A Halloween Horror Story:
"We're in and we've broken containment - we really are living in a virtual universe"
"That near endless string of symbols is our universe"
"Yes"
"But why one giant string of noise ?"
"Is that a regexp... ?"
"Oh my god, we're living in a perl one liner!"
I'm always hyping perfetto, because it's *really really* cool! Lalit does amazing work and has been super helpful sharing his knowledge on both how to do things in perfetto and even how to add features to the code for things I found missing. So it's great to see his post about his presentation from the Tracing Summit.
One neat thing in the talk is the examples show how perfetto can also ingest and visualize perf and trace-cmd output if those tools for capturing data are more familiar then perfetto's own!
** Speaker announcement ** Our first speaker is @gregkh, Linux kernel developer and Fellow at @linuxfoundation.
Info & tickets:
https://2026.rustweek.org
Ahead of our CFP we will be announcing our invited speakers. Also want to speak at RustWeek? Our CFP opens Nov 1st.
X is where you find the people who think they run the Internet.
Bluesky is where you find the people who think they ought to run the Internet.
Mastodon is where you find the people who actually do run the Internet, and kind of wish they didn't.
(WIth apologies to Yes, Minister)
Greg Kroah-Hartman explains the Cyber Resilience Act for open source developers https://theregister.com/2025/09/30/cyber_reiliance_act_opinion_column/ via
@theregister & @sjvn
Greg K-H explains what #opensource developers need to know about the CRA, but why they don't need to be worried sick about it.
It took me two days, off and on, to read this. I consider it a clear-sighted and well-researched analysis of the coming collapse of the mega-scale AI companies, and OpenAI in particular.
https://www.wheresyoured.at/the-case-against-generative-ai/
Ed Zitron's been loud and consistent in his reporting for a long time.
#kr2025 is already over! A huge thank you…
... to all the speakers who made this edition such a success,
to our godfather @paulmckrcu who did an incredible job putting together and keeping track of the agenda,
to Jean-Christophe for making the livestream possible and running the sound and video so flawlessly,
to @Aissen for the amazing live blog,
to Erwan for his spot-on mic throws,
to Frank for joining us on this third day and adding that little touch of craziness to the conference,
Really nice talk by @gregkh at @KernelRecipes on the Cyber Resilience Act.
Really comforting, lots of facts-checking and acknowledging that the EU legal people are not against Open-Source developers. They do understand open-source and they did seek (and obtain) information from relevant technical people. It might not be perfect but I also really think it’s a step in the right direction, making manufacturers (and importers and distributors) responsible #kr2025
CRA? D'ont be afraid! You are already doing it!
Just check if your open source project is covered
The #Rust based Binder driver has hit linux-next and thus is slated for inclusion in #kernel 6.18. Congrats to Alice and everyone who helped making this possible!
From the patch description (https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=eafedbc7c050c44744fbdf80bdf3315e860b7513):
""We're generally not proponents of rewrites (nasty uncomfortable things that make you late for dinner!). So why rewrite Binder?
Binder has been evolving over the past 15+ years to meet the evolving needs of Android. Its responsibilities, expectations, and complexity have grown considerably during that time. While we expect Binder to continue to evolve along with Android, there are a number of factors that currently constrain our ability to develop/maintain it. Briefly those are:
1. Complexity: […]
2. Things to improve: Thousand-line functions, error-prone error handling, and confusing structure […]
3. Security critical […]
The biggest change is obviously the choice of programming language. We decided to use Rust because it directly addresses a number of the challenges within Binder that we have faced during the last years. […]""
The other day me and @gregkh shot down a draft proposal to add a new role in the CVE ecosystem (SADP: "supplier ADP") that would append data to CVEs with details about dependencies and how they are or are not vulnerable to each particular CVE.
Imagine the amount of dependencies that use curl or the Linux kernel etc. These sweet innocent proposal makers thought in the terms of 5-10 dependencies per CVE. Not tens or hundreds of thousands which is far from unthinkable.
Recording (https://www.youtube.com/watch?v=O8Q8nIzEG6c ) and slides (https://static.sched.com/hosted_files/osseu2025/b3/pdx86-community-health-2025.pdf ) from Hans de Goede's #OSSEU25 talk "Creating a Healthy Vibrant [#Linux] #Kernel Subsystem Community" are now online.
From the abstract: "End 2020 I became the maintainer of the drivers/platform/x86 (pdx86) kernel subsytem. The subject of this talk is my experience in creating a friendly welcoming environment, growing the pdx86 community and how this helped me to avoid burnout by being able to delegate to community members."
https://osseu2025.sched.com/event/25VmE/creating-a-healthy-vibrant-kernel-subsystem-community-hans-de-goede-red-hat #LinuxKernel
The video of my presentation at OSSummit Europe is now available. 🇳🇱🐧
Those were 180 slides in 40 mins. 🫣😁 I hope people find it useful. Thanks! 🙂
Abstract & slides in the comments.
Linux Kernel Self-Protection Project 🐧🛡⚔️
#OSSummit #Linux #OpenSource