A big issue in the kernel are asymmetries between review resource and patch submission.
If you have 20 inexperienced kernel engineers all doing big difficult work and submitting large series that need TONS of review (and sometimes essentially development-via-review) and only a few reviewers, you have a problem.
What compounds this is that not all review is equal.
It seems most people will only really look at the surface, and rather happily give tags.
I think that technical skill is not enough for review [as I have said very often - soft skills are the actually core ones] - you have to be willing to say no, you have to be willing to consider the wider picture.
Finding people who have the right skills, are willing to handle the stress + thanklessness, & who have the time is not easy.
So the asymmetry I think is insoluble.
It'd be good if we could have stricter controls to throttle incoming series though.
Prototype for type-based partitioning of Linux kernel slab caches: https://discourse.llvm.org/t/rfc-a-framework-for-allocator-partitioning-hints/87434/24?u=melver
Compiler seems to be doing a good-enough job of inferring allocated types per /proc/slabinfo. With the diagnostic -Rpass=alloc-token I can see about 965 allocation sites where it failed to infer the allocated type, but most of them are "bag of bytes", and only few with complex sizeof calculations like struct_size that are too opaque right now (but can be fixed).
linux-stable is a vibe-backported frankenkernel
All microconferences (MCs) at LPC 2025 have been accepted! It is time to submit topics to your favorite MCs.
Please check out our latest blog post for the list of MCs, and how to create a ideal MC topic.
https://lpc.events/blog/current/index.php/2025/07/25/all-microconferences-have-been-accepted/
I've been playing with the LLM code assistants, trying to stress them out with the Linux kernel code. So far, I've had success with them writing reasonable unit tests:
https://lore.kernel.org/lkml/20250717085156.work.363-kees@kernel.org/
https://lore.kernel.org/lkml/20250724030233.work.486-kees@kernel.org/
These both saved me some time since it emitted quite a lot of good boundary testing code, but I had to massage them both a bit until I was happy with the coverage. But it was a net win on time spent.
And then I walked it through fixing a buffer overflow. This one didn't save me any time because I had to tell it how to look at the problem. Since it was a shorter/simpler session, I included my exact prompts just for anyone interested in what I did:
https://lore.kernel.org/lkml/20250724080756.work.741-kees@kernel.org/
This graph is the one I'm most excited about: the lifetime of security flaws in Linux is finally starting to get shorter (and the number of fixed flaws continues to rise).
https://hachyderm.io/@LinuxSecSummit@social.kernel.org/114750428620118674