Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday April 17 2015, @05:11PM   Printer-friendly
from the whole-bunch-of-hairy-beasts dept.

Phoronix reports that version 0.6 of GNU Hurd has been released. Before getting too excited about GNU Hurd, it's still bound to x86 32-bit and doesn't offer any compelling new features.

GNU Hurd 0.6 has "numerous cleanups and stylistic fixes" to the code-base, the message dispatching code in Hurd servers is now better, there's support for protected payloads of GNU March 1.5+, libz/libz2 are used as the decompressors to replace gz/bz2, the native fakeroot has improved, the performance of the integer hashing library has improved, and the init server has been split into the start-up server and a SysVinit-style program. The procfs and random translators were also merged.

More details on the new GNU Hurd release can be found via the 0.6 release announcement issued by Thomas Schwinge.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Insightful) by dime on Friday April 17 2015, @07:16PM

    by dime (1163) on Friday April 17 2015, @07:16PM (#172156)

    Live kernel patching infrastructure put into mainline is not a compelling new feature?

    Starting Score:    1  point
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Saturday April 18 2015, @12:36AM

    by Anonymous Coward on Saturday April 18 2015, @12:36AM (#172239)

    Sounds like a huge security risk to me.

    • (Score: 2) by darkfeline on Saturday April 18 2015, @11:58PM

      by darkfeline (1030) on Saturday April 18 2015, @11:58PM (#172645) Homepage

      Computers are a huge security risk.

      Actually, I take that back: humans are a huge security risk.

      Seriously though, with good practices, I don't see live kernel patching as being a significant increase in risk. Even if it were, you can just compile Linux without it.

      --
      Join the SDF Public Access UNIX System today!