Linux 7.0 Released: Stable Rust, Self-Healing Filesystems, Post-Quantum Security, and Faster Everything.
tech

Linux 7.0 Released: Stable Rust, Self-Healing Filesystems, Post-Quantum Security, and Faster Everything.

Linux 7.0 lands with stable Rust, XFS self-healing, and faster performance

April 13, 2026
8 min read

About the Version Number

On April 12, 2026, Linus Torvalds released Linux kernel 7.0. The round number has generated more attention than the release itself might otherwise command, which is exactly the kind of thing Torvalds anticipated. His release announcement was characteristically direct: "I'm getting to the point where I'm being confused by large numbers — almost running out of fingers and toes again, so the next kernel is going to be called 7.0."

The jump from 6.19 to 7.0 is a practical numbering decision, not a signal of architectural upheaval. The same logic produced 3.0 from 2.6.39 and 5.0 from 4.20. No single dramatic change triggered the version bump. What Linux 7.0 contains is a release that has been building across many development cycles: Rust officially stabilized as a supported language, autonomous filesystem repair for XFS, post-quantum cryptographic signatures for kernel modules, meaningful performance gains across thread management and file operations, and broad hardware enablement for the next generation of processors. That is a lot, even without a round number attached to it.

Torvalds also noted something unusual in his release announcement: the development cycle saw more fixes than average, which he attributed to AI-assisted tooling surfacing corner cases that had previously gone undetected. "I suspect it's a lot of AI tool use that will keep finding corner cases for us for a while, so this may be the 'new normal' at least for a while," he wrote. The result is a kernel that arrived more thoroughly tested than its predecessors despite a choppier-than-usual development cycle.

Rust Is Now Officially Supported

The biggest symbolic change in Linux 7.0 is the removal of the experimental label from Rust. After five years of incremental integration work, the Rust programming language is now an officially supported language for kernel development.

This does not mean Rust replaces C, which remains the primary language of the kernel and will for the foreseeable future. What it means is that drivers, modules, and other kernel components written in Rust are now a first-class path rather than a tolerated experiment. Developers writing new kernel code can now choose Rust with full confidence that it will be maintained and supported.

The security implications are the practical argument for this change. The most common sources of kernel CVEs, including buffer overflows, use-after-free bugs, and null-pointer dereferences, are structurally prevented by Rust's memory safety model. They require active effort to produce in Rust in ways they do not in C. Greg Kroah-Hartman, maintainer of the stable kernel branch, put it plainly: "Most of our bugs come from silly little corner cases in C that simply don't exist in Rust." Android 16 already ships with Rust kernel code running on production devices, confirming the approach works at scale.

The stabilization in Linux 7.0 sets the trajectory. As more drivers and subsystems are written or rewritten in Rust over the coming years, the kernel's security profile improves cumulatively without requiring any single dramatic intervention.

XFS Gets Autonomous Self-Healing

Linux 7.0 introduces self-healing capabilities for the XFS filesystem through a background daemon that monitors filesystem health in real time and triggers repairs automatically when corruption is detected, all while the filesystem remains fully mounted and in use.

The mechanism works through a multi-layered approach using redundant metadata copies stored within the filesystem structure. When the daemon detects corruption during normal operations, it uses those copies as donor data to repair the affected metadata without interrupting running workloads. Administrators can monitor the process through new entries in the /proc and /sys filesystems.

The significance for production environments is immediate. XFS is the default filesystem for Red Hat Enterprise Linux and a common choice for large-scale storage workloads precisely because of its performance characteristics with large files. The self-healing capability means that many categories of corruption that previously required manual intervention, scheduled maintenance windows, or filesystem unmounting for repair can now be handled automatically in the background. The XFS self-healing features are enabled by default on compatible hardware in Linux 7.0.

Post-Quantum Signatures for Kernel Modules

Every time the Linux kernel loads a driver or module, it verifies a digital signature to confirm the code has not been tampered with. Linux 7.0 adds support for ML-DSA signatures, the Module-Lattice-Based Digital Signature Algorithm, which is a FIPS 204 standard approved by NIST specifically for its resistance to quantum computing attacks.

Simultaneously, Linux 7.0 removes support for SHA-1-based module signing. NIST deprecated SHA-1 in 2011 and practical collision attacks against it were demonstrated in 2017. Its continued presence in kernel module signing was an acknowledged weakness. It is now gone.

The quantum computing threat to current cryptographic standards is not immediate, but the threat model that motivates this change is real. State-level actors are conducting harvest-now, decrypt-later campaigns: collecting encrypted data today with the intention of decrypting it when quantum computers become capable enough to break classical encryption. Kernel modules signed with vulnerable algorithms represent a specific attack surface for this approach. Linux 7.0's adoption of ML-DSA closes that surface, making the kernel the most cryptographically future-ready OS currently available on this vector.

Performance Improvements

Several concrete performance changes ship in Linux 7.0 with benchmarked results behind them.

Thread creation and teardown is 10 to 16 percent faster, driven by improvements to PID allocation. For workloads involving high rates of process spawning, container creation, or multi-threaded application startup, this translates directly to reduced latency. File open and close operations are 4 to 16 percent faster on multi-core machines, the range reflecting how workload characteristics affect the improvement.

Swap subsystem performance is improved, continuing work that began in Linux 6.18. The zram compressed block device now allows compressed pages to be written back without full decompression, reducing overhead for systems using compressed swap. These memory management improvements are directly relevant for systems under memory pressure, including lower-RAM servers, containers, and developer workstations running many concurrent applications.

AccECN, Accurate Explicit Congestion Notification, is now enabled by default in the networking stack. This provides continuous congestion feedback to TCP before packets are actually dropped, fixing a TCP design limitation that has existed since the protocol's original design. For network-intensive workloads, enabling AccECN by default improves throughput predictability and reduces unnecessary retransmissions.

Filesystem Updates Beyond XFS

Btrfs receives direct I/O support for block sizes larger than the system page size, a significant improvement for database workloads and other applications that benefit from large sequential I/O. Btrfs also gains initial support for the remap-tree feature, a translation layer for logical block addresses that enables relocation without rewriting data, though this remains experimental in 7.0.

The EROFS read-only filesystem now enables LZMA compression by default and formally recognizes DEFLATE and Zstandard compression as stable, expanding its usefulness for container images, read-only data partitions, and embedded systems. Non-blocking timestamp updates now function correctly across filesystems, and the legacy laptop mode power management option has been removed after a long deprecation period.

Hardware Support

Linux 7.0 includes foundational driver work for Intel Nova Lake, Intel Diamond Rapids, and AMD Zen 6 processors. These chips are not yet on sale, but the kernel groundwork ensures they will boot and function correctly on Linux from day one without waiting for subsequent kernel updates. Deeper performance tuning specific to their architectures will follow as the hardware reaches availability.

Intel TSX, the Transactional Synchronization Extensions feature, now defaults to auto mode rather than the disabled state that had been the cautious default following earlier security disclosures. Intel Arc B-series Battlemage discrete GPUs no longer block D3cold, the deepest PCIe power-saving state, meaning these cards will now properly reduce power consumption when idle. The NVK open-source driver for NVIDIA GPUs gains improved performance through restored large page support.

ARM, RISC-V, and Loongson processor support receives further bring-up work. KVM virtual machine support gains more sophisticated handling for AMD EPYC 5 CPUs. Qualcomm Snapdragon X2 Elite PHY support lands in 7.0, continuing incremental progress toward fully functional Linux support on Qualcomm's laptop silicon.

On the security side, BPF filtering for io_uring is now supported, enabling sandbox controls on io_uring operations without requiring administrators to disable the interface entirely. This fills a gap that had forced some security-conscious deployments into unnecessary performance trade-offs.

Distribution Availability

The Linux 7.0 source is available immediately at kernel.org. Rolling-release distributions including Arch Linux and openSUSE Tumbleweed are expected to ship packages within days. Ubuntu 26.04 LTS, codenamed Resolute Raccoon and scheduled for general availability on April 23, 2026, ships Linux 7.0 as its default kernel. As the base for dozens of downstream distributions including Linux Mint, Pop!_OS, Kubuntu, and ElementaryOS, Ubuntu 26.04's adoption means Linux 7.0 will reach a large segment of the global Linux install base within weeks of the kernel release.

If you are building applications, services, or infrastructure on Linux and want a development partner with deep expertise in system-level performance, security posture, and production deployment strategy, please reach out to MonkDA. We work with development and operations teams building production systems on Linux at every scale.

Ready to take your idea to market?

Let's talk about how MonkDA can turn your vision into a powerful digital product.