Language Selection

English French German Italian Portuguese Spanish

Kernel: AMD SMCA Updates, STM32MP1, and Rust

Filed under
  • AMD SMCA Updates
    Hi all,
    This set adds supports for SMCA changes in future AMD systems.
    Patch 1 adds an "unknown" bank type so that sysfs initialization issues
    can be avoided on systems with new bank types.
    Patch 2 adds new bank types and error descriptions used in future AMD
    Patch 3 adjusts how SMCA bank information is cached. Future AMD systems
    will have different bank type layouts between logical CPUs. So having a
    single system-wide cache of the layout won't be correct.
  • AMD Makes Some Interesting SMCA Driver Changes For Future CPUs - Phoronix

    These latest AMD machine check error driver patches can be found on the kernel mailing list as they work their way towards the mainline Linux kernel.

  • Announcing buildroot-external-st, Buildroot support for STM32MP1 platforms - Bootlin's blog

    Back in 2019, ST released a brand new processor family, the STM32MP1, whose members are currently based on a dual Cortex-A7 to run Linux combined with one Cortex-M4 to run bare-metal applications, together with a wide range of peripherals.

  • Updated Rust Code For Linux Kernel Patches Posted - Phoronix

    In 2022 we will very likely see the experimental Rust programming language support within the Linux kernel mainlined. Sent out this morning were the updated patches introducing the initial support and infrastructure around handling of Rust within the kernel.

    This summer saw the earlier patch series posted for review and discussion around introducing Rust programming language support in the Linux kernel to complement its longstanding C focus. In the months since there has been more progress on enabling Rust for the Linux kernel development, Linus Torvalds is not opposed to it, and others getting onboard with the effort. Rust for the Linux kernel remains of increasing interest to developers over security concerns with Rust affording more memory safety protections, potentially lowering the barrier to contributing to the kernel, and other related benefits.

More in Slashdot today

  • Rust support
    Rust support
    This is the patch series (v2) to add support for Rust as a second
    language to the Linux kernel.
    If you are interested in following this effort, please join us in
    the mailing list at:
    and take a look at the project itself at:
    As usual, special thanks go to ISRG (Internet Security Research
    Group) and Google for their financial support on this endeavor.
  • The Linux Kernel's Second Language? Rust Gets Another Step Closer - Slashdot

    "In 2022 we will very likely see the experimental Rust programming language support within the Linux kernel mainlined," writes Phoronix, citing patches sent out Monday "introducing the initial support and infrastructure around handling of Rust within the kernel."

Patch suggests Rust may be the next frontier for Linux kernel

  • Patch suggests Rust may be the next frontier for Linux kernel

    The Linux kernel has maintained portability due to reliance on the C programming language, but serious adoption of Rust now threatens its dominance.

    Mozilla’s decade old technology has become a major force, offering the same level of flexibility afforded by classic compiled languages, while offering interoperability with C. Kernel developers have long discussed the possibility of bringing Rust to Linux, and the Linux kernel now includes a stable Rust compiler. This has led Kernel developer Miguel Ojeda to introduce a patch that would make Rust its second official language.

Microsoft-controlled "Rust for Linux"

  • Rust for Linux Progresses with New Abstractions and Infrastructure [Ed: Linux the kernel -- not just Linux Foundation -- increasingly being controlled by the Microsoft, i.e. the thugs who attack him internationally]

    A new patch for Linux advances support for Rust as a second language for kernel development. Besides updating the infrastructure and providing new abstractions around kernel features, the new patch sets the base for more frequent submissions, writes Rust for Linux project lead Miguel Ojeda.

    The new patch comes a few months after the initial contribution setting the stage for using Rust for drivers and modules and taking advantage of its superior memory safety model.

    With the new submission, Rust for Linux moved to using the latest stable release of the Rust compiler, version 1.57.0. The objective here is not relying eventually on any unstable language features and being able to declare a minimum Rust version required for kernel development. The new infrastructure also includes a number of new diagnostics and clippy lints to ensure stricter checks.

GAFAM-funded publishers cheer for Rust (GitHub) in Linux

  • Rust in the Linux Kernel: ‘Good Enough’

    The effort to bring Rust to the Linux kernel marches on this week, with an update from Rust for Linux project maintainer Miguel Ojeda put out this week serving as cause for renewed excitement. While the update cautions that Rust support is “still to be considered experimental,” it notes that the project has moved on from using the beta Rust compiler to use stable releases, starting with Rust 1.57.0, which was just released last Thursday.

    In addition, the project has migrated to the 2021 edition of Rust, and plans to migrate to new stable compilers each time one is released.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Redis vs. MongoDB: What you need to know

Databases are garnering a lot of popularity every day and are used by many organizations for a wide variety of use cases. Many organizations are employing innovative techniques to handle their data storage. These companies often shift between databases to optimize their storage and data mapping according to their business needs. Companies with growing data requirements utilize databases with dynamic functionalities. However, deciding which database is perfect for each of these companies can be very subjective. When it comes to database management, choosing between Redis and MongoDB can be relatively challenging. Read more

FSF expands process for associate members to nominate new members of the board

The board of the Free Software Foundation (FSF) announced today that associate members of the FSF will be able to nominate and evaluate candidates for the nonprofit's board of directors for the first time in the organization's 37-year history. FSF currently has just over 5,000 associate members. Under new procedures adopted by the FSF board on January 17 and summarized here, the organization will proactively engage associate members with a sufficient history of association with the FSF in the recruiting process by inviting them to suggest board nominees and then research collectively those nominees' suitability for a position on the board, including most importantly their record of commitment to free software ideals. The new community engagement process is a key result of a six-month consultant-led review designed to help make FSF governance and recruitment practices more transparent and participatory, while more systematically ensuring their commitment to the FSF's values and principles. Read more

Security Leftovers

  • White House Meeting Explores Ways to Secure Software Supply Chain

    The path forward will require collaboration from companies and organizations that consume and ship open source software, said Joe Brockmeier, Vice President Marketing & Publicity at Apache Software Foundation. “There's no single "silver bullet" to get there, and it will take all of our organizations working together to improve the open source supply chain.”

  • CISA Adds 13 Known Exploited Vulnerabilities to Catalog | CISA

    CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.

  • CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

    In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems—CISA has published CISA Insights: Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats.

  • Linux Lock Screen Policy Enables Consistent Device Governance

    Every operating system should have security controls deployed, and Linux is no exception. Having a lock screen policy is even more of a consideration with a remote workforce where team members could be using a local coffee shop or other unsecured locations as an “office,” which increases the odds that bad actors could obtain physical access to devices. JumpCloud has created an easy-to-deploy policy to configure lock screen settings for Linux throughout your fleet, providing consistent governance and a scalable method for a secure OS configuration.

  • Oracle Releases January 2022 Critical Patch Update

    Oracle has released its Critical Patch Update for January 2022 to address 497 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

A note for LWN subscribers

January 22, 2022 will be the 24th anniversary of the publication of the first Weekly Edition. A lot has happened in the intervening years; the Linux community has grown immeasurably, and LWN has grown with it. Later this year will also be the 20th anniversary of the adoption of our subscription-based model, which has sustained LWN ever since. There is a change coming for our subscribers that will, with luck, help to set up LWN to thrive in the next coming years. The nominal price for an LWN subscription is $7 per month, a price that has remained unchanged since 2010. That $7 buys a lot less now than it did twelve years ago. Your editor is reliably informed by the Internet that inflation in the US has been just under 28% from 2010 until the middle of 2021; that rate doesn't include the last few months. Prices for some things, most notably health insurance in the US, have increased by rather more than that. Read more