Language Selection

English French German Italian Portuguese Spanish


Syndicate content
LinuxInsight - aggregated feeds
Updated: 1 hour 1 min ago

Phoronix: GPUVM Discrete GPU Code For AMDKFD, Radeon Compute Could Be Ready For Linux 4.17

Saturday 27th of January 2018 04:04:04 PM
Sent out Friday night were the latest patches for getting the discrete GPU support within the AMDKFD HSA kernel driver up to scratch for allowing the ROCm compute stack working off a mainline kernel...

LXer: Security Chaos Engineering: A new paradigm for cybersecurity

Saturday 27th of January 2018 03:36:25 PM
Security is always changing and failure always exists.This toxic scenario requires a fresh perspective on how we think about operational security. We must understand that we are often the primary cause of our own security flaws. The industry typically looks at cybersecurity and failure in isolation or as separate matters. We believe that our lack of insight and operational intelligence into our own security control failures is one of the most common causes of security incidents and, subsequently, data breaches.

TuxMachines: Slackware: What's New in 2018

Saturday 27th of January 2018 03:24:46 PM

Back to Slackware development, Patrick has just pushed a new GCC release (7.3.0) which has support for -mindirect-branch=thunk-extern flag which is needed to provide full mitigation of Spectre variant 2 and also push a new kernel built with CONFIG_RETPOLINE=y.Fixes to Meltdown has been pushed earlier when he delivered Linux Kernel 4.14.14 with KPTI enabled. As for Spectre variant 1, it all depends on microcode update. If you are AMD users, you can easily get it by updating to the latest kernel-firmware package found in -current. Intel users will have to install intel-microcode from SBo repository (it's best to be installed alongside with iucode_tool).

read more

TuxMachines: Ubuntu and Derivatives: Ubuntu 18.04, elementary OS, Pop!_OS

Saturday 27th of January 2018 03:21:23 PM
  • Ubuntu 18.04 will revert to long-in-the-tooth Xorg

    Canonical has announced that it’ll be reverting back to the Xorg graphics stack as the default option in Ubuntu 18.04 LTS “Bionic Beaver”. While Wayland will still be available as an option, the testing that Canonical carried out by making Wayland default in Ubuntu 17.10 has found that Xorg is still more advantageous to use over Wayland, especially for a release which needs to be rock solid as it gets picked up by educational institutions and businesses.

  • How to put icons on the desktop in elementary OS

    Ever tried elementary OS? If so you’ll know that you can’t put icons on the desktop by default.

    It’s a frustrating experience, particularly if you’re used to being able to use the desktop space as a literal ‘desktop space’. Sadly, elementary (sic) says it has ‘no plans’ to rethink its approach.

    But there is good news. An app called Desktop Folder lets you enable a desktop on elementary (of sorts) so that you can layer icons, files and app shortcuts all over your desktop wallpaper.

  • System76 Eyeing Disk Encryption By Default

    Ubuntu-focused Linux PC vendor System76 who has also been working on their own Pop!_OS distribution is looking at enabling disk encryption by default.

    System76 has shared another blog post highlighting their work on Pop!_OS. The latest is on their design work and installer. But what got me excited about this post is the mention of "Full disk encryption is seen as an important part of security and privacy and should be a default option...A hurdle for a privacy and security focused OEM like System76 is how to deliver a computer with the encryption provided by default."

  • Installer, elementary and Pop!_OS collaboration

    Welcome back, Pop! Fans - time for an update on the week! We have some great stuff going on.

    This week has been primarily been dominated by installer work. Daniel Foré from elementary flew in to work with us on what the new installer is going to be like. Last week, we shared quite a bit of the styling around Pop!_Shop and the installer with the visual designs. The work with elementary was focused on user experience around installation, drive partitioning, dual booting, and full disk encryption.

    At the kick off, we discussed what the various screens should look like and how they should be organized., as well as full disk encryption. Full disk encryption is seen as an important part of security and privacy and should be a default option. We worked around the challenges of incorporating full disk in the UI and what it means for the backend and identifying the various scenarios that exist. A hurdle for a privacy and security focused OEM like System76 is how to deliver a computer with the encryption provided by default. Pre-encrypting would require a unique key for that user that can’t be guaranteed. If a user wanted to have encryption they would have to encrypt and re-install the whole OS which is also not ideal.

read more

TuxMachines: Kernel Coverage at LWN (Paywall Expired)

Saturday 27th of January 2018 02:52:47 PM
  • Active state management of power domains

    The Linux kernel's generic power domain (genpd) subsystem has been extended to support active state management of the power domains in the 4.15 development cycle. Power domains were traditionally used to enable or disable power to a region of a system on chip (SoC) but, with the recent updates, they can control the clock rate or amount of power supplied to that region as well. These changes improve the kernel's ability to run the system's hardware at the optimal power level for the current workload.

    SoCs have become increasingly complex and power-efficient over the years. Most of the IP blocks in an SoC have independent power-control logic that can be turned on or off to reduce the power they consume. But there is also a significant amount of static current leakage that can't be controlled using the IP-block-specific power logic. SoCs are normally divided into several regions depending on which IP blocks are generally used together, so that an unused region can be completely powered off to eliminate this leakage. These regions of the chip, called "power domains", can be present in a hierarchy and thus can be nested; a nested domain is called a subdomain of the master domain. Powering down a power domain results in disabling all the IP blocks and subdomains controlled by the domain and also stopping any static leakage in that region of the chip.

  • Deadline scheduling part 1 — overview and theory

    Realtime systems are computing systems that must react within precise time constraints to events. In such systems, the correct behavior does not depend only on the logical behavior, but also in the timing behavior. In other words, the response for a request is only correct if the logical result is correct and produced within a deadline. If the system fails to provide the response within the deadline, the system is showing a defect. In a multitasking operating system, such as Linux, a realtime scheduler is responsible for coordinating the access to the CPU, to ensure that all realtime tasks in the system accomplish their job within the deadline.

    The deadline scheduler enables the user to specify the tasks' requirements using well-defined realtime abstractions, allowing the system to make the best scheduling decisions, guaranteeing the scheduling of realtime tasks even in higher-load systems.

    This article provides an introduction to realtime scheduling and some of the theory behind it. The second installment will be dedicated to the Linux deadline scheduler in particular.

  • Meltdown/Spectre mitigation for 4.15 and beyond

    While some aspects of the kernel's defenses against the Meltdown and Spectre vulnerabilities were more-or-less in place when the problems were disclosed on January 3, others were less fully formed. Additionally, many of the mitigations (especially for the two Spectre variants) had not been seen in public prior to the disclosure, meaning that there was a lot of scope for discussion once they came out. Many of those discussions are slowing down, and the kernel's initial response has mostly come into focus. The 4.15 kernel will include a broad set of mitigations, while some others will have to wait for later; read on for details on where things stand.

    This article from January 5 gives an overview of the defenses for all three vulnerability variants. That material will not be repeated here, so those who have not read it may want to take a quick look before proceeding.

read more

TuxMachines: KDE: Plasma Mobile, Martin on CSD

Saturday 27th of January 2018 02:51:03 PM
  • How To Test Plasma Mobile OS On Your Computer

    Howdy KDE users! I’ve got a good news for you to spend your weekend with an interesting project. As you may already know, the team behind KDE has announced a new open source smartphone OS named “Plasma Mobile” last year. Since it is a collaborative project, they haven’t set any timeline to the availability of final release. Last week, KDE team has hosted a poll on their Twitter and Google+ pages and requested the community members to help the KDE developers move forward with Plasma Mobile. As a result, 44% poll participants wanted to test the OS. After a lot of users’ request, KDE development team has released x86_64 based Plasma Mobile ISO images, so that anyone can now download and test it on their system or spin up a VM. This is really a great news for KDE fans and for those who wanted to get a glimpse of how it looks like in real time.

  • This week in Usability & Productivity, part 3

    Howdy folks! Here’s your weekly update on our long-term Usability & productivity goal.

  • Server side decorations and Wayland

    I heard that GNOME is currently trying to lobby for all applications implementing CSD. One of the arguments seems to be that CSD is a must on Wayland. That’s of course not the case. Nothing in Wayland enforces CSD. Wayland itself is as ignorant about this as X11.

    The situation is that GNOME Shell and Weston require CSD, but KDE Plasma and Sway do not. In fact we created a protocol (supported by GTK) that allows to negotiate with the Wayland compositor whether to use CSD or SSD.

  • KWin Developer's Response To The GNOME CSD Initiative

    KDE KWin window manager / compositor maintainer Martin Flöser has penned a brief response to the recent GNOME developer's CSD Initiative in trying to get all applications to pursue client-side decorations and abandon title bars in favor of header bars.

    GNOME's Wayland strategy has been all about using client-side decorations (CSD) rather than server-side decorations (SSD) although Wayland does not force applications to use CSDs. GNOME and the Weston reference compositor notably use client-side decorations while KDE has been all about server-side decorations.

read more

Phoronix: System76 Eyeing Disk Encryption By Default

Saturday 27th of January 2018 02:16:56 PM
Ubuntu-focused Linux PC vendor System76 who has also been working on their own Pop!_OS distribution is looking at enabling disk encryption by default...

Reddit: Server side decorations and Wayland

Saturday 27th of January 2018 02:01:18 PM

Phoronix: KWin Developer's Response To The GNOME CSD Initiative

Saturday 27th of January 2018 01:57:21 PM
KDE KWin window manager / compositor maintainer Martin Flöser has penned a brief response to the recent GNOME developer's CSD Initiative in trying to get all applications to pursue client-side decorations and abandon title bars in favor of header bars...

LXer: KDE Invites Users to Test Plasma Mobile, Releases First-Ever Dedicated ISO Image

Saturday 27th of January 2018 01:42:03 PM
The KDE Project continues to improve the Plasma Mobile UI for smartphones, tablets, and other mobile devices and released today an ISO image for the community to test on their machines.

Phoronix: Libvpx 1.7.0 Released With AVX Optimizations & More

Saturday 27th of January 2018 01:28:37 PM
Google's WebM folks quietly released libvpx 1.7.0 earlier this week as the latest version of their VP8/VP9 encoder/decoder library...

TuxMachines: Security: Updates, US Senate, Malware on Social Control Media, Ubuntu 16.04.4 LTS Delay

Saturday 27th of January 2018 01:15:23 PM
  • Security updates for Friday
  • Senate IT Tells Staffers They're On Their Own When It Comes To Personal Devices And State-Sponsored Hackers

    Notification of state-sponsored hacking attempts has revealed another weak spot in the US government's defenses. The security of the government's systems is an ongoing concern, but the Senate has revealed it's not doing much to ensure sensitive documents and communications don't end up in the hands of foreign hackers.

    The news of the hacking attempt was greeted with assurances that nothing of value was taken.

  • Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems

    According to researchers, Dark Caracal hackers do not rely on any "zero-day exploits" to distribute its malware; instead, it uses basic social engineering via posts on Facebook groups and WhatsApp messages, encouraging users to visit hackers-controlled fake websites and download malicious applications.

  • Ubuntu 16.04.4 LTS Delayed Due To Spectre & Meltdown

    Ubuntu 16.04.4 LTS had been scheduled to ship mid-February as the latest point release for this Long Term Support release, but unfortunately that is not going to happen as planned due to the Canonical kernel developers being overloaded by Spectre and Meltdown mitigation work.

    Ubuntu 16.04.4 is now being delayed by an unknown length of time, but they believe it shouldn't be more than "a few weeks" past the original 15 February ship date. They are waiting for the Spectre/Meltdown mitigation work to settle, for ensuring they are shipping qualified patches in this point release. Additionally, they have been busy with that mitigation work that they have neglected other kernel patches that may need to make it into this point release too.

read more

Phoronix: KDE-Focused Netrunner Rolling 2018.01 Released

Saturday 27th of January 2018 01:04:41 PM
For those still in search of a KDE-focused Linux distribution that's rolling-release and desktop-friendly, Netrunner Rolling 2018.01 has been released...

Phoronix: Ubuntu 16.04.4 LTS Delayed Due To Spectre & Meltdown

Saturday 27th of January 2018 12:31:37 PM
Ubuntu 16.04.4 LTS had been scheduled to ship mid-February as the latest point release for this Long Term Support release, but unfortunately that is not going to happen as planned due to the Canonical kernel developers being overloaded by Spectre and Meltdown mitigation work...

LXer: Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems

Saturday 27th of January 2018 11:47:41 AM
Are you using Linux or Mac OS? If you think your system is not prone to viruses, then you should read this. Wide-range of cybercriminals are now using a new piece of 'undetectable' spying malware that targets Windows, macOS, Solaris and Linux systems.

Reddit: Video playback

Saturday 27th of January 2018 11:04:12 AM

I used on windows CCCP codecs with MPC-HC. Everything worked smoothly and was beautiful.

Now I'm on linux and can't really find info about video playback. I only downloaded VLC, but it seems to be funky and not really stable.

Any recommendations?

submitted by /u/Aqua_R
[link] [comments]

LXer: Containers, the GPL, and copyleft: No reason for concern

Saturday 27th of January 2018 09:53:19 AM
Though open source is thoroughly mainstream, new software technologies and old technologies that get newly popularized sometimes inspire hand-wringing about open source licenses. Most often the concern is about the GNU General Public License (GPL), and specifically the scope of its copyleft requirement, which is often described (somewhat misleadingly) as the GPL’s derivative work issue.

More in Tux Machines

Graphics: Nouveau, Mesa and VESA

  • Nouveau Gets ARB_bindless_texture Support For Maxwell & Newer
    Back for Mesa 18.0 there was OpenGL bindless textures for Kepler GPUs on the open-source NVIDIA "Nouveau" driver while now for Mesa 18.1 that support is in place for Maxwell GPUs and newer. Bindless texture support is important for "AZDO" purposes for approaching zero driver overhead with OpenGL. ARB_bindless_texture reduces the API/GL driver overhead of resource bindings and allows accessing textures without needing to first bind/re-bind them.
  • Marek Working Towards Even Lower SGPR Register Usage
    Yesterday well known open-source AMD developer Marek Olšák landed his RadeonSI 32-bit pointers support for freeing up some scalar general purpose registers (SGPRs) and he's continued with a new patch series to alleviate register usage even more.
  • Libdrm 2.4.90 Released With Meson Build System, AMDGPU & Intel Improvements
    Marek Olšák on Saturday released the big libdrm 2.4.90 DRM library update that sits between Mesa and other GPU user-space components and the kernel's Direct Rendering Manager code.
  • Mesa Git Lands RadeonSI 32-bit Pointers Support
    At the start of the new year Marek Olšák of AMD posted a set of patches for 32-bit GPU pointers in RadeonSI. That work has now landed in mainline Mesa Git.
  • xf86-video-vesa 2.4.0
    Nothing terribly exciting, but enough bug fixes to justify a release.
  • VESA X.Org Driver Sees First Update In Three Years
    Should you find yourself using the xf86-video-vesa DDX for one reason or another, a new release is now available and it's the first in three years. The xf86-video-vesa 2.4.0 X.Org driver was released this week with the handful of commits that came in since v2.3.4 was tagged three years ago, it's been eight years already since xf86-video-vesa 2.3.0. For most users, xf86-video-vesa is just used in select fallback instances when your main DDX driver fails but even still these days KMS is pretty solid with xf86-video-modesetting, fbdev and other DDX drivers working well, etc.

Kernel: VGA_Switcheroo, Con Kolivas/MuQSS, and KPTI Protection

Ubuntu: Unity, Mir, and Snapd

  • Ubuntu Touch Q&A 23
    The developers have been hard at work on Xenial! ARM64 now working on Ubuntu Touch, and applications launch! As many modern CPUs don't include 32-bit compatibility mode, ARM64 native mode on UT can start to make use of more modern CPUs.
  • UBports Continues Working On Unity 8, Developer ISO Coming
    While Canonical is no longer involved in Unity 8 development, the community-driven UBports team continues working on their "Unity 8" and "Ubuntu Touch" efforts with a hope to deliver a developer ISO soon. Sadly the Yunit project that also forked Unity 8's code-base doesn't seem to be active at least not regularly anymore, but the UBports team is working on delivering. In their latest Q&A session they share that Unity 8 on the desktop is coming together. One of the developers commented, "While it's both good and pretty, it's not 'pretty good'."
  • This Week In Mir (16th Feb, 2018)
  • Snapd 2.31 Better Supports Wayland Via Mir, Canonical Hires Another Mir Developer
    Besides Mir 0.30 being released this week, other Mir progress was also made by these Canonical developers working on forging Mir into a viable Wayland compositor. Gerry Boland of Canonical's Mir team has shared that Snapd 2.31 now supports any Snap implementing the Wayland interface. This allows for Mir to be shipped as a Snap and support Wayland clients using Canonical's app sandboxing approach alternative to Flatpaks.

Debian: The SysVinit Migration, Debian Debates, and package-hosting repository,

  • The SysVinit upstream project just migrated to git
    Surprising as it might sound, there are still computers using the traditional Sys V init system, and there probably will be until systemd start working on Hurd and FreeBSD. The upstream project still exist, though, and up until today, the upstream source was available from Savannah via subversion. I am happy to report that this just changed.
  • futures of distributions
    Seems Debian is talking about why they are unable to package whole categories of modern software, such as anything using npm. It's good they're having a conversation about that, and I want to give a broader perspective.
  • What is Debian all about, really? Or: friction, packaging complex applications
    This weekend, those interested in Debian development have been having a discussion on the debian-devel mailing list about "What can Debian do to provide complex applications to its users?". I'm commenting on that in my blog rather than the mailing list, since this got a bit too long to be usefully done in an email.
  • Updated my package-repository
    Yesterday I overhauled my Debian package-hosting repository, in response to user-complaints.