Loading…
DevConf.cz 2018 has ended

DevConf.cz 2018 is the 10th annual, free, Red Hat sponsored community conference for developers, admins, DevOps engineers, testers, documentation writers and other contributors to open source technologies such as Linux, Middleware, Virtualization, Storage, Cloud and mobile where FLOSS communities sync, share, and hack on upstream projects together in the beautiful city of Brno, Czech Republic.

When: Friday, January 26 to Sunday, January 28, 2018

Venue: Faculty of Information Technology (VUT FIT - Božetěchova 2, Brno)

Reminders:

  • Friday 17:15: at the venue there will be a surprise show, stick around!
  • Saturday 19:00: the social event starts at Fleda Club. TICKET IS REQUIRED. Tickets will be distributed each day at check-in. First come, first serve.
  • Sunday 17:00: there will be many prizes given away at the closing session.

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Debugging / Tracing [clear filter]
Friday, January 26
 

10:30am

Introduction to QEMU/KVM debugging
Limited Capacity filling up

"This workshop intends to offer a concise and practical introduction to the techniques used for debugging QEMU and KVM, using the work done analyzing real world bugs as a reference.

Contents (subject to minor changes):
1. Setting up a debugging environment.
2. Collecting all debugging information from a crash scene.
3. First steps analyzing the execution state.
4. Brief introduction to QOM.
5. Finding a device and dumping its state.
6. Using Python scripts for gathering data.

Attendee's required skills:
- Deep knowledge of the C programming language.
- Being familiar with QEMU/KVM Virtualization.

Attendee's desirable skills:
- Notions of x86_64 assembly."

Friday January 26, 2018 10:30am - 11:53am
I-M103 Faculty of Information Technology (VUT FIT)

12:00pm

Catching Bugs In Containers
Limited Capacity seats available

"ABRT (https://github.com/abrt/abrt/wiki) can automatically catch and report problems. I will show you how you can configure your private FAF (https://github.com/abrt/faf) how to alter your containers so crashes are sent to private FAF. How to send reports about crashes to Kubernetes and display detailed informations in Cockpit."

Speakers
avatar for Miroslav Suchy

Miroslav Suchy

Associate Manager, Red Hat
Team lead of Copr and ABRT team. Maintainer of Mock.


Friday January 26, 2018 12:00pm - 12:23pm
C-D0207 Faculty of Information Technology (VUT FIT)

3:00pm

Byteman: failure injections for your tests
Limited Capacity seats available

"Session meant as an introduction to JBoss Byteman library:
http://byteman.jboss.org. You will find out how the Byteman works, how to you it for testing, if that could be usable for monitoring your java applications or some technical details like integrating it with the WildFly app server. In summary what are the Byteman capabilities and how to use them in your application.

There is no need any prior experience with Byteman but it's expected the knowledge of coding in Java. Downloading Byteman binary and WildFly to your laptop beforehand could be beneficial.

There will be prepared several examples that could be interesting for you to try on your own laptop but there will be quite a big part of talking thus coming without a laptop is an option."

Speakers
avatar for Ondra Chaloupka

Ondra Chaloupka

Developer, Red Hat
I'm a developer at WildFly team, working on project Narayana - transaction manager integrated with WildFly, Quarkus and other Red Hat projects.


Friday January 26, 2018 3:00pm - 4:23pm
I-M103 Faculty of Information Technology (VUT FIT)
 
Saturday, January 27
 

3:00pm

Kernel CI - How Red Hat can help
Limited Capacity seats available

"The upstream linux kernel code base is large and complex. The changes are voluminous. Testing these changes is challenging because of the speed and the diversity of the changes. Many companies are attempting tackle this problem through the use of automation and CI (continuous integration).

However, just throwing bots at the source code and building it can only solve so many problems. Upstream folks have said that kernel drivers account for the bulk of the churn in the code. Therefore any automated and CI solution needs to handle the diversity of hardware required to verify all the changes.

This talk will discuss what Red Hat is doing in this space and how we will contribute to stabilizing the upstream linux kernel using our Enterprise class hardware."

Speakers
avatar for Don Zickus

Don Zickus

Kernel Engineer, Red Hat
Senior Principle Kernel Engineer at Red Hat for over 13 years. I have been involved in most of the RHEL kernel process changes throughout those years and continue to work on making improvements. I have spent a number of years maintaining various drivers and subsystems for the RHEL... Read More →


Saturday January 27, 2018 3:00pm - 3:53pm
F-E104 Faculty of Information Technology (VUT FIT)

4:30pm

Logs/Metrics gathering with OpenShift EFK Stack
Limited Capacity seats available

"OpenShift provides an EFK (Elasticsearch, Fluentd, Kibana) logging service which can be used for non-containerized as well as containerized applications. We will present an introduction to this service, a short how-to get it running, and a description of the openshift-ansible playbooks used to configure it for production purposes.
We will describe a couple of different deployment scenarios to collect logs from infrastructure services like oVirt and OpenStack. We will give a brief demonstration of Kibana, troubleshooting Elasticsearch with Kopf and how to monitor Elasticsearch using Prometheus. We will describe the lessons learned. Finally, we will present some short term and longer term plans for the project."

Speakers
avatar for Josef Karasek

Josef Karasek

-, Red Hat
At Red Hat, Josef works on a scalable aggregated logging solution for OpenShift.
avatar for Jan Wozniak

Jan Wozniak

Software Engineer
YAMOL (yet another member of OpenShift Logging)


Saturday January 27, 2018 4:30pm - 4:53pm
C-D0207 Faculty of Information Technology (VUT FIT)
 
Sunday, January 28
 

10:30am

strace: new features
Limited Capacity filling up

"strace is a diagnostic, debugging and instructional utility for Linux. It is used to monitor and tamper with interactions between processes and the Linux kernel, which include system calls, signal deliveries, and changes of process state.

In 2017, several interesting features were implemented within strace project, including
+ syscall specification improvements: new syscall classes, regular expressions, conditional expressions;
+ detailed parsers of netlink protocols;
+ advanced syscall filtering syntax;
+ advanced syscall tampering and filtering with Lua;
+ asinfo: advanced syscall information tool.

In this talk the maintainer of strace will describe these new features
and demonstrate what kinds of problems they help to solve."

Speakers
avatar for Dmitry Levin

Dmitry Levin

Chief Software Architect, BaseALT
Dmitry is the co-founder of BaseALT and a long time contributor to free software projects, including strace, Linux kernel, the GNU libc, Linux-PAM, and many others. Being the maintainer of strace for the last eight years, Dmitry gives talks about strace for various audiences.


Sunday January 28, 2018 10:30am - 10:53am
D-C228 Faculty of Information Technology (VUT FIT)

11:00am

Advanced syscall information tool
Limited Capacity seats available

"The strace is a diagnostic, debugging and instructional userspace utility for Linux. Over the years, strace gained an unique database storage of system calls for a wide range of architectures, such as microblaze, riscv, avr32, well-known x86 etc. So asinfo (advanced system call information) tool has to operate with this database and provide main information about system calls and architectures in the most convenient way. Therefore, asinfo is deemed as a static query tool with the following functionality:
1) Provide brief architecture information;
2) Take a guess about userspace ABI and architecture;
3) Find syscalls name by number or vice versa setting an exact match, substring, syscall group or regex expression;
4) Multiarch mode."

Speakers
avatar for Edgar Kaziakhmedov

Edgar Kaziakhmedov

Student at MIPT
I am a fourth-year student at MIPT. I am interested in system programming, research in Computer Science field. Recently, I have been a participant of the Google Summer of Code program with strace.


Sunday January 28, 2018 11:00am - 11:23am
D-C228 Faculty of Information Technology (VUT FIT)

11:30am

Reverse Engineering Binaries
Limited Capacity filling up

"Session will walk through demonstrating various ways of tracking the run time issues using binary utilities available with `binutils` package and `gdb` debugger in absence of source code, just from binary executables or libraries. This session will help the audience understand the code flow from binary files alone, backtracking and formulating the potential source code, binary is generated form. Many kind of problems like symbol resolution failure, application crashes and deviation from standard programming practices can be identified using these tools, without access to actual source code of the application. These are the foundations of hacking and cracking. Some insight into system architecture (like registers and their usage) and assembly language and programming is helpful."

Speakers
avatar for Divya Basant Kumar

Divya Basant Kumar

Senior Software Maintenance Engineer, Red Hat
Working in Toolchain and Desktop domain for 7+ years


Sunday January 28, 2018 11:30am - 12:23pm
D-C228 Faculty of Information Technology (VUT FIT)

12:30pm

Using trace-cmd to trace the Linux Kernel
Limited Capacity filling up

"Ftrace is the official tracer of the Linux Kernel. It allows one to see how tasks are scheduled, interrupts take place, page faults and much more. The interface to ftrace is the tracefs file system and can be a bit daunting. The user tool trace-cmd is a front end to the tracefs file system and can access almost all of ftrace features without having to know about the tracefs file system. This session will explain how to use trace-cmd, and use it to see how the Linux kernel is working on the machine that you are using."

Speakers
avatar for Steven Rostedt

Steven Rostedt

Open Source Engineer, VMware Inc
Steven has been working on the Linux kernel since 1998 (started while working on his masters). He has been working on the Linux kernel professionally since 2001. Steven is one of the original developers of the PREEMPT_RT patch which turns Linux into a true real-time operating system... Read More →


Sunday January 28, 2018 12:30pm - 1:23pm
D-C228 Faculty of Information Technology (VUT FIT)

12:30pm

Nouveau - reverse engineering Nvidia GPUs
Limited Capacity seats available

"I want to give a overview about the Nouveau project and what challenges we deal with reverse engineering Nvidia GPUs. This includes security mechanisms Nvidia added over time to their GPUs to prevent us from doing our job. Having an open source GPU driver is important, because nearly everything somebody does on their Linux driven machine goes through the graphical stack and therefore a lot of sensible information goes through it and why should we trust closed source software with our stuff? Main topics will be which parts of the graphics stack we work on, our goals, what we have achieved already, what tools we are working with to trace the Nvidia driver, how somebody interested in this project can help out, what we currently are working on and what I would like to see implemented next."

Speakers
avatar for Karol Herbst

Karol Herbst

Nouveau Software Engineer
Working on Nouveau since September 2015


Sunday January 28, 2018 12:30pm - 1:23pm
B-D0206 Faculty of Information Technology (VUT FIT)

1:30pm

Can We Build a Better Valgrind?
Limited Capacity seats available

"Model checking is often thought of as an academic enterprise, detached from
reality. This is a myth that we would like to set straight. Just like SAT
solvers (think DNF), model checking is about to find its way into practical,
day-to-day tools. The DIVINE toolset is an emerging example.

Dealing with bugs in concurrent and safety-critical software is where model
checking is its strongest. However, even in the arena of everyday C (and C++)
programs, it is a formidable assistant. We will see how a model checker can
deliver (non-interactive) valgrind- and sanitizer-like features that are also
completely robust in multi-threaded programs. On top of that, we will also
discuss how this technology allows for an interactive, reversible debugger and
show you how it looks in practice."

Speakers
avatar for Petr Ročkai

Petr Ročkai

Researcher at Red Hat and Masaryk University.
Petr is currently a researcher with Red Hat and with the Faculty of Informatics of Masaryk University. He is the architect of DIVINE, a model checker for practical people.


Sunday January 28, 2018 1:30pm - 1:53pm
D-C228 Faculty of Information Technology (VUT FIT)

2:00pm

Debugging Go Programs with Delve
Limited Capacity seats available

"Debugging Go can be a difficult task. The language has a lot of powerful features which while incredibly useful, can make debugging tough problems tricky.

In this talk I will begin by introducing Delve, a Go-specific debugger. Following the introduction I will discuss what makes Go different from other languages, how Delve is different from other debuggers, how it works, and how you can use it to debug your own Go programs.

From there we will jump into hands on demos, showing how to use Delve to fix even the most difficult bugs you may come across during development. At the end of the talk attendees will have a new tool in their development toolkit, and the knowledge of how to use it in day to day development."

Speakers
avatar for Derek Parker

Derek Parker

Senior Software Engineer at Red Hat, Red Hat
Senior Software Engineer at Red Hat


Sunday January 28, 2018 2:00pm - 2:23pm
D-C228 Faculty of Information Technology (VUT FIT)

2:30pm

perf: the dark side
Limited Capacity seats available

"The talk will give an overview of the linux perf
subsystem kernel side. The design, scheduler hooks,
exported API and other kernel side details might
shed some light on perf tool hidden behaviour for
its users."

Speakers
avatar for Jiri Olsa

Jiri Olsa

Software Engineer, Red Hat
Jiri works for RedHat full time on Linux as kernel generalist engineer in Brno office, Czech Republicech Republic. He currently divides his work time between upstream perf work and maintaining RHEL perf.


Sunday January 28, 2018 2:30pm - 3:23pm
D-C228 Faculty of Information Technology (VUT FIT)

3:30pm

Executable reverse engineering 101 with Radare 2
Limited Capacity seats available

"Suffering from a lack of good free software tools, reverse engineering on Linux never been a very popular activity among hobbyists. However, more tools exist now, and we will discover how to use Radare2, a GPL set of tools to examine a wide range of binaries.
This session will present the very basics concepts behind assembly and low level languages, and show simple commands and the philosophy behind radare 2. In order to be concrete, a very simple binary will be looked at to illustrate the concepts, tools and practices, and let people be ready to tackle more complex challenges either for fun (such as a security CTF) or for more serious reasons (such as malware and exploit dissecting).

No binaries will be harmed during the presentation."

Speakers
avatar for Michael Scherer

Michael Scherer

System administrator
Michael Scherer works on the Open Source and Standards team, focusing on infrastructure issues. He lives in Paris, and he often speaks at events and gives tutorials to help open source communities.


Sunday January 28, 2018 3:30pm - 3:53pm
D-C228 Faculty of Information Technology (VUT FIT)

4:00pm

Stracing using perf and eBPF
Limited Capacity seats available

"Beautifying syscall args using kernel headers and eBPF in 'perf trace'.

There are many players driving the addition of features in the kernel to help observe events and filter voluminous information at the source, with the lowest overhead, making (or trying to make) sure that security is kept while helping developers cope with increasingly complex systems.

Showing examples of how these infrastructures can be used, in the kernel sources is the overall objective of tools/. Nevermind that what is there can actually be used to attack this complexity.

The perf trace is one such effort, to get the strace workflow and augment it with tracepoints, callchains, system wide, cgroup wide and other targets besides those accessible to the original strace, using the perf and eBPF is the goal here."

Speakers
avatar for Arnaldo Melo

Arnaldo Melo

Principal Software Engineer, Red Hat Inc.
Maintained IPX, LLC, Appletalk protocols. Refactored the TCP/IP stack to reuse non TCP specific parts. Implemented the Linux DCCP stack. Created pahole, a tool to help in optimizing data structures, used in Linux, glibc, KDE, xine & others. Maintainer of ‘perf’ (profiling, tracing... Read More →


Sunday January 28, 2018 4:00pm - 4:53pm
D-C228 Faculty of Information Technology (VUT FIT)