X-Git-Url: https://git.decadent.org.uk/gitweb/?a=blobdiff_plain;f=index.html;h=09b4e881d5a18483d1ca3b3ea30c45cc847317f3;hb=ab11e575ff5d9facf19f48d4329712add4105a91;hp=600c133ce925a726eacf4c44504aa3158f1da115;hpb=12e66dc4c6d3634826738cbfd27686174606f404;p=kernel-news-talk.git
diff --git a/index.html b/index.html
index 600c133..09b4e88 100644
--- a/index.html
+++ b/index.html
@@ -79,6 +79,131 @@
+
+
Linux releases early and often
+
+ -
+ Linux is released about 5 times a year (plus stable updates
+ every week or two)
+
+ -
+ For 'wheezy' we chose to freeze with Linux 3.2, which was
+ getting pretty old by the time of release
+
+ -
+ Good news: we have lots of new kernel features in testing/unstable
+
+ -
+ Bad news: some of them won't really work without new userland
+
+
+
+
+
+
Team device driver [3.3]
+
+ -
+ Alternative to the bonding driver - simpler, modular, high-level
+ control deferred to userland
+
+ -
+ Basic configuration can be done with ip, but it really
+ needs new tools - teamd, teamnl, etc.
+
+ -
+ Want to make it work? See
+ http://bugs.debian.org/695850
+
+
+
+
+
+
Transcendent memory [3.0-3.5]
+
+ -
+ Abstract storage for memory pages, expected to be slower than
+ regular memory but faster than disk
+
+ -
+ Can provide a second layer of page cache (cleancache and frontswap)
+
+ -
+ Pages stored by hypervisor (Xen), compressed local memory
+ (zcache) or cluster of machines (RAMster)
+
+ -
+ Not yet enabled in Debian kernels, and needs some thought about
+ configuration
+
+ -
+ Want to make it work? See
+ https://lwn.net/Articles/454795/
+ and mail debian-kernel
+
+
+
+
+
+
New KMS drivers [3.3-3.10]
+
+ -
+ DRM/KMS drivers added for old, new and virtual hardware -
+ AST, DisplayLink, Hyper-V, Matrox G200, QEMU Cirrus
+
+ -
+ Should be more robust than purely user-mode drivers, and
+ compatible with Secure Boot
+
+ -
+ Current X drivers don't work with these, so the kernel drivers
+ are disabled for now
+
+ -
+ Want to make it work? Join the X Strike Force and package the
+ new X drivers
+
+
+
+
+
+
Module signing [3.7]
+
+ -
+ Kernel modules can be signed at build time, and the kernel
+ configured to refuse loading unsigned modules
+
+ -
+ Necessary but not sufficient to implement Secure Boot -
+ we would also need signed kernel images and some other
+ restrictions when booted in this mode
+
+ -
+ Want to make Secure Boot work? Come to the meeting on Tuesday
+
+
+
+
+
+
More support for discard
+
+ -
+ Flash devices (and thin-provisioned SANs) can be more efficient
+ if the filesystem 'discards' unused disk space
+
+ -
+ Requires support in hardware, driver, filesystem and any layered
+ device drivers - e.g. LVM, RAID (added in 3.7)
+
+ -
+ Must be explicitly enabled, but d-i doesn't do this by default
+
+ -
+ Want to make it work?
+ See http://bugs.debian.org/690977
+
+
+
+
Questions?