|
|
Subscribe / Log in / New account

Welcome to LWN.net

LWN.net is a reader-supported news site dedicated to producing the best coverage from within the Linux and free software development communities. See the LWN FAQ for more information, and please consider subscribing to gain full access and support our activities.

[$] The push to save Itanium

[Kernel] Posted Nov 9, 2023 15:25 UTC (Thu) by corbet

It is (relatively) easy to add code to the kernel; it tends to be much harder to remove that code later. The most recent example of this dynamic can be seen in the story of the ia64 ("Itanium") architecture, support for which was removed during the 6.7 merge window. That removal has left a small group of dedicated ia64 users unhappy and clinging to a faint hope that this support could return in a year's time.

Full Story (comments: 20)

[$] LWN.net Weekly Edition for November 9, 2023

Posted Nov 9, 2023 0:06 UTC (Thu)

The LWN.net Weekly Edition for November 9, 2023 is available.

Inside this week's LWN.net Weekly Edition

  • Front: Patches on linux-kernel; Guest-first memory; 6.7 Merge window; BPF network device; Python C API.
  • Briefs: Openwall sponsorship; Fedora 39; OpenELA; Ubuntu Core Desktop; Gawk 5.3; Home Assistant 2023.11; Quotes; ...
  • Announcements: Newsletters, conferences, security updates, patches, and more.
Read more

[$] Reducing patch postings to linux-kernel

[Kernel] Posted Nov 8, 2023 20:45 UTC (Wed) by jake

The linux-kernel mailing list famously gets an enormous amount of email on a daily basis; the volume is so high that various email providers try to rate-limit it, which can lead to huge backlogs on the sending side and, of course, delayed mail. Part of the reason there is so much traffic is that nearly every patch gets copied to the mailing list, even when it may be unnecessary to do so. A proposed change would start shunting some of that patch email aside and, as might be guessed, has both supporters and detractors, but the discussion does highlight some of the different ways the mailing list is used by kernel developers.

Full Story (comments: 45)

[$] Progress in wrangling the Python C API

[Development] Posted Nov 7, 2023 20:12 UTC (Tue) by jake

There has been a lot of action for the Python C API in the last month or so—much of it organizational in nature. As predicted in our late September article on using the "limited" C API in the standard library, the core developer sprint in October was the scene of some discussions about the API and the plans for it. Out of those discussions have come two PEPs, one of which describes the API, its purposes, strengths, and weaknesses, while the other would establish a C API working group to coordinate and oversee the development and maintenance of it.

Full Story (comments: 6)

[$] The BPF-programmable network device

[Kernel] Posted Nov 6, 2023 16:23 UTC (Mon) by corbet

Containers and virtual machines on Linux communicate with the world via virtual network devices. This arrangement makes the full power of the Linux networking stack available, but it imposes the full overhead of that stack as well. Often, the routing of this networking traffic can be handled with relatively simple logic; the BPF-programmable network device, which was merged for the 6.7 kernel release, makes it possible to avoid expensive network processing, in at least some cases.

Full Story (comments: none)

[$] The first half of the 6.7 merge window

[Kernel] Posted Nov 3, 2023 14:19 UTC (Fri) by corbet

As of this writing, 9,842 non-merge changesets have found their way into the mainline repository since the 6.7 merge window opened. Nearly a third of those consist of the entire bcachefs development history but, even discounting that, there has been a lot of material landing for the next release. Read on for a summary of the most interesting changes pulled so far in this development cycle.

Full Story (comments: 2)

[$] Guest-first memory for KVM

[Kernel] Posted Nov 2, 2023 15:28 UTC (Thu) by corbet

One of the core objectives of any confidential-computing implementation is to protect a guest system's memory from access by actors outside of the guest itself. The host computer and hypervisor are part of the group that is to be excluded from such access; indeed, they are often seen as threat in their own right. Hardware vendors have added features like memory encryption to make memory inaccessible to the host, but such features can be difficult to use and are not available on all CPUs, so there is ongoing interest in software-only solutions that can improve confidentiality. The guest-first memory patch set, posted by Sean Christopherson and containing work by several developers, looks poised to bring some software-based protection to an upcoming kernel release.

Full Story (comments: 20)

LWN.net Weekly Edition for November 2, 2023

Posted Nov 2, 2023 0:05 UTC (Thu)

The LWN.net Weekly Edition for November 2, 2023 is available.

Inside this week's LWN.net Weekly Edition

  • Front: Implicit keyword arguments in Python; String handling in the kernel; Deferred scheduling; 6.6 Development statistics; Rust in the kernel; Help wanted.
  • Briefs: Removing OpenBSD syscall(); Linux 6.6; Why ACPI?; Kernel maintainership talk; C++ safety; Quote; ...
  • Announcements: Newsletters, conferences, security updates, patches, and more.
Read more

Help wanted at LWN

[Front] Posted Nov 1, 2023 19:31 UTC (Wed) by corbet

LWN.net is looking to hire a full-time writer/editor to help us keep the news flowing and to expand our content in areas of interest to our readers. We are certain that the person we need is out there somewhere, and are counting on help from LWN readers to find them. Read on for details on who we are looking for and how we see them fitting in here.

Full Story (comments: none)

Implicit keyword arguments for Python

[Development] Posted Nov 1, 2023 16:57 UTC (Wed) by jake

Python functions can use both positional and keyword arguments; the latter provide a certain level of documentation for an argument and its meaning, while allowing them to be given in any order in a call. But it is often the case that the name of the local variable to be passed is the same as the keyword, which can lead to overly repetitive argument lists, at least in some eyes. A recent proposal to shorten the syntax for calls with these duplicate names seems to be gaining some steam—a Python Enhancement Proposal (PEP) is forthcoming—though there are some who find it to be an unnecessary and unwelcome complication for the language.

Full Story (comments: 31)

Security updates for Thursday

[Security] Posted Nov 9, 2023 13:56 UTC (Thu) by jake

Security updates have been issued by Debian (cacti and chromium), Fedora (CuraEngine, podman, and rubygem-rmagick), Mageia (gnome-shell, openssl, and zlib), SUSE (salt), and Ubuntu (xrdp).

Full Story (comments: none)

The 2023 TAB election deadline is approaching

[Kernel] Posted Nov 8, 2023 21:15 UTC (Wed) by corbet

The reminder has gone out: the deadline for nominations for the Linux Foundation Technical Advisory Board is November 13. If you are interested in representing the kernel community on the TAB, now is the time to put together a self-nomination and get onto the ballot.

Comments (none posted)

A pile of stable kernel updates

[Kernel] Posted Nov 8, 2023 15:05 UTC (Wed) by corbet

The 6.6.1, 6.5.11, 6.1.62, 5.4.260, 4.19.298, and 4.14.329 stable kernel updates have all been released, each contains another set of important fixes.

Note that 5.15.138 and 5.10.200 ended up going into a second round of review; they can be expected in the near future.

Update: 5.15.138 and 5.10.200 are now available as well.

Comments (none posted)

Chamberlain v. Home Assistant

[Development] Posted Nov 8, 2023 14:58 UTC (Wed) by corbet

The developers of Home Assistant, which has recently been covered here, have announced that they will be removing support for Chamberlain and Liftmaster garage-door openers after being locked out by the company.

Because we cannot continue to work around Chamberlain Group if they keep blocking access to third parties, the MyQ integration will be removed from Home Assistant in the upcoming 2023.12 release on December 6, 2023. We are very disappointed that it has come to this and sincerely hope that Chamberlain Group is willing to reconsider its position.

Longtime readers may remember that Chamberlain tried to use the DMCA to block the use of third-party remotes nearly 20 years ago.

Comments (18 posted)

Canonical reveals more details about Ubuntu Core Desktop (Register)

[Distributions] Posted Nov 8, 2023 14:37 UTC (Wed) by corbet

The Register attended a talk about Ubuntu's upcoming Core Desktop immutable distribution.

We suspect that Core Desktop might yet be the tool that validates Canonical's Snap format and helps to overcome some of the resistance it faces. Snap's single-file distribution format is simple and enables transactional installation – including, critically, rollback – without a fancy filesystem underneath, or elaborate distribution methods such as libostree.

Comments (15 posted)

Security updates for Wednesday

[Security] Posted Nov 8, 2023 14:30 UTC (Wed) by corbet

Security updates have been issued by Debian (python-urllib3 and tang), Fedora (chromium, mlpack, open-vm-tools, and salt), Red Hat (avahi, binutils, buildah, c-ares, cloud-init, containernetworking-plugins, cups, curl, dnsmasq, edk2, flatpak, frr, gdb, ghostscript, glib2, gmp, grafana, haproxy, httpd, mod_http2, java-21-openjdk, kernel, krb5, libfastjson, liblouis, libmicrohttpd, libpq, libqb, librabbitmq, LibRaw, libreoffice, libreswan, libssh, libtiff, libvirt, libX11, linux-firmware, mod_auth_openidc, ncurses, nghttp2, opensc, pcs, perl-CPAN, perl-HTTP-Tiny, podman, procps-ng, protobuf-c, python-cryptography, python-pip, python-tornado, python-wheel, python3.11, python3.11-pip, python3.9, qemu-kvm, qt5 stack, runc, samba, samba, evolution-mapi, openchange, shadow-utils, skopeo, squid, sysstat, tang, tomcat, toolbox, tpm2-tss, webkit2gtk3, wireshark, xorg-x11-server, xorg-x11-server-Xwayland, and yajl), Slackware (sudo), SUSE (squid), and Ubuntu (python-urllib3).

Full Story (comments: none)

Sponsorship for the Openwall lists

[Security] Posted Nov 7, 2023 15:26 UTC (Tue) by corbet

Alexander "Solar Designer" Peslyak, the longtime maintainer of the oss-security and linux-distros mailing lists, has announced that this work has gained a sponsor:

After 15+ years of being a 100% volunteer effort, Openwall's maintenance of oss-security and (linux-)distros is finally sponsored by the OpenSSF, a project of the Linux Foundation. This sponsorship does not provide the Linux Foundation with the ability to set policies for community resources managed by Openwall. I am grateful for the support, which will help ensure continued operation of these resources on a new level while retaining independence.

As part of this arrangement, Peslyak is now producing statistics on vulnerability handling; the first set for 2023 has been posted.

Comments (none posted)

Fedora 39 released

[Distributions] Posted Nov 7, 2023 14:24 UTC (Tue) by corbet

Fedora 39 has been released, one day after the Fedora project's 20th anniversary. See the list of approved changes and this Fedora Magazine article for more information.

As always, we’ve updated many, many other packages as we work to bring you the best of everything the free and open source software world has to offer. Fedora Linux 39 includes gcc 13.2, binutils 2.40, glibc 2.38, gdb 13.2, and rpm 4.19. It also has updates to popular programming language stacks, including Python 3.12 and Rust 1.73.

Comments (6 posted)

Security updates for Tuesday

[Security] Posted Nov 7, 2023 14:15 UTC (Tue) by corbet

Security updates have been issued by Debian (trapperkeeper-webserver-jetty9-clojure), Mageia (libsndfile, packages, thunderbird, and x11-server), Oracle (.NET 6.0), SUSE (kernel, kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools- container, virt-operator-container, redis, and squid), and Ubuntu (gsl).

Full Story (comments: none)

Security updates for Monday

[Security] Posted Nov 6, 2023 14:22 UTC (Mon) by jake

Security updates have been issued by Debian (chromium, open-vm-tools, openjdk-17, pmix, and trafficserver), Fedora (netconsd, podman, suricata, and usd), Oracle (.NET 6.0, .NET 7.0, binutils, ghostscript, java-1.8.0-openjdk, kernel, and squid), SUSE (apache-ivy, gstreamer-plugins-bad, kernel, nodejs12, opera, poppler, rubygem-activesupport-5.2, tiff, util-linux, and virtualbox), and Ubuntu (krb5).

Full Story (comments: none)

--> More news items


Copyright © 2023, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds