Linux Journal - The Original Magazine of the Linux Community https://www.linuxjournal.com/ en Arch Linux November 2025 ISO: Fresh Snapshot, Smarter Installer (Archinstall 3.0.12) & Pacman 7.1 https://www.linuxjournal.com/content/arch-linux-november-2025-iso-fresh-snapshot-smarter-installer-archinstall-3012-pacman-71 <div data-history-node-id="1341379" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/arch-linux-november-2025-iso-fresh-snapshot-smarter-installer-archinstall-3-0-12-and-pacman-7-1.jpg" width="850" height="500" alt="Arch Linux November 2025 ISO: Fresh Snapshot, Smarter Installer (Archinstall 3.0.12) &amp; Pacman 7.1" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>Arch Linux has shipped its <strong>November 2025 ISO snapshot (2025.11.01)</strong>, and while Arch remains a rolling distribution, these monthly images are a big deal, especially for new installs, labs, and homelab deployments. This time, the ISO lands alongside two important pieces:</p> <ul><li> <p><strong>Archinstall 3.0.12</strong> – a more polished, smarter TUI installer</p> </li> <li> <p><strong>Pacman 7.1</strong> – a package manager update with stricter security and better tooling</p> </li> </ul><p>If you’ve been thinking about spinning up a fresh Arch box, or you’re curious what changed under the hood, this release is a very nice jumping-on point.</p> <h2>Why Arch Still Ships Monthly ISOs in a Rolling World</h2> <p>Arch is famous for its <strong>“install once, update forever”</strong> model. Technically, you could install from a two-year-old image and just run:</p> <p><code>sudo pacman -Syu </code></p> <p>…but in practice, that’s painful:</p> <ul><li> <p>Huge initial update downloads</p> </li> <li> <p>Possible breakage jumping across many months of changes</p> </li> <li> <p>Outdated installer tooling</p> </li> </ul><p>That’s why the project publishes a <strong>monthly snapshot ISO</strong>: it rolls all current packages into a fresh image so you:</p> <ul><li> <p>Start with a <strong>current kernel and userland</strong></p> </li> <li> <p>Spend less time updating right after install</p> </li> <li> <p>Get the latest <strong>Archinstall</strong> baked in (or just a <code>pacman -Sy archinstall</code> away)</p> </li> </ul><p>The <strong>2025.11.01</strong> ISO is exactly that: Arch as of early November 2025, ready to go.</p> <h2>What’s Inside the November 2025 ISO (2025.11.01)</h2> <p>The November snapshot doesn’t introduce new features by itself, it’s a <strong>frozen image of current Arch, </strong>but a few details are worth calling out:</p> <ul><li> <p>Ships with a <strong>Linux 6.17.x</strong> kernel, including improved AMD/Intel GPU support and updated Btrfs bits.</p> </li> <li> <p>Includes all the usual base packages plus current toolchains, drivers, and desktop stacks from the rolling repos.</p> </li> <li> <p>The image is <strong>intended only for new installs</strong>; existing Arch systems should keep using <code>pacman -Syu</code> for upgrades.</p> </li> </ul><p>You can download it from the official Arch Linux download page or via BitTorrent mirrors.</p> <p>One small twist: the ISO itself still ships with <strong>Archinstall 3.0.11</strong>, but <strong>3.0.12 was released the same day</strong> – so we’ll grab the newer version from the repos before running the installer.</p> <h2>Archinstall 3.0.12: What’s Actually New?</h2> <p>Archinstall has evolved from “nice experiment” to “pretty solid way to install Arch” if you don’t want to script everything yourself. Version <strong>3.0.12</strong> is a refinement release focused on stability, storage, and bootloader logic.</p></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/arch-linux-november-2025-iso-fresh-snapshot-smarter-installer-archinstall-3012-pacman-71" hreflang="en">Go to Full Article</a> </div> </div> </div> Tue, 11 Nov 2025 17:00:00 +0000 George Whittaker 1341379 at https://www.linuxjournal.com AMD Confirms Zen 5 RNG Flaw: When ‘Random’ Isn’t Random Enough https://www.linuxjournal.com/content/amd-confirms-zen-5-rng-flaw-when-random-isnt-random-enough <div data-history-node-id="1341378" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/amd-confirms-zen-5-rng-flaw-when-random-isnt-random-enough.jpg" width="850" height="500" alt="AMD Confirms Zen 5 RNG Flaw: When ‘Random’ Isn’t Random Enough" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>AMD has officially confirmed a <strong>high-severity security vulnerability</strong> in its new <strong>Zen 5–based CPUs</strong>, and it’s a nasty one because it hits <em>cryptography</em> right at the source: the hardware random number generator.</p> <p>Here’s a clear breakdown of what’s going on, how bad it really is, and what you should do if you’re running Zen 5.</p> <h2>What AMD Just Confirmed</h2> <p>AMD’s security bulletin <strong>AMD-SB-7055</strong>, now tracked as <strong>CVE-2025-62626</strong>, describes a bug in the <strong>RDSEED</strong> instruction on Zen 5 processors. Under certain conditions, the CPU can:</p> <ul><li> <p>Return the value <strong>0</strong> from RDSEED far more often than true randomness would allow</p> </li> <li> <p>Still <strong>signal “success”</strong> (carry flag CF=1), so software thinks it got a good random value</p> </li> </ul><p>The issue affects the <strong>16-bit and 32-bit forms</strong> of RDSEED on Zen 5; the <strong>64-bit form is not affected</strong>.</p> <p>Because RDSEED is used to feed cryptographically secure random number generators (CSPRNGs), a broken RDSEED can poison keys, tokens, and other security-critical values.</p> <p>AMD classifies the impact as:</p> <blockquote> <p><strong>Loss of confidentiality and integrity</strong> (High severity).</p> </blockquote> <h2>How the Vulnerability Works (In Plain English)</h2> <span class="h3-replacement">What RDSEED Is Supposed to Do</span> <p>Modern CPUs expose hardware instructions like <strong>RDRAND</strong> and <strong>RDSEED</strong>:</p> <ul><li> <p><strong>RDRAND</strong>: Gives you pseudo-random values from a DRBG that’s already been seeded.</p> </li> <li> <p><strong>RDSEED</strong>: Gives you <em>raw entropy</em> samples suitable for seeding cryptographic PRNGs (it should be very close to truly random).</p> </li> </ul><p>Software like TLS libraries, key generators, HSM emulators, and OS RNGs may rely directly or indirectly on RDSEED to bootstrap secure randomness.</p> <span class="h3-replacement">What’s Going Wrong on Zen 5</span> <p>On affected Zen 5 CPUs:</p> <ul><li> <p>The <strong>16-bit and 32-bit RDSEED variants</strong> sometimes return <strong>0</strong> much more often than a true random source should.</p> </li> <li> <p>Even worse, they simultaneously <strong>report success</strong> (CF=1), so software assumes the value is fine rather than retrying.</p> </li> </ul><p>In cryptographic terms, this means:</p> <ul><li> <p>Entropy can be <strong>dramatically reduced</strong> (many key bits become predictable or even fixed).</p> </li> <li> <p>Keys or nonces derived from those values can become <strong>partially or fully guessable</strong>.</p></li></ul></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/amd-confirms-zen-5-rng-flaw-when-random-isnt-random-enough" hreflang="en">Go to Full Article</a> </div> </div> </div> Thu, 06 Nov 2025 17:00:00 +0000 George Whittaker 1341378 at https://www.linuxjournal.com The Most Critical Linux Kernel Breaches of 2025 So Far https://www.linuxjournal.com/content/most-critical-linux-kernel-breaches-2025-so-far <div data-history-node-id="1341377" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/the-most-critical-linux-kernel-breaches-of-2025-so-far.jpg" width="850" height="500" alt="The Most Critical Linux Kernel Breaches of 2025 So Far" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The Linux kernel, foundational for servers, desktops, embedded systems, and cloud infrastructure, has been under heightened scrutiny. Several vulnerabilities have been exploited in real-world attacks, targeting critical subsystems and isolation layers. In this article, we’ll walk through major examples, explain their significance, and offer actionable guidance for defenders.</p> <h2>CVE-2025-21756 – Use-After-Free in the vsock Subsystem</h2> <p>One of the most alarming flaws this year involves a use-after-free vulnerability in the Linux kernel’s <strong>vsock</strong> implementation (Virtual Socket), which enables communication between virtual machines and their hosts.</p> <p><strong>How the exploit works:</strong> A malicious actor inside a VM (or other privileged context) manipulates reference counters when a vsock transport is reassigned. The code ends up freeing a socket object while it’s still in use, enabling memory corruption and potentially root-level access.</p> <p><strong>Why it matters:</strong> Since vsock is used for VM-to-host and inter-VM communication, this flaw breaks a key isolation barrier. In multi-tenant cloud environments or container hosts that expose vsock endpoints, the impact can be severe.</p> <p><strong>Mitigation:</strong> Kernel maintainers have released patches. If your systems run hosts, hypervisors, or other environments where vsock is present, make sure the kernel is updated and virtualization subsystems are patched.</p> <h2>CVE-2025-38236 – Out-of-Bounds / Sandbox Escape via UNIX Domain Sockets</h2> <p>Another high-impact vulnerability involves the <strong>UNIX domain socket</strong> interface and the <code>MSG_OOB</code> flag. The bug was publicly detailed in August 2025 and is already in active discussion.</p> <p><strong>Attack scenario:</strong> A process running inside a sandbox (for example a browser renderer) can exploit <code>MSG_OOB</code> operations on a UNIX domain socket to trigger a use-after-free or out-of-bounds read/write. That allows leaking kernel pointers or memory and then chaining to full kernel privilege escalation.</p> <p><strong>Why it matters:</strong> This vulnerability is especially dangerous because it bridges from a low-privilege sandboxed process to kernel-level compromise. Many systems assume sandboxed code is safe; this attack undermines that assumption.</p> <p><strong>Mitigation:</strong> Distributions and vendors (like browser teams) have disabled or restricted <code>MSG_OOB</code> usage for sandboxed contexts. Kernel patches are available. Systems that run browser sandboxes or other sandboxed processes need to apply these updates immediately.</p> <h2>CVE-2025-38352 – TOCTOU Race Condition in POSIX CPU Timers</h2> <p>In September 2025, the U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog.</p></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/most-critical-linux-kernel-breaches-2025-so-far" hreflang="en">Go to Full Article</a> </div> </div> </div> Tue, 04 Nov 2025 17:00:00 +0000 George Whittaker 1341377 at https://www.linuxjournal.com Steam Deck 2 Rumors Ignite a New Era for Linux Gaming https://www.linuxjournal.com/content/steam-deck-2-rumors-ignite-new-era-linux-gaming <div data-history-node-id="1341376" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/steam-deck-2-rumors-ignite-a-new-era-for-linux-gaming.jpg" width="850" height="500" alt="Steam Deck 2 Rumors Ignite a New Era for Linux Gaming" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>The speculation around a successor to the Steam Deck has stirred renewed excitement, not just for a new handheld, but for what it signals in Linux-based gaming. With whispers of next-gen specs, deeper integration of SteamOS, and an evolving handheld PC ecosystem, these rumors are fueling broader hopes that Linux gaming is entering a more mature age. In this article we look at the existing rumors, how they tie into the Linux gaming landscape, why this matters, and what to watch.</p> <h2>What the Rumours Suggest</h2> <p>Although Valve has kept things quiet, multiple credible outlets report about the Steam Deck 2 being in development and potentially arriving well after 2026. Some of the key tid-bits:</p> <ul><li> <p>Editorials note that Valve isn’t planning a mere spec refresh; it wants a <em>“generational leap in compute without sacrificing battery life”</em>.</p> </li> <li> <p>A leaked hardware slide pointed to an AMD “Magnus”-class APU built on Zen 6 architecture being tied to next-gen handhelds, including speculation about the Steam Deck 2.</p> </li> <li> <p>One hardware leaker (KeplerL2) cited a possible <strong>2028</strong> launch window for the Steam Deck 2, which would make it roughly 6 years after the original.</p> </li> <li> <p>Valve’s own design leads have publicly stated that a refresh with only 20-30% more performance is <em>“not meaningful enough”</em>, implying they’re waiting for a more substantial upgrade.</p> </li> </ul><p>In short: while nothing is official yet, there’s strong evidence that Valve is working on the next iteration and wants it to be a noteworthy jump, not just a minor update.</p> <h2>Why This Matters for Linux Gaming</h2> <p>The rumoured arrival of the Steam Deck 2 isn’t just about hardware, it reflects and could accelerate key inflection points for Linux &amp; gaming:</p> <span class="h3-replacement"><strong>Validation of SteamOS &amp; Linux Gaming</strong></span> <p>The original Steam Deck, running SteamOS (a Linux-based OS), helped prove that PC gaming doesn’t always require Windows. A well-received successor would further validate Linux as a first-class gaming platform, not a niche alternative but a mainstream choice.</p> <span class="h3-replacement"><strong>Handheld PC Ecosystem Momentum</strong></span> <p>Since the first Deck, many Windows-based handhelds have entered the market (such as the ROG Ally, Lenovo Legion Go). Rumours of the Deck 2 keep spotlight on the form factor and raise expectations for Linux-native handhelds. This momentum helps encourage driver, compatibility and OS investments from the broader community.</p></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/steam-deck-2-rumors-ignite-new-era-linux-gaming" hreflang="en">Go to Full Article</a> </div> </div> </div> Thu, 30 Oct 2025 16:00:00 +0000 George Whittaker 1341376 at https://www.linuxjournal.com Kali Linux 2025.3 Lands: Enhanced Wireless Capabilities, Ten New Tools & Infrastructure Refresh https://www.linuxjournal.com/content/kali-linux-20253-lands-enhanced-wireless-capabilities-ten-new-tools-infrastructure-refresh <div data-history-node-id="1341375" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/kali-linux-2025%E2%80%933-lands-enhanced-wireless-capabilities-ten-new-tools-and-infrastructure-refresh.jpg" width="850" height="500" alt="Kali Linux 2025.3 Lands: Enhanced Wireless Capabilities, Ten New Tools &amp; Infrastructure Refresh" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><h2>Introduction</h2> <p>The popular penetration-testing distribution Kali Linux has dropped its latest quarterly snapshot: version 2025.3. This release continues the tradition of the rolling-release model used by the project, offering users and security professionals a refreshed toolkit, broader hardware support (especially wireless), and infrastructure enhancements under the hood. With this update, the distribution aims to streamline lab setups, bolster wireless hacking capabilities (particularly on Raspberry Pi devices), and integrate modern workflows including automated VMs and LLM-based tooling.</p> <p>In this article, we’ll walk through the key highlights of Kali Linux 2025.3, how the changes affect users (both old and new), the upgrade path, and what to keep in mind for real-world deployment.</p> <h2>What’s New in Kali Linux 2025.3</h2> <p>This snapshot from the Kali team brings several categories of improvements: tooling, wireless/hardware support, architecture changes, virtualization/image workflows, UI and plugin tweaks. Below is a breakdown of the major updates.</p> <span class="h3-replacement"><strong>Tooling Additions: Ten Fresh Packages</strong></span> <p>One of the headline items is the addition of ten new security tools to the Kali repositories. These tools reflect shifts in the field, toward AI-augmented recon, advanced wireless simulation and pivoting, and updated attack surface coverage. Among the additions are:</p> <ul><li> <p><strong>Caido</strong> and <strong>Caido-cli</strong> – a client-server web-security auditing toolkit (graphical client + backend).</p> </li> <li> <p><strong>Detect It Easy (DiE)</strong> – a utility for identifying file types, a useful tool in reverse engineering workflows.</p> </li> <li> <p><strong>Gemini CLI</strong> – an open-source AI agent that integrates Google’s Gemini (or similar LLM) capabilities into the terminal environment.</p> </li> <li> <p><strong>krbrelayx</strong> – a toolkit focused on Kerberos relaying/unconstrained delegation attacks.</p> </li> <li> <p><strong>ligolo-mp</strong> – a multiplayer pivoting solution for network-lateral movement.</p> </li> <li> <p><strong>llm-tools-nmap</strong> – allows large-language-model workflows to drive Nmap scans (automated/discovery).</p> </li> <li> <p><strong>mcp-kali-server</strong> – configuration tooling to connect an AI agent to Kali infrastructure.</p> </li> <li> <p><strong>patchleaks</strong> – a tool that detects security-fix patches and provides detailed descriptions (useful both for defenders and auditors).</p> </li> <li> <p><strong>vwifi-dkms</strong> – enables creation of “dummy” Wi-Fi networks (virtual wireless interfaces) for advanced wireless testing and hacking exercises.</p></li></ul></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/kali-linux-20253-lands-enhanced-wireless-capabilities-ten-new-tools-infrastructure-refresh" hreflang="en">Go to Full Article</a> </div> </div> </div> Tue, 28 Oct 2025 16:00:00 +0000 George Whittaker 1341375 at https://www.linuxjournal.com VMScape: Cracking VM-Host Isolation in the Speculative Execution Age & How Linux Patches Respond https://www.linuxjournal.com/content/vmscape-cracking-vm-host-isolation-speculative-execution-age-how-linux-patches-respond <div data-history-node-id="1341374" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/vmscape-cracking-vm-host-isolation-in-the-speculative-execution-age-how-linux-patches-respond.jpg" width="850" height="500" alt="VMScape: Cracking VM-Host Isolation in the Speculative Execution Age &amp; How Linux Patches Respond" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><h2>Introduction</h2> <p>In the world of modern CPUs, speculative execution, where a processor guesses ahead on branches and executes instructions before the actual code path is confirmed, has long been recognized as a performance booster. However, it has also given rise to a class of vulnerabilities collectively known as “Spectre” attacks, where microarchitectural side states (such as the branch target buffer, caches, or predictor state) are mis-exploited to leak sensitive data.</p> <p>Now, a new attack variant, dubbed <strong>VMScape</strong>, exposes a previously under-appreciated weakness: the isolation between a guest virtual machine and its host (or hypervisor) in the branch predictor domain. In simpler terms: a malicious VM can influence the CPU’s branch predictor in such a way that when control returns to the host, secrets in the host or hypervisor can be exposed. This has major implications for cloud security, virtualization environments, and kernel/hypervisor protections.</p> <p>In this article we’ll walk through how VMScape works, the CPUs and environments it affects, how the Linux kernel and hypervisors are mitigating it, and what users, cloud operators and admins should know (and do).</p> <h2>What VMScape Is &amp; Why It Matters</h2> <span class="h3-replacement"><strong>The Basics of Speculative Side-Channels</strong></span> <p>Speculative execution vulnerabilities like Spectre exploit the gap between <em>architectural state</em> (what the software sees as completed instructions) and <em>microarchitectural state</em> (what the CPU has done internally, such as cache loads, branch predictor updates, etc). Even when speculative paths are rolled back architecturally, side-effects in the microarchitecture can remain and be probed by attackers.</p> <p>One of the original variants, Spectre-BTI (Branch Target Injection, also called Spectre v2) leveraged the Branch Target Buffer (BTB) / predictor to redirect speculative execution along attacker-controlled paths. Over time, hardware and software mitigations (IBRS, eIBRS, IBPB, STIBP) have been introduced. But VMScape shows that when virtualization enters the picture, the isolation assumptions break down.</p> <span class="h3-replacement"><strong>VMScape: Guest to Host via Branch Predictor</strong></span> <p>VMScape (tracked as CVE‑2025‑40300) is described by researchers from ETH Zürich as <strong>“the first Spectre-based end-to-end exploit in which a malicious guest VM can leak arbitrary sensitive information from the host domain/hypervisor, without requiring host code modifications and in default configuration.”</strong></p> <p>Here are the key elements making VMScape significant:</p> <ul><li> <p>The attack is <strong>cross-virtualization</strong>: a guest VM influences the host’s branch predictor state (not just within the guest).</p></li></ul></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/vmscape-cracking-vm-host-isolation-speculative-execution-age-how-linux-patches-respond" hreflang="en">Go to Full Article</a> </div> </div> </div> Thu, 23 Oct 2025 16:00:00 +0000 George Whittaker 1341374 at https://www.linuxjournal.com Self-Tuning Linux Kernels: How LLM-Driven Agents Are Reinventing Scheduler Policies https://www.linuxjournal.com/content/self-tuning-linux-kernels-how-llm-driven-agents-are-reinventing-scheduler-policies <div data-history-node-id="1341373" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/self-tuning-linux-kernels-how-llm-driven-agents-are-reinventing-scheduler-policies.jpg" width="850" height="500" alt="Self-Tuning Linux Kernels: How LLM-Driven Agents Are Reinventing Scheduler Policies" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><h2>Introduction</h2> <p>Modern computing systems rely heavily on operating-system schedulers to allocate CPU time fairly and efficiently. Yet many of these schedulers operate <strong>blindly</strong> with respect to the <em>meaning</em> of workloads: they cannot distinguish, for example, whether a task is latency-sensitive or batch-oriented. This mismatch, between application semantics and scheduler heuristics, is often referred to as the <em>semantic gap</em>.</p> <p>A recent research framework called SchedCP aims to close that gap. By using autonomous LLM‐based agents, the system analyzes workload characteristics, selects or synthesizes custom scheduling policies, and safely deploys them into the kernel, without human intervention. This represents a meaningful step toward <em>self-optimizing</em>, <em>application-aware</em> kernels.</p> <p>In this article we will explore what SchedCP is, how it works under the hood, the evidence of its effectiveness, real-world implications, and what caveats remain.</p> <h2>Why the Problem Matters</h2> <p>At the heart of the issue is that general-purpose schedulers (for example the Linux kernel’s default policy) assume broad fairness, rather than tailoring scheduling to what <em>your</em> application cares about. For instance:</p> <ul><li> <p>A video-streaming service may care most about minimal tail latency.</p> </li> <li> <p>A CI/CD build system may care most about throughput and job completion time.</p> </li> <li> <p>A cloud analytics job may prefer maximum utilisation of cores with less concern for interactive responsiveness.</p> </li> </ul><p>Traditional schedulers treat all tasks mostly the same, tuning knobs generically. As a result, systems often sacrifice optimisation opportunities. Some prior efforts have used reinforcement-learning techniques to tune scheduler parameters, but these approaches have limitations: slow convergence, limited generalisation, and weak reasoning about <em>why</em> a workload behaves as it does.</p> <p>SchedCP starts from the observation that large language models can reason semantically about workloads (expressed in plain language or structured summaries), propose new scheduling strategies, and generate code via eBPF that is loaded into the kernel via the <code>sched_ext</code> interface. Thus, a custom scheduler (or modified policy) can be developed specifically for a given workload scenario, and in a self-service, automated way.</p> <h2>Architecture &amp; Key Components</h2> <p>SchedCP comprises two primary subsystems: a <strong>control-plane framework</strong> and an <strong>agent loop</strong> that interacts with it. The framework decouples “what to optimise” (reasoning) from “how to act” (execution) in order to preserve kernel stability while enabling powerful optimisations.</p> <p>Here are the major components:</p></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/self-tuning-linux-kernels-how-llm-driven-agents-are-reinventing-scheduler-policies" hreflang="en">Go to Full Article</a> </div> </div> </div> Tue, 21 Oct 2025 16:00:00 +0000 George Whittaker 1341373 at https://www.linuxjournal.com Bcachefs Ousted from Mainline Kernel: The Move to DKMS and What It Means https://www.linuxjournal.com/content/bcachefs-ousted-mainline-kernel-move-dkms-and-what-it-means <div data-history-node-id="1341372" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/bcachefs-ousted-from-mainline-kernel-the-move-to-dkms-and-what-it-means.jpg" width="850" height="500" alt="Bcachefs Ousted from Mainline Kernel: The Move to DKMS and What It Means" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><h2>Introduction</h2> <p>After years of debate and development, <strong>bcachefs</strong>—a modern copy-on-write filesystem once merged into the Linux kernel—is being removed from mainline. As of kernel 6.17, the in-kernel implementation has been excised, and future use is expected via an out-of-tree DKMS module. This marks a turning point for the bcachefs project, raising questions about its stability, adoption, and relationship with the kernel development community.</p> <p>In this article, we’ll explore the background of bcachefs, the sequence of events leading to its removal, the technical and community dynamics involved, and implications for users, distributions, and the filesystem’s future.</p> <h2>What Is Bcachefs?</h2> <p>Before diving into the removal, let’s recap what bcachefs is and why it attracted attention.</p> <ul><li> <p><strong>Origin &amp; goals</strong>: Developed by Kent Overstreet, bcachefs emerged from ideas in the earlier <em>bcache</em> project (a block-device caching layer). It aimed to build a full-featured, general-purpose filesystem combining performance, reliability, and modern features (snapshots, compression, encryption) in a coherent design.</p> </li> <li> <p><strong>Mainline inclusion</strong>: Bcachefs was merged into the mainline kernel in version <strong>6.7</strong> (released January 2024) after a lengthy review and incubation period.</p> </li> <li> <p><strong>“Experimental” classification</strong>: Even after being part of the kernel, bcachefs always carried disclaimers about its maturity and stability—they were not necessarily recommends for production use by all users.</p> </li> </ul><p>Its presence in mainline gave distributions a path to ship it more casually, and users had easier access without building external modules—an important convenience for adoption.</p> <h2>What Led to the Removal</h2> <p>The excision of bcachefs from the kernel was not sudden but the culmination of tension over development practices, patch acceptance timing, and upstream policy norms.</p> <span class="h3-replacement">“Externally Maintained” status in 6.17</span> <p>In kernel 6.17’s preparation, maintainers marked bcachefs as <strong>“externally maintained.”</strong> Though the code remained present, the change signified that upstream would no longer accept new patches or updates within the kernel tree.</p> <p>This move allowed a transitional period. The code was “frozen” inside the tree to avoid breaking existing systems immediately, while preparation was made for future removal.</p></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/bcachefs-ousted-mainline-kernel-move-dkms-and-what-it-means" hreflang="en">Go to Full Article</a> </div> </div> </div> Thu, 16 Oct 2025 16:00:00 +0000 George Whittaker 1341372 at https://www.linuxjournal.com Linux Mint 22.2 ‘Zara’ Released: Polished, Modern, and Built for Longevity https://www.linuxjournal.com/content/linux-mint-222-zara-released-polished-modern-and-built-longevity <div data-history-node-id="1341371" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/linux-mint-22%E2%80%932-zara-released-polished-modern-and-built-for-longevity.jpg" width="850" height="500" alt="Linux Mint 22.2 ‘Zara’ Released: Polished, Modern, and Built for Longevity" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><h2>Introduction</h2> <p>The Linux Mint team has officially unveiled <strong>Linux Mint 22.2</strong>, codenamed <strong>“Zara”</strong>, on September 4, 2025. As a Long-Term Support (LTS) release, Zara will receive updates through <strong>2029</strong>, promising users stability, incremental improvements, and a comfortable desktop experience.</p> <p>This version is not about flashy overhauls; rather, it’s about refinement — applying polish to existing features, smoothing rough edges, weaving in new conveniences (like fingerprint login), and improving compatibility with modern hardware. Below, we’ll delve into what’s new in Zara, what users should know before upgrading, and how it continues Mint’s philosophy of combining usability, reliability, and elegance.</p> <h2>What’s New in Linux Mint 22.2 “Zara”</h2> <p>Here’s a breakdown of key changes, refinements, and enhancements in Zara.</p> <span class="h3-replacement">Base, Support &amp; Kernel Stack</span> <ul><li> <p><strong>Ubuntu 24.04 (Noble) base</strong>: Zara continues to use Ubuntu 24.04 as its upstream base, ensuring broad package compatibility and long-term security support.</p> </li> <li> <p><strong>Kernel 6.14 (HWE)</strong>: The default kernel for new installations is 6.14, bringing support for newer hardware.</p> </li> <li> <p>However — for existing systems upgraded from Mint 22 or 22.1 — the older kernel (6.8 LTS) remains the default, because 6.14’s support window is shorter.</p> </li> <li> <p>Zara is an LTS edition, with security updates and maintenance promised through <strong>2029</strong>.</p> </li> </ul><span class="h3-replacement">Major Features &amp; Enhancements</span> <h4>Fingerprint Authentication via <strong>Fingwit</strong></h4> <p>Zara introduces a first-party tool called <strong>Fingwit</strong> to manage fingerprint-based authentication. With compatible hardware and support via the <strong>libfprint</strong> framework, users can:</p> <ul><li> <p>Enroll fingerprints</p> </li> <li> <p>Use fingerprint login for the <strong>screensaver</strong></p> </li> <li> <p>Authenticate <code>sudo</code> commands</p> </li> <li> <p>Launch administrative tools via <code>pkexec</code> using the fingerprint</p> </li> <li> <p>In some cases, bypass password entry at login (unless home directory encryption or keyring constraints force password fallback)</p> </li> </ul><p>It is important to note that fingerprint login on the actual login screen may be disabled or limited depending on encryption or keyring usage; in those cases, the system falls back to password entry.</p> <h4>UI &amp; Theming Refinements</h4> <ul><li> <p><strong>Sticky Notes</strong> app now sports <strong>rounded corners</strong>, improved Wayland compatibility, and a companion Android app named <strong>StyncyNotes</strong> (available via F-Droid) to sync notes across devices.</p></li></ul></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/linux-mint-222-zara-released-polished-modern-and-built-longevity" hreflang="en">Go to Full Article</a> </div> </div> </div> Tue, 14 Oct 2025 16:00:00 +0000 George Whittaker 1341371 at https://www.linuxjournal.com Ubuntu Update Backlog: How a Brief Canonical Outage Cascaded into Multi-Day Delays https://www.linuxjournal.com/content/ubuntu-update-backlog-how-brief-canonical-outage-cascaded-multi-day-delays <div data-history-node-id="1341370" class="layout layout--onecol"> <div class="layout__region layout__region--content"> <div class="field field--name-field-node-image field--type-image field--label-hidden field--item"> <img loading="lazy" src="/sites/default/files/nodeimage/story/ubuntu-update-backlog-how-a-brief-canonical-outage-cascaded-into-multi-day-delays.jpg" width="850" height="500" alt="Ubuntu Update Backlog: How a Brief Canonical Outage Cascaded into Multi-Day Delays" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-node-author field--type-ds field--label-hidden field--item">by <a title="View user profile." href="/users/george-whittaker" lang="" about="/users/george-whittaker" typeof="schema:Person" property="schema:name" datatype="">George Whittaker</a></div> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><h2>Introduction</h2> <p>In early September 2025, Ubuntu users globally experienced disruptive delays in installing updates and new packages. What seemed like a fleeting outage—only about <strong>36 minutes</strong> of server downtime—triggered a cascade of effects: mirrors lagging, queued requests overflowing, and installations hanging for days. The incident exposed how fragile parts of Ubuntu’s update infrastructure can be under sudden load.</p> <p>In this article, we’ll walk through what happened, why the fallout was so severe, how Canonical responded, and lessons for users and infrastructure architects alike.</p> <h2>What Happened: Outage &amp; Immediate Impact</h2> <p>On <strong>September 5, 2025</strong>, Canonical’s archive servers—specifically <strong>archive.ubuntu.com</strong> and <strong>security.ubuntu.com</strong>—suffered an unplanned outage. The status page for Canonical showed the incident lasting roughly <strong>36 minutes</strong>, after which operations were declared “resolved.”</p> <p>However, that brief disruption set off a domino effect. Because the archives and security servers serve as the central hubs for Ubuntu’s package ecosystem, any downtime causes massive backlog among mirror servers and client requests. Mirrors found themselves out of sync, processing queues piled up, and users attempting updates or new installs encountered failed downloads, hung operations, or “404 / package not found” errors.</p> <p>On Ubuntu’s community forums, Canonical acknowledged that while the server outage was short, the <strong>upload / processing queue</strong> for security and repository updates had become “obscenely” backlogged. Users were urged to be patient, as there was no immediate workaround.</p> <p>Throughout September 5–7, users continued reporting incomplete or failed updates, slow mirror responses, and installations freezing mid-process. Even newly provisioning systems faced broken repos due to inconsistent mirror states.</p> <p>By <strong>September 8</strong>, the situation largely stabilized: mirrors caught up, package availability resumed, and normal update flows returned. But the extended period of degraded service had already left many users frustrated.</p> <h2>Why a Short Outage Turned into Days of Disruption</h2> <p>At first blush, 36 minutes seems trivial. Why did it have such prolonged consequences? Several factors contributed:</p> <ol><li> <p><strong>Centralized repository backplane</strong> Ubuntu’s infrastructure is architected around central canonical repositories (archive, security) which then propagate to mirrors worldwide. When the central system is unavailable, mirrors stop receiving updates and become stale.</p></li></ol></div> <div class="field field--name-node-link field--type-ds field--label-hidden field--item"> <a href="/content/ubuntu-update-backlog-how-brief-canonical-outage-cascaded-multi-day-delays" hreflang="en">Go to Full Article</a> </div> </div> </div> Thu, 09 Oct 2025 16:00:00 +0000 George Whittaker 1341370 at https://www.linuxjournal.com