Document Library

 

TitleSpeakerSummaryYearGet the slideshf:doc_categorieshf:doc_tags
A quarter century of Linux open source: my personal journeyJens AXBOEHaving been involved with the Linux kernel and open source projects for 25 years teaches you as much about people as it does technology. From struggli2023community2023
A unique way to maintain a Linux kernel subsystemSteven ROSTEDTSteven Rostedt maintains the tracing subsystem of the Linux kernel. He has a unique workflow that incorporates several tools. He uses quilt on top of2023community2023
Demystifying the Linux kernel security processGreg KHThere is a lot of misunderstanding about how the Linux kernel deals with security vulnerabilities. This talk will go into how the different Linux kern2023security2023
Evolving ftrace on arm64Mark RUTLANDThe Linux kernel’s ftrace mechanism makes it possible to dynamically attach hooks to kernel functions, and can be used for a variety of purposes inclu2023tracing2023
Fast by Friday: Why Kernel Superpowers are EssentialBrendan GREGGIt is not ok that we speed weeks, even months, trying to solve why software is slow. Companies waste money on compute costs, users are unhappy with la2023performance2023
Faster & Fewer Page FaultsMatthew WILCOXWe have improved the Linux page fault mechanism to reduce the number of faults and handle them more quickly when they do happen. By managing memory in2023performance2023
Gaining bounds-checking on trailing arraysGustavo AR SILVAHaving a dynamically-sized trailing array at the end of a structure is a popular code construct in the Linux kernel. However, trailing arrays can also2023debugging2023
Getting the RK3588 SoC supported upstreamSebastian REICHELThe Rockchip RK3588 system-on-chip (SoC) is an impressive flagship with 8 ARM cores (4x A76, 4x A55), plenty of cache, and a vast amount of peripheral2023hardware2023
Hardware and its Concurrency HabitsPaul E MACKENNEYThis talk will present a high-level overview of the hardware structure of modern computer systems, and then will use this structure to show how the la2023concurrency2023
How not to submit a patchset?Frederic WEISBECKERWhat makes an apparently good patchset fail? Despite the fact it hasn’t been applied, did you know that working on this patchset might have actually b2023patching2023
Linux and gaming: the road to performanceAndre ALMEIDAPlaying games on Linux has come from a painful reality, with a lot of tinkering, to (sometimes) a one-click experience. This happened because a lot of2023gaming2023
Netconf 2023 WorkshopDavid MILLERDavid will present a summary of the netconf workshop happening at Kernel Recipes this year.2023networking2023
On the way to io_uring networkingPavel BEGUNKOVio_uring has set a remarkably high bar for storage performance. Consequently, attention has naturally turned towards networking as the next frontier.2023storage2023
Panic AttackGuilherme G. PICOLIThe crash/panic path and all its related machinery were always subject to polemics; it’s an area naturally full of trade-offs, conflicting views and a2023debugging2023
Resource control in production at MetaChris DOWNControl groups (or cgroups for short) are one of the most fundamental technologies underpinning our modern love of containerisation and resource contr2023tooling2023
sched_ext: pluggable scheduling in the Linux kernelDavid VERNETScheduling is a notoriously difficult problem. An effective scheduler should fully utilize a system, while also optimizing for cache locality, while a2023scheduling2023
stress-ng: finding kernel bugs through stress testingColin IAN KINGStress-ng is a tool that stress tests kernels using deliberately intense testing to shake out various kernel (and hardware) bugs. This talk describes2023debugging2023
The Arm laptop projectJohan HOVOLDWhat would it take to run mainline Linux on an Arm laptop built for Windows? That was the question Linaro set out to answer in a project funded by Arm2023arm2023
The maintainer’s POVBorislav PETKOVThe collective work on the kernel between code submitters and maintainers is a strange symbiosis of constant back’n’forth and is often the source of m2023community2023
Update on Landlock: Audit Debugging and MetricsMickaël SALAUNLandlock enables to sandbox Linux applications but it might be challenging to identify the cause of denied accesses. Being able to debug a security po2023security2023
Coming soonThomas Gleixner2023community2023
Checking your work: validating the kernel by building and testing in CIDavid VERNERThe Linux kernel is one of the most complex pieces of software ever written. Being in ring 0, bugs in the kernel are a big problem, so having confidence in …2022testing2022
Developing Tilck a Tiny Linux-compatible kernelVladislav VALTCHEVOne of the ways to get a solid understanding of operating systems is to write one, from scratch. This is what Vlad has been doing in his free time since …2022tooling2022
Ftrace updateSteven ROSTEDT A lot of neat little features has been added to the ftrace tracing subsystem. This will go over what those are. From synthetic events to event probes. New triggers and …2022tracing2022
HID-BPFBenjamin TISSOIRESHID (Human Interface Device) is an old protocol which handles input devices. It is supposed to be standard and to allow devices to work without the need for a driver. …2022tracing2022
Idmapped MountsChristian BRAUNEROn most Linux filesystems ownership is expressed in the form of user identifiers (uid) and group identifiers (gid). The only way to alter ownership of a filesystem object is to …2022file-systems2022
io_uring: path to zerocopy I/OPavel BEGUNKOVWith I/O devices getting faster each year, memory copies are becoming more and more expensive, wasting a lot of CPU cycles and being a burden to the memory subsystem. The …2022storage2022
Linux on RISC-VDrew FUSTINIIt is an exciting time for Linux on RISC-V, the open instruction set (ISA) that is quickly gaining critical mass.  I will introduce the pieces needed to boot Linux on …2022arm2022
Looking at yourself: Linux Introspection talesArnaldo CARVALHO DE MELOIntrospection information, used originally by debuggers, has come a long way into playing a greater role in the functioning of Linux. Now its used by tracers, profilers, and then by …2022debugging2022
Make Linux developers fix your kernel bugThorsten LEEMHUISPssst! Don’t tell anyone, but there is a rule that forces Linux developers to fix certain kind of kernel bugs. This is pretty strictly enforced by Linux creator and lead-developer …2022community2022
New userspace API for display panel brightness-controlHans DE GOEDEThe current userspace API for brightness control offered by /sys/class/backlight devices has various problems: 1. There is no way to map the backlight device to a specific display-output / panel …2022graphics2022
Once upon an APIMichael KERRISK2022development2022
Powerful and Programmable Kernel Debugging with drgnOmar SANDOVALKernel bugs that sneak past testing into production tend to be tricky, convoluted, and hard to reproduce. When investigating such bugs, you often want to explore various data structures, look …2022debugging2022
Rethinking the kernel camera frameworkRicardo RIBALDAVideo4Linux (V4L2) has enabled hundreds of different multimedia devices, from TV tuners to the webcam that has accompanied you during the pandemic. Unfortunately, it has been neglected by vendors when …2022device2022
Test-driven kernel releasesGuillaume TUCKERUpstream Linux kernel testing has grown exponentially on many fronts during the past few years: kselftest is now more stable, KUnit gaining coverage and many out-of-tree test suites have kept …2022testing2022
The complete story of the in-kernel sloppy GPIO logic analyzerWolfram SANGYou know the rules, right? You should not implement a logic analyzer in software because equidistant sampling points cannot be guaranteed. You should also not disable interrupts in your kernel …2022gpio2022
The Kernel Self-Protection Project and how you can helpGustavo A.R SILVAThis presentation will cover some of the most recent KSPP accomplishments, as well as some currently active efforts. Also, a brief explanation of how you can help us complete some particularly challenging …2022security2022
The untold story of BPFAlexei STAROVOITOVThis talk will uncover for the first time the true origin of ‘Extended Berkley Packet Filter’. It would be fascinating for aspiring and expert open source developers to discover BPF’s …2022tracing2022
Trust and the Linux development modelGreg KHIn 2020, the University of Minnesota was found to have submitted a number of hypocrite commits to the Linux kernel development community in an attempt to prove that the kernel …2022development2022
We won’t live forever so what does that mean?David MILLERSpeaking about my stroke, how that effected me as a developer and my approach to delegation.2022community2022
What’s new with io_uringJens AXBOE A review about what’s new with io_uring. Faster IO with a consistent model.2022storage2022
Analyzing changes to the binary interface exposed by the Kernel to its modulesDodji SEKETELI – Matthias MANNICH – Jessica YUOperating system distributors often face challenges that are somewhat different from that of upstream kernel developers. For instance, some kernel updates often need to stay at least binary compatible with modules that might …2019abi2019
BPF at FacebookAlexei STAROVOITOVThis talk will provide several examples of how Facebook engineers use BPF to scale the networking, prevent denial of service, secure containers, analyze performance. It’s suitable for BPF newbies and experts.2019networking2019
CVEs are dead long live the CVE!Greg KHFor the Linux kernel, CVEs do not work at all given the rate of fixes being applied and rapidly backported and pushed to users through a huge variety of different ways. The …2019security2019
Driving the industry toward upstream firstEnric BALLETBO I SERRAWanting to avoid the Android experience, Google developers always aimed to make their Chrome OS Linux kernels as close to mainline as possible. However, when Chromebooks were first created, Google …2019community2019
Faster IO through io_uringJens AXBOESince the dawn of time, Linux has had to make do with inferior IO interfaces. Native Linux AIO supports only a niche application class (O_DIRECT), and even for that use case, it’s …2019storage2019
Formal modeling made easyDaniel BRISTOT DE OLIVEIRAModeling parts of Linux has become a recurring topic. For instance, the memory model, the model for PREEMPT_RT synchronization, and so on. But the term “formal model” causes panic for most of …2019development2019
ftrace: Where modifying a running kernel all startedSteven ROSTEDTFtrace’s most powerful feature is the function tracer (and function graph tracer which is built from it). But to have this enabled on production systems, it had to have its overhead be …2019tracing2019
GNU poke an extensible editor for structured binary dataJose E MARCHESIGNU poke is a new interactive editor for binary data. Not limited to editing basic ntities such as bits and bytes, it provides a full-fledged procedural, interactive programming language designed to describe …2019tooling2019
Hunting and fixing bugs all over the Linux kernelGustavo AR SILVAAt a rate of almost 9 changes per hour (24/7), the Linux kernel is definitely a scary beast. Bugs are introduced on a daily basis and, through the use of multiple code …2019debugging2019
Kernel documentation: past, present and futureJonathan CORBETThe Linux kernel project includes a huge amount of documentation, but that information has seen little in the way of care over the years. The amount of care has increased significantly …2019documentation2019
Kernel hacking behind closed doorsThomas GLEIXNERThe recent hardware security vulnerabilites exposed the kernel community to unprecedented restrictions and bureaucrazy. Pure software bugs which only affect the Linux kernel are a completely different category and the kernel community has …2019community2019
Marvels of Memory Auto-configuration (SPD)Jean DELVARESystem memory configuration is a transparent operation nowadays, something that we all came to expect to just work out of the box. Still, it does happen behind the scenes every single time …2019memory2019
Metrics are moneyAurélien ROUGEMONTIn I.T. we all use all kinds of metrics. Operations teams rely heavily on these, especially when things go south. These metrics are sometimes overrated. Let’s dive into a few …2019tooling2019
No NMI? No Problem! – Implementing Arm64 Pseudo-NMIJulien THIERRYAs the name would suggest, a Non-Maskable Interrupt (NMI) is an interrupt-like feature that is unaffected by the disabling of classic interrupts. In Linux, NMIs are involved in some features such as …2019arm2019
pidfds: Process file descriptors on LinuxChristian BRAUNERTraditionally processes are identified globally via process identifiers (PIDs). Due to how pid allocation works the kernel is free to recycle PIDs once a process has been reaped. As such, PIDs do …2019file-systems2019
RCU in 2019Joël FERNANDESRCU has seen lots of changes in the last 2 years. Of note is the RCU flavor consolidation and tree RCU’s lock contention improvements. There have been also improvements with static checking, …2019concurrency2019
Suricata and XDPEric LEBLONDSuricata is a network threat detection engine using network packets capture to reconstruct the traffic till the application layer and find threats on the network using rules that define behavior to detect. …2019security2019
The Next Steps toward Software Freedom for LinuxBradley KUHNLinux is likely the most important software project ever undertaken; it is essential to the future of freedom for users and developers alike. Many in our community believe that Linux’s continued success and …2019community2019
The ubiquity but also the necessity of eBPF as a technology to keep the kernel relevantDavid MILLERTraditionally operating systems are black boxes designed by system engineers that users simply have to “fit into”. Users do not want to be placed in a box, rather they want to …2019tracing2019
What To Do When Your Device Depends on Another OneRaphael WysockiContemporary computer systems are quite complicated. There may be multiple connections between various components in them and the components may depend on each other in various ways. At the same time, however, …2019device2019
XDP closer integration with network stackJesper DANGAARD BROUERXDP (eXpress Data Path) is the new programmable in-kernel fast-path, which is placed as a layer before the existing Linux kernel network stack (netstack). We claim XDP is not kernel-bypass, …2019networking2019
Atomic explosion: evolution and use of relaxed concurrency primitivesWill DEACONOver the past few years, the kernel has grown a modern, sophisticated memory model which is exposed directly to the developer and provides portable concurrency primitives across the 20+ architectures supported by mainline. …2018concurrency2018
CLIP OS: Building a defense-in-depth OS around Linux kernel…Mickael SALAUN, Timothée RAVIERThe French Network and Information Security Agency (ANSSI) just declassified and released the sources of its long-time internal hardened Linux distribution: CLIP OS. The project’s main goal is to build …2018security2018
Coccinelle: 10 Years of Automated Evolution in the Linux KernelJulia LAWALLThe Coccinelle C-program matching and transformation tool was first released in 2008 to facilitate specification and automation in the evolution of Linux kernel code. The novel contribution of Coccinelle is to allow software …2018tooling2018
CPU Idle Loop ReworkRaphael WYSOCKIThe CPU idle loop is the piece of code executed by logical CPUs if they have no tasks to run. If the CPU supports idle states allowing it to draw less power …2018power-management2018
From knowing the definition of Linux kernel to becoming a kernel hackerVaishali THAKKARSelf learning is underrated in the modern era of education. While kernel being the heart of an operating system, traditional universities [in India] are still far away from teaching anything more than the definition …2018development2018
Is Video4Linux ready for all cutting-edge hardware?Ezequiel GARCIA20182018
KernelShark 1.0 What’s new and what’s comingSteven ROSTEDTFtrace is the official tracer of the Linux kernel. It was added in 2008, and in 2009 came trace-cmd which was  a command line tool that would make interaction with ftrace easier. …2018tracing2018
Live (Kernel) Patching: status quo and status futurusJiri KOSINAThe purpose of this talk is to provide a short overview of the current live patching facility inside the linux kernel (with a brief history excursion), describe the features it currently provides, …2018patching2018
Meltdown and Spectre: seeing through the magician’s tricksPaolo BONZINIThroughout 2018 several computer vulnerabilities got into the spotlight, possessing all the ingredients needed to attract attention: the core issue was unusually located in the processor rather than the software; almost all personal …2018security2018
Mitigating Spectre and Meltdown vulnerabilitiesDavid WOODHOUSEThe Spectre and Meltdown vulnerabilities are part of a class of hardware flaws which have existed for years, but which have only recently been discovered. David will describe the problems, and explain …2018security2018
New GPIO Interface for User SpaceBartosz GOLASZEWSKISince linux 4.8 the GPIO sysfs interface is deprecated. Due to its many drawbacks and bad design decisions a new user space interface has been implemented in the form of …2018hardware2018
ObsBox: a Linux-based real-time system for LHC beam monitoringMiguel OJEDAAt the Large Hadron Collider (LHC) at CERN, Geneva, Switzerland, the radiofrequency and transverse damper feedback systems digitize beam phase and position measurements for beam studies. The “observation box” (ObsBox) diagnostic system parasitically …2018real-time2018
Overview of SD/eMMC their high speed modes and Linux supportGrégory CLEMENTSD and eMMC devices are widely present on Linux systems and became on some products the primary storage medium. One of the key feature for storage is the speed of the bus …2018hardware2018
Packets probes and eBPF filtering in SkydiveNicolas PLANELEfficient monitoring of large-scale networks poses a delicate balance between capture granularity on the one hand and the imposed overheads and performance penalties on the other. Skydive is an open source real-time network topology …2018networking2018
Qemu in UEFIAlexander GRAFUEFI is a firmware specification created by Intel with portability in mind. The UEFI way of doing that was to provide special UEFI byte code (EBC). Unfortunately nobody really cared so compiler, …2018virtualization2018
State of CPU IsolationFrédéric WEISBECKERThe kernel is great at doing its job for your task, providing unified access to hardware, filesystem, network, scheduling your code when you need to, … But can’t it all be done …2018hardware2018
TPM enabling the Crypto Ecosystem for enhanced SecurityJames BOTTOMLEYFor decades, all laptops have come with a TPM.  Now with Microsoft forcing the transition to the next  generation, Linux faces a challenge in that all the previous TPM 1.2 tools don’t work with 2.0.  Having …2018security2018
XDP: a new programmable network layerJesper DANGAARD BROUERThis talk will introduce XDP (eXpress Data Path), and explain how this is essentially a new (programmable) network layer in-front of the existing network stack. Then it will dive into the details …2018networking2018
Zinc: New Cryptography API for Linux KernelJason DONENFELDZinc is a new minimal cryptography API for the kernel that is in the process of being upstreamed. Rather than providing an abstracted framework, Zinc provides simple functions. This talk …2018security2018
A year of fixing Coverity issues all over the Linux kernelGustavo AR SILVACoverity is a static analyzer that scans the kernel code and reports issues that can hide coding mistakes and vulnerabilities. Currently, it reports around 5,000 outstanding defects in the Linux …2018debugging2018
The Power Supply SubsysytemSebastian REICHELDo you know how batteries and battery chargers are handled in the Linux kernel subsystem? While not as complex as the DRM subsystem, the power-supply subsystem is a key part …2018hardware2018
20 years of Linux virtual memoryAndrea ARCANGELIAndrea will provide a short high level view of the most notable milestones in the evolution of the Linux Virtual Memory over the years. He will then f2017memory2017
An introduction to the Linux DRM subsystemMaxime RIPARDEvery modern multimedia-oriented ARM SoC usually has a number of display controllers, to drive a screen or an LCD panel, and a GPU, to provide 3D acce2017graphics2017
Container FS interfacesJames BOTTOMLEYMany talks about containers start with Orchestration systems like Docker or Kubernetes. However, this one will look at the storage impacts on the actu2017containers2017
EBPF and XDPEric LEBLONDBerkeley Packet Filter is an old friend for most people that deal with network under Linux. But its extended version eBPF is completely redefining the2017networking2017
HDMI CEC: Status ReportHans VERKUILThe HDMI connector features a CEC (Consumer Electronics Control) pin that allows connected devices to detect and control one another. A new framework2017graphics2017
Linux kernel ABI specificationSasha LEVINThe ABI, the layer that joins the kernel and userspace is quite a mess. Various different interfaces, lacking documentation, and constant changes make2017abi2017
Linux Kernel release modelGreg KHThis talk describes how the Linux kernel development model works, what a long term supported kernel is, and why all Linux-based systems devices should2017community2017
Modern Key Management with GPGWerner KOCHThis talk describes how the Linux kernel development model works, what a long term supported kernel is, and why all Linux-based systems devices should2017security2017
Overview of Generic PM Domains (genpd)Kevin HILMANThe generic PM domains (genpd) framework in the kernel provides a way of grouping devices together that have common power management (PM) operations.2017power-management2017
Perf in NetflixBrendan GREGGLinux perf is a crucial performance analysis tool at Netflix, and is used by a self-service GUI for generating CPU flame graphs and other reports. Thi2017performance2017
Performance Analysis with BPFBrendan GREGGThe in-kernel Berkeley Packet Filter (BPF) has been enhanced in recent  kernels to do much more than just filtering packets. It can now run user-defin2017performance2017
Refactoring the Linux KernelThomas GLEIXNERThe effort to merge the real-time preemption patch into the mainline kernel requires to refactor existing infrastructure in the kernel. Such refactori2017development2017
Testing on-device with LAVA / Continuous IntegrationOlivier CRETEContinous integration has gained a lot of popularity in the open source world in recent years, with the loud/web world at the forefront. The kernel wo2017tooling2017
The Serial Device BusJohan HOVOLDUARTs and RS-232 have been around since the 1960s, and despite the advent of technologies like USB and PCIe, it seems UART-attached devices are not go2017hardware2017
The State of Kernel Self-ProtectionKees COOKThe Kernel Self-Protection Project focuses on addressing gaps in Linux’s defensive technologies. With Linux reaching into every corner of modern life,2017security2017
Understanding the Linux Kernel via FtraceSteven ROSTEDTFtrace is the official tracer of the Linux kernel. It has been apart of Linux since 2.6.31, and has grown tremendously ever since. Ftrace’s name comes2017tracing2017
What’s Inside The Input Stack?Benjamin TISSOIREEverybody uses at least one input device when dealing with a computer. And hopefully, this input device “just” works. However, when dealing with the b2017input2017
What’s new in the world of storage for linuxJens AXBOEStorage keeps moving forward, and so does the Linux IO stack. This talk will detail some of the recent  additions and changes that have gone into the2017storage2017
Software Heritage: our Software Commons, foreverNicolas DANDRIMONTSoftware Heritage, the universal source code archive, was announced to the public in the spring of 2016. Since then, our development has been running2017community2017
Fixing coverity bugs all around the Linux kernelGustavo AR SILVACoverity scans the kernel code and reports issues that can hide coding mistakes and vulnerabilities. It reports around 6,000 outstanding defects in th2017debugging2017
Build farm againWilly TARREAUFollowing a talk last year, Willy will present a review about how he used his build farm, some feedbacks about hardware and what improvment he could p2017tooling2017
Control Group Status UpdateTejun HEOcgroup has seen a lot of activities recently especially with the v2 effort. This talk goes over the v2 interface and discusses the recent developments and what’s to come in cgroup.2016cgroup2016
Debian’s support for Secure Boot on x86 and ARMBen HUTCHINGSDesktop and laptop PCs designed to run Windows will now only run a boot loader signed by Microsoft or by their manufacturer, unless manually reconfigured. Several Linux distributions now include the necessary chain …2016security2016
entry_*.S: A carefree stroll through kernel entry codeBorislav PETKOVI have always wondered what happens when we enter the kernel from userspace: what preparations does the hardware meet when the userspace to kernel space switch instructions are executed and …2016development2016
From ‘git tag’ to the front page: how kernel releases are madeKonstentin RYABITSEVGo on a detailed journey through the kernel.org infrastructure all the way from the moment Linus does “git tag” to when the front page of kernel.org says that there is a new kernel release …2016community2016
Kernel documentation: what we have and where it’s goingJonathan CORBETThe Linux kernel features an extensive array of, to put it kindly, somewhat disorganized documentation. A significant effort is underway to make things better, though. This talk will review the …2016documentation2016
kernelci.org: 1.5 million kernel boots (and counting)Kevin HILMANThe kernelci.org project performs over 2000 kernel boot tests per day for upstream kernels on a wide variety of hardware.  This talk will provide an overview of kernelci.org, how distributed board farms …2016tooling2016
Landlock LSM: Unprivileged sandboxingMickael SALAUNLinux has multiple access-control features, which help to contain the damage from a malicious process. However, it is difficult and complex, especially for unprivileged users, to create a sandboxed application because of the …2016security2016
Maintainer’s Don’t ScaleDaniel VETTERA tale from one of the busier places (by patch churn at least) in the kernel, and how to make it all work well. Since about 1 year the drm/i915 kernel driver …2016community2016
Man-pages: discovery feedback loops and the perfect kernel commit messageMichael KERRISKThe Linux man-pages project lives on the boundary between two worlds that are not always mutually intelligible: the kernel and user-space programs. One subgoal of that project is to allow the two …2016documentation2016
New hwmon device registration APIJean DELVAREThe hwmon subsystem originates from the 1998 project lm-sensors. Along the way, there have been a lot of effort done to have all drivers present a standard interface to user-space, …2016hardware2016
Patches carved into stone tablets…Greg KHWith the wide variety of more “modern” development tools such as github, gerrit, and other methods of software development, why is the Linux kernel team still stuck in the 1990’s with ancient requirements …2016tooling2016
Speeding up development by setting up a kernel build farmWilly TARREAUBuilding a full kernel takes time but is often necessary during development or when backporting patches. The nature of the kernel makes it easy to distribute its build on multiple …2016tooling2016
The kernel reportJonathan CORBETThe Linux kernel is at the core of any Linux system; the performance and capabilities of the kernel will, in the end, place an upper bound on what he system as a …2016community2016
The Linux Driver ModelGreg KHThe Linux driver model was created over a decade ago with the goal of unifying all hardware drivers in the kernel in a way to provide both consitant device naming …2016drivers2016
Understanding a Real-Time System (more than just a kernel)Steven ROSTEDTThe PREEMPT_RT patch turns Linux into a hard Real-Time designed operating system. But it takes more than just a kernel to make sure you can meet all your requirements. This …2016real-time2016
Upstream Kernel Graphics is (Finally) WinningDaniel VETTERAbout 5 years ago I was at a big conference on the topic of what’s needed for upstream graphics. I spent a lot of time apologizing for and ranting about the various …2016graphics2016
Video and ColorspacesHans VERKUILIn order to correctly reproduce the colors encoded in a video (or a still image for that matter) you need to know the colorspace information associated with the video. But what …2016graphics2016
Who needs a Real-Time Operating System (Not You!)Steven ROSTEDTA Real-Time Operating System (RTOS) is used for mission critical projects that require a deterministic response time for external stimuli. Many times project managers request an RTOS even though they …2016real-time2016
Why you need a test strategy for your kernel developmentLaurent PINCHARTTesting is important. That’s a well known fact that very few developers will dispute. Why is then so little kernel code covered by a clear testing strategy ? Through real …2016testing2016
Would an ABI changes visualization tool be useful to Linux Kernel maintenance?Dodji SEKETELILibabigail is a new infrastructure for semantic analysis of ELF binaries containing C or C++ programs that has emerged lately. It powers command line tools like ‘abidiff’, which let users …2016abi2016
The Free Software Bastard GuideClément OUDOTDeveloper, Enterprise, there are many ways to be a Free Software bastard. This talk will give you some useful hints to become the best asshole in communities.2016community2016
Amateur practice of ethernet driversFrançois ROMIEUThis talk will  focus on various highlights of ethernet drivers and their maintenance as the speaker was able to practice for several years to the Linux kernel.2015networking2015
An Introduction to GreybusGreg KHGreybus is the name for a new application layer protocol on top of Unipro that controls the Ara Phone from Google. This protocol turns a phone into a modular device, …2015hardware2015
Anatomy of an Atomic KMS DriverLaurent PINCHARTThe DRM and KMS APIs have won in the Linux graphics ecosystem. Long gone are the days when KMS meant only a handful of desktop graphics drivers. As a side …2015graphics2015
CPU isolationFrédéric WEISBECKERcpu2015
Hardened kernels for everyoneYves-Alexis PEREZGrsecurity is a Linux kernel hardening patch. The PaX patchset it includes pioneered some security features like ASLR which where later included in basically every operating system. But the patch …2015security2015
Hardware Manufacturer and Linux kernel relationshipsBruno CORNECEvery Linux kernel needs a hardware platform to run it. Compared to twenty years ago, the relationships between hardware manufacturers and the Linux kernel community has improved in order to …2015hardware2015
How to choose a kernel for your products?Willy TARREAUIt’s often difficult to select a kernel for products that are shipped to customers. Several branches exist, bugs need to be avoided as much as possible and updates must be rare enough …2015community2015
Introduction to Kernel Power ManagementKevin HILMANIn order to keep up with the complexities of SoCs, the Linux kernel has an ever-growing set of features for power management. For the uninitiated, it can be confusing how …2015power-management2015
Kernel packet capture technologiesEric LEBLONDCapturing packets running on the wire to send them to a software doing analysis seems at first sight a simple tasks. But one has not to forget that with current …2015networking2015
Linux kernel IO subsystem: How it works and how can I see what is it doing?Jan KARAUnderstanding how Linux kernel IO subsystem works is a key to analysis of a wide variety of issues occurring when running a Linux system. This talk is aimed at helping …2015storage2015
Linux Stable Release processGreg KHThe Linux kernel gets a stable release about once every week. This talk will go into the process of getting a patch accepted into the stable releases, how the release …2015community2015
Multi-campus Layer 2 Network Fabric: what? why? How?William DAUCHYTwo years ago we presented our implementation of Virtual Network over TRILL in the Linux kernel. We were able to build lots of logic networks within a datacenter. Now the work continue …2015networking2015
Representing device-tree peripherals in ACPIDavid WOODHOUSEPlatforms using ACPI firmware are becoming increasingly interesting to embedded developers. This presentation will demonstrate the new features in the ACPI 5.1 specification which make it possible for ACPI to …2015firmware2015
So you want to write a Linux driver frameworkMike TURQUETTEWriting a new driver framework in Linux is hard. There are many pitfalls along the way; this talk hopes to point out some of those pitfalls and hard lessons learned …2015drivers2015
Solving the Linux storage scalability bottlenecksJens AXBOEFlash devices introduced a sudden shift in the performance profile of direct attached storage. With IOPS rates orders of magnitude higher than rotating storage, it became clear that Linux needed …2015storage2015
Speed up your kernel development cycle with QEMUStefan HAJNOCZIKernel development is often associated with rebooting crashed machines, debugging over serial consoles, and an unwiedly development cycle. Developers know that short development cycles are incredibly important for programmer productivity. The QEMU machine …2015development2015
WireGuard: A Kernelspace VPNJason DONENFELDWireGuard is an upcoming project to replace IPSec with a newer more modern and secure VPN protocol. It lives inside the kernel and provides a very simple and novel interface …security2015
kGraft: Live Patching of the Linux KernelJiri SLABYThe talk introduces the need of live kernel patching. Further, it explains what is kGraft, how it works, what are its limitations, and our plans with the implementation in the …patching2014
Linux Security Modules: tracing deciding actingSamir BELLABESLinux Security Modules – LSM – is a framework that allows to support a number of security models for Linux kernel. At Kernel Recipes 2012 and 2013, we discussed about …security2014
Manage patches with QuiltJean DELVAREA presentation of the quilt patch management tool, including use cases (SUSE kernel, OBS) and practical usability tips. Quick presentation of what quilt is, what it can be used for, …tooling2014
NDIV: a low overhead network traffic diverterWilly TARREAUNDIV is a young, very simple, yet efficient network traffic diverter. Its purpose is to help build network applications that intercept packets at line rate with a very low processing …networking2014
Quick state of the art of clangSylvestre LEDRUWorking on clang for a while now, I will propose a review of my work on debian rebuild and comment results.tooling2014
Supporting a new ARM platform: the Allwinner exampleMxime RIPARDSince last year, we have been working on supporting the SoCs from Allwinner, a chinese SoC vendor, in the mainline kernel. These SoCs are cheap, wide-spread, backed by a strong community and, …arm2014
Testing Video4Linux Applications and DriversHans VERKUILThe video4linux subsystem of the kernel is a very large API with many ioctls, settings, options and capabilities. This poses a problem both for the kernel developer and for the …graphics2014
The Linux graphics stack and Nouveau driverMartin PERESThe Linux graphics stack is constantly evolving to add support for new hardware. This evolution and new software specifications have forced the X graphical server to be split into several …graphics2014
The Linux Kernel how fast it is developed and how we stay sane doing itGreg KHThis talk will go into the latest statistics for the development of the Linux kernel. It will describe how the many thousand developers all work together and are able to release a …development2014
What’s new in NftablesEric LEBLONDNftables is a new packet filtering framework which aims at replacing iptables. It has been developed by the Netfilter team who wanted after 10 years of development to get rid …networking2014
Writing Code: Keep It Short Stupid!Hans VERKUILThe traditional KISS principle says that you are stupid if you can’t keep it simple. However, keeping it simple is actually very, very hard. But my lasting impression after reading …development2014
x86 instruction encoding and the nasty hacks we do in the kernelBorislav PETKOVI have always wanted to understand x86 instruction encoding in detail but never gotten around to it. Of course not, who has time nowadays?! So, in order to force me …arm2014
Xen as a foundation for cloud infrastructureJulien GRALLIt is no accident that Xen software powers some of the largest Clouds in existence. From its outset, the Xen Project was intended to enable what we now call Cloud Computing. This …virtualization2014
ARM support in kernel Overview and understandThomas PETAZZONIOver the past two years, the support of the platforms based on ARM processor in the Linux kernel  has evolved considerably. Between the use of the Device Tree, moving drivers in many …2013arm2013
Automating source code evolutions using CoccinelleJulia LAWALLNew APIs are continually added to the Linux kernel, to improve functionality, reliability, or performance.  Nevertheless, it is a challenge to update old code to use these new APIs.  Coccinelle is a …2013debugging2013
Crosstool-ng A cross-toolchain generatorYann E MORINA toolchain is an essential component in a software development project. It will compile, assemble and link the code that is being  developed, and thus is a very sensitive piece of any …2013tooling2013
Deciphering Oopsies How to debug kernel oopsBorislav PETKOVThe Linux kernel is a very complex beast living in millions of households and data centers around the world. Normally, you’re not supposed to notice its presence but when it gets cranky …2013debugging2013
Display and kernel: review and futureLaurent PINCHART2013graphics2013
Distributions and Kernel DebianMaximilian ATTEMS2013community2013
Developping drivers on small machinesWilly TARREAUThe objective of this conference is to explain how to develop on small machines that can boot fast,  fanless …  It’s convenient and often more realistic than to work in …2013development2013
Linux Security Modules Formal conceptsSamir BELLABESThis conference proposes to browse the differences between the models that make up the security modules of Linux kernels. An introduction to implementation will be presented in order to understand …2013security2013
Nftables Why and how?Eric LEBLONDIptables and Netfilter were introduced in 2001 along with Linux 2.4 as  the full  layer for firewall. The functionalities and the codes changed quite a lot during this decade, but …2013networking2013
VNT Design and implementationWilliam DAUCHYIaaS Providers need next-generation virtualized networks, providing large-scale multi-tenancy services and meeting new requirements in terms of efficiency and availability. The main limitation of current network architectures mainly comes from inadequate design standards. …2013development2013
Persistent logs using UBIMatthew CASTETA short presentation about a library for persistent log based on the UBI layer. The goal is to enable an embedded software component to log persistent messages  (even after a full update …2013tooling2013
kconfig-frontends, a packaging of the kconfig parser and frontendsYann E MORINThe configuration language used by the Linux kernel, known as kconfig, has gained some traction in the community, and is increasingly used by  third-party projects. The kconfig-frontends package aims at centralising the …2013tooling2013
Easy rootfs using BuildrootThomas PETAZZONIThe Linux kernel is an exciting world. But  if you want to get a working system, it is still essential to provide our kernel a root filesystem. The kernel developers …2013tooling2013
Viewing real time ltt trace using gtkwaveIvan DJELICThis presentation will explain how to use some ltt to be viewd in gtkwave, a graphical visualization tool, developped by the Parrot team. It will also explain why this tool …2013tracing2013
Coccinelle, a bug finding tool Julia LAWALL2012tooling2012
Embedded is not special David WOODHOUSE2012hardware2012
Flash memory David WOODHOUSE2012hardware2012
Interruption timer périodique Frédéric WEISBECKER2012hardware2012
Les mécanismes de contrôle d’accès du kernel Samir BELLABES2012security2012
Maintenance des branches stables du noyau Willy TARREAU2012community2012
Maintenir un sous systeme du noyau linux Jean DELVARE2012community2012
Pinhole story Eric LEBLOND2012security2012