Feed lwn LWN.net

Favorite IconLWN.net

Link https://lwn.net/
Feed http://lwn.net/headlines/rss
Updated 2025-09-14 12:15
Stone: Introducing freedesktop.org GitLab
Daniel Stone reflectson the completion of freedesktop.org's move to a GitLab-basedinfrastructure. "We’ve spent the past couple of years paying downour technical debt, and the community equivalent thereof. Ourinfrastructure is much less error-prone than it was: we’ve gone fromfighting fires to being able to prepare the new GitLab infrastructure andspend time shepherding projects through it. Now that we have a fair fewprojects on GitLab and they’ve been able to serve themselves, we’ve beenable to take some time for community issues."
Kuhn: In Memoriam: Gervase Markham
Bradley Kuhn noteswith sadness the passing of Gervase Markham. "Gerv's time withus was too short. In response, I suggest that we look at his life and workand learn from his example. Gerv set aside his illness for as long aspossible to continue good work in FLOSS. If he can do that, we can all beinspired by him to set aside virtually any problem to work hard, together,for important outcomes that are bigger than us all."
A set of weekend stable kernel updates
There is a new set of stable kernel updates available:4.17.11,4.14.59,4.9.116,4.4.145, and3.18.117.Each contains another collection of important fixes.
[$] Teaching the OOM killer about control groups
The kernel's out-of-memory (OOM) killer is summoned when the system runsshort of free memory and is unable to proceed without killing one or moreprocesses. As might be expected, the policy decisions around whichprocesses should be targeted have engendered controversy for as long as theOOM killer has existed. The 4.19 development cycle is likely to includea new OOM-killer implementation that targets control groups rather thanindividual processes, but it turns out that there is significantdisagreement over how the OOM killer and control groups should interact.
What Are Machine Learning Models Hiding? (Freedom to Tinker)
Over on the Freedom to Tinker blog, Vitaly Shmatikov reports on some research he and others have been doing on machine-learning models—and what can be hidden inside them."Federated learning, where models are crowd-sourced from hundreds or even millions of users, is an even juicier target. In a recent paper [PDF], we show that a single malicious participant in federated learning can completely replace the joint model with another one that has the same accuracy but also incorporates backdoor functionality. For example, it can intentionally misclassify images with certain features or suggest adversary-chosen words to complete certain sentences.When training ML [machine learning] models, it is not enough to ask if the model has learned its task well. Creators of ML models must ask what else their models have learned. Are they memorizing and leaking their training data? Are they discovering privacy-violating features that have nothing to do with their learning tasks? Are they hiding backdoor functionality? We need least-privilege ML models that learn only what they need for their task – and nothing more."
Remote Spectre exploits demonstrated
This paper fromfour Graz University of Technology researchers [PDF] describes amechanism they have developed to exploit the Spectre V1 vulnerabilityover the net, with no local code execution required. "We show thatmemory access latency, in general, can be reflected in the latency ofnetwork requests. Hence, we demonstrate that it is possible for an attackerto distinguish cache hits and misses on specific cache lines remotely, bymeasuring and averaging over a larger number of measurements. Based onthis, we implemented the first access-driven remote cache attack, a remotevariant of Evict+ Reload called Thrash+Reload. Our remote Thrash+Reloadattack is a significant leap forward from previous remote cache timingattacks on cryptographic algorithms. We facilitate this technique toretrofit existing Spectre attacks to our network-based scenario. ThisNetSpectre variant is able to leak 15 bits per hour from a vulnerabletarget system." Other attacks described in the paper are able toachieve higher rates.
Security updates for Friday
Security updates have been issued by CentOS (java-1.8.0-openjdk and thunderbird), Debian (busybox, chromium-browser, intel-microcode, mailman, and vim-syntastic), Fedora (NetworkManager-vpnc), SUSE (exempi, java-1_8_0-ibm, libofx, libsndfile, microcode_ctl, ntfs-3g, ovmf, rpm, util-linux, webkit2gtk3, and xen), and Ubuntu (clamav and evolution-data-server).
Financial woes for Slackware's Patrick Volkerding
Patrick Volkerding, who is the founder and benevolent dictator for life of the Slackware Linux distribution, posted a note at LinuxQuestions.org detailing some financial problems. It appears they mostly stem from a deal that he made with the Slackware Store that has gone badly awry."Still not sure how to move forward, but I have some hope that the community might think that my work is and has been worth supporting. If at all possible I'd like to get away from replicating physical media which seems to be a lost cause. T-shirts? Well, maybe, but I don't see that providing a reasonable income either. I'm wondering how Patreon would do. It would at least be better than nothing, which is where I am now.Through all of this I have continued to work hard towards getting Slackware 15.0 released because I believe it will be by far the best release we've ever had, and because I'm dedicated to my work and the community that uses it. I've never really been in this for the money. " Note that there is at least one person out there soliciting Bitcoin who is not affiliated with Volkerding, in what looks like a scam of some sort; it is particularly sad because that is similar to what he alleges has happened with Slackware Store as well. No word, yet, on how to go about helping out. [Thanks to Ken Dawson for a heads-up about this.][Update: Volkerding has posted his PayPal link for donations.]
Security updates for Thursday
Security updates have been issued by Arch Linux (jenkins), CentOS (java-1.8.0-openjdk, openslp, and thunderbird), Fedora (dcraw and httpd), Oracle (java-1.8.0-openjdk and thunderbird), Red Hat (procps), Scientific Linux (thunderbird), SUSE (kernel), and Ubuntu (clamav and tomcat7, tomcat8).
[$] LWN.net Weekly Edition for July 26, 2018
The LWN.net Weekly Edition for July 26, 2018 is available.
[$] PostgreSQL and patents
Patents and open-source projects are always a messy combination it seems.A recent discussion on the pgsql-hackers mailing list highlights some ofthe problems that can result even when a patent holder wants to make theirpatents available to a project like PostgreSQL. Software patents are aminefield in many ways—often projects want to just avoid the problemsentirely by staying completely away from code known to be covered by patents.
[$] A kernel event notification mechanism
The kernel has a range of mechanisms for notifying user space whensomething of interest happens. These include dnotify and inotify for filesystem events,signals, poll(), tracepoints, uevents, and more. One might think thatthere would be little need for yet another, but there are still events ofinterest that user space can only learn about by polling. In an attempt tofix this problem, David Howells, not content with his recent attempt to add seven new system calls for filesystemmounting, has put forward a proposal for ageneral-purpose event notification mechanism for Linux.
[$] Replacing AWK with Python in GCC?
GCC has a lot of command-lineoptions—so many, in fact, that its build process does a fair amount ofprocessing using AWK to generate theoption-parsing code for the compiler. But some find the AWK code to bedifficult to work with. A recent post to the GCC mailing list proposes replacing AWK withPython in the hopes of more maintainable option-parsing generation in thefuture.
Stable kernel updates
Stable kernels 4.17.10, 4.14.58, 4.9.115, and 4.4.144 have been released. They all containimportant fixes throughout the tree and users should upgrade.
Security updates for Wednesday
Security updates have been issued by Debian (ant, evolution-data-server, libarchive-zip-perl, mailman, resiprocate, slurm-llnl, and sympa), Mageia (firmware, kernel, microcode, and wesnoth), openSUSE (Chromium), Oracle (openslp and thunderbird), Red Hat (java-1.7.0-oracle, java-1.8.0-oracle, kernel, qemu-kvm-rhev, and thunderbird), SUSE (kernel, nautilus, and xen), and Ubuntu (ant and clamav).
Hutterer: Why it's not a good idea to handle evdev directly
Peter Hutterer writesabout why libinput exists. It turns out that, like most otherhardware, input devices have no end of obnoxious quirks to deal with."All this is just handling features that users have come toexpect. Examples for non-features that you'll have to implement: on someLenovo series (*50 and newer) you will get a pointer jump after a series ofof events that only have pressure information. You'll have to detect anddiscard that jump. The HP Pavilion DM4 touchpad has random jumps in theslot data. Synaptics PS/2 touchpads may 'randomly' end touches and restartthem on the next event frame 10ms later. If you don't handle that you'llget ghost taps. And so on and so forth."
[$] Statistics from the 4.18 development cycle
The 4.18-rc6 kernel prepatch came out onJuly 22, right on schedule. That is a sign that this development cycle is approachingits conclusion, so the time has come for a look at some statistics for howthings went this time around. It was another fairly ordinary releasecycle for the most part, but with a couple of distinctive features.
Python has brought computer programming to a vast new audience (Economist)
Here is theEconomist's take on the state of the Python language and community."Mr Van Rossum, though delighted by this enthusiasm for his software,has come to find the rigours of supervising it, in his role as 'benevolentdictator for life', unbearable. He fears he has become something of anidol. 'I’m uncomfortable with that fame,' he says, sounding uncannily likeBrian trying to drive away the crowds of disciples. 'Sometimes I feel likeeverything I say or do is seen as a very powerful force.' On July 12th heresigned, leaving the Pythonistas to manage themselves."
[$] Initializing the entropy pool using RDRAND and friends
<p>Random number generation in the kernel has garnered a lot of attention overthe years. The tensions between the need for cryptographic-strength randomnumbers versus getting strong random numbers more quickly—along with the needto avoid regressions—has led to something of a patchwork of APIs. While itis widely agreed that waiting for a properly initialized random numbergenerator (RNG) before producing random numbers is the proper course,opinions differ on what "properly" means exactly. Beyond that, waiting,especially early in the boot process, can be problematic as well. Onesolution would be to trust the RNG instructions provided by most modernprocessors, but that comes with worries of its own.
Security updates for Tuesday
Security updates have been issued by Debian (network-manager-vpnc), Fedora (haproxy, mailman, and NetworkManager-vpnc), Mageia (clamav, ffmpeg, rust, thunderbird, and wireshark), Oracle (java-1.8.0-openjdk and openslp), Red Hat (rh-ror42-rubygem-sprockets and rh-ror50-rubygem-sprockets), Scientific Linux (java-1.8.0-openjdk and openslp), SUSE (ImageMagick, libofx, php53, and python-dulwich), and Ubuntu (linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-hwe, linux-azure, linux-gcp, mutt, and python-cryptography).
Announcing NetBSD 8.0
NetBSD 8.0 has been released.This version features USB stack rework with USB3 support added, anin-kernel audio mixer, reproducible builds, full userland debuginformation, and much more.
Security updates for Monday
Security updates have been issued by Arch Linux (apache, networkmanager-vpnc, and znc), Debian (gosa, opencv, and slurm-llnl), Fedora (evolution, evolution-data-server, evolution-ews, gnome-bluetooth, libtomcrypt, podman, python-cryptography, and rust), Gentoo (passenger), Red Hat (java-1.8.0-openjdk and openslp), Slackware (php), SUSE (openssl-1_1, procps, python, rsyslog, rubygem-passenger, and xen), and Ubuntu (mutt).
Kernel prepatch 4.18-rc6
The sixth 4.18 kernel prepatch is out fortesting. "So this was the week when the other shoe dropped ... The reason thetwo previous rc releases were so nice and small was that David hadn'tsent me much networking fixes, and they came in this week.That said, it's not really a huge rc this week either, so it's allgood."
A weekend pile of stable kernels
Greg Kroah-Hartman has released five new stable kernels: 4.17.9, 4.14.57, 4.9.114, 4.4.143, and 3.18.116. As usual, they contain importantchanges throughout the kernel tree; users of those series should upgrade.
Open sourcing oomd, a new approach to handling OOMs
Over on the Facebook code site, Daniel Xu announces the release of oomd under the GPLv2. Oomd is a user-space "out of memory" killer that was mentioned in our recent article on the block I/O latency controller and it uses the pressure stall information covered in an even more recent article."Oomd constantly monitors PSI [Pressure Stall Information] metrics to assess whether a system is under unrecoverable load. PSI alone is insufficient, so oomd also monitors the system holistically. This is in contrast to Linux’s OOM killer, which focuses primarily on the kernel’s concerns. Since OOM detection criteria can vary depending on workload, the plugin system supports customization to both the detection and process kill strategies.Thanks to this new ability to monitor key system resource indicators, oomd is able to take corrective action in userspace before a system-wide OOM occurs. Corrective action is configured via a flexible plugin system that is capable of executing custom code. Thus, in addition to oomd’s default process SIGKILL behavior, application developers can customize their plugin with alternate strategies, such as sending a 'back off' RPC to the main workload or dumping system logs to a remote service."
Security updates for Friday
Security updates have been issued by Debian (dnsmasq, linux-base, and openjpeg2), Fedora (libgit2, libtomcrypt, openslp, and perl-Archive-Zip), and openSUSE (gdk-pixbuf, libopenmpt, mercurial, perl, php7, polkit, and rsyslog).
[$] The problem with the asynchronous bsg interface
The kernel supports two different "SCSI generic" pseudo-devices, each ofwhich allows user space to send arbitrary commands to a SCSI-attacheddevice. Both SCSI-generic implementations have proved to have securityissues in the past as a result of the way their API was designed. In thecase of one of those drivers, these problems seem almost certain to lead to theremoval of a significant chunk of functionality in the 4.19 developmentcycle.
Stable kernel 4.4.142
Greg Kroah-Hartman has released the 4.4.142stable kernel. It is not an essential upgrade, "but a number ofbuild problems with perf are now resolved, and an x86 issue that some people might have hitis now handled properly. If those were problems for you, pleaseupgrade."
Security updates for Thursday
Security updates have been issued by Debian (ant, gpac, linux-4.9, linux-latest-4.9, taglib, vlc, and znc), Fedora (ceph), Red Hat (fluentd and qemu-kvm-rhev), Slackware (httpd), and SUSE (e2fsprogs, glibc, libgcrypt, mercurial, openssh, perl, rubygem-sprockets, shadow, and wireshark).
[$] LWN.net Weekly Edition for July 19, 2018
The LWN.net Weekly Edition for July 19, 2018 is available.
[$] Deep learning and free software
<p>Deep-learning applications typically rely on a trained neural net toaccomplish their goal (e.g. photo recognition, automatic translation, orplaying go). That neural net uses what is essentially a large collection ofweighting numbers that have been empirically determined as part of its training (which generally uses a huge set of training data). Afree-software application could use those weights, but there are a number of barriers for users who might want to tweak them for variousreasons. A discussion on the debian-devel mailing list recently looked atwhether these deep-learning applications can ever truly be considered "free" (as infreedom) because of these pre-computed weights—and the difficultiesinherent in changingthem.
[$] The PEP 572 endgame
Over the last few months, it became clear that the battle over PEP 572 wouldbe consequential; its scale and vehemence was largely unprecedented in thehistory of Python. The announcement by Guido van Rossum thathe was stepping down from his role as benevolent dictator for life (BDFL),due in part to that battle,underscored the importance of it. While the Python project charts its course in the wake of hisresignation, it makes sense to catch up on where things stand with thiscontentious PEP that has now been accepted for Python 3.8.
Stable kernel 4.17.8
Stable kernel 4.17.8 has been released.This fixes the issue with i386 systems that was present in the 4.17.7 kernel.
Security updates for Wednesday
Security updates have been issued by Arch Linux (curl, lib32-curl, lib32-libcurl-compat, lib32-libcurl-gnutls, libcurl-compat, and libcurl-gnutls), Debian (blender, ffmpeg, and wordpress), Fedora (curl), Gentoo (tqdm), Oracle (kernel), Slackware (mutt), SUSE (xen), and Ubuntu (policykit-1).
[$] Kernel symbol namespacing
In order to actually do anything, a kernel module must gain access tofunctions and data structures in the rest of the kernel. Enabling andcontrolling that access is the job of the symbol-export mechanism. Whilethe enabling certainly happens, the control part is not quite so clear;many developers view the nearly 30,000 symbols in current kernels that areavailable to all modules as being far too many. The symbolnamespaces patch set from Martijn Coenen doesn't reduce that number,but it does provide a mechanism that might help to impose some order onexported symbols in general.
Stable kernel updates
Stable kernels 4.17.7, 4.14.56, 4.9.113, and 4.4.141 have been released. The 4.17.7 kernel is broken for i386 systems. "I did this release anyway with this known problem as there is a fix in here for x86-64 systems that was nasty to track down and was affecting people. Given that the huge majority of systems are NOT i386, I felt this was a safe release to do at this point in time." Beyond that, these kernels all contain the usual set of important fixes.
Security updates for Tuesday
Security updates have been issued by Arch Linux (thunderbird), Debian (ruby-rack-protection), Fedora (firefox and soundtouch), Red Hat (kernel), Scientific Linux (gnupg2), SUSE (perl and python-paramiko), and Ubuntu (policykit-1).
[$] Python post-Guido
The recent announcement by Guido van Rossumthat he was stepping away from his "benevolent dictator for life" (BDFL) role for Python was met with somesurprise, but not much shock, at least in the core-developer community.Van Rossum has been telegraphing some kind of change, at some unspecifiedpoint, for several years now, though the proximate cause (the "PEP 572 mess") isunfortunate. In the meantime, though, the project needs to figure outhow to govern itself moving forward—Van Rossum did not appoint a successorand has left the governance question up to the core developers.
Security updates for Monday
Security updates have been issued by CentOS (firefox, gnupg2, kernel, python, and qemu-kvm), Debian (389-ds-base, cups, imagemagick, kernel, mailman, ruby2.1, sssd, thunderbird, and znc), Fedora (glpi, hadoop, kernel, rubygem-sprockets, singularity, thunderbird, wordpress, xapian-core, and xen), Mageia (cantata and flash-player-plugin), openSUSE (exiv2, libvorbis, nodejs6, nodejs8, openslp, singularity, slurm, and tiff), and SUSE (kernel-azure and openssl).
Kernel prepatch 4.18-rc5
The 4.18-rc5 kernel prepatch has beenreleased. "For some reason this week actually felt very busy, butthe rc5 numbers show otherwise. It's all small and calm, and things areprogressing nicely."
[$] Tracking pressure-stall information
All underutilized systems are essentially the same, but each overutilizedsystem tends to be overloaded in its own way. If one's goal is tomaximize the use of the available computing resources, overutilizationtends not to be too far away, but when it happens, it can be hard to tellwhere the problem is. Sometimes, even the fact that there is a problem atall is not immediately apparent. Thepressure-stall information patch set from Johannes Weiner may make lifeeasier for system administrators by exposing more information about the real utilizationstate of the system.
Security updates for Friday
Security updates have been issued by Debian (cinnamon), Fedora (docker, firefox, jetty, and knot-resolver), Oracle (gnupg2), Scientific Linux (gnupg2), SUSE (gdk-pixbuf, java-1_8_0-openjdk, libopenmpt, php7, and rsyslog), and Ubuntu (dns-root-data, dnsmasq, and thunderbird).
Guido van Rossum resigns as Python leader
Python creator and Benevolent Dictator for Life Guido van Rossum has decided,in the wake of the difficult PEP 572discussion, to step down from his leadership of the project. "Now that PEP 572 is done, I don't ever want to have to fight so hard for aPEP and find that so many people despise my decisions.I would like to remove myself entirely from the decision process. I'llstill be there for a while as an ordinary core dev, and I'll still beavailable to mentor people -- possibly more available. But I'm basicallygiving myself a permanent vacation from being BDFL, and you all will be onyour own."
[$] Six (or seven) new system calls for filesystem mounting
Mounting filesystems is a complicated business. The kernel supports a widevariety of filesystem types, and each has its own, often extensive set of options. As a result, the mount()system call is complex, and the list of mountoptions is a rather long read. But even with all of that complexity,mount() does not do everything that users would like. Forexample, the options for a mount operation must all fit within a single4096-byte page — the fact that this is a problem for some users isillustrative in its own right. Theproblems with mount() have come up at various meetings, includingat the 2018 Linux Storage, Filesystem, andMemory-Management Summit. A setof patches implementing a new approach is getting closer to beingready, but it features some complexity of its own and there are someremaining concerns about the proposed system-call API.
Security updates for Thursday
Security updates have been issued by Arch Linux (qutebrowser), CentOS (firefox), Debian (ruby-sprockets), Fedora (botan2, git-annex, kernel, kernel-tools, and visualboyadvance-m), Mageia (chromium-browser-stable, graphviz, mailman, nikto, perl-Archive-Zip, redis, and w3m), openSUSE (nextcloud), Oracle (gnupg2), Red Hat (flash-plugin, gnupg2, and kernel), Slackware (bind and curl), SUSE (java-1_8_0-openjdk, php7, rsyslog, slurm, and ucode-intel), and Ubuntu (cups, libpng, and libpng, libpng1.6).
[$] LWN.net Weekly Edition for July 12, 2018
The LWN.net Weekly Edition for July 12, 2018 is available.
[$] Signing and distributing Gentoo
The compromise of the Gentoo's GitHubmirror was certainly embarrassing, but its overall impact on Gentoo userswas likely fairly limited. Gentoo and GitHub respondedquickly and forcefully to the breach, which greatly limited the damagethat could be done; the fact that it was a mirror and not the master copyof Gentoo's repositories made it relatively straightforward to recoverfrom. But the black eye that it gave the project has led some to consider waysto make it even harder for an attacker to add malicious content toGentoo—even if the distribution's own infrastructure were to becompromised.
A set of stable kernel updates
Greg Kroah-Hartman has released stable kernels 4.17.6, 4.14.55, 4.9.112, 4.4.140, and 3.18.115. As usual, they contain importantfixes and users should upgrade.
[$] Emacs & TLS
<p>A recent query about the status of network security (TLS settings inparticular) in Emacs led to a long thread in the emacs-devel mailing list. That threadtouched on a number of different areas, including using OpenSSL (or otherTLS libraries) rather thanGnuTLS, what kinds of problems should lead to complaints out of the box, what settings should be the default, and when those settings couldchange for Emacs so as not to discombobulate users. The latter issue isone that lots of projects struggle with: what kinds of changes areappropriate for a bug-fix release versus a feature release. For Emacs, itslengthy development cycle, coupled with the perceived urgency ofsecurity changes, makes that question even more difficult.
Security updates for Wednesday
Security updates have been issued by Debian (cups), Oracle (kernel and qemu-kvm), Red Hat (ansible, kernel, kernel-rt, and qemu-kvm), Scientific Linux (kernel and qemu-kvm), Slackware (thunderbird), and Ubuntu (curl, firefox, imagemagick, and xapian-core).
...143144145146147148149150151152...