Linux Weekly News
A big crop of new stable kernels
[$] Solutions for direct-map fragmentation
Security updates for Thursday
[$] LWN.net Weekly Edition for May 12, 2022
Red Hat Enterprise Linux 9 released
NVIDIA Transitioning To Official, Open-Source Linux GPU Kernel Driver (Phoronix)
NVIDIA's open kernel modules is already considered "production ready, opt-in" for data center GPUs. For GeForce and workstation GPUs, the open kernel module code is considered "alpha quality" but will be ramped up moving forward with future releases. NVIDIA has already deprecated the monolithic kernel module approach for their data center GPU support to focus on this open kernel driver solution (and their existing proprietary kernel module using the GSP). Only Turing and newer GPUs will be supported by this open-source kernel driver. Pre-Turing GPUs are left to using the existing proprietary kernel drivers or the Nouveau DRM driver for that matter.
The user-space code remains proprietary, though, which could inhibit the eventual merging of this code into the mainline kernel.
Update: here is NVIDIA's press release on the new drivers.
[$] Changing filesystem resize patterns
[$] Better tools for out-of-memory debugging
The 2022 Python Language Summit (PSF blog)
[$] Seeking an API for protection keys supervisor
The malicious "rustdecimal" crate
The crate contained identical source code and functionality as the legit rust_decimal crate, except for the Decimal::new function.
When the function was called, it checked whether the GITLAB_CI environment variable was set, and if so it downloaded a binary payload into /tmp/git-updater.bin and executed it. The binary payload supported both Linux and macOS, but not Windows.
Security updates for Wednesday
[$] Page pinning and filesystems
[$] Recent RCU changes
[$] The state of memory-management development
Fedora 36 released
[$] Improving memory-management documentation
Security updates for Tuesday
Poettering: Fitting Everything Together
First and foremost, I think the focus must be on an image-based design rather than a package-based one. For robustness and security it is essential to operate with reproducible, immutable images that describe the OS or large parts of it in full, rather than operating always with fine-grained RPM/dpkg style packages. That's not to say that packages are not relevant (I actually think they matter a lot!), but I think they should be less of a tool for deploying code but more one of building the objects to deploy.