X-Git-Url: https://git.decadent.org.uk/gitweb/?p=kernel-news-talk.git;a=blobdiff_plain;f=index.html;h=48ec2dfeaf655f7836f0f08acf730cdb3e527185;hp=9d3e258a406cd81ae208f8b47ff57719475fe2f5;hb=65722b1dae44dd728d5c627b638d4d04ca541bee;hpb=a9b8623650fe04abfd3864b2c039073b253c635f
diff --git a/index.html b/index.html
index 9d3e258..48ec2df 100644
--- a/index.html
+++ b/index.html
@@ -61,20 +61,18 @@
Regular Linux contributor in both roles since 2008
-
- -
- Maintaining a net driver in my day job, plus core networking
- and PCI code as necessary
-
- -
- Debian kernel team member, now doing most of the unstable
- maintenance aside from ports
-
- -
- Maintaining Linux 3.2.y stable update series on
- kernel.org
-
-
+
+
+ Maintaining a net driver in my day job, plus core networking
+ and PCI code as necessary
+
+
+ Debian kernel team member, now doing most of the unstable
+ maintenance aside from ports
+
+
+ Maintaining Linux 3.2.y stable update series on
+ kernel.org
@@ -111,7 +109,7 @@
needs new tools - teamd, teamnl, etc.
- Want to make it work? See
+ Make it work: see
http://bugs.debian.org/695850
@@ -136,9 +134,9 @@
configuration
- Want to make it work? See
+ Make it work: see
https://lwn.net/Articles/454795/
- and mail debian-kernel
+ and send proposal to debian-kernel
@@ -159,8 +157,68 @@
are disabled for now
- Want to make it work? Join the X Strike Force and package the
- new X drivers
+ Make it work: join the X Strike Force and package the new X
+ drivers
+
+
+
+
+
+
Module signing [3.7]
+
+ -
+ Kernel modules can be signed at build time, and the kernel
+ configured to refuse loading unsigned modules
+
+ -
+ Necessary but not sufficient to implement Secure Boot -
+ we would also need signed kernel images and some other
+ restrictions when booted in this mode
+
+ -
+ Make Secure Boot work: come to the meeting on Tuesday
+
+
+
+
+
+
More support for discard
+
+ -
+ Flash devices (and thin-provisioned SANs) can be more efficient
+ if the filesystem 'discards' unused disk space
+
+ -
+ Requires support in hardware, driver, filesystem and any layered
+ device drivers - e.g. LVM, RAID (added in 3.7)
+
+ -
+ Must be explicitly enabled, but d-i doesn't do this by default
+
+ -
+ Make it work: fix http://bugs.debian.org/690977
+
+
+
+
+
+
User namespaces [3.7]
+
+ -
+ One of the last missing pieces for OpenVZ-like containers
+
+ -
+ Each user namespace has its own root user with
+ privileges over the users and processes in that namespace - but
+ not the whole system
+
+ -
+ Currently somewhat experimental, and requires filesystem
+ changes which haven't been done for XFS
+
+ -
+ Make it work: send patches to upstream XFS developers (this
+ one's hard)