAGHDASARYAN
    • Preserving guest memory across kexec - James Gowans
    • Multi-Gen LRU: Current Status & Next Steps - Jesse Barnes‎, Rom Lemarchand
    • Memory tiering - Jerome Glisse
    • Scalability solutions for the mmap_lock - Map... Liam Howlett, SUREN BAGHDASARYAN, Michel Lespinasse
    • Restricting access to IPP printers with OAuth2 framework - Piotr Pawliczek
    • Tuning Linux TCP for data-center networks - Yuchung Cheng
    • Unified structure for thermal zone device registration - Rui Zhang
    • Securely booting confidential VMs with encrypting disk
    • Unmapped Private Memory for Confidential Guests
    • Closing the BPF map permission loophole
    • OPENED Tool for Managing eBPF Heterogeneity
    • Pressure feedback for LRU map types
    • Reusing the BPF CI
    • The revival of the learning-sync bridgeport flag
    • More CO-RE? Taming the effects of compiler optimizations on BPF tracing
    Blogs

  • Porting Device Driver to the latest Upstream Kernel
    Y Yunseong Kim

    I recently received an DM from a kernel developer working on upstreaming an ADC driver. They hit a classic and frustrating wall: The driver worked perfectly on v6.1, but after porting it to the latest mainline (v6.18-rc5), the boot logs stopped dead at "Starting Kernel...". No panic message, no earlycon, just silence.

    This is a scenario many of us faced when we first started kernel development. Here is the advice I shared, which might be helpful for anyone dealing with major kernel upgrades.

    💡 1. Don't try to jump 17 floors at once (Incremental Updates)

    Moving directly from v6.1 to v6.18 is like trying to jump from the 1st floor to the 18th without an elevator. It’s a recipe for broken legs (and broken builds).

    The Analogy: Treat kernel upgrades like crossing a river with stepping stones.
    The Fix: Instead of the latest RC, try porting to closer Long Term Support (LTS) versions first (e.g., v6.1 -> v6.6 -> v6.10).
    The Value: Making your driver work on these intermediate stable kernels is not just "busy work"—it is a valuable contribution and the best way to understand what changed and when.

    💡 2. "git bisect" is your best friend (but narrow the search first)

    When a regression happens, "git bisect" is the standard tool to find the culprit commit. However, the gap between v6.1 and v6.18 contains tens of thousands of commits. Finding a needle in that haystack is painful. By following step (💡Incremental Updates), you can narrow the range (e.g., "It works on v6.10 but breaks on v6.11") before running bisect. This makes the process much faster and more manageable.

    • git bisect document: https://git-scm.com/docs/git-bisect
    • "git bisect" results in the kernel mailing lists: https://lore.kernel.org/all/?q=q%3A"git+bisect"

    💡 3. Leave "Breadcrumbs" in the dark (Manual Tracing)

    If the system hangs even before initializes, standard debugging tools often won't help. The kernel is crashing before it has a voice.

    The Analogy: Like Hansel and Gretel, you need to leave breadcrumbs to see how far you got.
    The Fix: Go "old school." Manually insert print statements (pr_info() or printk()) directly into the early initialization code, such as start_kernel() in init/main.c: “I am here 1”, “I am here 2”...
    It looks primitive, but seeing where the printing stops will tell you exactly which function caused the panic.

    By configuring the earlycon parameter, the kernel can output messages during the initial boot phase, before standard consoles are initialized. This allows us to capture the kernel call trace.

    See "Detailed Explanation of setup_earlycon" by David Zhu

    • https://www.linkedin.com/pulse/detailed-explanation-setupearlycon-david-zhu-lai0c/

    The Linux kernel is massive, but if you break the problem down into smaller, manageable steps, no bug is unfixable. Happy hacking! 🚀

    Blogs

  • FAQ. How to Contribute to the Linux Kernel?
    Y Yunseong Kim

    Hi @Jinseok, Thank you for the great sharing!

    Announcements

  • How does the Linux kernel build system (Kbuild) detect file changes?
    Y Yunseong Kim

    The Linux kernel build system (Kbuild) detects changed files using a combination of make's timestamp comparison and a sophisticated Dependency Tracking mechanism.

    As you observed, changing a single .c file finishes quickly, whereas modifying a header (.h) file often triggers a massive rebuild. This happens because of the structure of the Dependency Graph.
    Here is the technical breakdown of how this works:

    1. Core Detection Mechanism: Hidden .cmd Files
      When the kernel is compiled, Kbuild doesn't just generate the .o (object) file; it also creates a hidden file that records a list of every single file referenced during the creation of that object.
    • Example: Let's say you are compiling drivers/net/ethernet/intel/e1000/e1000_main.c.
    • The build system generates e1000_main.o and simultaneously creates a hidden file named .e1000_main.o.cmd in the same directory.
      If you open this .cmd file, you will see something like this (it is very long):
    cmd_drivers/net/ethernet/intel/e1000/e1000_main.o := gcc ... (compiler options) ... \
      source_drivers/net/ethernet/intel/e1000/e1000_main.c \
      deps_drivers/net/ethernet/intel/e1000/e1000_main.o := \
        drivers/net/ethernet/intel/e1000/e1000_main.c \
        include/linux/module.h \
        include/linux/types.h \
        include/linux/init.h \
        ... (hundreds of other header files) ...
    

    The next time you run make, the process is as follows:

    • It checks if e1000_main.o exists.
    • It reads the .e1000_main.o.cmd file.
    • If the modification time (timestamp) of any source or header file listed there is newer than the e1000_main.o file, make determines that the object is "outdated" and recompiles it.
    1. Why Does Modifying a Header Trigger a Full Rebuild?
      This is due to the difference in the Scope of Reference.
      A. When modifying a .c file (Leaf Node Change)
    • my_driver.c is typically not included by other files. It sits at the edge (leaf) of the dependency tree.
    • Therefore, if my_driver.c changes, only my_driver.o needs to be rebuilt.
      B. When modifying a .h file (Root/Branch Node Change)
    • Take a core header like include/linux/sched.h (related to process scheduling) as an example.
    • This header is #included by almost every subsystem in the kernel (filesystems, memory management, drivers, etc.).
    • Consequently, include/linux/sched.h appears in the dependency lists within thousands of .cmd files.
    • The moment this header is touched, make sees that "thousands of .o files that depend on this header are outdated," and triggers a rebuild for all of them.

    Note: In C, recompilation upon header modification is strictly necessary. If structure (struct) member offsets change or macro (#define) values are updated, the binary code utilizing them must be regenerated to calculate the new offsets/values correctly.

    1. Technical Implementation Tool: fixdep
      To optimize this process, the Linux kernel build system uses a tool called fixdep.
    • When compiling with GCC, the -Wp,-MMD,file.d option is used. This tells the compiler to output a list of all header files read during the Preprocessing stage.
    • The kernel's scripts/basic/fixdep program parses this list and converts it into the .cmd file format (Make rules) shown above.
    • It also tracks changes to command-line options (CFLAGS). If the compiler flags change, fixdep ensures a rebuild occurs even if the source files haven't changed.
      Summary
    • How does it know?: Every .o file has a hidden .cmd file that lists "every file used to build me (including headers)."
    • Why do headers take so long?: Because that single header file is listed in the .cmd dependency lists of thousands of object files.
    • Why are .c files fast?: They are rarely dependencies for other files, so only the file itself needs recompilation.
      Tip: How to build specific modules quickly?
      Running make from the kernel root checks the entire dependency tree, which can be slow. You can build specific directories to save time:
    # Build only the driver in this specific directory
    make M=drivers/net/ethernet/intel/e1000/
    

    However, if you have modified a core header (include/linux/*.h), a full rebuild is unavoidable. Skipping it would likely result in a Symbol Version (CRC) mismatch, preventing the module from loading.


    1. File Change Check After Build

    1. Checking Config (m vs * ): If it is a module (m), you only need to run make modules_install and reload it. If it is built-in (* or y), you must reinstall the kernel image (bzImage) and reboot.
    2. Checking Timestamps: Needs refinement. The make utility handles timestamp comparisons automatically.
    3. Comparing md5sum: The .o or .ko files in your build directory will have different hash values every time you build them (due to build paths, timestamps, etc.). Furthermore, installed modules undergo stripping (removal of debug symbols), making their hash different from the original build artifact.

    2. Verifying Steps

    Step 1: Verify Config Status (Improve Precision)

    Using grep is more reliable than visually checking menuconfig.

    • Method: Check the .config file in your working directory.
    grep "CONFIG_MY_DRIVER" .config
    
    
    • CONFIG_...=m: It is a module. Just replace the .ko file (No reboot needed).
    • CONFIG_...=y: It is built-in. You must flash the new kernel image and reboot.

    Step 2: Verify Changes (Key Correction)

    Comparing timestamps or md5sum hashes is inaccurate. Instead, verifying strings inside the binary or using Modinfo is the most definitive method.

    Recommended Method A: Use strings (Most Reliable)
    Add a unique, identifiable string (like a log message) to your code, then check if that string exists in the binary.

    1. Add code: printk(KERN_INFO "MyPatch_v1 checking...\n");
    2. Build, then verify:
    strings drivers/my/driver.ko | grep "MyPatch_v1"
    
    • If you see the string, your changes are 100% applied.

    **Recommended Method B: Check modinfo**
    If you updated the module version, check it with modinfo.

    modinfo drivers/my/driver.ko
    

    Step 3: Note on Comparing with Installed Modules (Replacing hash sum command)

    If you try to compare the "installed module (/lib/modules/.../my.ko)" with the "just built module (my.ko)" using like md5sum, it will fail 99% of the time.

    • Reason: During make modules_install, debug symbols are stripped, and module signatures are added.
    • Alternative: Compare file sizes (the installed one will be much smaller) or use the strings command mentioned above to peek inside the installed module.

    3. Summary

    After modifying the kernel code, check the .config file to determine if the feature is a module (m) or built-in (*, y).

    1. If Module (m): Recompile only the module and reinstall it (rmmod -> insmod).
    2. If Built-in (y): You must reinstall the entire kernel image and reboot the system.

    How to Verify Changes:
    Simple timestamp or hash (md5sum) comparisons can be inaccurate due to symbol stripping or signing during installation. Instead, I recommend using the strings [module].ko | grep [unique_string] command to verify that your specific code changes are actually present in the binary.

    Blogs

  • FAQ. How to Contribute to the Linux Kernel?
    Y Yunseong Kim

    Pre-study before kernel contribution

    Q&A: Getting Started with AppArmor Contribution

    Q. I’m very interested in AppArmor and would like to contribute. How should I prepare, and what is the best way to start contributing to Linux security?

    A. I recommend starting by analyzing the interaction between user space and the kernel. Specifically, you should examine the AppArmor-related options in /proc and /sys, and profile the user space applications that control AppArmor using tools like trace-cmd. This will help you understand the code flow and how policies are enforced.

    • https://www.trace-cmd.org/
    • https://trace-cmd.org/Documentation/trace-cmd/
    • https://github.com/rostedt/trace-cmd
    • https://kernelshark.org/Documentation.html
    • https://wiki.st.com/stm32mpu/wiki/Trace-cmd_and_kernelshark_trace_viewer

    To give you more context, here is a breakdown of the key components you should look into:

    1. Understanding the Interfaces: /sys and /proc
    AppArmor relies heavily on the SecurityFS interface to interact with the kernel.

    # With root privilege, For example:
    $ trace-cmd record -F -p function_graph cat /sys/kernel/security/apparmor/profiles
    $ trace-cmd report > cat-apparmor.log
    
    • /sys/kernel/security/apparmor: This is the primary control interface. It is where the kernel exports information about the loaded policies, features, and the interface for loading or replacing profiles. Exploring this directory helps you understand what capabilities the running kernel supports.
    • /proc/[pid]/attr/current: This interface shows the AppArmor profile currently applied to a specific process. Monitoring this file is essential for debugging and verifying that process confinement is working as expected.

    2. Analyzing User Space Tools
    Before diving deep into the kernel code, it is crucial to understand how policies are generated and passed to the kernel. The core component here is the AppArmor Parser.

    • apparmor_parser: This is the user space program responsible for compiling human-readable text profiles into a binary format that the kernel can digest. By tracing this application with trace-cmd, you can see exactly how it invokes the kernel interfaces to load policies.
    • https://documentation.suse.com/ko-kr/sles/12-SP5/html/SLES-all/cha-apparmor-start.html
    • https://manpages.debian.org/stretch/apparmor/apparmor.7.en.html

    3. Source Code Repository
    You can find the source code for the AppArmor user space tools, including the parser and libraries, in their official repository. Studying this code is the best way to understand the mechanism behind policy loading.

    • AppArmor User Space Repository: https://gitlab.com/apparmor/apparmor
    • AppArmor Kernel Source Code: https://elixir.bootlin.com/linux/v6.18.2/source/security/apparmor/apparmorfs.c#L2311

    Conclusion
    Lastly, keep in mind that this workflow is not specific to AppArmor. Analyzing the /sys and /proc interfaces and profiling the interaction between user space and the kernel is a universally effective approach. It serves as an excellent starting point for analyzing and contributing to any Linux kernel subsystem.

    P.S.
    profiles_open() → seq_read() (call p_start/p_next/p_show/p_stop)

    // security/apparmor/apparmorfs.c
    
    static const struct file_operations aa_sfs_profiles_fops = {
        .open = profiles_open,
        .read = seq_read,
        .llseek = seq_lseek,
        .release = profiles_release,
    };
    
    1. profiles_open(): seq_open() init seq_file.
    2. seq_read() - VFS read seq_file.
    3. aa_sfs_profiles_op's callback
      • p_start() :Start.
      • p_next() : Next profile.
      • p_show() : Print profile.
      • p_stop() : End
    4. profiles_release() : Close the file.
    Announcements

  • Kernel security guidance
    Y Yunseong Kim

    Oh, great! As for protection view, it's deeply connected to the work I did at my previous job. I'm constantly researching and organizing this topic. I'll cover it in a series.

    General Discussion

  • Linux Kernel Study Resources
    Y Yunseong Kim

    LF Live Mentorship

    • https://events.linuxfoundation.org/lf-live-mentorship-series/

    Adrian Huang's Linux Kernel Core Big Picture Slides

    • https://www.slideshare.net/AdrianHuang/presentations

    University of Warsaw, Institute of Informatics - Janina Mincer-Daszkiewicz Debian 11 (Kernel 6.12.6) based AOS Course

    • https://students.mimuw.edu.pl/ZSO/index_en.html

    KDLP (Redhat)

    • https://kdlp.underground.software/course/index.html

    Kernel Newbies

    • https://kernelnewbies.org/LinuxVersions
    • https://kernelnewbies.org/FirstKernelPatch

    Moon 😄 Kernel Core Analysis

    • http://jake.dothome.co.kr/

    Linux Kernel Teaching

    • https://linux-kernel-labs.github.io/

    LWN Conference index

    • https://lwn.net/Archives/ConferenceIndex/

    Yocto kernel patch

    • https://docs.yoctoproject.org/kernel-dev/common.html#modifying-an-existing-recipe

    Linux Kernel Exploit

    • https://github.com/xairy/linux-kernel-exploitation

    Linux Kernel CTF

    • https://github.com/google/security-research/tree/master/pocs/linux/kernelctf

    LDD 3rd on v5.10

    • https://github.com/d0u9/Linux-Device-Driver

    Embetronicx Linux Device Driver Tutorial

    • https://embetronicx.com/linux-device-driver-tutorials/
    • https://github.com/Embetronicx/Tutorials/tree/master/Linux/Device_Driver

    Kernel Glossary

    • https://0xff07.github.io/kernel-glossary/

    Awesome-kerneldev

    • https://github.com/retpolanne/awesome-kerneldev

    First contribution to Linux kernel

    • https://debconf25-first-contribution-to-linux-28c229.pages.igalia.com/
    • https://docs.lkcamp.dev/unicamp_group/workshop/

    Bangalore Linux Kernel Meetup

    • https://kernelmeetup.wordpress.com/
    Announcements

  • Welcome to your NodeBB!
    Y Yunseong Kim

    Welcome to your brand new NodeBB forum!

    This is what a topic and post looks like. As an administrator, you can edit the post's title and content.
    To customise your forum, go to the Administrator Control Panel. You can modify all aspects of your forum there, including installation of third-party plugins.

    Additional Resources

    • NodeBB Documentation
    • Community Support Forum
    • Project repository
    General Discussion
  • Login

  • Don't have an account? Register

  • Login or register to search.
Powered by NodeBB Contributors
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups