Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Operating Systems Upgrades Linux

Linux 3.13 Released 141

diegocg writes "Linux kernel 3.13 has been released. This release includes nftables (the successor of iptables); a revamp of the block layer designed for high-performance SSDs; a framework to cap power consumption in Intel RAPL devices; improved squashfs performance; AMD Radeon power management enabled by default and automatic AMD Radeon GPU switching; improved NUMA and hugepage performance; TCP Fast Open enabled by default; support for NFC payments; support for the High-Availability Seamless Redundancy protocol; new drivers; and many other small improvements. Here's the full list of changes."
This discussion has been archived. No new comments can be posted.

Linux 3.13 Released

Comments Filter:
  • by jones_supa (887896) on Monday January 20, 2014 @08:00AM (#46012041)
    Probably because of the extremely high performance requirements. There's a lot of packets going through a 10Gbit interface and if you run some Python code for each of them you're gonna choke the machine.
  • by upuv (1201447) on Monday January 20, 2014 @08:06AM (#46012067) Journal

    The problem is overheads and security.

    Embedding a language at such a low level is very tricky. It has to be blinding fast and user very very little resources. python, perl, ruby are all great languages. but ill suited for the task of network management tasks. The RAM overheads are huge. This is why we are seeing a relatively constant evolution, change of embedded languages at these low levels. This is a game of resource management on the host system.

    Just imagine if this host was a web server. With thousands of socket requests per second. How would Python manage to keep up with that. Without crushing the system under load even before the traffic was passed off to a process like Ngynx to handle. Python would be a performance nightmare at this level.

    Another way to look at this is. What if you hammered the system with a DOS style attack. If each request had to go through a python execution stack you are basically making the system far more vulnerable to DOS than it ever was before.

    Now lets look at topics around these highly extensible languages. Here you have a system that in part is supposed to improve security. But by adding in a language like python you are adding in a very extensible lnaguage at a very low level. A kernel level to be precise. So higher than root. The security implications are enormous. You are basically exposing the kernel to a far higher risk. This would be a hackers dream come true.

    So there are reason for these language syntax choices. They must be managed very carefully.

  • by cupantae (1304123) <maroneill&gmail,com> on Monday January 20, 2014 @08:09AM (#46012083)

    I think the real question (and possibly what StripedCow was asking) is why not use the syntax of existing languages, to make it easier to learn and read?

  • by Nerdfest (867930) on Monday January 20, 2014 @08:18AM (#46012115)

    Which means that you could proibably come up with something to do this yourself. I'm sure quite a few people would be interested in it.

  • by arielCo (995647) on Monday January 20, 2014 @08:33AM (#46012181)

    It's faster than the scanned rule lists in iptables, and the remaining alternative is compiling to native code into a module every time you change a rule.

    I know that seeing "bloat" everywhere and griping is an honored /. tradition, but someone has to add a dash of reality.

  • by Bengie (1121981) on Monday January 20, 2014 @11:00AM (#46013315)

    Common syntax that results in different behaviour? That sounds more confusing to me.

    Exactly. It seems like the only people who want firewall syntax in the form of a popular scripting language are people who should not be touching firewall rules in the first place.

To iterate is human, to recurse, divine. -- Robert Heller