mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

620
comptes actifs

#io_uring

0 message0 participant0 message aujourd’hui
Andrés Gómez<p>My <span class="h-card" translate="no"><a href="https://floss.social/@igalia" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>igalia</span></a></span> colleague Luís Henriques has just published a very interesting post about the work he has been doing lately in the Linux <a href="https://hostux.social/tags/kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kernel</span></a> about <a href="https://hostux.social/tags/FUSE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FUSE</span></a> over <a href="https://hostux.social/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a>.</p><p><a href="https://luis.camandro.org/2025-06-14-fuse-over-io_uring.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">luis.camandro.org/2025-06-14-f</span><span class="invisible">use-over-io_uring.html</span></a></p>
Marcel Waldvogel<p>All you never wanted to know about creating fast socket I/O on <a href="https://waldvogel.family/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>. Unless you are a real geek.</p><p>A small, ultra-high performance publish-subscribe server doing kind of TCP <a href="https://waldvogel.family/tags/multicast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>multicast</span></a> using <a href="https://waldvogel.family/tags/sendfile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sendfile</span></a>, <a href="https://waldvogel.family/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a>, <a href="https://waldvogel.family/tags/splice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>splice</span></a>, (mapped) files, and <a href="https://waldvogel.family/tags/fallocate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fallocate</span></a> for file hole punching.</p><p>Saturating a 10 Gbps link with useful data with just 8 cores.</p><p>A beautiful writeup for anyone into fast Linux networking. Not just for <a href="https://waldvogel.family/tags/ATproto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ATproto</span></a> </p><p>h/t <span class="h-card" translate="no"><a href="https://smnn.ch/@nohillside" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nohillside</span></a></span> <br><a href="https://waldvogel.family/tags/PubSub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PubSub</span></a> <a href="https://waldvogel.family/tags/Kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kernel</span></a> <a href="https://waldvogel.family/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <br><a href="https://www.asayers.com/jetrelay" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">asayers.com/jetrelay</span><span class="invisible"></span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> '<a href="https://mastodon.thenewoil.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a>' security blindspot allows stealthy <a href="https://mastodon.thenewoil.org/tags/rootkit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rootkit</span></a> attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/linux-io-uring-security-blindspot-allows-stealthy-rootkit-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/linux-io-uring-security-blindspot-allows-stealthy-rootkit-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
argv minus one<p>Do any operating systems other than <a href="https://mastodon.sdf.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> (<a href="https://mastodon.sdf.org/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a>, <a href="https://mastodon.sdf.org/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a>, <a href="https://mastodon.sdf.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, <a href="https://mastodon.sdf.org/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>, etc) have an API for non-blocking file IO?</p><p>I know Linux has that in <a href="https://mastodon.sdf.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a>, which can do almost any IO operation (even fsync) in the background and tell you when it's done, but is that the only OS with such a feature?</p><p><a href="https://mastodon.sdf.org/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.sdf.org/tags/async" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>async</span></a></p>
Nils Goroll 🕊️:varnishcache:<p>Does anyone happen to have any information on the relevance of UIO_FASTIOV (defined as 8 on <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>). I understand that submitting vectored io with within this limit can avoid dynamic memory allocation in the kernel, but is this relevant in any way in practice? Is it relevant with <a href="https://fosstodon.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a> ?</p>
Nils Goroll 🕊️:varnishcache:<p>using <a href="https://fosstodon.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a> for storage in <a href="https://fosstodon.org/tags/varnishcache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>varnishcache</span></a> </p><p><a href="https://fosstodon.org/tags/allsystemsgo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>allsystemsgo</span></a> <a href="https://fosstodon.org/tags/ASG2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASG2024</span></a> </p><p><a href="https://media.ccc.de/v/all-systems-go-2024-305-using-iouring-for-storage" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">media.ccc.de/v/all-systems-go-</span><span class="invisible">2024-305-using-iouring-for-storage</span></a></p><p>From: <span class="h-card" translate="no"><a href="https://botsin.space/@mediacccde" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mediacccde</span></a></span><br><a href="https://botsin.space/@mediacccde/113203506819669014" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">botsin.space/@mediacccde/11320</span><span class="invisible">3506819669014</span></a></p>
Nils Goroll 🕊️:varnishcache:<p>the <a href="https://fosstodon.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a> example/proxy.c code really is super helpful. thank you, <span class="h-card" translate="no"><a href="https://fosstodon.org/@axboe" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>axboe</span></a></span> !</p>
Lars Wirzenius<p>Fun: <a href="https://toot.liw.fi/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> bindings to <a href="https://toot.liw.fi/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a> using the io-uring crate can do 10 thousand NOP operations per second on my laptop.</p><p>This isn't useful, but it's the "hello, world" for me for learning about io_uring.</p>
Nils Goroll 🕊️:varnishcache:<p>HAPPY 18TH BIRTHDAY <a href="https://fosstodon.org/tags/VarnishCache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VarnishCache</span></a> ! To celebrate this memorable occasion, we have just tagged Version 1.0.0-rc1 of <a href="https://gitlab.com/uplex/varnish/slash" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gitlab.com/uplex/varnish/slash</span><span class="invisible"></span></a>, which contains fellow, our advanced, <a href="https://fosstodon.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a> based, high performance, eventually persistent, always consistent <a href="https://fosstodon.org/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> storage engine.<br>Read the full announcement: <a href="https://varnish-cache.org/lists/pipermail/varnish-announce/2024-February/000762.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">varnish-cache.org/lists/piperm</span><span class="invisible">ail/varnish-announce/2024-February/000762.html</span></a><br>And the changelog: <a href="https://gitlab.com/uplex/varnish/slash/-/blob/master/CHANGES.rst?ref_type=heads" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.com/uplex/varnish/slash</span><span class="invisible">/-/blob/master/CHANGES.rst?ref_type=heads</span></a></p>
Chris Gioran 💔<p>I added an opcode to <a href="https://fosstodon.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a> in the <a href="https://fosstodon.org/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> kernel</p><p>Then I exposed it to the userspace uring library from <a href="https://fosstodon.org/tags/tokio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tokio</span></a> </p><p>And finally I wrote an application with it.</p><p>It's easier than it sounds. But I still learned a lot. Here, I wrote it up:</p><p><a href="https://radiki.dev/posts/add-zero-opcode-to-io-uring/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">radiki.dev/posts/add-zero-opco</span><span class="invisible">de-to-io-uring/</span></a></p><p>If you find this useful let me know, and I'll write more.</p><p><a href="https://fosstodon.org/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a> <a href="https://fosstodon.org/tags/rustlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustlang</span></a></p>
Nils Goroll 🕊️:varnishcache:<p>This month, SLASH/fellow <a href="https://gitlab.com/uplex/varnish/slash" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">gitlab.com/uplex/varnish/slash</span><span class="invisible"></span></a>, our advanced, <a href="https://fosstodon.org/tags/io_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>io_uring</span></a> based, high performance, eventually persistent, always consistent <a href="https://fosstodon.org/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> storage engine for <a href="https://fosstodon.org/tags/varnishcache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>varnishcache</span></a> has received bug fixes and relevant performance improvements:<br>- reduced memory footprint<br>- improve cache lookup performance<br>- made memory allocation priorities more fine grained<br>- reduced overhead for concurrent access to disk objects<br>- improved disk space allocation</p><p>Please try it out, all feedback is welcome!</p>
Julien M.<a class="hashtag" href="https://social.alternativebit.fr/tag/infosec" rel="nofollow noopener noreferrer" target="_blank">#InfoSec</a><br><blockquote><strong>Learnings from <a class="hashtag" href="https://social.alternativebit.fr/tag/kctf" rel="nofollow noopener noreferrer" target="_blank">#kCTF</a> VRP's 42 <a class="hashtag" href="https://social.alternativebit.fr/tag/linuxkernel" rel="nofollow noopener noreferrer" target="_blank">#LinuxKernel</a> exploits submissions</strong><br>Since its inception, the program has rewarded researchers with a total of 1.8 million USD, and in the past year, there has been a clear trend: 60% of the submissions exploited the <a class="hashtag" href="https://social.alternativebit.fr/tag/io_uring" rel="nofollow noopener noreferrer" target="_blank">#io_uring</a> component of the <a class="hashtag" href="https://social.alternativebit.fr/tag/linux" rel="nofollow noopener noreferrer" target="_blank">#Linux</a> <a class="hashtag" href="https://social.alternativebit.fr/tag/kernel" rel="nofollow noopener noreferrer" target="_blank">#kernel</a> (we paid out around 1 million USD for <a class="hashtag" href="https://social.alternativebit.fr/tag/io_uring" rel="nofollow noopener noreferrer" target="_blank">#io_uring</a> alone). Furthermore, <a class="hashtag" href="https://social.alternativebit.fr/tag/io_uring" rel="nofollow noopener noreferrer" target="_blank">#io_uring</a> vulnerabilities were used in all the submissions which bypassed our mitigations.<br><br>To protect our users, we decided to limit the usage of <a class="hashtag" href="https://social.alternativebit.fr/tag/io_uring" rel="nofollow noopener noreferrer" target="_blank">#io_uring</a> in <a class="hashtag" href="https://social.alternativebit.fr/tag/google" rel="nofollow noopener noreferrer" target="_blank">#Google</a> products<br></blockquote><a href="https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html" rel="nofollow noopener noreferrer" target="_blank">https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html</a>
Phoronix<p>Google Limiting <a href="https://noc.social/tags/IO_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IO_uring</span></a> Use Due To Security Vulnerabilities</p><p><a href="https://www.phoronix.com/news/Google-Restricting-IO_uring" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Google-Restr</span><span class="invisible">icting-IO_uring</span></a></p><p>Original tweet : <a href="https://twitter.com/phoronix/status/1669650034344730626" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/phoronix/status/16</span><span class="invisible">69650034344730626</span></a></p>
Phoronix<p><a href="https://noc.social/tags/libuv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libuv</span></a> Adds <a href="https://noc.social/tags/IO_uring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IO_uring</span></a> Support For ~8x Throughput Boost</p><p><a href="https://www.phoronix.com/news/libuv-io-uring" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/libuv-io-uri</span><span class="invisible">ng</span></a></p><p>Original tweet : <a href="https://twitter.com/phoronix/status/1648333901176135682" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/phoronix/status/16</span><span class="invisible">48333901176135682</span></a></p>