Hírolvasó
700 millió euró bírságot fizethet a Meta és az Apple
A Metának is fájni fog a vámháború
20 éves a legelső YouTube-videó
Maradnak a sütik a Google Chrome-ban
IT sec partnernap + pizza + kézműves sörözés
A fiatal tinik nem tartanak az AI-tól
[$] Code signing for BPF programs
The Linux kernel can be configured so that kernel modules must be signed or otherwise authenticated to be loaded into the kernel. Some BPF developers want that to be an option for BPF programs as well — after all, if those are going to run as part of the kernel, they should be subject to the same code-signing requirements. Blaise Boscaccy and Cong Wang presented two different visions for how BPF code signing could work at the 2025 Linux Storage, Filesystem, Memory-Management, and BPF Summit.
[$] DMA addresses for UIO
Security updates for Tuesday
Már sakkozni is megtanulhatunk a Duolingóval
Leszámolni készül az AI az Instagramon kamuzó fiatalokkal
"„Te tetves csicska” – gyűlöletlavina zúdult Ceglédi Zoltánra húsvéthétfőn"
Sokba kerül, hogy udvariaskodunk a ChatGPT-vel
Készen áll a Huawei betörni az Nvidia-chipek helyére
Megkezdődött a Google történelmi tárgyalása
Mit néztem most - Biggest Heist Ever
[$] Indirect calls in BPF
Anton Protopopov kicked off the BPF track on the second day of the 2025 Linux Storage, Filesystem, Memory-Management, and BPF Summit with a discussion about permitting indirect calls in BPF. He also spoke about his continuing work on static keys, a topic which is related because the implementation of indirect jumps and static keys in the verifier use some of the same mechanisms for tracking indirect control-flow. Although some design work remains to be done, it may soon be possible to make indirect calls in BPF without any extra work compared to normal C.
RISC-V images for Fedora Linux 42
The Fedora Project's RISC-V special-interest group (SIG) has announced the availability of Fedora Linux 42 images for supported RISC-V boards, as well as QEMU and container images. The SIG is working toward making RISC-V a primary architecture for Fedora, and has made significant progress in the past year.
Our upstreaming work continues apace, and we want to acknowledge that none of this progress would be possible without the incredible collaboration from maintainers across the Fedora Project and beyond. Thank you to everyone who reviewed, accepted, merged, and built our patches. Your support makes this architecture possible.
We're also excited about just how many packages build cleanly without special treatment or overlay repositories that need to be cared for. RISC-V is becoming just another architecture, and that's exactly how it should be.
Template strings accepted for Python 3.14
The Python Steering Council accepted PEP 750 ("Template Strings") on April 10. LWN covered the discussion around the proposal, including the substantial revisions to the idea that were needed for it to be accepted. Template strings (t-strings) are a new kind of string that produces structured data instead of a raw string, allowing library authors to build their own custom template-handling logic. Since the approval happened before the cutoff for new features (May 6), support for template strings will be included in Python 3.14, scheduled for October 2025.