how an interns attempts to familiarize themselves with a codebase, and spice up the comments resulting in finding a major security vulnerability. Via Reddit, via 🤷♀️
Designing Custom #Linux Schedulers with sched_ext – slides and the recording of yesterdays #LinuxFoundation Mentorship session from @arighi are now online:
https://www.linuxfoundation.org/webinars/designing-custom-linux-schedulers-with-sched_ext
Direct link to the slides: https://events.linuxfoundation.org/wp-content/uploads/2025/01/Andrea-Righi-Mentorship-1_22_25-scx.pdf
Direct link to the recording: https://www.youtube.com/watch?v=jsLjg9tGuVI
At least something done in the kernel side for the v4l2-loopback driver this week:
The next small push is to split v4l2_loopback_fops
into two: one for /dev/videoX and other for the anonymous inode returned back from the ioctl.
Got tired of updating clangd data manually so did a quick script to automate it :
#!/usr/bin/env bash
# Copyright (c) Jarkko Sakkinen 2025
set -e
run_build() {
make ARCH=x86_64 O=.clangd -j$(nproc)
scripts/clang-tools/gen_compile_commands.py -d .clangd
}
run_menuconfig() {
if [[ ! -d .clangd ]]; then
exit 1
fi
make ARCH=x86_64 O=.clangd menuconfig
run_build
}
while getopts ":m" opt; do
case $opt in
m)
run_menuconfig
exit 0
;;
*)
echo "Usage: $0 [-m]"
exit 1
;;
esac
done
if [[ ! -d .clangd ]]; then
make ARCH=x86_64 O=.clangd tinyconfig
fi
run_build