SUSE Labs Conference 2026
09:00 - 09:05
Welcome
09:05 - 10:00
Thorsten Kukuk: Update from the Future Technology Team
In this talk I will speak about what the Future Technology Team did in the last year. Some of the bigger topics are: * Running the distro with NoNewPrivs option/ no_new_privs flag set; * Building openSUSE Tumbleweed and MicroOS images with mkosi; * Update on Full Disk Encryption with TPM and Fido2; * Update on bootloaders: systemd-boot vs grub2-bls vs grub2-efi vs grub2, EFI vs Legacy BIOS; * fuel-ignition, ignition and combustion; * And much more
In this talk I will speak about what the Future Technology Team did in the last year. Some of the bigger topics are: * Running the distro with NoNewPrivs option/ no_new_privs flag set; * Building openSUSE Tumbleweed and MicroOS images with mkosi; * Update on Full Disk Encryption with TPM and Fido2; * Update on bootloaders: systemd-boot vs grub2-bls vs grub2-efi vs grub2, EFI vs Legacy BIOS; * fuel-ignition, ignition and combustion; * And much more
10:00 - 11:00
[Arm] Arm 2.0 starts with the AGI chip
11:00 - 11:15
coffee-break
11:15 - 11:45
Ignaz Forster: State of transactional-update (2026 edition)
Since the last update in 2024 a few new features have accumulated which may be worth highlighting. Let's have a look at a few more more prominent ones: * /etc subvolumes: How the migration from the relatively complex overlayfs layers to /etc btrfs subvolumes works; * OCI images: How to update the system using an OCI image with all its advantages and disadvantages; * tukit plugins: How to hook into API function calls; * Debugging snapshots with --keep: Why you should not use it; * systemd logging: Where to find the log output now; * A short summary of other noteworthy changes if you are using a transactional system yourself.
Since the last update in 2024 a few new features have accumulated which may be worth highlighting. Let's have a look at a few more more prominent ones: * /etc subvolumes: How the migration from the relatively complex overlayfs layers to /etc btrfs subvolumes works; * OCI images: How to update the system using an OCI image with all its advantages and disadvantages; * tukit plugins: How to hook into API function calls; * Debugging snapshots with --keep: Why you should not use it; * systemd logging: Where to find the log output now; * A short summary of other noteworthy changes if you are using a transactional system yourself.
11:45 - 12:15
Petr Pavlu: Update on kABI tooling for SUSE kernels
kABI is a kernel variant of the application binary interface. SUSE kernels provide stable kABI support, which is one value add. Maintaining this stability requires a series of tools. The talk offers a brief introduction to kABI concepts and outlines the kABI pipeline used by SUSE kernels, focusing on genksyms, suse-kabi-tools and fixup writing. It will discuss the individual tools in this pipeline and highlight new developments. The presentation will cover the upstream tool gendwarfksyms, recent changes to suse-kabi-tools and experiments with automated kABI fixup writing. The talk will conclude with a summary and a discussion of future plans. The session should provide a good overview of recent, ongoing and upcoming tooling changes affecting kABI checking in SUSE Linux.
kABI is a kernel variant of the application binary interface. SUSE kernels provide stable kABI support, which is one value add. Maintaining this stability requires a series of tools. The talk offers a brief introduction to kABI concepts and outlines the kABI pipeline used by SUSE kernels, focusing on genksyms, suse-kabi-tools and fixup writing. It will discuss the individual tools in this pipeline and highlight new developments. The presentation will cover the upstream tool gendwarfksyms, recent changes to suse-kabi-tools and experiments with automated kABI fixup writing. The talk will conclude with a summary and a discussion of future plans. The session should provide a good overview of recent, ongoing and upcoming tooling changes affecting kABI checking in SUSE Linux.
12:15 - 13:30
lunch
13:30 - 14:15
Shung-Hsi Yu: bpftrace: a swiss army knive tracing tool
This talk will give a quick introduction to bpftrace, an awk-like scripting language powered by BPF that specializes in tracing. We'll go through its concept, syntax, and provide a few example usage to see it in action, and finally close with a comparison with other existing tracing tools (bcc, ftrace, LTTng, systemtap, to name a few).
This talk will give a quick introduction to bpftrace, an awk-like scripting language powered by BPF that specializes in tracing. We'll go through its concept, syntax, and provide a few example usage to see it in action, and finally close with a comparison with other existing tracing tools (bcc, ftrace, LTTng, systemtap, to name a few).
14:15 - 15:00
João Póvoas: Kernel CVE Process: Overview and Open Discussion
We will review our stabilized kernel CVE pipeline to ensure everyone is up to date on upstream CVE flagging, vulnerability assessment, patch/backport handling, and the tools and automation we have in place. We will also discuss future strategies to reduce our reliance on upstream, enabling us to identify and backport security fixes more independently and faster. The remainder of the session will be an open discussion to hear your complaints, identify workflow breakdowns, and gather ideas to improve the process.
We will review our stabilized kernel CVE pipeline to ensure everyone is up to date on upstream CVE flagging, vulnerability assessment, patch/backport handling, and the tools and automation we have in place. We will also discuss future strategies to reduce our reliance on upstream, enabling us to identify and backport security fixes more independently and faster. The remainder of the session will be an open discussion to hear your complaints, identify workflow breakdowns, and gather ideas to improve the process.
15:00 - 15:15
coffee-break
15:15 - 16:00
[FUJITSU] The Future of BS2000 Virtualization on x86. Moving from Xen to KVM
BS2000 is the mainframe operating system for Fujitsu’s SE series mainframe systems. Originally developed for and still natively running on /390 platforms, it has also been brought onto x86 systems, where it is running virtualized on Xen. In the future, ujitsu’s aim is to transition from Xen to KVM virtualization. In this presentation, we will look into current implementation details with Xen and question what needs to be considered when moving from there to KVM. We will present ideas and findings that e came along already and hope for further ideas and input from the audience.
BS2000 is the mainframe operating system for Fujitsu’s SE series mainframe systems. Originally developed for and still natively running on /390 platforms, it has also been brought onto x86 systems, where it is running virtualized on Xen. In the future, ujitsu’s aim is to transition from Xen to KVM virtualization. In this presentation, we will look into current implementation details with Xen and question what needs to be considered when moving from there to KVM. We will present ideas and findings that e came along already and hope for further ideas and input from the audience.
16:00 - 16:45
Martin Wilck: Improving Kernel Module Packaging
SUSE's approach to packaging 3rd party modules using Kernel Module Packages (KMPs), which exists in almost unchanged form since SLE11, is well thought-out and very successful. But there are some recurring issues in particular when KMPs must be updated to a new module version. This is related to the use of "Provides: multiversion(kernel)" in the KMPs. In short, updating modules doesn't work reliably. A possible workaround is not using "multiversion(kernel)", but that has negative side effects, especially if a KABI-incompatible kernel maintenance update is shipped by SUSE. This talk explains the issues and discusses various approaches to the problem. It shows a way to modify the KMP packaging slightly, such that both module updates and KABI-incompatible kernel updates can be handled gracefully.
SUSE's approach to packaging 3rd party modules using Kernel Module Packages (KMPs), which exists in almost unchanged form since SLE11, is well thought-out and very successful. But there are some recurring issues in particular when KMPs must be updated to a new module version. This is related to the use of "Provides: multiversion(kernel)" in the KMPs. In short, updating modules doesn't work reliably. A possible workaround is not using "multiversion(kernel)", but that has negative side effects, especially if a KABI-incompatible kernel maintenance update is shipped by SUSE. This talk explains the issues and discusses various approaches to the problem. It shows a way to modify the KMP packaging slightly, such that both module updates and KABI-incompatible kernel updates can be handled gracefully.
16:45 - 17:15
Michal Koutný: Good, bad and ugly syscalls in Linux
The Linux syscall table has got nearly 400 entries by now. I set out to go through them and pick various rudiments as cautionary examples (while at the same time sticking to "not breaking userspace"). Then I noticed some patterns where the API evolved into newer and nicer form (which is worth bringing up here). This topic may be useful to users and creators of other APIs than of the Linux kernel. This talk is not meant to substitute [The Linux Programming Interface](https://www.man7.org/tlpi/) book, it is refreshed and translated version of my [previous talk at Linux Days](https://pretalx.linuxdays.cz/linuxdays-2025/talk/RYZUML/).
The Linux syscall table has got nearly 400 entries by now. I set out to go through them and pick various rudiments as cautionary examples (while at the same time sticking to "not breaking userspace"). Then I noticed some patterns where the API evolved into newer and nicer form (which is worth bringing up here). This topic may be useful to users and creators of other APIs than of the Linux kernel. This talk is not meant to substitute [The Linux Programming Interface](https://www.man7.org/tlpi/) book, it is refreshed and translated version of my [previous talk at Linux Days](https://pretalx.linuxdays.cz/linuxdays-2025/talk/RYZUML/).
17:15 - 17:45
Jan Kara: Interesting performance bugs
In this talk I will speak about two performance bugs I have been working on during last year: A regression in performance of a DB2 backup to XFS filesystem and a regression (but see the talk) in streaming IO performance to Ceph RBD (network block device). The dead ends we have explored as well as leads which eventually helped to track the problem down.
In this talk I will speak about two performance bugs I have been working on during last year: A regression in performance of a DB2 backup to XFS filesystem and a regression (but see the talk) in streaming IO performance to Ceph RBD (network block device). The dead ends we have explored as well as leads which eventually helped to track the problem down.
09:05 - 10:00
Enno Gotthold: Reproducible infrastructure with Ansible & Terraform in Orthos 2
Orthos 2 is SUSE Labs' management tool of choice for sharing bare-metal machines with colleagues. The talk will provide an introduction to Ansible & Terraform, and show how internally at SUSE you can use Ansible to provision machines reproducibly after installation.
Orthos 2 is SUSE Labs' management tool of choice for sharing bare-metal machines with colleagues. The talk will provide an introduction to Ansible & Terraform, and show how internally at SUSE you can use Ansible to provision machines reproducibly after installation.
11:00 - 11:15
coffee-break
11:15 - 11:45
Nicolai Stange: Introducing CocoonFs -- secure persistence for Confidential Computing core state
SUSE has been a birthbed for key Confidential Computing projects like the "COCONUT Secure VM Service Module" (SVSM), which has moved under the umbrella of the LF's Confidential Computing Consortium since. It became clear during early stages of development that some means of securely persisting sensitive core state, like that of an emulated TPM, would be needed. Assuming malicious hypervisors, existing FDE solutions operating at the block-layer (e.g. stacked "dm-crypt" + "dm-integrity"), which have been designed with the intent to protect data at rest, don't address the security needs of the SVSM at a satisfactory level. This led the presenter to create a new special-purpose filesystem format specifically tailored to the needs for protecting the most sensitive core TEE state: "CocoonFs". After revisiting the relevant abstract security definitions, the talk will give a quick overview on where common FDE solutions fall them short (on purpose), introduce the main "CocoonFs" format features, and discuss some of the trade-offs made.
SUSE has been a birthbed for key Confidential Computing projects like the "COCONUT Secure VM Service Module" (SVSM), which has moved under the umbrella of the LF's Confidential Computing Consortium since. It became clear during early stages of development that some means of securely persisting sensitive core state, like that of an emulated TPM, would be needed. Assuming malicious hypervisors, existing FDE solutions operating at the block-layer (e.g. stacked "dm-crypt" + "dm-integrity"), which have been designed with the intent to protect data at rest, don't address the security needs of the SVSM at a satisfactory level. This led the presenter to create a new special-purpose filesystem format specifically tailored to the needs for protecting the most sensitive core TEE state: "CocoonFs". After revisiting the relevant abstract security definitions, the talk will give a quick overview on where common FDE solutions fall them short (on purpose), introduce the main "CocoonFs" format features, and discuss some of the trade-offs made.
11:45 - 12:15
Antoine Ginies: Virtui-manager
A New tool to manage Virtual Machine. No X11 required: runs perfectly on headless servers and remote connections via SSH. Transhypervisor View: Manage VMs across multiple Libvirt servers in one unified dashboard. Smart Caching: caching reduces latency and API load. Built directly on the Libvirt API for maximum compatibility and stability with QEMU/KVM environments. Real-time updates via events ensure ultra-low bandwidth usage and immediate UI responsiveness. Full support for snapshots and disk overlays: branch your VM states or revert changes with confidence. Manage large scale fleets by selecting VMs using flexible regex patterns and group filters. Custom Migration support: workaround some migration limitation. Granular Server Preferences allow you to manage storage pools and network configurations remotely. Auto installation support: Autoyast and Agama for openSUSE and SLES.
A New tool to manage Virtual Machine. No X11 required: runs perfectly on headless servers and remote connections via SSH. Transhypervisor View: Manage VMs across multiple Libvirt servers in one unified dashboard. Smart Caching: caching reduces latency and API load. Built directly on the Libvirt API for maximum compatibility and stability with QEMU/KVM environments. Real-time updates via events ensure ultra-low bandwidth usage and immediate UI responsiveness. Full support for snapshots and disk overlays: branch your VM states or revert changes with confidence. Manage large scale fleets by selecting VMs using flexible regex patterns and group filters. Custom Migration support: workaround some migration limitation. Granular Server Preferences allow you to manage storage pools and network configurations remotely. Auto installation support: Autoyast and Agama for openSUSE and SLES.
12:15 - 13:30
lunch
13:30 - 14:15
Christian Goll: Leveraging Local LLMs for Automated Changelog Generation
Creating accurate changelog entries is often the final hurdle in the package submission process, where time pressure can lead to critical updates being overlooked. Since submission requests in the Open Build Service (OBS) contain the necessary technical context—including spec file diffs, file lists, and release notes—this task is an ideal candidate for automation using Large Language Models (LLMs). This talk explores the end-to-end workflow of fine-tuning a local LLM for this specialized task. We will cover how to extract data from OBS and the essential steps required to prepare it for training. Additionally, the talk discusses the fundamentals of fine-tuning, including model size selection and the optimization of tuning parameters.
Creating accurate changelog entries is often the final hurdle in the package submission process, where time pressure can lead to critical updates being overlooked. Since submission requests in the Open Build Service (OBS) contain the necessary technical context—including spec file diffs, file lists, and release notes—this task is an ideal candidate for automation using Large Language Models (LLMs). This talk explores the end-to-end workflow of fine-tuning a local LLM for this specialized task. We will cover how to extract data from OBS and the essential steps required to prepare it for training. Additionally, the talk discusses the fundamentals of fine-tuning, including model size selection and the optimization of tuning parameters.
14:15 - 15:00
Cyril Hrubis: Rust in Kernel (Discussion)
The amount of rust code in the kernel grows steadily and we should start figuring out how to deal with it. There are a lot points to consider, rust version, kernel packaging, kABI, livepatching, etc.
The amount of rust code in the kernel grows steadily and we should start figuring out how to deal with it. There are a lot points to consider, rust version, kernel packaging, kABI, livepatching, etc.
15:00 - 15:15
coffee-break
16:00 - 16:45
Dario Faggioli: Running VMs with different schedulers: from CFS to EEVF, and even sched_ext
The Linux scheduler is undergoing a significant transformation, with the transition from the long-standing Completely Fair Scheduler (CFS) to the Earliest Eligible Virtual Deadline First (EEVDF), and even more so with the extensible, BPF-based, sched_ext framework. This session will show the results of a benchmarking campaign aimed at comparing legacy (as fairly as we'll be able to) CFS, EEVDF, and a few of the emerging sched_ext based solutions across different SUSE and openSUSE distributions. By simulating multi-VM scenarios, with varying degrees of oversubscription and heterogeneous workloads, we will try to offer a quantitative estimation of the impact of the different scheduling algorithms on some virt-typical KPIs, such as throughput, latency and resource utilization.
The Linux scheduler is undergoing a significant transformation, with the transition from the long-standing Completely Fair Scheduler (CFS) to the Earliest Eligible Virtual Deadline First (EEVDF), and even more so with the extensible, BPF-based, sched_ext framework. This session will show the results of a benchmarking campaign aimed at comparing legacy (as fairly as we'll be able to) CFS, EEVDF, and a few of the emerging sched_ext based solutions across different SUSE and openSUSE distributions. By simulating multi-VM scenarios, with varying degrees of oversubscription and heterogeneous workloads, we will try to offer a quantitative estimation of the impact of the different scheduling algorithms on some virt-typical KPIs, such as throughput, latency and resource utilization.
16:45 - 17:15
Cathy Hu: SELinux for package maintainers: Dos and Don'ts
In this presentation, we will discuss packaging guidelines and scenarios you might encounter as a package maintainer. We will explain how to integrate independent custom modules, deal with SELinux-aware applications, how to troubleshoot issues and when to delegate to the SELinux working group. Additionally, we will discuss some things that should not be done when integrating the package in an SELinux-enabled system.
In this presentation, we will discuss packaging guidelines and scenarios you might encounter as a package maintainer. We will explain how to integrate independent custom modules, deal with SELinux-aware applications, how to troubleshoot issues and when to delegate to the SELinux working group. Additionally, we will discuss some things that should not be done when integrating the package in an SELinux-enabled system.
17:15 - 17:45
Shung-Hsi Yu: Finding Time for Upstream Work (Discussion)
SUSE has a strong "Upstream First" policy. While many of our colleagues joined the company as established contributors or even maintainers, others (like myself) joined as kernel newbies and are trying to make that leap. There is a gap between contributing the occasional fix for a product issue and actively reviewing patches, contributing a major feature, or maintaining a subsystem. This session is an open discussion that hopes to help others like me to bridge that gap. Some questions I have in mind are: * How do you balance reactive/proactive product maintenance (L3, bug fixes) with upstream work? * How do you context-switch effectively? * What advice do you have for engineers looking to take on more upstream responsibility? We invite experienced contributors/maintainers to come share their workflows, and newer contributors to bring their questions.
SUSE has a strong "Upstream First" policy. While many of our colleagues joined the company as established contributors or even maintainers, others (like myself) joined as kernel newbies and are trying to make that leap. There is a gap between contributing the occasional fix for a product issue and actively reviewing patches, contributing a major feature, or maintaining a subsystem. This session is an open discussion that hopes to help others like me to bridge that gap. Some questions I have in mind are: * How do you balance reactive/proactive product maintenance (L3, bug fixes) with upstream work? * How do you context-switch effectively? * What advice do you have for engineers looking to take on more upstream responsibility? We invite experienced contributors/maintainers to come share their workflows, and newer contributors to bring their questions.
09:00 - 09:45
Michal Svec: Product Management Update
09:45 - 10:15
Andrea Cervesato, Cyril Hrubis: AI-powered patch review for Linux Test Project
LTP receives a steady flow of patches from contributors worldwide, and every one of them needs to be reviewed against the project's coding standards before it can be merged. This is time-consuming work that falls on a small group of maintainers. LTP Agent automates that first pass. It watches Patchwork for new submissions, reviews each patch against the project's own rules, smoke-tests the code, and posts a verdict back — all within minutes of submission. Contributors get immediate feedback on common issues like missing cleanup, non-portable code, or incorrect API usage, so they can send a revised version before a maintainer even looks at it. The result is that maintainers spend less time on mechanical checks and more time on design and correctness. Contributors iterate faster. And the codebase stays consistent as it grows. On top of that, we are currently working on using LLMs for converting legacy code into the new LTP API.
LTP receives a steady flow of patches from contributors worldwide, and every one of them needs to be reviewed against the project's coding standards before it can be merged. This is time-consuming work that falls on a small group of maintainers. LTP Agent automates that first pass. It watches Patchwork for new submissions, reviews each patch against the project's own rules, smoke-tests the code, and posts a verdict back — all within minutes of submission. Contributors get immediate feedback on common issues like missing cleanup, non-portable code, or incorrect API usage, so they can send a revised version before a maintainer even looks at it. The result is that maintainers spend less time on mechanical checks and more time on design and correctness. Contributors iterate faster. And the codebase stays consistent as it grows. On top of that, we are currently working on using LLMs for converting legacy code into the new LTP API.
10:15 - 11:00
Adrian Schröter: The new SLFO Distribution source and build managment
My talk is supposed to focus on * How do we store and reference sources of - packages; - upstream code repositories; - code streams and products. * The various ways to rebuild our sources - Pure git based build; - Including remote resurces from servers; - SLSA provenance rebuild. * How this enables us to improve or support at all - proven soverignity of our products; - SBOM generation; - product certifications; - WIP/future SLSA 1.2 source tracking support. * If time permits - enablement of AI usage for our packaging thanks to the new build mechanics
My talk is supposed to focus on * How do we store and reference sources of - packages; - upstream code repositories; - code streams and products. * The various ways to rebuild our sources - Pure git based build; - Including remote resurces from servers; - SLSA provenance rebuild. * How this enables us to improve or support at all - proven soverignity of our products; - SBOM generation; - product certifications; - WIP/future SLSA 1.2 source tracking support. * If time permits - enablement of AI usage for our packaging thanks to the new build mechanics
11:00 - 11:15
coffee-break
11:15 - 11:45
Thomas Zimmermann: A retrospection on 5 years of simpledrm
Being started in Hack Week 19, the simpledrm graphics driver reached the upstream kernel in 2021. Since then it has been adopted by all major Linux distributions. Simpledrm is nowadays the umbrella term for the Linux kernel's boot-up graphics. It's a success story out of SUSE Labs that has quietly impacted the Linux graphics stack. I did a first presentation on the topic at SUSE Labs 2022. This is a follow-up talk that hopefully wraps up the topic for good. We'll go through the basics, some history, various other drivers, changes we had to do throughout the kernel and user space. We'll look at what worked and what didn't, and what is left to do.
Being started in Hack Week 19, the simpledrm graphics driver reached the upstream kernel in 2021. Since then it has been adopted by all major Linux distributions. Simpledrm is nowadays the umbrella term for the Linux kernel's boot-up graphics. It's a success story out of SUSE Labs that has quietly impacted the Linux graphics stack. I did a first presentation on the topic at SUSE Labs 2022. This is a follow-up talk that hopefully wraps up the topic for good. We'll go through the basics, some history, various other drivers, changes we had to do throughout the kernel and user space. We'll look at what worked and what didn't, and what is left to do.
11:45 - 12:15
Michal Koutný: Throttling with CPU controller 2
CPU throttling is a tempting mechanism provided by the cgroup CPU controller. The temptation comes from the assumption that by restricting one container A, we ensure sufficient runtime for another container B (e.g. in case of runaways of A). However, this doesn't always hold up because of how Linux kernel is internally organized. Thankfully, there have been some recent changes to CPU scheduler that promise more predictable behavior. This talk will be graphs (and maybe formulas) comparing the old and the new behaviors. (The content loosely builds on top of [Throttling with CPU Controller](https://www.youtube.com/watch?v=-OibmKdl6SQ) from LabsConf 2022.)
CPU throttling is a tempting mechanism provided by the cgroup CPU controller. The temptation comes from the assumption that by restricting one container A, we ensure sufficient runtime for another container B (e.g. in case of runaways of A). However, this doesn't always hold up because of how Linux kernel is internally organized. Thankfully, there have been some recent changes to CPU scheduler that promise more predictable behavior. This talk will be graphs (and maybe formulas) comparing the old and the new behaviors. (The content loosely builds on top of [Throttling with CPU Controller](https://www.youtube.com/watch?v=-OibmKdl6SQ) from LabsConf 2022.)
12:15 - 13:30
lunch
13:30 - 14:15
[WDC] Space-Time Hacking XFS GC
14:15 - 15:00
Angel Yankov, Lucas Mulling: crypto-maintainers roadmap: openssl, FIPS and post-quantum crypto across SUSE distros
In this talk, the cryptography packaging team will present our roadmap: openSSL support, support of forks, upstream plans, our own CI activites. Plans for the next FIPS-certification rounds. And an update on post-quantum resistant cryptography ( PQC ) available across our distributions.
In this talk, the cryptography packaging team will present our roadmap: openSSL support, support of forks, upstream plans, our own CI activites. Plans for the next FIPS-certification rounds. And an update on post-quantum resistant cryptography ( PQC ) available across our distributions.
15:00 - 15:15
coffee-break
15:15 - 15:45
Pedro Falcato: Transparent hugepages and where to find them
Transparent Hugepages are the way the kernel has to provide userspace with larger granularity chunks of pages, which frequently improves performance. However, popular wisdom is often clouded with hearsay and bad advice. This talk will go over transparent hugepages, what they are and how to get them.
Transparent Hugepages are the way the kernel has to provide userspace with larger granularity chunks of pages, which frequently improves performance. However, popular wisdom is often clouded with hearsay and bad advice. This talk will go over transparent hugepages, what they are and how to get them.
15:45 - 16:15
Hannes Reinecke: Sheepdog as a distributed NVMe-oF storage
Sheepdog (http://ghttps://github.com/sheepdog/sheepdog) is a rather old (ish) project providing a distributed storage for KVM/Qemu. While originally only meant for Qemu (with direct integration etc) it still is a distributed storage system. And with the help of a sheepdog interface for ublk (block device in userspace) we can export a sheepdog volume as a linux block device, which in turn can be used as a backing store for the NVMe target. In this talk I will be presenting the building blocks required to build a distributed nvme cluster with sheepdog, and (hopefully) give a short demo of the features.
Sheepdog (http://ghttps://github.com/sheepdog/sheepdog) is a rather old (ish) project providing a distributed storage for KVM/Qemu. While originally only meant for Qemu (with direct integration etc) it still is a distributed storage system. And with the help of a sheepdog interface for ublk (block device in userspace) we can export a sheepdog volume as a linux block device, which in turn can be used as a backing store for the NVMe target. In this talk I will be presenting the building blocks required to build a distributed nvme cluster with sheepdog, and (hopefully) give a short demo of the features.
16:15 - 16:45
Vasant Karasulli: Git-fixes tool annual review
In this session, I will give an overview of the recent changes to the tool and future plans.
In this session, I will give an overview of the recent changes to the tool and future plans.
16:45 - 17:45
Adam Majer: OBS to Git, the road to redemption
Last year, we presented a partially live Git Workflow. Since then, it's been deployed for SLFO and some devel projects with some pain-points and missing features. With TW transition being imminent, this presentation covers: the current state, efficient usage of these workflows, and current and future developments.
Last year, we presented a partially live Git Workflow. Since then, it's been deployed for SLFO and some devel projects with some pain-points and missing features. With TW transition being imminent, this presentation covers: the current state, efficient usage of these workflows, and current and future developments.
09:00 - 09:45
Patrik Jakobsson: Backporting a kernel subsystem
When doing hardware enablement for the SUSE kernel it is common to backport individual drivers to a more recent upstream version. For drivers in certain subsystems it can be more advantageous to backport the entire subsystem. This significantly increases the number of patches requiring backporting, which necessitates special tooling. This presentation will demonstrate the process and tools used to backport the DRM subsystem.
When doing hardware enablement for the SUSE kernel it is common to backport individual drivers to a more recent upstream version. For drivers in certain subsystems it can be more advantageous to backport the entire subsystem. This significantly increases the number of patches requiring backporting, which necessitates special tooling. This presentation will demonstrate the process and tools used to backport the DRM subsystem.
09:45 - 10:15
Joey Lee: The Inner Workings of Shim Bootloader
As the primary gateway for Secure Boot on Linux, the Shim bootloader is critical for establishing a system’s Chain of Trust. This session provides a technical review into the inner workings of Shim, moving beyond high-level concepts to analyze its source code and internal logic. We will trace the execution flow from the UEFI entry point to the handoff of the next-stage bootloader, focusing on how Shim manages MOK (Machine Owner Key) certificates and performs cryptographic verification of EFI binaries.
As the primary gateway for Secure Boot on Linux, the Shim bootloader is critical for establishing a system’s Chain of Trust. This session provides a technical review into the inner workings of Shim, moving beyond high-level concepts to analyze its source code and internal logic. We will trace the execution flow from the UEFI entry point to the handoff of the next-stage bootloader, focusing on how Shim manages MOK (Machine Owner Key) certificates and performs cryptographic verification of EFI binaries.
10:15 - 11:00
Vincenzo Mezzela, Fernando Gonzalez, Marcos Paulo de Souza: Automating Kernel Livepatching development at SUSE
Over the past year, the kernel livepatching team’s primary goal has been to reduce the human intervention required for the livepatch creation. Several new approaches and tools have been implemented, ranging from automated patch analysis and monitoring dashboards to new filesystems, and are currently being integrated into the workflow. However, several roadblocks remain. This talk presents the evolution of our workflow, and seeks to foster a collaborative dialogue regarding our remaining challenges.
Over the past year, the kernel livepatching team’s primary goal has been to reduce the human intervention required for the livepatch creation. Several new approaches and tools have been implemented, ranging from automated patch analysis and monitoring dashboards to new filesystems, and are currently being integrated into the workflow. However, several roadblocks remain. This talk presents the evolution of our workflow, and seeks to foster a collaborative dialogue regarding our remaining challenges.
11:00 - 11:15
coffee-break
11:15 - 11:45
Alberto Planas Dominguez: Proposal for TPM2+FIDO2 enrollment in systemd
User space based Full Disk Encryption in openSUSE is old news. We can set up FDE installations using the systemd toolset. This allows us to use traditional passwords, the TPM2 to validate the status before mounting the encrypted device or a FIDO2 key to validate the presence of a token owned by authorized users. To increase the security, in Tumbleweed, we recommend combining both TPM2 and a password (TPM2+PIN). This guarantees the system is in a healthy state and the user has the correct authorization, but it still doesn't support a combination of TPM2 and FIDO2 keys. To fix this issue, we are proposing a new enrollment method in systemd: TPM2+FIDO2. This method will not use the hmac-secret extension but will rely on the more traditional system based on credentials and asserts.
User space based Full Disk Encryption in openSUSE is old news. We can set up FDE installations using the systemd toolset. This allows us to use traditional passwords, the TPM2 to validate the status before mounting the encrypted device or a FIDO2 key to validate the presence of a token owned by authorized users. To increase the security, in Tumbleweed, we recommend combining both TPM2 and a password (TPM2+PIN). This guarantees the system is in a healthy state and the user has the correct authorization, but it still doesn't support a combination of TPM2 and FIDO2 keys. To fix this issue, we are proposing a new enrollment method in systemd: TPM2+FIDO2. This method will not use the hmac-secret extension but will rely on the more traditional system based on credentials and asserts.
11:45 - 12:15
Carlos López: Fallible allocations in Rust: std, Linux kernel and SVSM
The Rust standard library includes several data types that perform allocations, including Box (regular heap allocations), collections like Vec or HashMap, and reference-counted smart pointers (Rc/Arc). However, stable Rust has two shortcomings in this area: one may not specify which allocator is used, and a failing allocation causes an immediate panic, which is not acceptable for OS-level software. This talk provides an overview of the current status of the related unstable Rust std APIs, how the Rust subsystem in the Linux kernel approaches the same topic, and how we plan to implement something similar for the COCONUT SVSM project (https://github.com/coconut-svsm/svsm).
The Rust standard library includes several data types that perform allocations, including Box (regular heap allocations), collections like Vec or HashMap, and reference-counted smart pointers (Rc/Arc). However, stable Rust has two shortcomings in this area: one may not specify which allocator is used, and a failing allocation causes an immediate panic, which is not acceptable for OS-level software. This talk provides an overview of the current status of the related unstable Rust std APIs, how the Rust subsystem in the Linux kernel approaches the same topic, and how we plan to implement something similar for the COCONUT SVSM project (https://github.com/coconut-svsm/svsm).
12:15 - 13:30
lunch
14:15 - 15:00
Jiri Slaby: Inside the KSS: A Sentinel’s Toolkit and Behind
What tools does a Kernel Security Sentinel rely on to keep the core of the OS safe? This talk provides an overview of the tools ecosystem used by the KSS team. Capabilities of several custom tools will be presented, incl. short demos. Ideas to improve and what you use are indeed welcome.
What tools does a Kernel Security Sentinel rely on to keep the core of the OS safe? This talk provides an overview of the tools ecosystem used by the KSS team. Capabilities of several custom tools will be presented, incl. short demos. Ideas to improve and what you use are indeed welcome.
15:00 - 15:15
coffee-break
15:15 - 15:45
Martin Caj: News in SUSE Bugzilla infrastructure
Inside view into SUSE infrastructure for the Bugzilla service. How it works and what you can looking forward for.
Inside view into SUSE infrastructure for the Bugzilla service. How it works and what you can looking forward for.
15:45 - 16:15
Danilo Spinella: Error recovery with health-checker and systemd-bless-boot
openSUSE MicroOS is a snapshot-based, immutable operating system that features automatic updates and recovery. Health-checker is the system tool responsible for handling automatic recovery and rollbacks, and it comes installed by default. It was recently rewritten to support both systemd-boot and grub2-bls, utilizing systemd-bless-boot and Automatic Boot Assessment. In this talk, we will provide a brief explanation of the Boot Loader Specification (BLS), which is supported by both systemd-boot and grub2-bls. Next, we will explain Automatic Boot Assessment, describe how it is used by health-checker, and show how it can be used to check the system status at boot and act accordingly.
openSUSE MicroOS is a snapshot-based, immutable operating system that features automatic updates and recovery. Health-checker is the system tool responsible for handling automatic recovery and rollbacks, and it comes installed by default. It was recently rewritten to support both systemd-boot and grub2-bls, utilizing systemd-bless-boot and Automatic Boot Assessment. In this talk, we will provide a brief explanation of the Boot Loader Specification (BLS), which is supported by both systemd-boot and grub2-bls. Next, we will explain Automatic Boot Assessment, describe how it is used by health-checker, and show how it can be used to check the system status at boot and act accordingly.
16:15 - 16:45
Richard Lyu: Decoding OVMF in Virtualization
This session decodes how OVMF drives UEFI initialization in virtualized environments, providing a clear walkthrough of critical transitions across the boot phases and the key handoffs between OVMF and the hypervisor. Attendees will gain practical insights for debugging OVMF issues and validating firmware behavior across different virtualized workloads. The talk also covers SUSE’s tailored OVMF builds, highlighting how workload-specific firmware choices improve cryptographic key management and strengthen the trusted execution path from the earliest boot state.
This session decodes how OVMF drives UEFI initialization in virtualized environments, providing a clear walkthrough of critical transitions across the boot phases and the key handoffs between OVMF and the hypervisor. Attendees will gain practical insights for debugging OVMF issues and validating firmware behavior across different virtualized workloads. The talk also covers SUSE’s tailored OVMF builds, highlighting how workload-specific firmware choices improve cryptographic key management and strengthen the trusted execution path from the earliest boot state.
16:45 - 17:45
Michal Hocko: Git-fixes tracking discussion session (Discussion)
There are several open questions on how to proceed with our git-fixes tracking infrastructure brought up over email, e.g. - tracking through bugzilla; - how aggressive should be the filtering; - the overall purpose of the infrastructure. We have not been able to find consensus over those and discuss them in person might help to align on those topics.
There are several open questions on how to proceed with our git-fixes tracking infrastructure brought up over email, e.g. - tracking through bugzilla; - how aggressive should be the filtering; - the overall purpose of the infrastructure. We have not been able to find consensus over those and discuss them in person might help to align on those topics.
09:00 - 09:45
Jürgen Groß: Kernel Branch Maintainer Workflow Enhancements
For a kernel branch maintainer some activities seem to be perfect fits for further automation, like better merge conflict handling, but for sure others have different pain points. I'd like to discuss what could be done to: - increase the automatic merge success rate; - decrease the number of potential errors when doing manual merges; - other enhancements of the maintainer workflow
For a kernel branch maintainer some activities seem to be perfect fits for further automation, like better merge conflict handling, but for sure others have different pain points. I'd like to discuss what could be done to: - increase the automatic merge success rate; - decrease the number of potential errors when doing manual merges; - other enhancements of the maintainer workflow
09:45 - 10:15
Dawei Pang: Using drgn helps to analyze performance defect
As a QA Engineer, I often support performance developer for gathering metrics and researching performance defects during OS (pre-)validation. A programmable kernel debugger drgn is used during debugging issue, it helped lots to identify and verify the possible performance differences. I would like to share the insights and examples learned while co-working with developer. 1) The basic usage and script of drgn. 2) Example: CPU idle and cost issue, performance profiling and understand results
As a QA Engineer, I often support performance developer for gathering metrics and researching performance defects during OS (pre-)validation. A programmable kernel debugger drgn is used during debugging issue, it helped lots to identify and verify the possible performance differences. I would like to share the insights and examples learned while co-working with developer. 1) The basic usage and script of drgn. 2) Example: CPU idle and cost issue, performance profiling and understand results
10:15 - 11:00
Stephan Barth: The SLES feature process
How are features for SUSE Linux Enterprise Server evaluated and processed? While SLES is supposed to be stable, SUSE is still adding quite some features for new releases, but also during the Maintenance phase of a product. What information is important for requesting a new package version or a completely new technology? What change may pose a risk and how do we make sure no regressions are introduced? In this talk all of these questions will be answered.
How are features for SUSE Linux Enterprise Server evaluated and processed? While SLES is supposed to be stable, SUSE is still adding quite some features for new releases, but also during the Maintenance phase of a product. What information is important for requesting a new package version or a completely new technology? What change may pose a risk and how do we make sure no regressions are introduced? In this talk all of these questions will be answered.
11:00 - 11:15
coffee-break
11:15 - 12:15
[SAP] What we (don't) know about the CR2 bug
12:15 - 13:30
lunch
13:30 - 14:00
David Mulder: Himmelblau: Consistent Linux Identity Experience across Entra ID and Keycloak
Himmelblau provides a unified approach to integrating Linux systems with modern identity providers. This session highlights recent work on Entra ID and Intune integration, alongside new support for OpenID Connect providers like Keycloak. We’ll demonstrate how the browser orchestration model enables consistent authentication and system behavior across different identity backends. A demo will showcase both Entra ID-based and Keycloak-based login flows, illustrating how Himmelblau enables identity flexibility without increasing complexity.
Himmelblau provides a unified approach to integrating Linux systems with modern identity providers. This session highlights recent work on Entra ID and Intune integration, alongside new support for OpenID Connect providers like Keycloak. We’ll demonstrate how the browser orchestration model enables consistent authentication and system behavior across different identity backends. A demo will showcase both Entra ID-based and Keycloak-based login flows, illustrating how Himmelblau enables identity flexibility without increasing complexity.
14:00 - 14:30
Giuliano Belinassi: Creating Userspace Livepatches directly with GCC
When creating source-based live patches, a key challenge lies in extracting relevant portions of the original codebase into a separate, compact project. Existing automated tools for C projects, such as klp- ccp and clang-extract, address this by invoking source-to-source compilation techniques that construct a “closure” of all required dependencies, thereby minimizing code size and ensuring the result can be compiled independently of external components. In this work, we present a work-in-progress approach that leverages the GCC compiler to eliminate all symbols that are not reachable from the target function within a given compilation unit. This method removes the need for source-to-source compilers and offers improved scalability, extending support beyond C to additional languages such as C++ and Fortran.
When creating source-based live patches, a key challenge lies in extracting relevant portions of the original codebase into a separate, compact project. Existing automated tools for C projects, such as klp- ccp and clang-extract, address this by invoking source-to-source compilation techniques that construct a “closure” of all required dependencies, thereby minimizing code size and ensuring the result can be compiled independently of external components. In this work, we present a work-in-progress approach that leverages the GCC compiler to eliminate all symbols that are not reachable from the target function within a given compilation unit. This method removes the need for source-to-source compilers and offers improved scalability, extending support beyond C to additional languages such as C++ and Fortran.
14:30 - 15:00
Fernando Mancera: Surviving a Kubernetes report without knowing Kubernetes
You got a bug report assigned and rush to look at it. Suddenly, you recognize a few words “pods”, “nodes”, “CNI”, “cluster”, “workers”, “kubectl”. You vision begins to blur and you deeply wish it were 2015. Your take a deep breath and start working on the report. If that sounds familiar, this talk might help you. We will look at the different options we have to debug an issue related to Kubernetes without deploying a whole Kubernetes cluster. A set of tools I have been using during the last year as a kernel engineer who keeps working on Kubernetes related bugs but does not know Kubernetes at all.
You got a bug report assigned and rush to look at it. Suddenly, you recognize a few words “pods”, “nodes”, “CNI”, “cluster”, “workers”, “kubectl”. You vision begins to blur and you deeply wish it were 2015. Your take a deep breath and start working on the report. If that sounds familiar, this talk might help you. We will look at the different options we have to debug an issue related to Kubernetes without deploying a whole Kubernetes cluster. A set of tools I have been using during the last year as a kernel engineer who keeps working on Kubernetes related bugs but does not know Kubernetes at all.
15:00 - 15:15
coffee-break
15:15 - 16:10
Claudio Fontana, Jim Fehlig: VirtX (2): a simple federation of KVM hosts based on libvirt, serf and shared storage - Technical deep dive
Managing a fleet of KVM hypervisors with shared storage introduces coordination challenges that cluster managers tend to solve with heavyweight infrastructure. VirtX takes a different approach: a lightweight Go service running on each host, using libvirt for VM lifecycle management, serf for decentralized host membership and events, and sanlock for distributed resource lease management directly on shared block storage. VirtX is an open source platform that is simple to reason about, offers its full functionality through a REST API, has no external coordination service dependencies beyond the shared storage itself, and makes its safety guarantees explicit through the storage layer rather than through distributed consensus. This talk covers the requirements, architecture trade-offs and the practical engineering decisions made along the way, upstream contributions to sanlock and pending upstream changes to libvirt necessary to realize a resource provisioning and de-provisioning lifecycle. In addition to manual installs, VMs can be provisioned using cloud-ready images and cloud-init support for first-boot configuration. We will also touch on experimental AI integration, and provide a demo of the current implementation, as well as highlighting missing functionality and potential improvements.
Managing a fleet of KVM hypervisors with shared storage introduces coordination challenges that cluster managers tend to solve with heavyweight infrastructure. VirtX takes a different approach: a lightweight Go service running on each host, using libvirt for VM lifecycle management, serf for decentralized host membership and events, and sanlock for distributed resource lease management directly on shared block storage. VirtX is an open source platform that is simple to reason about, offers its full functionality through a REST API, has no external coordination service dependencies beyond the shared storage itself, and makes its safety guarantees explicit through the storage layer rather than through distributed consensus. This talk covers the requirements, architecture trade-offs and the practical engineering decisions made along the way, upstream contributions to sanlock and pending upstream changes to libvirt necessary to realize a resource provisioning and de-provisioning lifecycle. In addition to manual installs, VMs can be provisioned using cloud-ready images and cloud-init support for first-boot configuration. We will also touch on experimental AI integration, and provide a demo of the current implementation, as well as highlighting missing functionality and potential improvements.
16:10 - 16:40
Filip Kastl: Scaling GCC’s Points-To Analysis with Steensgaard’s Algorithm
How can a compiler like GCC tell pointers apart? I use 'int *p' and 'int *q' in my program. Can they ever point to the same int? Questions like this one are extremely important for compiler optimization. One of the mechanisms that can answer them is "points-to analysis". In particular, if you're trying to analyze pointers that get passed around between functions, you need interprocedural points-to analysis (IPA PTA). However, you have probably never compiled with IPA PTA. GCC doesn't enable it by default because it doesn't scale well enough. My ambitious project is to change that! In this talk I'll explain what points-to analysis is. I'll talk about how my approach -- using Steensgaard's algorithm -- is different from what GCC currently does. Finally, I'll show some examples of what GCC can optimize with my modifications that it couldn't before.
How can a compiler like GCC tell pointers apart? I use 'int *p' and 'int *q' in my program. Can they ever point to the same int? Questions like this one are extremely important for compiler optimization. One of the mechanisms that can answer them is "points-to analysis". In particular, if you're trying to analyze pointers that get passed around between functions, you need interprocedural points-to analysis (IPA PTA). However, you have probably never compiled with IPA PTA. GCC doesn't enable it by default because it doesn't scale well enough. My ambitious project is to change that! In this talk I'll explain what points-to analysis is. I'll talk about how my approach -- using Steensgaard's algorithm -- is different from what GCC currently does. Finally, I'll show some examples of what GCC can optimize with my modifications that it couldn't before.
16:40 - 17:20
Fabian Vogt: RISC86: RISC-V System Emulator in x86 Kernel Space
Fast RISC-V hardware is still hard to get and QEMU is slow. Can we do better? RISC86 allows to boot a RISC-V Linux kernel on x86 hardware, providing direct access to hardware with minimal overhead. This talk starts with a deep dive into the RISC-V system architecture, how it compares to x86 and explains the hacks^W novel techniques used by RISC86 to achieve minimal overhead. Includes some info about the histories of RISC-V and x86 as well as some rants about weirdnesses in those architectures.
Fast RISC-V hardware is still hard to get and QEMU is slow. Can we do better? RISC86 allows to boot a RISC-V Linux kernel on x86 hardware, providing direct access to hardware with minimal overhead. This talk starts with a deep dive into the RISC-V system architecture, how it compares to x86 and explains the hacks^W novel techniques used by RISC86 to achieve minimal overhead. Includes some info about the histories of RISC-V and x86 as well as some rants about weirdnesses in those architectures.
17:20 - 17:45
Good-Bye
09:00 - 09:45
Jan Kara: What is new in filesystem notification?
Filesystem notification framework (fsnotify) is a Linux kernel subsystem for notifications about changes in the filesystem. Currently this functionality is mostly exposed to userspace through fanotify interface and syscalls. In this talk we first give a quick overview of basic fanotify functionality and then go over a new functionality that fanotify has acquired since the last update I gave in 2020. Support for unpriviledged users using fanotify, support for notification events to implement hierarchical storage management, support for reporting of filesystem errors through fanotify, and support for notification about mount events. We also briefly overview new features under discussion.
Filesystem notification framework (fsnotify) is a Linux kernel subsystem for notifications about changes in the filesystem. Currently this functionality is mostly exposed to userspace through fanotify interface and syscalls. In this talk we first give a quick overview of basic fanotify functionality and then go over a new functionality that fanotify has acquired since the last update I gave in 2020. Support for unpriviledged users using fanotify, support for notification events to implement hierarchical storage management, support for reporting of filesystem errors through fanotify, and support for notification about mount events. We also briefly overview new features under discussion.
09:45 - 10:15
Ken Johnson: Engineering Assurance: Mastering Hardware Compatibility with SUSE YES Certification
In an increasingly complex hardware landscape, ensuring seamless interoperability between operating systems and diverse hardware platforms is critical for mitigating risk and reducing total cost of ownership. This session provides a deep dive into the SUSE YES Certification program, a hardware assurance standard with a legacy spanning over 38 years. We will explore the technical rigors of the certification process, detailing how SUSE Partner Engineering collaborates with Independent Hardware Vendors (IHVs) to resolve compatibility issues before they reach the end-user. A central focus will be the SUSE YES System Certification Kit (SCK), the specialized test suite used to validate everything from CPU, memory, storage and network stress testing to advanced power management, persistent memory, GPU accelerators, TPM and more across x86_64, Arm, IBM Power, and IBM Z architectures.
In an increasingly complex hardware landscape, ensuring seamless interoperability between operating systems and diverse hardware platforms is critical for mitigating risk and reducing total cost of ownership. This session provides a deep dive into the SUSE YES Certification program, a hardware assurance standard with a legacy spanning over 38 years. We will explore the technical rigors of the certification process, detailing how SUSE Partner Engineering collaborates with Independent Hardware Vendors (IHVs) to resolve compatibility issues before they reach the end-user. A central focus will be the SUSE YES System Certification Kit (SCK), the specialized test suite used to validate everything from CPU, memory, storage and network stress testing to advanced power management, persistent memory, GPU accelerators, TPM and more across x86_64, Arm, IBM Power, and IBM Z architectures.
10:15 - 11:00
Michal Suchánek, Sangeetha Thackarajan: Kernel build infrastructure (kerncvs) Discussion
Discussion about SUSE internal kernel development infrastructure
Discussion about SUSE internal kernel development infrastructure
11:00 - 11:15
coffee-break
12:15 - 13:30
lunch
13:30 - 14:00
Marcela Mašláňová: Update on Orthos
I will provide an update on Orthos development in the past year and what's coming next.
I will provide an update on Orthos development in the past year and what's coming next.
14:00 - 15:00
Thomas Zimmermann: Let's discuss AI in the context of SUSElabs (Discussion)
In this session we discuss the topic of AI with the focus on our work and workplace; both internal and in upstream projects. Since earlier this year I've been experimenting with Gemini and how to integrate it into my workflow. I'll open up the discussion with results and thoughts on how well this has worked so far. Afterwards you're welcome to report on your findings, experience, thoughts, etc. This is an open discussion and everyone in Labs is welcome to participate.
In this session we discuss the topic of AI with the focus on our work and workplace; both internal and in upstream projects. Since earlier this year I've been experimenting with Gemini and how to integrate it into my workflow. I'll open up the discussion with results and thoughts on how well this has worked so far. Afterwards you're welcome to report on your findings, experience, thoughts, etc. This is an open discussion and everyone in Labs is welcome to participate.
15:00 - 15:15
coffee-break
15:15 - 16:10
Hoyeon Lee: Linux Kernel Tracing Internals
This session dives into the core mechanisms of Linux kernel tracing. We explore dynamic instrumentation such as exception-based kprobe and code-patching ftrace, comparing internals and performance overhead. The talk also covers low-overhead, statically defined tracepoints and counter-based sampling via perf_event. Finally, we introduce BPF as a programmable execution layer that reuses and enhances tracing sources for flexible and efficient kernel observation.
This session dives into the core mechanisms of Linux kernel tracing. We explore dynamic instrumentation such as exception-based kprobe and code-patching ftrace, comparing internals and performance overhead. The talk also covers low-overhead, statically defined tracepoints and counter-based sampling via perf_event. Finally, we introduce BPF as a programmable execution layer that reuses and enhances tracing sources for flexible and efficient kernel observation.
16:10 - 16:40
Arne Wolf: Virtualizing SAP Workloads with SUSE KVM
A detailed overview on virtualising SAP workloads with SUSE KVM with a focus on virtualising SAP HANA with SUSE KVM.
A detailed overview on virtualising SAP workloads with SUSE KVM with a focus on virtualising SAP HANA with SUSE KVM.
16:40 - 17:20
Gabriel Krisman Bertazi: Investigation of a tricky performance regression inside the SAP infrastructure
During the SLE16 SAP validation cycle, our QE team found an interesting performance regression affecting a single cpu generation. In this talk, I'll retrace my steps, from running the workload inside the SAP infrastructure down to identifying the specific micro-architectural interaction that caused the issue. In parallel, I'll present methods to investigate real-world performance bug in constrained environment, with near black-box workloads. Beyond an interesting story, these methods are useful to anyone investigating bugs directly in the SAP infrastructure in the future.
During the SLE16 SAP validation cycle, our QE team found an interesting performance regression affecting a single cpu generation. In this talk, I'll retrace my steps, from running the workload inside the SAP infrastructure down to identifying the specific micro-architectural interaction that caused the issue. In parallel, I'll present methods to investigate real-world performance bug in constrained environment, with near black-box workloads. Beyond an interesting story, these methods are useful to anyone investigating bugs directly in the SAP infrastructure in the future.