LWN: Comments on "The 5.6 merge window opens" https://lwn.net/Articles/810780/ This is a special feed containing comments posted to the individual LWN article titled "The 5.6 merge window opens". en-us Mon, 15 Sep 2025 22:15:11 +0000 Mon, 15 Sep 2025 22:15:11 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net The 5.6 merge window opens https://lwn.net/Articles/813391/ https://lwn.net/Articles/813391/ cortana <div class="FormattedComment"> The audit log?<br> </div> Thu, 27 Feb 2020 09:36:58 +0000 The 5.6 merge window opens https://lwn.net/Articles/812264/ https://lwn.net/Articles/812264/ glm <div class="FormattedComment"> About the "new boot-time parameter (managed_irq)": I don't understand the concept of "managed interrupts". Could you give a short explanation and some examples?<br> </div> Wed, 12 Feb 2020 12:32:11 +0000 RFC 8229 (TCP Encapsulation for IPsec) support merged https://lwn.net/Articles/812029/ https://lwn.net/Articles/812029/ shef <div class="FormattedComment"> As far as I know some user equipment manufacturers support TLS encapsulation for WiFi calling which is relying on IPsec/IKE by default. Some time back 3GPP defined TLS profiles as a firewall bypass mechanism. Curious if 3GPP will switch back to IPsec/IKE over TCP if it is going to be supported by Android.<br> </div> Tue, 11 Feb 2020 02:21:48 +0000 The 5.6 merge window opens https://lwn.net/Articles/811942/ https://lwn.net/Articles/811942/ mchapman Uh, <code>setenforce</code> obviously. Fri, 07 Feb 2020 22:51:42 +0000 The 5.6 merge window opens https://lwn.net/Articles/811940/ https://lwn.net/Articles/811940/ mchapman If I understand the changes correctly, they do not alter the ability to use <code>getenforce</code> to toggle whether SELinux is in enforcing or permissive mode. Fri, 07 Feb 2020 22:41:11 +0000 The 5.6 merge window opens https://lwn.net/Articles/811818/ https://lwn.net/Articles/811818/ ScottMinster <div class="FormattedComment"> Indeed, just last night I was setting up a new server and things were not working. I suspected that it might be a bad SELinux context on some files. Since temporarily disabling SELinux caused things to start working, that confirmed my suspicions, and I was able to quickly resolve the issue (and then re-enable SELinux).<br> <p> I can see how being able to disable it on a production server could be a bad thing, as a debugging tool it is nice.<br> <p> If there was an easier way to determine why a process (like a web server) cannot read a file other than "permission denied" maybe it wouldn't be as big a deal.<br> </div> Fri, 07 Feb 2020 12:44:54 +0000 The 5.6 merge window opens https://lwn.net/Articles/811720/ https://lwn.net/Articles/811720/ Cyberax <div class="FormattedComment"> <font class="QuotedText">&gt; The ability to disable the SELinux security module at run time has been deprecated with an eye toward removing it in a future release. This feature is still used by Fedora and RHEL, but has been left behind by most other distributions. The preferred way to disable SELinux is with the selinux=0 command-line parameter. </font><br> Do we need MORE evidence that SELinux was designed by plants from the NSA to subvert Linux security?<br> <p> </div> Thu, 06 Feb 2020 20:00:46 +0000 The 5.6 merge window opens https://lwn.net/Articles/811650/ https://lwn.net/Articles/811650/ NRArnot <div class="FormattedComment"> Losing runtime disable of selinux will make life far harder for sysadmins.<br> <p> At present, if something won't work and the reason is not obvious, a simple test is to disable selinux, test again, and re-enable selinux seconds later having established whether or not it's the source of the problem. (On a test machine, not a public-facing server).<br> <p> Having to reboot to test will be a complete PITA. Especially if the fix is still not obvious and several iterations are required.<br> </div> Thu, 06 Feb 2020 09:50:55 +0000 RFC 8229 (TCP Encapsulation for IPsec) support merged https://lwn.net/Articles/811219/ https://lwn.net/Articles/811219/ josh <div class="FormattedComment"> I'm hoping that HTTP/3 helps convince the operators of such networks that blocking UDP is a problem.<br> </div> Fri, 31 Jan 2020 16:49:46 +0000 RFC 8229 (TCP Encapsulation for IPsec) support merged https://lwn.net/Articles/811198/ https://lwn.net/Articles/811198/ hailfinger <div class="FormattedComment"> Support for RFC 8229 (TCP Encapsulation of IKE and IPsec Packets) was also merged in this series of commits:<br> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b50b0580d27bc45a0637aefc8bac4d31aa85771a">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7b3801927e52f8621de311277f7fc727635019e7">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cac3c71604cf4eada8df00b1e66892636399cda5">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=25f6802b4c18817c82cd581d38ce155ad6412176">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eecd227a9a3479038ba2a2f579b3ce9edb364b80">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e27cca96cd68fa2c6814c90f9a1cfd36bb68c593">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e27cca96cd68fa2c6814c90f9a1cfd36bb68c593">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <p> Cover letter: <a href="https://marc.info/?l=linux-netdev&amp;m=157468978806473&amp;w=4">https://marc.info/?l=linux-netdev&amp;m=157468978806473&amp;...</a><br> <p> For some networks, all non-TCP communication to the outside is blocked, so you can neither use UDP encapsulation nor raw ESP to establish an IPsec tunnel. With these patches, you can finally use port 443/TCP to establish an IPsec tunnel. Obviously, tunneling e.g. TCP over TCP has some drawbacks, but at least the option does exist now.<br> <p> @corbet: Would it be possible to mention this in the article (or a followup) in the network section? Thanks!<br> </div> Fri, 31 Jan 2020 14:30:38 +0000 Can we stop this? https://lwn.net/Articles/811139/ https://lwn.net/Articles/811139/ pbonzini <div class="FormattedComment"> Not exactly an answer to your question, but you may be interested in this recent article from LWN: <a href="https://lwn.net/Articles/810404/">https://lwn.net/Articles/810404/</a><br> </div> Fri, 31 Jan 2020 06:57:29 +0000 Can we stop this? https://lwn.net/Articles/811109/ https://lwn.net/Articles/811109/ sub2LWN <div class="FormattedComment"> BPF := Banter Prudently, Fellow :-) Glancing at the git log:<br> <p> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <p> I noticed a recent merge from an LWN repo:<br> <p> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=05ef8b97ddf9aed40df977477daeab01760d7f9a">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/...</a><br> <p> Including "A new document on how to help with documentation" which I assume is Documentation/doc-guide/contributing.rst<br> <p> I had no idea you are the Documentation maintainer. Which subsystems do you think are improving the most in regards to their documentation? Other than:<br> <p> <a href="https://www.kernel.org/doc/html/latest/process/maintainers.html#documentation">https://www.kernel.org/doc/html/latest/process/maintainer...</a><br> <p> Hunting around for descriptions of the "merge window" process itself, as a kernel noob, I found this section of "A guide to the Kernel Development Process" comprehensive:<br> <p> <a href="https://www.kernel.org/doc/html/latest/process/2.Process.html#how-patches-get-into-the-kernel">https://www.kernel.org/doc/html/latest/process/2.Process....</a><br> </div> Fri, 31 Jan 2020 00:03:37 +0000 Can we stop this? https://lwn.net/Articles/811095/ https://lwn.net/Articles/811095/ corbet This kind of comment is really not helpful to anybody. LWN comments are far better when we're not just tossing random childish insults around; could I ask you (and others!) to please stop doing that? Thu, 30 Jan 2020 21:48:12 +0000 The 5.6 merge window opens https://lwn.net/Articles/811086/ https://lwn.net/Articles/811086/ grober <div class="FormattedComment"> BPF == Biggest Possible Fuckup.<br> </div> Thu, 30 Jan 2020 21:20:26 +0000