Language Selection

English French German Italian Portuguese Spanish

LWN

Syndicate content
LWN.net is a comprehensive source of news and opinions from and about the Linux community. This is the main LWN.net feed, listing all articles which are posted to the site front page.
Updated: 1 hour 30 min ago

FSF: New Respects Your Freedom website

8 hours 58 min ago
The Free Software Foundation's Respects Your Freedom program provides a certification for hardware that supports your freedom. A new website listing certified products has been launched. "In 2012, when we announced the first certification, we hosted information about the program and retailers as a simple page on the Free Software Foundation (FSF) Web site. With only one retailer selling one device, this was certainly satisfactory. As the program grew, we added each new device chronologically to that page, highlighting the newest certifications. We are now in a place where eight different retailers have gained nearly fifty certifications [...]. With so many devices available, across so many different device categories, it was getting more difficult for users to find what they were looking for in just a plain chronological list."

A set of stable kernels

9 hours 33 min ago
Stable kernels 5.3.10, 4.19.83, 4.14.153, 4.9.200, and 4.4.200 have been released. They all contain important fixes and users should upgrade.

Security updates for Monday

9 hours 40 min ago
Security updates have been issued by Debian (ampache, chromium, djvulibre, firefox-esr, gdal, and ruby-haml), Fedora (chromium, file, gd, hostapd, nspr, and rssh), openSUSE (bcm20702a1-firmware, firefox, gdal, libtomcrypt, php7, python-ecdsa, python3, samba, and thunderbird), SUSE (apache2-mod_auth_openidc, libssh2_org, and rsyslog), and Ubuntu (bash).

Kernel prepatch 5.4-rc7

Monday 11th of November 2019 02:16:49 AM
The seventh 5.4 prepatch is out for testing. "Nothing looks _bad_, but there is too much of it. So I'm leaning towards an rc8 being likely next weekend due to that, but I won't make a final decision yet. We'll see."

[$] Emulated iopl()

Friday 8th of November 2019 05:37:26 PM
Operating systems and computing hardware both carry a lot of their history with them. The x86 I/O-port mechanism is one piece of that history; it is rarely used by hardware designed in the last 20 years, but it must still be supported. That doesn't mean that this support can't be cleaned up and improved, though, especially when the old implementation turns out to have some unpleasant properties. An example can be seen in the iopl() patch set from Thomas Gleixner.

openSUSE votes not to change its name

Friday 8th of November 2019 02:41:23 PM
The openSUSE project has been considering a name change as part of its move into a separate foundation since (at least) June. A long and somewhat controversial vote of project members has just come to an end, and the result is conclusive: 225-42 against the name change.

Security updates for Friday

Friday 8th of November 2019 02:36:53 PM
Security updates have been issued by Arch Linux (linux-hardened), Debian (fribidi), Gentoo (oniguruma, openssh/openssh, openssl, and pump), Mageia (chromium-browser-stable, expat, firefox, freetds, proftpd, python, thunderbird, and unbound), Oracle (sudo), Scientific Linux (thunderbird), Slackware (kernel), SUSE (rubygem-haml), and Ubuntu (fribidi and webkit2gtk).

[$] Statistics from the 5.4 development cycle

Thursday 7th of November 2019 10:27:48 PM
As of this writing, just over 14,000 non-merge changesets have found their way into the mainline repository for the 5.4 release; that is a bit less than we saw for 5.3, but more than most of the other recent kernels. The final 5.4 release is approaching, so it must be time for our usual look at where the code merged in this development cycle came from. It's mostly business as usual in the kernel community, modulo an appearance from none other than Hulk Robot.

Security updates for Thursday

Thursday 7th of November 2019 02:52:41 PM
Security updates have been issued by Arch Linux (squid), Fedora (chromium, libssh2, and wpa_supplicant), openSUSE (chromium), Red Hat (ansible, chromium-browser, openstack-octavia, patch, qemu-kvm-rhev, sudo, and thunderbird), Scientific Linux (sudo), SUSE (bluez, gdb, php72, and thunderbird), and Ubuntu (cpio and rygel).

Rust 1.39.0 released

Thursday 7th of November 2019 02:50:24 PM
Version 1.39.0 of the Rust language is available. The biggest new feature appears to be the async/await mechanism, which is described in this blog post: "So, what is async await? Async-await is a way to write functions that can 'pause', return control to the runtime, and then pick up from where they left off. Typically those pauses are to wait for I/O, but there can be any number of uses."

[$] LWN.net Weekly Edition for November 7, 2019

Thursday 7th of November 2019 01:05:51 AM
The LWN.net Weekly Edition for November 7, 2019 is available.

[$] Filesystem sandboxing with eBPF

Wednesday 6th of November 2019 10:40:32 PM
Running untrusted code in a safe manner is generally the goal of sandboxing efforts. The sandbox technique presented by Georgia Tech PhD student Ashish Bijlani at Open Source Summit Europe 2019 is no exception. He has used something of a novel scheme to allow unprivileged code to implement the sandbox policies using BPF; the policies are then enforced by the kernel.

[$] Digging for license information with FOSSology

Wednesday 6th of November 2019 05:52:09 PM
At Open Source Summit Europe 2019, Michael C. Jaeger and Maximilian Huber updated attendees on the FOSSology project, which is an open-source license-compliance tool. They introduced FOSSology and talked about how it can be used, but they also looked at the new features added in the last few releases. Beyond that, they presented some experiments the project has been doing with creating machine-learning models for license recognition.

Stable kernel updates

Wednesday 6th of November 2019 04:08:27 PM
Stable kernels 5.3.9, 4.19.82, 4.14.152, 4.9.199, and 4.4.199 have been released. They all contain important fixes and users should upgrade.

Security updates for Wednesday

Wednesday 6th of November 2019 03:55:31 PM
Security updates have been issued by Debian (cpio, openafs, proftpd-dfsg, simplesamlphp, and wordpress), Fedora (thunderbird), openSUSE (binutils, docker-runc, kernel, nfs-utils, php7, python3, and samba), Red Hat (389-ds:1.4, ansible, bind, container-tools:1.0, container-tools:rhel8, curl, dbus, dhcp, dovecot, edk2, elfutils, evolution, freeradius:3.0, gdb, gettext, glib2, glibc, GNOME, gnutls, go-toolset:rhel8, http-parser, httpd:2.4, kernel, kernel-rt, libarchive, libjpeg-turbo, libqb, libreswan, libseccomp, libtiff, libvorbis, lldpad, lua, mariadb:10.3, mod_auth_mellon, numpy, openssh, openssl, openstack-octavia, osinfo-db and libosinfo, php:7.2, php:7.3, python-urllib3, python27:2.7, python3, qemu-kvm-rhev, qt5-qtbase, rh-php70-php, rh-python36-python, samba, squid:4, sssd, sudo, systemd, virt-manager, virt:rhel, and yum), SUSE (ardana-ansible, ardana-horizon, ardana-keystone, ardana-manila, ardana-neutron, crowbar-core, crowbar-openstack, grafana, openstack-cinder, openstack-dashboard, openstack-horizon-plugin-manila-ui, openstack-keystone, openstack-manila, openstack-neutron, openstack-neutron-fwaas, openstack-neutron-lbaas, openstack-nova, openstack-octavia, openstack-octavia-amphora-image, pdns, python-Django1, python-keystonemiddleware, python-octaviaclient, python-os-brick, python-oslo.cache, python-oslo.messaging, gdb, and libssh2_org), and Ubuntu (firefox).

[$] Generalizing address-space isolation

Tuesday 5th of November 2019 07:16:44 PM
Linux systems have traditionally run with a single address space that is shared by user and kernel space. That changed with the advent of the Meltdown vulnerability, which forced the merging of kernel page-table isolation (KPTI) at the end of 2017. But, Mike Rapoport said during his 2019 Open Source Summit Europe talk, that may not be the end of the story for address-space isolation. There is a good case to be made for increasing the separation of address spaces, but implementing that may require some fundamental changes in how kernel memory management works.

Red Hat Enterprise Linux 8.1 released

Tuesday 5th of November 2019 07:16:21 PM
Red Hat has announced the release of Red Hat Enterprise Linux 8.1. This is the first update in what is planned to be a 6 month cadence for minor releases. The release notes contain more information.

Git v2.24.0

Tuesday 5th of November 2019 05:46:00 PM
Git 2.24 has been released. This blog post covers the highlights of this release, beginning with feature macros. "Usually, configuring some behavior requires only a single configuration change, like enabling or disabling any of the aforementioned values. But what about when it doesn’t? What do you do when you don’t know which configuration values to change? For example, let’s say you want to live on the bleeding-edge of the latest from upstream Git, but don’t have a chance to discover all the new configurable options. In Git 2.24, you can now opt into feature macros—one Git configuration that implies many others. These are hand-selected by the developers of Git, and they let you opt into a certain feature or adopt a handful of settings based on the characteristics of your repository."

Security updates for Tuesday

Tuesday 5th of November 2019 03:38:53 PM
Security updates have been issued by Arch Linux (electron, ghostscript, glibc, python2, and samba), Debian (webkit2gtk), Slackware (libtiff), SUSE (ImageMagick, python-ecdsa, and samba), and Ubuntu (apport, haproxy, ruby-nokogiri, and whoopsie).

[$] Identifying buggy patches with machine learning

Monday 4th of November 2019 05:19:07 PM
The stable kernel releases are meant to contain as many important fixes as possible; to that end, the stable maintainers have been making use of a machine-learning system to identify patches that should be considered for a stable update. This exercise has had some success but, at the 2019 Open Source Summit Europe, Sasha Levin asked whether this process could be improved further. Might it be possible for a machine-learning system to identify patches that create bugs and intercept them, so that the fixes never become necessary?