LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Thursday, February 7th, 2019

    Time Event
    12:07a
    [$] Lisp and the foundations of computing

    At the start of his linux.conf.au 2019 talk, Kristoffer Grönlund said that he would be taking attendees back 60 years or more. That is not quite to the dawn of computing history, but it is close—farther back than most of us were alive to remember. He encountered John McCarthy's famous Lisp paper [PDF] via Papers We Love and it led him to dig deeply into the Lisp world; he brought back a report for the LCA crowd.

    1:15a
    [$] LWN.net Weekly Edition for February 7, 2019
    The LWN.net Weekly Edition for February 7, 2019 is available.
    2:37p
    Security updates for Thursday
    Security updates have been issued by Debian (curl, golang, libthrift-java, mumble, netmask, python3.4, and rssh), openSUSE (python-python-gnupg), Oracle (kernel), Scientific Linux (thunderbird), Slackware (curl), SUSE (firefox, python, and rmt-server), and Ubuntu (curl, libarchive, and libreoffice).
    4:19p
    LSFMM 2019 gains a BPF track
    The call for proposals for the 2019 Linux Storage, Filesystem, and
    Memory-Management Summit has been updated with an important addition: this
    year's event (April 30 to May 2, San Juan, Puerto Rico) will
    include a BPF track. The submission deadline has been extended to
    February 22 to allow BPF developers to put together their proposals.
    5:24p
    [$] Concurrency management in BPF
    In the beginning, programs run on the in-kernel BPF virtual machine had no
    persistent internal state and no data that was shared with any other part
    of the system. The arrival of eBPF and, in particular, its maps
    functionality, has changed that situation, though, since a map can be
    shared between two or more BPF programs as well as with processes running
    in user space. That sharing naturally leads to concurrency problems, so
    the BPF developers have found themselves needing to add
    primitives to manage concurrency (the "exchange and add" or XADD
    instruction, for example). The next step is the addition of a
    spinlock mechanism to protect
    data structures, which has also led to some wider discussions on what the
    BPF memory
    model should look like.

    << Previous Day 2019/02/07
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org