X-Git-Url: https://git.decadent.org.uk/gitweb/?p=kernel-news-talk.git;a=blobdiff_plain;f=index.html;h=0713e46dc51e7ecbed681ca474caab347220e72d;hp=712b7f29fe6496f74003501e8bbe8d5de2549ca6;hb=b327656faff079f122b1b243f482f208a2be3e8b;hpb=508780fde6734ec7d84153b53a13311809880775
diff --git a/index.html b/index.html
index 712b7f2..0713e46 100644
--- a/index.html
+++ b/index.html
@@ -117,6 +117,72 @@
+
+
Transcendent memory [3.0-3.5]
+
+ -
+ Abstract storage for memory pages, expected to be slower than
+ regular memory but faster than disk
+
+ -
+ Can provide a second layer of page cache (cleancache and frontswap)
+
+ -
+ Pages stored by hypervisor (Xen), compressed local memory
+ (zcache) or cluster of machines (RAMster)
+
+ -
+ Not yet enabled in Debian kernels, and needs some thought about
+ configuration
+
+ -
+ Want to make it work? See
+ https://lwn.net/Articles/454795/
+ and mail debian-kernel
+
+
+
+
+
+
New KMS drivers [3.3-3.10]
+
+ -
+ DRM/KMS drivers added for old, new and virtual hardware -
+ AST, DisplayLink, Hyper-V, Matrox G200, QEMU Cirrus
+
+ -
+ Should be more robust than purely user-mode drivers, and
+ compatible with Secure Boot
+
+ -
+ Current X drivers don't work with these, so the kernel drivers
+ are disabled for now
+
+ -
+ Want to make it work? Join the X Strike Force and package the
+ new X drivers
+
+
+
+
+
+
Module signing [3.7]
+
+ -
+ Kernel modules can be signed at build time, and the kernel
+ configured to refuse loading unsigned modules
+
+ -
+ Necessary but not sufficient to implement Secure Boot -
+ we would also need signed kernel images and some other
+ restrictions when booted in this mode
+
+ -
+ Want to make Secure Boot work? Come to the meeting on Tuesday
+
+
+
+
Questions?