Posts by LWN (old posts, page 23)
Version 12.0 of
the Forgejo software forge has been released. Changes include a number of
user-interface improvements, a mechanism to keep forks in sync with their
upstream, and more; see the release
notes for the full list.
[$] Scheduler medley: time-slice extension, sched_ext deadline servers, and LRU batching.
Decades after its creation, the Linux CPU scheduler remains an area
of active development; it is difficult to find a time slice to cover every
interesting scheduler change. In an attempt to catch up, the time has come
to round-robin through a few patches that have been circulating recently.
The work at hand focuses on a new attempt at time-slice extension, the
creation of a deadline server for sched_ext tasks, and keeping tasks on
isolated CPUs from being surprised by LRU batching.
Security updates for Thursday
Security updates have been issued by AlmaLinux (emacs, java-17-openjdk, kernel, kernel-rt, microcode_ctl, python3.11-setuptools, python3.12-setuptools, and socat), Debian (gnutls28), Fedora (vim), Red Hat (java-1.8.0-ibm), Slackware (bind), SUSE (docker, erlang, erlang26, ggml-devel-5889, gnuplot, kernel, kubernetes1.27, libQt6Concurrent6, mailman3, and transfig), and Ubuntu (apache2, bind9, linux-iot, linux-lowlatency-hwe-6.11, and linux-raspi, linux-raspi-5.4).
[$] LWN.net Weekly Edition for July 17, 2025
Inside this week's LWN.net Weekly Edition:
- Front: Python JIT; Anubis; Secure Boot certificate expiration; SFrame; Exported symbols; Python packaging in Fedora.
- Briefs: Parrot 6.4; SPI report; Quotes; ...
- Announcements: Newsletters, conferences, security updates, patches, and more.
Hyprland 0.50.0 released
Version 0.50.0 of Hyprland, a compositor for Wayland, has been
released. Changes include a new render-scheduling option that "
can drastically improve FPS on underpowered devices, while coming at no performance or latency cost when the system is doing alright", an option to exclude applications from screen sharing, a new test suite, and more.
[$] Linux and Secure Boot certificate expiration
Linux users who have Secure Boot
enabled on their systems knowingly or unknowingly rely on a key from
Microsoft that is set to expire in September. After that point, Microsoft
will no longer use that key to sign the shim
first-stage UEFI bootloader that is used by Linux distributions to boot the
kernel with Secure Boot. But the replacement key, which has been available
since 2023, may not be installed on many systems; worse yet, it may require
the hardware vendor to issue an update for the system firmware, which may
or may not happen. It seems that the vast majority of systems will not be
lost in the shuffle, but it may require extra work from distributors and
users.
[$] Fedora SIG changes Python packaging strategy
Fedora's NeuroFedora special-interest group (SIG) is considering a change of strategy when it comes to packaging Python modules. The SIG, which consists of three active members, is struggling to keep up with maintaining the hundreds of packages that it has taken on. What's more, it's not clear that the majority of packages are even being consumed by Fedora users; the group is trying to determine the right strategy to meet its goals and shed unnecessary work. If its new packaging strategy is successful, it may point the way to a more sustainable model for Linux distributions to provide value to users without trying to package everything under the sun.
Security updates for Wednesday
Security updates have been issued by Oracle (cloud-init, emacs, firefox, glib2, go-toolset:rhel8, kernel, lz4, python-setuptools, python3.11-setuptools, python3.12-setuptools, and socat), Red Hat (fence-agents, glib2, glibc, java-17-openjdk, kernel, kernel-rt, python-setuptools, python3.11-setuptools, and python3.12-setuptools), Slackware (libxml2), SUSE (glib2, gpg2, kernel, libxml2, poppler, rmt-server, runc, stalld, and xen), and Ubuntu (jpeg-xl).
The Software in the Public Interest 2024 annual report
Software in the Public Interest has released
its annual report for 2024. It includes reports from the long list of
projects housed under the SPI umbrella, but the financial statements are
not included at this time.
[$] Enforcement (or not) for module-specific exported symbols
Loadable kernel modules require access to kernel data structures and
functions to get their job done; the kernel provides this access by way of
exported symbols. Almost since this mechanism was created, there have been
debates over which symbols should be exported, and how. The 6.16 kernel
gained a new export mechanism that limits access to symbols to specific
kernel modules. That code is likely to change soon, but the addition
of an enforcement mechanism has since been backed out.