Language Selection

English French German Italian Portuguese Spanish

Linux 5.6

Filed under
Linux

So I'll admit to vacillating between doing this 5.6 release and doing
another -rc.

This has a bit more changes than I'd like, but they are mostly from
davem's networking fixes pulls, and David feels comfy with them. And I
looked over the diff, and none of it looks scary. It's just slightly
more than I'd have preferred at this stage - not doesn't really seem
worth delaying a release over.

So about half the diff from the final week is network driver fixlets,
and some minor core networking fixes. Another 20% is tooling - mostly
bpf and netfilter selftests (but also some perf work).

The rest is "misc" - mostly random drivers (gpio, rdma, input) and DTS
files. With a smattering of fixes elsewhere (a couple of afs fixes,
some vm fixes, etc).

The shortlog is appended, nothing really looks all that exciting, and
most of the discussions I've seen are already about things for the
next merge window.

Which obviously opens now as of the release, and I'll start doing
pulls tomorrow. I already have a couple of pull requests in pending in
my inbox - thank you.

And while I haven't really seen any real sign of kernel development
being impacted by all the coronavirus activity - I suspect a lot of us
work from home even normally, and my daughter laughed at me and called
me a "social distancing champ" the other day - it may be worth just
mentioning: I think we're all reading the news and slightly
distracted.  I'm currently going by the assumption that we'll have a
fairly normal 5.7 release, and there doesn't seem to be any signs
saying otherwise, but hey, people may have better-than-usual reasons
for missing the merge window. Let me know if you know of some
subsystem that ends up being affected.

So we'll play it by ear and see what happens. It's not like the merge
window is more important than your health, or the health of people
around you.

                  Linus

Read more

Linux 5.6 Kernel Released

  • Linux 5.6 Kernel Released With WireGuard, USB4, New AMD + Intel Hardware Support

    Linus Torvalds just announced the release of the Linux 5.6 stable kernel a few minutes ago. This also means the Linux 5.7 merge window is now open for business.

  • The 5.6 kernel has been released

    Linus has released the 5.6 kernel.

    Some of the headline features in this release include Arm EOPD support, time namespaces, the BPF dispatcher and batched BPF map operations (both described in this article), the openat2() system call, the WireGuard virtual private network implementation, the flow queue PIE packet scheduler, nearly complete year-2038 support, many new io_uring features, the pidfd_getfd() system call, the ZoneFS filesystem, the ability to implement TCP congestion-control algorithms in BPF, the dma-buf heaps subsystem, and the removal of the /dev/random blocking pool.

    See the LWN merge-window summaries (part 1 and part 2) and the (under construction) KernelNewbies 5.6 page for more details.

'Social distancing champ' Linus Torvalds releases Linux 5.6

  • 'Social distancing champ' Linus Torvalds releases Linux 5.6, tells devs to put health before next release

    Linux overseer Linus Torvalds given the world version 5.6 of the Linux kernel, and been given the title “social distancing champ”.

    The latter accolade came from his daughter. But he’s tried to live the values it implies by telling the Linux community not to stress about the pace of kernel development.

    “I haven't really seen any real sign of kernel development being impacted by all the coronavirus activity - I suspect a lot of us work from home even normally,” he wrote.

    “I'm currently going by the assumption that we'll have a fairly normal 5.7 release, and there doesn't seem to be any signs saying otherwise, but hey, people may have better-than-usual reasons for missing the merge window,” he added.

Linux Kernel 5.6 Officially Released

  • Linux Kernel 5.6 Officially Released

    Torvalds says in the official announcement that the development of the next kernel update is unlikely to be impacted substantially by the new coronavirus outbreak, as most engineers are typically working from home anyway.

    However, he does admit that a slowdown is expected due to social distancing and the pandemic.

Linux 5.6 Release – Main Changes, Arm, MIPS & RISC-V

  • Linux 5.6 Release – Main Changes, Arm, MIPS & RISC-V Architectures

    Some of those changes are said to allow booting a buildroot-based system on QEMU’s virt board.

    For the full list of commit messages, you can check out the changelog generated with the command git log v5.5..v5.6 --stat. KernelNewbies website should also soon have a Linux 5.6 changelog.

Linux Kernel 5.6 Released With Plenty Of New Features

  • Linux Kernel 5.6 Released With Plenty Of New Features

    The boss of the Linux, Linus Torvalds has released Linux Kernel 5.6. One of the biggest features or improvements that you might see in Linux Kernel 5.6 is that it has a solution for the Year 2038 Problem which means that you can now run your 32-bit system beyond Jan 19, 2038.

    The new kernel also has support for WireGuard VPN, Server-to-server copy for NFSD, Intel Virtual Bus, Qualcomm, Experimental F2FS file compression support, USB4, Amazon Echo speaker and open-source NVIDIA RTX 2000 series.

Linux Kernel 5.6 Officially Released with Built-In WireGuard

  • Linux Kernel 5.6 Officially Released with Built-In WireGuard Support

    Despite all of the coronavirus challenges we’re facing these days, Linus Torvalds announced the release of the Linux 5.6 kernel series, the first to ship with built-in WireGuard support.

    Development of Linux kernel 5.6 kicked off in early February with the first Release Candidate, but it wasn’t affected by the coronavirus outbreak. Seven weeks and RCs later, the final release of the Linux 5.6 kernel is here with a plethora of goodies.

    WireGuard is now built into the kernel and all future kernels will ship with it

    [...]

    Of course, there are also numerous new and updated kernels, along with lots of improvements for various components. This makes Linux kernel 5.6 a worthy upgrade for most GNU/Linux distributions.

    However, Linux 5.6 isn’t yet ready for mainstream use because it’s still marked as a “mainline” kernel on the kernel.org website, from where you can also download the source tarball if you’re eager to try it on your machine.

    The rest of the world should wait for the first point release, Linux kernel 5.6.1, before upgrading. With this, the two-weeks merge window for the Linux 5.7 kernel series is now officially open, and Linus Torvalds hopes the coronavirus outbreak won’t affect its development cycle.

Serious bug in the final

  • Linux 5.6 Ships With Broken Intel WiFi Driver After Network Security Fixes Go Awry

    For those that are normally spinning their own kernels and punctually upgrading to new releases, you will want to hold off on the new Linux 5.6 kernel for the moment if you use the Intel "IWLWIFI" WiFi driver.

    Landing in the kernel right ahead of the Linux 5.6 release were a set of mac80211 security fixes sent in by Intel's Johannes Berg. Those fixes in turn broke the IWLWIFI driver that supports Intel's current wireless chipsets on Linux.

Linux 5.6 is out with USB4 and GeForce RTX GPU support

  • Linux 5.6 is out with USB4 and GeForce RTX GPU support, plus much more

    A new Linux Kernel version 5.6 has been officially released with some important changes including the addition of support for USB4, and GeForce RTX 2000 series graphics cards with the Nouveau driver.

    Yes, Turing GPU support has arrived with the open source Nouveau driver, along with the proprietary firmware images, as Phoronix.com reports. However, don’t get too excited, as re-clocking doesn’t work yet (getting the GPU to operate at stock clocks), and other important pieces of the puzzle are missing (like no Vulkan support with Nouveau).

Linux 5.6 Kernel released with Nvidia RTX 20 graphics support

  • Linux 5.6 Kernel released with Nvidia RTX 20 graphics support

    The Linux 5.6 Kernel was released this weekend. The popular alternative OS kernel includes some important new features and changes, as well a broader support for modern PC hardware like Nvidia RTX20 and AMD Navi series GPUs. However, in his announcement of the release, Linus Torvalds indicated that progress towards the next release could be impacted by Covid-19.

    Linux specialist site Phoronix characterises the Linux 5.6-rc1 test release kernel as "simply huge," being stuffed with new and improved features for end-users. HEXUS readers might be particularly interested in the raft of new CPUs and GPUs supported in this release but there is a lot more to discuss, as you will see if you read on.

How to Install Kernel 5.6 in Ubuntu / Linux Mint

SD Times news digest

Bootlin contributions to Linux 5.6 enumerated

  • Linux 5.6, Bootlin contributions inside

    Linux 5.6 was released last Sunday. As usual, LWN has the best coverage of the new features merged in this release: part 1 and part 2. Sadly, the corresponding KernelNewbies page has not yet been updated with the usual very interesting summary of the important changes.

    Bootlin contributed a total of 95 patches to this release, which makes us the 27th contributing company by number of commits, according to the statistics.

Linux 5.6 Contributions From Collaborans

  • Linux Kernel 5.6

    The Linux kernel development process has always prided itself in being a distributed effort, with contributions coming in from all parts of the world. Long before video conferencing became the new normal, kernel developers were collaborating remotely, using tools like IRC and mailing lists to successfully work together. It comes to no surprise, then, that despite the challenges presented by COVID-19, kernel development has continued.

    Of course, the merge window for kernel 5.6 closed before most countries had implemented any COVID-19 countermeasures. Since then, most of us have been, and continue to be, affected by COVID-19 in one way or another. And while 5.7 already promises to be another great release, what matters most right now is that everyone in the community stays safe. Take care of yourselves and those around you!

    That being said, kernel 5.6 was released over the weekend, so let's take a look at the various projects Collaborans have been involved in, and the progress made. As usual, you can learn more about this release in thise LWN posts: part 1, part 2, and development statistics.

Linux kernel 5.6.0 iwlwifi bug

  • Linux kernel 5.6.0 iwlwifi bug

    Quick note that the Linux kernel 5.6.0 has an iwlwifi bug that will prevent network connectivity. [1]

    A patch is out but did not make 5.6.0. This patch IS included in gentoo-sources-5.6.0. It will be in vanilla-sources 5.6.1 once upstream releases a new version.

What's New in Linux 5.6? WireGuard VPN and USB4

  • What's New in Linux 5.6? WireGuard VPN and USB4

    Linus's post also notes that for the next release's timing they'll "play it by ear... It's not like the merge window is more important than your health, or the health of people around you." But he says he hasn't seen signs that the pandemic could affect its development (other than the possibility of distraction by the news).

    "I suspect a lot of us work from home even normally, and my daughter laughed at me and called me a 'social distancing champ' the other day..."

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Android Leftovers

All about Kubernetes

Kubernetes is an enterprise-grade container-orchestration system designed from the start to be cloud-native. It has grown to be the de-facto cloud container platform, continuing to expand as it has embraced new technologies, including container-native virtualization and serverless computing. Kubernetes manages containers and more, from micro-scale at the edge to massive scale, in both public and private cloud environments. It is a perfect choice for a "private cloud at home" project, providing both robust container orchestration and the opportunity to learn about a technology in such demand and so thoroughly integrated into the cloud that its name is practically synonymous with "cloud computing." Read more Also: Provision Kubernetes NFS clients on a Raspberry Pi homelab A beginner's guide to Kubernetes container orchestration

Security and Proprietary Issues

  • Surprise Capital One court decision spells trouble for incident response

    Break in case of emergency: Language is everything. Delineate clearly in all written comms between a ‘potential incident’ - and an actual one. Don’t start turning one of the hundreds of security events you see into a ‘security incident’ before the most essential facts are understood. Halpert’s threshold for incidents that need to be covered by legal privilege are: a) An incident that gives rise to an obligation to notify a regulator, or a contractual obligation to notify a business partner; or b) An incident that exposed trade secrets or otherwise would affect the share price of a company; or c) An incident that would cause significant reputational hit to the company; or d) An incident in which a crime is committed.

  • Judge rules Capital One must hand over Mandiant's forensic data breach report

    It’s a significant ruling that effectively affords the attorneys suing Capital One with a breakdown of which bank behaviors were successful, and which failed. It’s common for Fortune 500 companies to keep incident response firms like Mandiant on retainer, though it’s rare for those firms’ insights on high profile breaches to be made public. Similar rulings in the future could provide aggrieved customers with ammunition to seek higher pay-outs in court.

  • Retrotech: The Novell NetWare Experience

    In the simplest terms possible, NetWare was a dedicated network operating system. It was designed around fast and reliable network operations at the expense of almost everything else. Novell had invested massive amounts of research in figuring out how to do fast I/O and minimizing any delays from hardware related sources. The end result was a very lean system that remained stable and performant with a large number of clients attached. As networking was Novell's bread and butter, NetWare had excellent support for everything: clients were available for DOS, Windows, UNIX, Macintosh, OS/2 and probably other platforms I've never even heard of.

    The early history of NetWare is very muddled, and pre-2.0 versions have been lost to time. This compounded with poor documentation has made it very difficult to trace the early history of the product. However, while NetWare was not the first (or only) network product for IBM PCs, it quickly became the largest, displacing IBM's PC Network, and laughed at Microsoft's LAN Manager, and IBM OS/2 LAN Server.

    While NetWare did compete on UNIX, Sun had already gotten their foot in the door by porting NFS and making it the de-facto solution for all UNIXs of the era, as well as Linux. Meanwhile, Apple held onto AppleTalk which itself survived well into the early 2000s when NetWare had already disappeared into the aether. The explosion of Wintel PCs throughout the 90s had given NetWare a market position that should have been very difficult to dislodge.

    The full story of NetWare's fall from grace is a story for another time, but I do want to go into the more technical aspects that were both the boon and bane of NetWare. Much of NetWare's success can be attributed to its own IPX protocol which made networking plug and play and drastically lowered latencies compared to NetBIOS or even TCP/IP.

  • Polish malspam pushes ZLoader malware

    When enabling macros on the malicious Excel spreadsheet, the victim host retrieved the ZLoader DLL as shown in the previous section, saved the DLL to the victim's Documents folder, and ran it using rundll32.exe.

  • Microsoft Defender SmartScreen is hurting independent developers

    But what is SmartScreen?

    SmartScreen collects installation data from all Windows users in order to establish “reputation”. If the program does not have an established good reputation, you get this big warning message. By this time most users have deleted the .exe already thinking it is a malware, but SmartScreen can be bypassed by clicking on “More info” then “Run anyway”.

    The digital signature racket

    But let’s say you bite the bullet, you buy yourself an overpriced piece of prime numbers generated by a computer, sign your code and re-publish your application. You can now start getting users to install your app right? Wrong.

    But how do you build reputation? First of all, Microsoft needs to be able to gather information on who has published the app, and this is done by a code signing certificate. The most obvious implication is that unsigned apps will always trigger SmartScreen. The more insidious implication is that acquiring a code signing certificate is a big expense for an individual developer. There is currently no “Let’s Encrypt” equivalent to code signing certificates; so you have to purchase it from trusted authorities. The price range is wide but a certificate only valid for a year will typically go for about $100.

  • #Privacy: Michigan State University struck by ransomware attack

    It remains unclear as to how and when the attack happened, and what the ransom demand is.

    NetWalker is one of twelve ransomware gangs who threaten to publish data in revenge if organisations refuse to pay the ransom demand.

    MSU have not official disclosed the incident, however, an MSU spokesperson, Dan Olsen shared the following statement to EdScoop: “We are aware of a possible intrusion and we are actively looking into it.”

  • MSU: We won't pay [attacker] demanding ransom, threatening university over records

    University officials believe the latest breach occurred on Memorial Day and took relevant computer systems offline within hours of the intrusion, according to a news release. It compromised data associated with the Department of Physics and Astronomy, and information technology teams are coordinating with law enforcement to understand the scope of the breach. Investigators are notifying and providing support to affected MSU affiliates as they are identified.

    The cybersecurity breach, known as a ransomware attack, first became public May 27 when a [cr]acker-affiliated blog posted screenshots of files allegedly belonging to MSU affiliates. Images circulating on social media include a redacted passport and a list of transactions related to physics and astronomy projects. They also show a countdown clock that warns of “secret data publication” less than one week from when the screenshots were taken.

  • Michigan State target of ransomware attack threatening to release university data

    The ransom demanded was not specified, but the ransomware gang is prepared to release the university's documents.

    The NetWalker, a newer form of ransomeware sometimes labeled as Mailto, blog post threatened publication of 'secret' documents dated with a countdown clock with close to a week remaining.

  • Malware Team NetWalker Launches Ransomware Attack Against Weiz

    The Malware team NetWalker launched a new ransomware attack against the Austrian village of Weiz which affected the public service system and leaked a lot of the stolen data from building applications as we are about to read more in the following latest cryptocurrency news.

    According to the cybersecurity firm Panda Security, the Malware team managed to enter the town’s public network through phishing emails related to the Coronavirus pandemic. The subject of the emails which was ‘’information about the coronavirus’’ was used to bait the employees of the public infrastructure of the city into clicking on malicious links which triggered the ransomware.

    Panda Security claims that the ransomware attack belongs to a new version of a ransomware family that spreads by using VBScripts. If the infection is successful, it will spread through the entire windows network to which the infected machine is related. The report details that the ransomware terminates and services under Windows which encrypts files on all available disks thus eliminating the backups.

  • Inside a ransomware gang’s attack toolbox

    The crooks deployed a pirated copy of the Virtual Box virtual machine (VM) software to every computer on the victim’s network, plus a VM file containing a pirated copy of Windows XP, just to have a “walled garden” for their ransomware to sit inside while it did its cryptographic scrambling.

    But that’s far from everything that today’s crooks bring along for a typical attack, as SophosLabs was able to document recently when it stumbled upon a cache of tools belonging to a ransomware gang known as Netwalker.

  • Researchers Dive Into Evolution of Malicious Excel 4.0 Macros

    For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools.

    A central part of many organizations’ productivity tools, Excel opens the door for phishing attacks where victims are tricked into enabling macros in malicious documents, which can results in the attackers gaining a foothold on the network, in preparation for additional activities.

    During their five-month research, Lastline observed thousands of malicious samples, clustered into waves that provide a comprehensive picture of how the threat has evolved in both sophistication and evasiveness.

  • MSU won't pay ransom to [cr]acker who stole financial documents, personal information

    EdScoop reported the ransomware attack on May 27 and provided screenshots from a blog on the dark web, showing what appear to be a student's passport, MSU financial documents and files from the MSU network, as well as a countdown that had about one week remaining as of May 27.

  • Attackers Target 1M+ WordPress Sites To Harvest Database Credentials

    Attackers were spotted targeting over one million WordPress websites in a campaign over the weekend. The campaign unsuccessfully attempted to exploit old cross-site scripting (XSS) vulnerabilities in WordPress plugins and themes, with the goal of harvesting database credentials.

    The attacks were aiming to download wp-config.php, a file critical to all WordPress installations. The file is located in the root of WordPress file directories and contains websites’ database credentials and connection information, in addition to authentication unique keys and salts. By downloading the sites’ configuration files, an attacker would gain access to the site’s database, where site content and credentials are stored, said researchers with Wordfence who spotted the attack.

    Between May 29 and May 31, researchers observed (and were able to block) over 130 million attacks targeting 1.3 million sites.

  • Denial of service attacks against advocacy groups skyrocket

    Distributed denial-of-service attacks against advocacy organizations increased by 1,120% since a Minneapolis police officer killed George Floyd by kneeling on his neck, sparking demonstrations throughout the U.S.

    In figures published Tuesday, the internet security firm Cloudflare said it blocked more than 135 billion malicious web requests against advocacy sites, compared to less than 30 million blocked requests against U.S. government websites, such as police and military organizations. The company did not disclose which websites were affected, specifically.

Reading about open source in French

English speakers have so many wonderful open source resources that it's easy to forget that communications in English aren't accessible to everyone everywhere. Therefore, I've been looking for great open source resources in Spanish and French, so I can recommend them when the need arises. One I've been looking at recently is LinuxFr.org, which seems to be a fine "agora" for all sorts of interesting conversations in French about open source specifically and open everything else as well. Read more