LWN: Comments on "The beginning of the 6.13 merge window" https://lwn.net/Articles/998623/ This is a special feed containing comments posted to the individual LWN article titled "The beginning of the 6.13 merge window". en-us Thu, 25 Sep 2025 10:14:10 +0000 Thu, 25 Sep 2025 10:14:10 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net bcachefs? https://lwn.net/Articles/999013/ https://lwn.net/Articles/999013/ koverstreet <div class="FormattedComment"> I suspect Jon would appreciate if we can keep this off the lwn pages for now.<br> <p> I'm a little burned out on it anyways.<br> </div> Fri, 22 Nov 2024 08:17:57 +0000 bcachefs? https://lwn.net/Articles/999008/ https://lwn.net/Articles/999008/ burki99 <div class="FormattedComment"> This time, it is not a late pull request but obnoxious behavior on the LKML: <a href="https://www.heise.de/news/Linus-Torvalds-suspendiert-Bcachefs-Entwickler-wegen-Code-of-Conduct-Verletzung-10082644.html">https://www.heise.de/news/Linus-Torvalds-suspendiert-Bcac...</a> <br> Kent‘s own take (he has a hard time acknowledging behavioral issues, instead he prefers pointing out technical ones): <a href="https://www.patreon.com/posts/trouble-in-116412665">https://www.patreon.com/posts/trouble-in-116412665</a><br> I am sure the editors could say much more. It seems to be a very unfortunate situation where technical innovation might fail to come to the kernel due to the inability of its author to respectfully listen and cooperate with his peers.<br> </div> Fri, 22 Nov 2024 05:00:40 +0000 bcachefs? https://lwn.net/Articles/999006/ https://lwn.net/Articles/999006/ jalla <div class="FormattedComment"> There seemed to be a lot of noise around requests coming in at the 11th hour, this time around the pull request came in quite early. Curious to learn more about that this cycle.<br> </div> Fri, 22 Nov 2024 01:14:24 +0000 Internal kernel changes - crypto subsystem https://lwn.net/Articles/999003/ https://lwn.net/Articles/999003/ l1k <blockquote> The kernel's cryptographic subsystem has gained a new internal API for signature generation. There is some kerneldoc documentation available.</blockquote> <p>Author here. More accurately the goal of my patches was to move sign/verify operations out of akcipher and into a new, separate crypto algorithm type. akcipher is thus now solely for asymmetric encrypt/decrypt. Of note here is that the new sign/verify API uses kernel buffers, whereas akcipher uses sglists. <p>Herbert Xu started the transition to the new crypto algorithm type for sign/verify a year ago by introducing a frontend: <p><a href="https://lore.kernel.org/linux-crypto/ZIg4b8kAeW7x%2FoM1@gondor.apana.org.au/">https://lore.kernel.org/linux-crypto/ZIg4b8kAeW7x%2FoM1@gondor.apana.org.au/</a> <p>I completed that effort by adding a backend and migrating all asymmetric sign/verify algorithms to it: <p><a href="https://lore.kernel.org/all/cover.1725972333.git.lukas@wunner.de/">https://lore.kernel.org/all/cover.1725972333.git.lukas@wunner.de/</a> <p>We currently have 3 algorithms in the tree: RSA (only PKCS1 encoding), ECDSA (X9.62 encoding and from v6.13 also P1363) and ECRDSA (aka GOST). Signing is currently only supported by the RSA algorithm implementation. Verifying by all three. Thu, 21 Nov 2024 22:58:01 +0000 unlinkat flag? https://lwn.net/Articles/998983/ https://lwn.net/Articles/998983/ josh <div class="FormattedComment"> <span class="QuotedText">&gt; There is a new sysctl knob, fs.dentry-negative, that controls whether the virtual filesystem (VFS) layer deletes a file's kernel-internal directory entry ("dentry") when the file itself is deleted. It seems that some benchmarks do better when dentries are removed, while others benefit from having a negative dentry left behind, so the kernel developers have put the decision into the system administrator's hands. The default value (zero) means that dentries are not automatically deleted, matching the behavior of previous kernels. </span><br> <p> I wonder if it would make sense to add a flag to unlinkat, which lets userspace indicate on a case-by-case basis whether the removed file is likely to be looked for again or not? Userspace is in a great position to know whether a filename is likely to be looked for again or not.<br> </div> Thu, 21 Nov 2024 17:52:44 +0000