I sometimes do git log --author
to know developers including myself for just fun, retrospects, or interviews. It was not easy to get the whole picture with my poor brain. Hence I wrote a script: https://github.com/sjp38/lazybox/blob/master/git_helpers/profile_author.py
E.g.,
$ ./profile_author.py "SeongJae Park" --branch linus/master --repo ~/linux --max_files 10
since 2023-04-14 until 2024-04-13
# <changed_lines> <file>
746 mm/damon/sysfs-schemes.c
735 Documentation/admin-guide/mm/damon/usage.rst
646 mm/damon/core.c
522 Documentation/mm/damon/design.rst
405 tools/testing/selftests/damon/_damon_sysfs.py
291 include/linux/damon.h
273 mm/damon/sysfs.c
179 mm/damon/core-test.h
100 Documentation/ABI/testing/sysfs-kernel-mm-damon
86 mm/damon/sysfs-test.h
# 5035 total lines
# 52 total files
# 172 commits
I made a tool to help view kernel configuration values and compare them across many Linux distributions. Here's a blog post introducing it:
https://blogs.oracle.com/linux/post/explore-linux-kernel-kconfigs
Or, you can skip right to the tool here:
https://oracle.github.io/kconfigs/
Source is available here:
https://github.com/oracle/kconfigs
I just renewed my subscription to @LWN
The best content about bleeding-edge Linux kernel development! 🐧 🙌
You should really consider subscribing if you haven't done it yet. 🙂
I wanted to know simple daily Linux kernel CVE statistics just for fun, so wrote a script[1] and plotted the output.
$ ./vulns_stat.sh ./vulns/ 30 | ../gnuplot/plot.py --data_fmt table --type labeled-lines --xtics_rotate -90 cve_stat_30_days.png
[1] https://github.com/sjp38/lazybox/blob/master/cve_stat/vulns_stat.sh
Memory management subsystem pull request[1] for Linux 6.9-rc1 has been posted. To quote Andrew’s summary for DAMON part:
[1] https://lore.kernel.org/all/20240313200532.34e4cff216acd3db8def4637@linux-foundation.org/
The 6.8 kernel has been released https://lwn.net/Articles/964784/ #LWN
The #Linux #kernel CVE team released their first two CVEs:
* CVE-2023-52433: netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
https://lore.kernel.org/linux-cve-announce/2024022058-outsell-equator-e1c5@gregkh/
* CVE-2024-26581: netfilter: nft_set_rbtree: skip end interval element from gc
https://lore.kernel.org/linux-cve-announce/2024022024-uniquely-recluse-d893@gregkh/
For more details on the new #LinuxKernel CVE process, see https://docs.kernel.org/process/cve.html (recently added by https://git.kernel.org/torvalds/c/5928d411557ec5d53832cdd39fc443704a3e5b77 )
Screenshot from https://lore.kernel.org/linux-cve-announce/