[Hide] (972.1KB, 1000x1000)
Emacs 28.1 is out!
- Native JIT compilation of elisp files using libgccjit*
- The new NonGNU ELPA package archive is enabled by default alongside GNU ELPA (https://elpa.nongnu.org/)
- Text shaping with HarfBuzz and drawing with Cairo
- Support for loading SECure COMPuting filters**
- Much improved display of ((( Emoji ))) and Emoji sequences
- New system for documenting groups of functions
- A minor mode for context menus (context-menu-mode)
- Mode-specific commands
- Emacs shows matching parentheses by default
- Many improvements and extensions to project.el
*Emacs now optionally supports native compilation of Lisp files.
To enable this, configure Emacs with the '--with-native-compilation' option.
This requires the libgccjit library to be installed and functional,
and also requires GCC and Binutils to be available when Lisp code is
natively compiled. See the Info node "(elisp) Native Compilation" for
If you build Emacs with native compilation, but without zlib, be sure
to configure with the '--without-compress-install' option, so that the
installed "*.el" files are not compressed; otherwise, you will not be
able to use JIT native compilation of the installed "*.el" files.
Note that JIT native compilation is done in a fresh session of Emacs
that is run in a subprocess, so it can legitimately report some
warnings and errors that aren't uncovered by byte-compilation. We
recommend examining any such warnings before you decide they are
** Emacs now supports loading a Secure Computing filter.
This is supported only on capable GNU/Linux systems. To activate,
invoke Emacs with the '--seccomp=FILE' command-line option. FILE must
name a binary file containing an array of 'struct sock_filter'
structures. Emacs will then install that list of Secure Computing
filters into its own process early during the startup process. You
can use this functionality to put an Emacs process in a sandbox to
avoid security issues when executing untrusted code. See the manual
page for 'seccomp' system call, for details about Secure Computing
Clasp v1.0.0 released
> Clasp is a new Common Lisp implementation that seamlessly interoperates with C++ libraries and programs using LLVM for compilation to native code.
* Implemented save-lisp-and-die. This saves the state of a running environment for loading and fast startup later. Our most complex environment Cando starts up in ~4 seconds, which is 10x faster than the old startup that loaded libraries.
* clasp-debug interface so that IDEs like SLIME can retrieve backtraces and more to present during debugging.
* Fixed many errors identified by the ansi-test-suite
New Gentoo LiveGUI ISO and artwork / branding contest!
After a long break, we now have again a weekly Gentoo LiveUSB ISO with GUI for AMD64!
> boots directly into KDE Plasma and comes with a ton of up-to-date software. This ranges from office applicactions such as LibreOffice, Inkscape, and GIMP all the way to many system administrator tools.
Some of the software on the image:
> KDE Plasma as desktop environment
> Office productivity: LibreOffice, LyX, TeXstudio, XournalPP, kile
> Web browsers: Firefox, Chromium
> IRC and similar: irssi, weechat
> Editors: Emacs, vim, kate, nano, joe
> Development and source control: git, subversion, gcc, Python, Perl
> Graphics: Inkscape, Gimp, Povray, Luminance HDR, Digikam
> Video: KDEnlive
> Disk management: hddtemp, testdisk, hdparm, nvme-cli, gparted, partimage, btrfs-progs, ddrescue, dosfstools, e2fsprogs, zfs
> Network tools and daemons: nmap, tcpdump, traceroute, minicom, pptpclient, bind-tools, cifs-utils, nfs-utils, ftp, chrony, ntp, openssh, rdesktop, openfortivpn, openvpn, tor
> Backup: mt-st, fsarchiver
> Benchmarks: bonnie, bonnie++, dbench, iozone, stress, tiobench