Hubbry Logo
Linux kernelLinux kernelMain
Open search
Linux kernel
Community hub
Linux kernel
logo
8 pages, 0 posts
0 subscribers
Be the first to start a discussion here.
Be the first to start a discussion here.
Contribute something
Linux kernel
Linux kernel
from Wikipedia

Linux Kernel
Original authorLinus Torvalds
DevelopersCommunity contributors
Linus Torvalds
Initial release0.02 (5 October 1991; 34 years ago (1991-10-05))
Stable release
Regular: 6.17.7 / 2 November 2025[2] Edit this on Wikidata
LTS: 6.12.57 / 2 November 2025[3] Edit this on Wikidata
Preview release
6.18-rc4[4] Edit this on Wikidata / 2 November 2025
Repository
Written inC (with GNU extensions;[5] C11 (gnu11)[6] since 5.18, C89 (gnu89) before),[7]
Assembly language
Available inEnglish
LicenseGPL-2.0-only with Linux-syscall-note[8][9][10][a]
Websitekernel.org Edit this on Wikidata

The Linux kernel is a free and open-source[14]: 4  Unix-like kernel that is used in many computer systems worldwide. The kernel was created by Linus Torvalds in 1991 and was soon adopted as the kernel for the GNU operating system (OS) which was created to be a free replacement for Unix. Since the late 1990s, it has been included in many operating system distributions, many of which are called Linux. One such Linux kernel operating system is Android which is used in many mobile and embedded devices.

Most of the kernel code is written in C as supported by the GNU Compiler Collection (GCC) which has extensions beyond standard C.[14]: 18 [15] The code also contains assembly code for architecture-specific logic such as optimizing memory use and task execution.[14]: 379–380  The kernel has a modular design such that modules can be integrated as software components – including dynamically loaded. The kernel is monolithic in an architectural sense since the entire OS kernel runs in kernel space.

Linux is provided under the GNU General Public License version 2, although it contains files under other compatible licenses.[13]

History

[edit]
Linus Torvalds at the LinuxCon Europe 2014

In 1991, Linus Torvalds was a computer science student enrolled at the University of Helsinki. During his time there, he began to develop an operating system as a side-project inspired by UNIX, for a personal computer.[16] He started with a task switcher in Intel 80386 assembly language and a terminal driver.[16] On 25 August 1991, Torvalds posted the following to comp.os.minix, a newsgroup on Usenet:[17]

I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones. This has been brewing since April, and is starting to get ready. I'd like any feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical layout of the file-system (due to practical reasons) among other things).
I've currently ported bash(1.08) and gcc(1.40), and things seem to work. This implies that I'll get something practical within a few months [...]
Yes - it's free of any minix code, and it has a multi-threaded fs. It is NOT protable [sic] (uses 386 task switching etc), and it probably never will support anything other than AT-harddisks, as that's all I have :-(.

On 17 September 1991, Torvalds prepared version 0.01 of Linux and put on the "ftp.funet.fi" – FTP server of the Finnish University and Research Network (FUNET). It was not even executable since its code still needed Minix to compile and test it.[18]

On 5 October 1991, Torvalds announced the first "official" version of Linux, version 0.02.[19][18]

[As] I mentioned a month ago, I'm working on a free version of a Minix-lookalike for AT-386 computers. It has finally reached the stage where it's even usable (though may not be depending on what you want), and I am willing to put out the sources for wider distribution. It is just version 0.02...but I've successfully run bash, gcc, gnu-make, gnu-sed, compress, etc. under it.

Linux grew rapidly as many developers, including the MINIX community, contributed to the project.[citation needed] At the time, the GNU Project had completed many components for its free UNIX replacement, GNU, but its kernel, the GNU Hurd, was incomplete. The project adopted the Linux kernel for its OS.[20]

Torvalds labeled the kernel with major version 0 to indicate that it was not yet intended for general use.[21] Version 0.11, released in December 1991, was the first version to be self-hosted; compiled on a computer running the Linux kernel.

When Torvalds released version 0.12 in February 1992, he adopted the GNU General Public License version 2 (GPLv2) over his previous self-drafted license, which had not permitted commercial redistribution.[22] In contrast to Unix, all source files of Linux are freely available, including device drivers.[23]

The initial success of Linux was driven by programmers and testers across the world. With the support of the POSIX APIs, through the libC that, whether needed, acts as an entry point to the kernel address space, Linux could run software and applications that had been developed for Unix.[24]

The Linux kernel supports various hardware architectures, providing a common platform for software, including proprietary software.

On 19 January 1992, the first post to the new newsgroup alt.os.linux was submitted.[25] On 31 March 1992, the newsgroup was renamed comp.os.linux.[26]

The fact that Linux is a monolithic kernel rather than a microkernel was the topic of a debate between Andrew S. Tanenbaum, the creator of MINIX, and Torvalds.[27] The Tanenbaum–Torvalds debate started in 1992 on the Usenet group comp.os.minix as a general discussion about kernel architectures.[28][29]

Version 0.96 released in May 1992 was the first capable of running the X Window System.[30][31] In March 1994, Linux 1.0.0 was released with 176,250 lines of code.[32] As indicated by the version number, it was the first version considered suitable for a production environment.[21] In June 1996, after release 1.3, Torvalds decided that Linux had evolved enough to warrant a new major number, and so labeled the next release as version 2.0.0.[33][34] Significant features of 2.0 included symmetric multiprocessing (SMP), support for more processors types and support for selecting specific hardware targets and for enabling architecture-specific features and optimizations.[24] The make *config family of commands of kbuild enable and configure options for building ad hoc kernel executables (vmlinux) and loadable modules.[35][36]

Version 2.2, released on 20 January 1999,[37] improved locking granularity and SMP management, added m68k, PowerPC, Sparc64, Alpha, and other 64-bit platforms support.[38] Furthermore, it added new file systems including Microsoft's NTFS read-only capability.[38] In 1999, IBM published its patches to the Linux 2.2.13 code for the support of the S/390 architecture.[39]

Version 2.4.0, released on 4 January 2001,[40] contained support for ISA Plug and Play, USB, and PC Cards. Linux 2.4 added support for the Pentium 4 and Itanium (the latter introduced the ia64 ISA that was jointly developed by Intel and Hewlett-Packard to supersede the older PA-RISC), and for the newer 64-bit MIPS processor.[41] Development for 2.4.x changed a bit in that more features were made available throughout the series, including support for Bluetooth, Logical Volume Manager (LVM) version 1, RAID support, InterMezzo and ext3 file systems.

Version 2.6.0 was released on 17 December 2003.[42] The development for 2.6.x changed further towards including new features throughout the series. Among the changes that have been made in the 2.6 series are: integration of μClinux into the mainline kernel sources, PAE support, support for several new lines of CPUs, integration of Advanced Linux Sound Architecture (ALSA) into the mainline kernel sources, support for up to 232 users (up from 216), support for up to 229 process IDs (64-bit only, 32-bit architectures still limited to 215),[43] substantially increased the number of device types and the number of devices of each type, improved 64-bit support, support for file systems which support file sizes of up to 16 terabytes, in-kernel preemption, support for the Native POSIX Thread Library (NPTL), User-mode Linux integration into the mainline kernel sources, SELinux integration into the mainline kernel sources, InfiniBand support, and considerably more.

Starting with 2.6.x releases, the kernel supported a large number of file systems; some designed for Linux, like ext3, ext4, FUSE, Btrfs,[44] and others native to other operating systems like JFS, XFS, Minix, Xenix, Irix, Solaris, System V, Windows and MS-DOS.[45]

Though development had not used a version control system thus far, in 2002, Linux developers adopted BitKeeper, which was made freely available to them even though it was not free software. In 2005, because of efforts to reverse-engineer it, the company which owned the software revoked its support of the Linux community. In response, Torvalds and others wrote Git. The new system was written within weeks, and in two months the first official kernel made using it was released.[46]

In 2005 the stable team was formed as a response to the lack of a kernel tree where people could work on bug fixes, and it would keep updating stable versions.[47] In February 2008 the linux-next tree was created to serve as a place where patches aimed to be merged during the next development cycle gathered.[48][49] Several subsystem maintainers also adopted the suffix -next for trees containing code which they mean to submit for inclusion in the next release cycle. As of January 2014, the in-development version of Linux is held in an unstable branch named linux-next.[50]

The 20th anniversary of Linux was celebrated by Torvalds in July 2011 with the release of version 3.0.0.[33] As 2.6 had been the version number for 8 years, a new uname26 personality that reports 3.x as 2.6.40+x had to be added to the kernel so that old programs would work.[51]

Version 3.0 was released on 22 July 2011.[52] On 30 May 2011, Torvalds announced that the big change was "NOTHING. Absolutely nothing." and asked, "...let's make sure we really make the next release not just an all new shiny number, but a good kernel too."[53] After the expected 6–7 weeks of the development process, it would be released near the 20th anniversary of Linux.

On 11 December 2012, Torvalds decided to reduce kernel complexity by removing support for i386 processors—specifically by not having to emulate[54] the atomic CMPXCHG instruction introduced with the i486 to allow reliable mutexes—making the 3.7 kernel series the last one still supporting the original processor.[55][56] The same series unified support for the ARM processor.[57]

The numbering change from 2.6.39 to 3.0, and from 3.19 to 4.0, involved no meaningful technical differentiation; the major version number was increased simply to avoid large minor numbers.[52][58] Stable 3.x.y kernels were released until 3.19 in February 2015. Version 3.11, released on 2 September 2013,[59] added many new features such as new O_TMPFILE flag for open(2) to reduce temporary file vulnerabilities, experimental AMD Radeon dynamic power management, low-latency network polling, and zswap (compressed swap cache).[60]

In April 2015, Torvalds released kernel version 4.0.[33] By February 2015, Linux had received contributions from nearly 12,000 programmers from more than 1,200 companies, including some of the world's largest software and hardware vendors.[61] Version 4.1 of Linux, released in June 2015, contains over 19.5 million lines of code contributed by almost 14,000 programmers.[62]

Linus Torvalds announced that kernel version 4.22 would instead be numbered 5.0 in March 2019, stating that "'5.0' doesn't mean anything more than that the 4.x numbers started getting big enough that I ran out of fingers and toes."[63] It featured many major additions such as support for the AMD Radeon FreeSync and NVIDIA Xavier display, fixes for F2FS, EXT4 and XFS, restored support for swap files on the Btrfs file system and continued work on the Intel Icelake Gen11 graphics and on the NXP i.MX8 SoCs.[64][65] This release was noticeably larger than the rest, Torvalds mentioning that "The overall changes for all of the 5.0 release are much bigger."[63]

A total of 1,991 developers, of whom 334 were first-time collaborators, added more than 553,000 lines of code to version 5.8, breaking the record previously held by version 4.9.[66]

Popularity

[edit]

According to the Stack Overflow's annual Developer Survey of 2019, more than 53% of all respondents have developed software for Linux and about 27% for Android,[67] although only about 25% develop with Linux-based operating systems.[68]

Most websites run on Linux-based operating systems,[69][70] and all of the world's 500 most powerful supercomputers run on Linux.[71]

Linux distributions bundle the kernel with system software (e.g., the GNU C Library, systemd, and other Unix utilities and daemons) and a wide selection of application software, but their usage share in desktops is low in comparison to other operating systems.

Android, which runs on a modified Linux kernel, accounts for the majority of mobile device operating systems,[72][73][74] and is increasingly being used in embedded devices, making it a significant driver of Linux adoption.[24]

Value

[edit]
Redevelopment costs of Linux kernel

The cost to redevelop version 2.6.0 of the Linux kernel in a traditional proprietary development setting has been estimated to be US$612 million (€467M, £394M) in 2004 prices using the COCOMO person-month estimation model.[75] In 2006, a study funded by the European Union put the redevelopment cost of kernel version 2.6.8 higher, at €882M ($1.14bn, £744M).[76]

This topic was revisited in October 2008 by Amanda McPherson, Brian Proffitt, and Ron Hale-Evans. Using David A. Wheeler's methodology, they estimated redevelopment of the 2.6.25 kernel now costs $1.3bn (part of a total $10.8bn to redevelop Fedora 9).[77] Again, Garcia-Garcia and Alonso de Magdaleno from University of Oviedo (Spain) estimate that the value annually added to kernel was about €100M between 2005 and 2007 and €225M in 2008, it would cost also more than €1bn (about $1.4bn as of February 2010) to develop in the European Union.[78]

As of 7 March 2011, using then-current LOC (lines of code) of a 2.6.x Linux kernel and wage numbers with David A. Wheeler's calculations it would cost approximately $3bn (about €2.2bn) to redevelop the Linux kernel as it keeps getting bigger. An updated calculation as of 26 September 2018, using then-current 20,088,609 LOC (lines of code) for the 4.14.14 Linux kernel and the current US national average programmer salary of $75,506 show that it would cost approximately $14,725,449,000 (£11,191,341,000) to rewrite the existing code.[79]

Distribution

[edit]

Most who use Linux do so via a Linux distribution. Some distributions ship the vanilla or stable kernel. However, several vendors (such as Red Hat and Debian) maintain a customized source tree. These are usually updated at a slower pace than the vanilla branch, and they usually include all fixes from the relevant stable branch, but at the same time they can also add support for drivers or features which had not been released in the vanilla version the distribution vendor started basing its branch from.

Developers

[edit]

Community

[edit]
Million lines of codeKernel Version010203040501.0.02.2.02.5.04.06.17.1Million lines of codeGrowth of the Linux kernel by number of lines of code
Graph of the sizes of Linux Kernel versions in millions of lines of code[80]. View source data.

The community of Linux kernel developers comprises about 5000–6000 members. According to the "2017 State of Linux Kernel Development", a study issued by the Linux Foundation, covering the commits for the releases 4.8 to 4.13, about 1500 developers were contributing from about 200–250 companies on average. The top 30 developers contributed a little more than 16% of the code. For companies, the top contributors are Intel (13.1%) and Red Hat (7.2%), Linaro (5.6%), IBM (4.1%), the second and fifth places are held by the 'none' (8.2%) and 'unknown' (4.1%) categories.[81]

"Instead of a roadmap, there are technical guidelines. Instead of a central resource allocation, there are persons and companies who all have a stake in the further development of the Linux kernel, quite independently from one another: People like Linus Torvalds and I don’t plan the kernel evolution. We don’t sit there and think up the roadmap for the next two years, then assign resources to the various new features. That's because we don’t have any resources. The resources are all owned by the various corporations who use and contribute to Linux, as well as by the various independent contributors out there. It's those people who own the resources who decide..."

— Andrew Morton, 2005

None
Unknown
Consultants
SUSE
Google
nearly 500 other
companies


Corporate affiliation of contributions to the Linux kernel, 4.8–4.13[81]

Conflict

[edit]

Notable conflicts among Linux kernel developers:

  • In July 2007, Con Kolivas announced that he would cease developing for the Linux kernel.[82][83]
  • In July 2009, Alan Cox quit his role as the TTY layer maintainer after disagreement with Torvalds.[84]
  • In December 2010, there was a discussion between Linux SCSI maintainer James Bottomley and SCST maintainer Vladislav Bolkhovitin about which SCSI target stack should be included in the Linux kernel.[85] This made some Linux users upset.[86]
  • In June 2012, Torvalds made it very clear that he did not agree with NVIDIA releasing its drivers as closed.[87]
  • In April 2014, Torvalds banned Kay Sievers from submitting patches to the Linux kernel for failing to deal with bugs that caused systemd to negatively interact with the kernel.[88]
  • In October 2014, Lennart Poettering accused Torvalds of tolerating the rough discussion style on Linux kernel related mailing lists and of being a bad role model.[89]
  • In March 2015, Christoph Hellwig filed a lawsuit against VMware for infringement of the copyright on the Linux kernel.[90] Linus Torvalds made it clear that he did not agree with this and similar initiatives by calling lawyers a festering disease.[91]
  • In April 2021, a team from the University of Minnesota was found to be submitting "bad faith" patches to the kernel as part of its research. This resulted in the immediate reversion of all patches ever submitted by a member of the university. In addition, a warning was issued by a senior maintainer that any future patch from the university would be rejected on sight.[92][93]

Prominent Linux kernel developers have been aware of the importance of avoiding conflicts between developers.[94] For a long time there was no code of conduct for kernel developers due to opposition by Torvalds.[95] However, a Linux Kernel Code of Conflict was introduced on 8 March 2015.[96] It was replaced on 16 September 2018 by a new Code of Conduct based on the Contributor Covenant. This coincided with a public apology by Torvalds and a brief break from kernel development.[97][98] On 30 November 2018, complying with the Code of Conduct, Jarkko Sakkinen of Intel sent out patches replacing instances of "fuck" appearing in source code comments with suitable versions focused on the word 'hug'.[99]

Developers who feel treated unfairly can report this to the Linux Foundation Technical Advisory Board.[100] In July 2013, the maintainer of the USB 3.0 driver Sage Sharp asked Torvalds to address the abusive commentary in the kernel development community. In 2014, Sharp backed out of Linux kernel development, saying that "The focus on technical excellence, in combination with overloaded maintainers, and people with different cultural and social norms, means that Linux kernel maintainers are often blunt, rude, or brutal to get their job done".[101] At the linux.conf.au (LCA) conference in 2018, developers expressed the view that the culture of the community has gotten much better in the past few years. Daniel Vetter, the maintainer of the Intel drm/i915 graphics kernel driver, commented that the "rather violent language and discussion" in the kernel community has decreased or disappeared.[102]

Laurent Pinchart asked developers for feedback on their experiences with the kernel community at the 2017 Embedded Linux Conference Europe. The issues brought up were discussed a few days later at the Maintainers Summit. Concerns over the lack of consistency in how maintainers responded to patches submitted by developers were echoed by Shuah Khan, the maintainer of the kernel self-test framework. Torvalds contended that there would never be consistency in the handling of patches because different kernel subsystems have, over time, adopted different development processes. Therefore, it was agreed upon that each kernel subsystem maintainer would document the rules for patch acceptance.[103]

Development

[edit]

Linux is evolution, not intelligent design!

— Linus Torvalds, 2005[104][105][106]

Codebase

[edit]

The kernel source code, a.k.a. source tree, is managed in the Git version control system – also created by Torvalds.[107]

As of 2021, the 5.11 release of the Linux kernel had around 30.34 million lines of code. Roughly 14% of the code is part of the "core," including architecture-specific code, kernel code, and memory management code, while 60% is drivers.

Contributions

[edit]

Contributions are submitted as patches, in the form of text messages on the Linux kernel mailing list (LKML) (and often also on other mailing lists dedicated to particular subsystems). The patches must conform to a set of rules and to a formal language that, among other things, describes which lines of code are to be deleted and what others are to be added to the specified files. These patches can be automatically processed so that system administrators can apply them in order to make just some changes to the code or to incrementally upgrade to the next version.[108] Linux is distributed also in GNU zip (gzip) and bzip2 formats.

A developer who wants to change the Linux kernel writes and tests a code change. Depending on how significant the change is and how many subsystems it modifies, the change will either be submitted as a single patch or in multiple patches of source code. In case of a single subsystem that is maintained by a single maintainer, these patches are sent as e-mails to the maintainer of the subsystem with the appropriate mailing list in Cc. The maintainer and the readers of the mailing list will review the patches and provide feedback. Once the review process has finished the subsystem maintainer accepts the patches in the relevant Git kernel tree. If the changes to the Linux kernel are bug fixes that are considered important enough, a pull request for the patches will be sent to Torvalds within a few days. Otherwise, a pull request will be sent to Torvalds during the next merge window. The merge window usually lasts two weeks and starts immediately after the release of the previous kernel version.[109] The Git kernel source tree names all developers who have contributed to the Linux kernel in the Credits directory and all subsystem maintainers are listed in Maintainers.[110]

As with many large open-source software projects, developers are required to adhere to the Contributor Covenant, a code of conduct intended to address harassment of minority contributors.[111][112] Additionally, to prevent offense the use of inclusive terminology within the source code is mandated.[113]

Programming language

[edit]

Linux is written in a special C programming language supported by GCC, a compiler that extends the C standard in many ways, for example using inline sections of code written in the assembly language (in GCC's "AT&T-style" syntax) of the target architecture.

In September 2021, the GCC version requirement for compiling and building the Linux kernel increased from GCC 4.9 to 5.1, allowing the potential for the kernel to be moved from using C code based on the C89 standard to using code written with the C11 standard,[114] with the migration to the standard taking place in March 2022, with the release of Linux 5.18.[115]

Initial support for the Rust programming language was added in Linux 6.1[116] which was released in December 2022,[117] with later kernel versions, such as Linux 6.2 and Linux 6.3, further improving the support.[118][119]

Coding style

[edit]

Since 2002, code must adhere to the 21 rules of the Linux Kernel Coding Style.[120][121]

Versioning

[edit]

As for most software, the kernel is versioned as a series of dot-separated numbers.

For early versions, the version consisted of three or four dot-separated numbers called major release, minor release and revision.[14]: 9  At that time, odd-numbered minor releases were for development and testing, while even numbered minor releases for production. The optional fourth digit indicated a patch level.[21] Development releases were indicated with a release candidate suffix (-rc).

The current versioning conventions are different. The odd/even number implying dev/prod has been dropped, and a major version is indicated by the first two numbers together. While the time-frame is open for the development of the next major, the -rcN suffix is used to identify the n'th release candidate for the next version.[122] For example, the release of the version 4.16 was preceded by seven 4.16-rcN (from -rc1 to -rc7). Once a stable version is released, its maintenance is passed to the stable team. Updates to a stable release are identified by a three-number scheme (e.g., 4.16.1, 4.16.2, ...).[122]

Toolchain

[edit]

The kernel is usually built with the GNU toolchain. The GNU C compiler, GNU cc, part of the GNU Compiler Collection (GCC), is the default compiler for mainline Linux. Sequencing is handled by GNU make. The GNU Assembler (often called GAS or GNU as) outputs the object files from the GCC generated assembly code. Finally, the GNU Linker (GNU ld) produces a statically linked executable kernel file called vmlinux. Both as and ld are part of GNU Binary Utilities (binutils).

GNU cc was for a long time the only compiler capable of correctly building Linux. In 2004, Intel claimed to have modified the kernel so that its C compiler was also capable of compiling it.[123] There was another such reported success in 2009, with a modified 2.6.22 version.[124][125] Support for the Intel compiler has been dropped in 2023.[126]

Since 2010, effort has been underway to build Linux with Clang, an alternative compiler for the C language;[127] as of 12 April 2014, the official kernel could almost be compiled by Clang.[128][129] The project dedicated to this effort is named LLVMLinux after the LLVM compiler infrastructure upon which Clang is built.[130] LLVMLinux does not aim to fork either Linux or the LLVM, therefore it is a meta-project composed of patches that are eventually submitted to the upstream projects. By enabling Linux to be compiled by Clang, developers may benefit from shorter compilation times.[131]

In 2017, developers completed upstreaming patches to support building the Linux kernel with Clang in the 4.15 release, having backported support for X86-64 and AArch64 to the 4.4, 4.9, and 4.14 branches of the stable kernel tree. Google's Pixel 2 shipped with the first Clang built Linux kernel,[132] though patches for Pixel (1st generation) did exist.[133] 2018 saw ChromeOS move to building kernels with Clang by default,[134] while Android made Clang[135] and LLVM's linker LLD[136] required for kernel builds in 2019. Google moved its production kernel used throughout its datacenters to being built with Clang in 2020.[137] The ClangBuiltLinux group coordinates fixes to both Linux and LLVM to ensure compatibility, both composed of members from LLVMLinux and having upstreamed patches from LLVMLinux.

Debugging

[edit]
Linux kernel panic output

As with any software, problems with the Linux kernel can be difficult to troubleshoot. Common challenges relate to userspace vs. kernel space access, misuse of synchronization primitives, and incorrect hardware management.[14]: 364 

An oops is a non-fatal error in the kernel. After such an error, operations continue with suspect reliability.[138]

A panic (generated by panic()) is a fatal error. After such an error, the kernel prints a message and halts the computer.[14]: 371 

The kernel provides for debugging by printing via printk() which stores messages in a circular buffer (overwriting older entries with newer). The syslog(2) system call provides for reading and clearing the message buffer and for setting the maximum log level of the messages to be sent to the console.[139] Kernel messages are also exported to userland through the /dev/kmsg interface.[140]

The ftrace mechanism allow for debugging by tracing. It is used for monitoring and debugging Linux at runtime and it can analyze user space latencies due to kernel misbehavior.[141][142][143][144] Furthermore, ftrace allows users to trace Linux at boot-time.[145]

kprobes and kretprobes can break into kernel execution (like debuggers in userspace) and collect information non-disruptively.[146] kprobes can be inserted into code at (almost) any address, while kretprobes work at function return. uprobes have similar purposes but they also have some differences in usage and implementation.[147]

With KGDB Linux can be debugged in much the same way as userspace programs. KGDB requires an additional machine that runs GDB and that is connected to the target to be debugged using a serial cable or Ethernet.[148]

Change process

[edit]

The Linux kernel project integrates new code on a rolling basis. Standard operating procedure is that software checked into the project must work and compile without error.

Each kernel subsystem is assigned a maintainer who is responsible for reviewing patches against the kernel code standards and keeping a queue of patches that can be submitted to Torvalds within a merge window that is usually several weeks.

Patches are merged by Torvalds into the source code of the prior stable Linux kernel release, creating the release candidate (-rc) for the next stable release. Once the merge window is closed, only fixes to the new code in the development release are accepted. The -rc development release of the kernel goes through regression testing and once it is considered stable by Torvalds and the subsystem maintainers, a new version is released and the development process starts over again.[149]

Mainline Linux

[edit]

The Git tree that contains the Linux kernel source code is referred to as mainline Linux. Every stable kernel release originates from the mainline tree,[150] and is frequently published on kernel.org. Mainline Linux has only solid support for a small subset of the many devices that run Linux. Non-mainline support is provided by independent projects, such as Yocto or Linaro, but in many cases the kernel from the device vendor is needed.[151] Using a vendor kernel likely requires a board support package.

Maintaining a kernel tree outside of mainline Linux has proven to be difficult.[152]

Mainlining refers to the effort of adding support for a device to the mainline kernel,[153] while there was formerly only support in a fork or no support at all. This usually includes adding drivers or device tree files. When this is finished, the feature or security fix is considered mainlined.[154]

Linux-like kernel

[edit]

The maintainer of the stable branch, Greg Kroah-Hartman, has applied the term Linux-like to downstream kernel forks by vendors that add millions of lines of code to the mainline kernel.[155] In 2019, Google stated that it wanted to use the mainline Linux kernel in Android so the number of kernel forks would be reduced.[156] The term Linux-like has also been applied to the Embeddable Linux Kernel Subset, which does not include the full mainline Linux kernel but a small modified subset of the code.[157]

Linux forks

[edit]
An iPod booting iPodLinux

There are certain communities that develop kernels based on the official Linux. Some interesting bits of code from these forks that include Linux-libre, Compute Node Linux, INK, L4Linux, RTLinux, and User-Mode Linux (UML) have been merged into the mainline.[158] Some operating systems developed for mobile phones initially used heavily modified versions of Linux, including Google Android, Firefox OS, HP webOS, Nokia Maemo and Jolla Sailfish OS. In 2010, the Linux community criticised Google for effectively starting its own kernel tree:[159][160]

This means that any drivers written for Android hardware platforms, can not get merged into the main kernel tree because they have dependencies on code that only lives in Google's kernel tree, causing it to fail to build in the kernel.org tree. Because of this, Google has now prevented a large chunk of hardware drivers and platform code from ever getting merged into the main kernel tree. Effectively creating a kernel branch that a number of different vendors are now relying on.[161]

— Greg Kroah-Hartman, 2010

Today Android uses a customized Linux[162] where major changes are implemented in device drivers, but some changes to the core kernel code is required. Android developers also submit patches to the official Linux that finally can boot the Android operating system. For example, a Nexus 7 can boot and run the mainline Linux.[162]

At a 2001 presentation at the Computer History Museum, Torvalds had this to say in response to a question about distributions of Linux using precisely the same kernel sources or not:

They're not... well they are, and they're not. There is no single kernel. Every single distribution has their own changes. That's been going on since pretty much day one. I don't know if you may remember Yggdrasil was known for having quite extreme changes to the kernel and even today all of the major vendors have their own tweaks because they have some portion of the market they're interested in and quite frankly that's how it should be. Because if everybody expects one person, me, to be able to track everything that's not the point of GPL. That's not the point of having an open system. So actually the fact that a distribution decides that something is so important to them that they will add patches for even when it's not in the standard kernel, that's a really good sign for me. So that's for example how something like ReiserFS got added. And the reason why ReiserFS is the first journaling filesystem that was integrated in the standard kernel was not because I love Hans Reiser. It was because SUSE actually started shipping with ReiserFS as their standard kernel, which told me "ok." This is actually in production use. Normal People are doing this. They must know something I don't know. So in a very real sense what a lot of distribution houses do, they are part of this "let's make our own branch" and "let's make our changes to this." And because of the GPL, I can take the best portions of them.[163]

— Linus Torvalds, 2001

Long-term support

[edit]
Boot messages of a Linux kernel 2.6.25.17

The latest version and older versions are maintained separately. Most of the latest kernel releases were supervised by Torvalds.[164]

The Linux kernel developer community maintains a stable kernel by applying fixes for software bugs that have been discovered during the development of the subsequent stable kernel. Therefore, www.kernel.org always lists two stable kernels. The next stable Linux kernel is released about 8 to 12 weeks later.

Some releases are designated for long-term support as longterm with bug fix releases for two or more years.[165]

Size

[edit]

Some projects have attempted to reduce the size of the Linux kernel. One of them is TinyLinux. In 2014, Josh Triplett started the -tiny source tree for a reduced size version.[166][167][168][169]

Architecture and features

[edit]
Map of the Linux kernel
Sankey diagram of Linux Kernel Source Lines of Code

Even though seemingly contradictory, the Linux kernel is both monolithic and modular. The kernel is classified as a monolithic kernel architecturally since the entire OS runs in kernel space. The design is modular since it can be assembled from modules that in some cases are loaded and unloaded at runtime.[14]: 338 [170] It supports features once only available in closed source kernels of non-free operating systems.

The rest of the article makes use of the UNIX and Unix-like operating systems convention of the manual pages. The number that follows the name of a command, interface, or other feature specifies the section (i.e. the type of the OS' component or feature) it belongs to. For example execve(2) refers to a system call, and exec(3) refers to a userspace library wrapper.

The following is an overview of architectural design and of noteworthy features.

Most device drivers and kernel extensions run in kernel space (ring 0 in many CPU architectures), with full access to the hardware. Some exceptions run in user space; notable examples are filesystems based on FUSE/CUSE, and parts of UIO.[194][195] Furthermore, the X Window System and Wayland, the windowing system and display server protocols that most people use with Linux, do not run within the kernel. Differently, the actual interfacing with GPUs of graphics cards is an in-kernel subsystem called Direct Rendering Manager (DRM).

Unlike standard monolithic kernels, device drivers are easily configured as modules, and loaded or unloaded while the system is running and can also be pre-empted under certain conditions in order to handle hardware interrupts correctly and to better support symmetric multiprocessing.[177] By choice, Linux has no stable device driver application binary interface.[196]

Linux typically makes use of memory protection and virtual memory and can also handle non-uniform memory access,[197] however the project has absorbed μClinux which also makes it possible to run Linux on microcontrollers without virtual memory.[198]

The hardware is represented in the file hierarchy. User applications interact with device drivers via entries in the /dev or /sys directories.[199] Process information is mapped into the /proc directory.[199]

Various layers within Linux, also showing separation between the userland and kernel space
User mode User applications bash, LibreOffice, GIMP, Blender, 0 A.D., Mozilla Firefox, ...
System components init daemon:
OpenRC, runit, systemd...
System daemons:
polkitd, smbd, sshd, udevd...
Windowing system:
X11, Wayland, SurfaceFlinger (Android)
Graphics:
Mesa, AMD Catalyst, ...
Other libraries:
GTK, Qt, EFL, SDL, SFML, FLTK, GNUstep, ...
C standard library fopen, execv, malloc, memcpy, localtime, pthread_create... (up to 2000 subroutines)
glibc aims to be fast, musl aims to be lightweight, uClibc targets embedded systems, bionic was written for Android, etc. All aim to be POSIX/SUS-compatible.
Kernel mode Linux kernel stat, splice, dup, read, open, ioctl, write, mmap, close, exit, etc. (about 380 system calls)
The Linux kernel System Call Interface (SCI), aims to be POSIX/SUS-compatible[200]
Process scheduling subsystem IPC subsystem Memory management subsystem Virtual files subsystem Networking subsystem
Other components: ALSA, DRI, evdev, klibc, LVM, device mapper, Linux Network Scheduler, Netfilter
Linux Security Modules: SELinux, TOMOYO, AppArmor, Smack
Hardware (CPU, main memory, data storage devices, etc.)

Interfaces

[edit]
Four interfaces are distinguished: two internal to the kernel, and two between the kernel and userspace.

Linux started as a clone of UNIX, and aims toward POSIX and Single UNIX Specification compliance.[201] The kernel provides system calls and other interfaces that are Linux-specific. In order to be included in the official kernel, the code must comply with a set of licensing rules.[8][13]

The Linux application binary interface (ABI) between the kernel and the user space has four degrees of stability (stable, testing, obsolete, removed);[202] The system calls are expected to never change in order to preserve compatibility for userspace programs that rely on them.[203]

Loadable kernel modules (LKMs), by design, cannot rely on a stable ABI.[196] Therefore, they must always be recompiled whenever a new kernel executable is installed in a system, otherwise they will not be loaded. In-tree drivers that are configured to become an integral part of the kernel executable (vmlinux) are statically linked by the build process.

There is no guarantee of stability of source-level in-kernel API[196] and, because of this, device driver code, as well as the code of any other kernel subsystem, must be kept updated with kernel evolution. Any developer who makes an API change is required to fix any code that breaks as the result of their change.[204]

Kernel-to-userspace API

[edit]

The set of the Linux kernel API that regards the interfaces exposed to user applications is fundamentally composed of UNIX and Linux-specific system calls.[205] A system call is an entry point into the Linux kernel.[206] For example, among the Linux-specific ones there is the family of the clone(2) system calls.[207] Most extensions must be enabled by defining the _GNU_SOURCE macro in a header file or when the user-land code is being compiled.[208]

System calls can only be invoked via assembly instructions that enable the transition from unprivileged user space to privileged kernel space in ring 0. For this reason, the C standard library (libC) acts as a wrapper to most Linux system calls, by exposing C functions that, if needed,[209] transparently enter the kernel which will execute on behalf of the calling process.[205] For system calls not exposed by libC, such as the fast userspace mutex,[210] the library provides a function called syscall(2) which can be used to explicitly invoke them.[211]

Pseudo filesystems (e.g., the sysfs and procfs filesystems) and special files (e.g., /dev/random, /dev/sda, /dev/tty, and many others) constitute another layer of interface to kernel data structures representing hardware or logical (software) devices.[212][213]

Kernel-to-userspace ABI

[edit]

Because of the differences existing between the hundreds of various implementations of the Linux OS, executable objects, even though they are compiled, assembled, and linked for running on a specific hardware architecture (that is, they use the ISA of the target hardware), often cannot run on different Linux distributions. This issue is mainly due to distribution-specific configurations and a set of patches applied to the code of the Linux kernel, differences in system libraries, services (daemons), filesystem hierarchies, and environment variables.

The main standard concerning application and binary compatibility of Linux distributions is the Linux Standard Base (LSB).[214][215] However, the LSB goes beyond what concerns the Linux kernel, because it also defines the desktop specifications, the X libraries and Qt that have little to do with it.[216] The LSB version 5 is built upon several standards and drafts (POSIX, SUS, X/Open, File System Hierarchy (FHS), and others).[217]

The parts of the LSB more relevant to the kernel are the General ABI (gABI),[218] especially the System V ABI[219][220] and the Executable and Linking Format (ELF),[221][222] and the Processor Specific ABI (psABI), for example the Core Specification for X86-64.[223][224]

The standard ABI for how x86_64 user programs invoke system calls is to load the syscall number into the rax register, and the other parameters into rdi, rsi, rdx, r10, r8, and r9, and finally to put the syscall assembly instruction in the code.[225][226][227]

In-kernel API

[edit]
At XDC2014, Alex Deucher from AMD announced the unified kernel-mode driver.[228] The proprietary Linux graphic driver, libGL-fglrx-glx, will share the same DRM infrastructure with Mesa 3D. As there is no stable in-kernel ABI, AMD had to constantly adapt the former binary blob used by Catalyst.

There are several internal kernel APIs between kernel subsystems. Some are available only within the kernel subsystems, while a somewhat limited set of in-kernel symbols (i.e., variables, data structures, and functions) is exposed to dynamically loadable modules (e.g., device drivers loaded on demand) whether they're exported with the EXPORT_SYMBOL() and EXPORT_SYMBOL_GPL() macros[229][230] (the latter reserved to modules released under a GPL-compatible license).[231]

Linux provides in-kernel APIs that manipulate data structures (e.g., linked lists, radix trees,[232] red-black trees,[233] queues) or perform common routines (e.g., copy data from and to user space, allocate memory, print lines to the system log, and so on) that have remained stable at least since Linux version 2.6.[234][235][236]

In-kernel APIs include libraries of low-level common services used by device drivers:

In-kernel ABI

[edit]

The Linux developers chose not to maintain a stable in-kernel ABI. Modules compiled for a specific version of the kernel cannot be loaded into another version without being recompiled.[196]

Process management

[edit]

Linux, as other kernels, has the ability to manage processes including creating, suspending, resuming and terminating. Unlike other operating systems, the Linux kernel implements processes as a group of threads called tasks. If two tasks share the same TGID, then they are called in the kernel terminology a task group. Each task is represented by a task_struct data structure. When a process is created it is assigned a globally unique identifier called PID and cannot be shared[246][247]

A new process can be created by calling clone[248] family of system calls or fork system call. Processes can be suspended and resumed by the kernel by sending signals like SIGSTOP and SIGCONT. A process can terminate itself by calling exit system call, or terminated by another process by sending signals like SIGKILL, SIGABRT or SIGINT.

If the executable is dynamically linked to shared libraries, a dynamic linker is used to find and load the needed objects, prepare the program to run and then run it.[249]

The Native POSIX Thread Library (NPTL)[250] provides the POSIX standard thread interface (pthreads) to userspace. The kernel isn't aware of processes nor threads but it is aware of tasks, thus threads are implemented in userspace. Threads in Linux are implemented as tasks sharing resources, while if they aren't sharing called to be independent processes.

The kernel provides the futex(7) (fast user-space mutex) mechanisms for user-space locking and synchronization.[251] The majority of the operations are performed in userspace but it may be necessary to communicate with the kernel using the futex(2) system call.[210]

As opposed to userspace threads described above, kernel threads run in kernel space.[252] They are threads created by the kernel itself for specialized tasks; they are privileged like the kernel and aren't bound to any process or application.

Scheduling

[edit]

The Linux process scheduler is modular, in the sense that it enables different scheduling classes and policies.[253][254] Scheduler classes are plugable scheduler algorithms that can be registered with the base scheduler code. Each class schedules different types of processes. The core code of the scheduler iterates over each class in order of priority and chooses the highest priority scheduler that has a schedulable entity of type struct sched_entity ready to run.[14]: 46–47  Entities may be threads, group of threads, and even all the processes of a specific user.

Linux provides both user preemption as well as full kernel preemption.[14]: 62–63  Preemption reduces latency, increases responsiveness,[255] and makes Linux more suitable for desktop and real-time applications.

For normal tasks, by default, the kernel uses the Completely Fair Scheduler (CFS) class[needs update], introduced in version 2.6.23.[179] The scheduler is defined as a macro in a C header as SCHED_NORMAL. In other POSIX kernels, a similar policy known as SCHED_OTHER allocates CPU timeslices (i.e, it assigns absolute slices of the processor time depending on either predetermined or dynamically computed priority of each process). The Linux CFS does away with absolute timeslices and assigns a fair proportion of CPU time, as a function of parameters like the total number of runnable processes and the time they have already run; this function also takes into account a kind of weight that depends on their relative priorities (nice values).[14]: 46–50 

With user preemption, the kernel scheduler can replace the current process with the execution of a context switch to a different one that therefore acquires the computing resources for running (CPU, memory, and more). It makes it according to the CFS algorithm (in particular, it uses a variable called vruntime for sorting entities and then chooses the one that has the smaller vruntime, - i.e., the schedulable entity that has had the least share of CPU time), to the active scheduler policy and to the relative priorities.[256] With kernel preemption, the kernel can preempt itself when an interrupt handler returns, when kernel tasks block, and whenever a subsystem explicitly calls the schedule() function.

The kernel also contains two POSIX-compliant[257] real-time scheduling classes named SCHED_FIFO (realtime first-in-first-out) and SCHED_RR (realtime round-robin), both of which take precedence over the default class.[253] An additional scheduling policy known as SCHED DEADLINE, implementing the earliest deadline first algorithm (EDF), was added in kernel version 3.14, released on 30 March 2014.[258][259] SCHED_DEADLINE takes precedence over all the other scheduling classes.

Real-time PREEMPT_RT patches, included into the mainline Linux since version 2.6, provide a deterministic scheduler, the removal of preemption and interrupt disabling (where possible), PI Mutexes (i.e., locking primitives that avoid priority inversion),[260][261] support for High Precision Event Timers (HPET), preemptive read-copy-update (RCU), (forced) IRQ threads, and other minor features.[262][263][264]

In 2023, Peter Zijlstra proposed replacing CFS with an earliest eligible virtual deadline first scheduling (EEVDF) scheduler,[265][266] to prevent the need for CFS "latency nice" patches.[267] The EEVDF scheduler replaced CFS in version 6.6 of the Linux kernel.[178]

Synchronization

[edit]

The kernel has different causes of concurrency (e.g., interrupts, bottom halves, preemption of kernel and users tasks, symmetrical multiprocessing).[14]: 167 

For protecting critical regions (sections of code that must be executed atomically), shared memory locations (like global variables and other data structures with global scope), and regions of memory that are asynchronously modifiable by hardware (e.g., having the C volatile type qualifier), Linux provides a large set of tools. They consist of atomic types (which can only be manipulated by a set of specific operators), spinlocks, semaphores, mutexes,[268][14]: 176–198 [269] and lockless algorithms (e.g., RCUs).[270][271][272] Most lock-less algorithms are built on top of memory barriers for the purpose of enforcing memory ordering and prevent undesired side effects due to compiler optimization.[273][274][275][276]

PREEMPT_RT code included in mainline Linux provide RT-mutexes, a special kind of Mutex which do not disable preemption and have support for priority inheritance.[277][278] Almost all locks are changed into sleeping locks when using configuration for realtime operation.[279][264][278] Priority inheritance avoids priority inversion by granting a low-priority task which holds a contended lock the priority of a higher-priority waiter until that lock is released.[280][281]

Linux includes a kernel lock validator called Lockdep.[282][283]

Interrupts

[edit]

Although the management of interrupts could be seen as a single job, it is divided into two. This split in two is due to the different time constraints and to the synchronization needs of the tasks whose the management is composed of. The first part is made up of an asynchronous interrupt service routine (ISR) that in Linux is known as the top half, while the second part is carried out by one of three types of the so-called bottom halves (softirq, tasklets, and work queues).[14]: 133–137 

Linux interrupt service routines can be nested. A new IRQ can trap into a high priority ISR that preempts any other lower priority ISR.

Memory

[edit]

The Linux kernel manages both physical and virtual memory. It divides physical memory into zones,[284] each of which has a specific purpose.

  • ZONE_DMA: this zone is suitable for DMA.
  • ZONE_NORMAL: for normal memory operations.
  • ZONE_HIGHMEM: part of physical memory that is only accessible to the kernel using temporary mapping.

Those zones are the most common, but others exist.[284]

Linux implements virtual memory with 4 or 5-level page tables.[285] The kernel is not pageable (meaning it is always resident in physical memory and cannot be swapped to the disk) and there is no memory protection (no SIGSEGV signals, unlike in user space), therefore memory violations lead to instability and system crashes.[14]: 20  User memory is pageable by default, although paging for specific memory areas can be disabled with the mlock() system call family.

Page frame information is maintained in apposite data structures (of type struct page) that are populated immediately after boot and kept until shutdown, regardless of whether they are associated with virtual pages. The physical address space is divided into different zones, according to architectural constraints and intended use. NUMA systems with multiple memory banks are also supported.[286]

Small chunks of memory can be dynamically allocated in kernel space via the family of kmalloc() APIs and freed with the appropriate variant of kfree(). vmalloc() and kvfree() are used for large virtually contiguous chunks. alloc_pages() allocates the desired number of entire pages.

The Linux Storage Stack Diagram[287]

The kernel used to include the SLAB, SLUB and SLOB allocators as configurable alternatives.[288][289] The SLOB allocator was removed in Linux 6.4[290] and the SLAB allocator was removed in Linux 6.8.[291] The sole remaining allocator is SLUB, which aims for simplicity and efficiency,[289] is PREEMPT_RT compatible[292] and was introduced in Linux 2.6.

Virtual filesystem

[edit]

Since Linux supports numerous filesystems with different features and functionality, it is necessary to implement a generic filesystem that is independent from underlying filesystems. The virtual file system interfaces with other Linux subsystems, userspace, or APIs and abstracts away the different implementations of underlying filesystems. VFS implements system calls like create, open, read, write and close. VFS implements a generic superblock[293] and inode block that is independent from the one that the underlying filesystem has.

In this subsystem directories and files are represented by a struct file data structure. When userspace requests access to a file it is returned a file descriptor (non negative integer value) but in kernel space it is a struct file structure. This structure stores all the information the kernel knows about a file or directory.

sysfs and procfs are virtual filesystems that expose hardware information and userspace programs' runtime information. These filesystems aren't present on disk and instead the kernel implements them as a callback or routine which gets called when they are accessed by userspace.

Supported architectures

[edit]
TiVo DVR, a consumer device running Linux

While not originally designed to be portable,[17][294] Linux is now one of the most widely ported operating system kernels, running on a diverse range of systems from the ARM architecture to IBM z/Architecture mainframe computers. The first port was performed on the Motorola 68000 platform. The modifications to the kernel were so fundamental that Torvalds viewed the Motorola version as a fork and a "Linux-like operating system".[294] However, that moved Torvalds to lead a major restructure of the code to facilitate porting to more computing architectures. The first Linux that, in a single source tree, had code for more than i386 alone, supported the DEC Alpha AXP 64-bit platform.[295][296][294]

Linux runs as the main operating system on IBM's Summit; as of October 2019, all of the world's 500 fastest supercomputers run some operating system based on the Linux kernel,[71] a big change from 1998 when the first Linux supercomputer got added to the list.[297]

Linux has also been ported to various handheld devices such as Apple's iPhone 3G and iPod.[298]

Supported devices

[edit]

In 2007, the LKDDb project has been started to build a comprehensive database of hardware and protocols known by Linux kernels.[299] The database is built automatically by static analysis of the kernel sources. Later in 2014, the Linux Hardware project was launched to automatically collect a database of all tested hardware configurations with the help of users of various Linux distributions.[300]

Live patching

[edit]

Rebootless updates can even be applied to the kernel by using live patching technologies such as Ksplice, kpatch and kGraft. Minimalistic foundations for live kernel patching were merged into the Linux kernel mainline in kernel version 4.0, which was released on 12 April 2015. Those foundations, known as livepatch and based primarily on the kernel's ftrace functionality, form a common core capable of supporting hot patching by both kGraft and kpatch, by providing an application programming interface (API) for kernel modules that contain hot patches and an application binary interface (ABI) for the userspace management utilities. However, the common core included into Linux kernel 4.0 supports only the x86 architecture and does not provide any mechanisms for ensuring function-level consistency while the hot patches are applied.

Security

[edit]

Kernel bugs present potential security issues. For example, they may allow for privilege escalation or create denial-of-service attack vectors. Over the years, numerous bugs affecting system security were found and fixed.[301] New features are frequently implemented to improve the kernel's security.[302][303]

Capabilities(7) have already been introduced in the section about the processes and threads. Android makes use of them and systemd gives administrators detailed control over the capabilities of processes.[304]

Linux offers a wealth of mechanisms to reduce kernel attack surface and improve security which are collectively known as the Linux Security Modules (LSM).[305] They comprise the Security-Enhanced Linux (SELinux) module, whose code has been originally developed and then released to the public by the NSA,[306] and AppArmor[193] among others. SELinux is now actively developed and maintained on GitHub.[192] SELinux and AppArmor provide support to access control security policies, including mandatory access control (MAC), though they profoundly differ in complexity and scope.

Another security feature is the Seccomp BPF (SECure COMPuting with Berkeley Packet Filters) which works by filtering parameters and reducing the set of system calls available to user-land applications.[307]

Critics have accused kernel developers of covering up security flaws, or at least not announcing them; in 2008, Torvalds responded to this with the following:[308][309]

I personally consider security bugs to be just "normal bugs". I don't cover them up, but I also don't have any reason what-so-ever to think it's a good idea to track them and announce them as something special...one reason I refuse to bother with the whole security circus is that I think it glorifies—and thus encourages—the wrong behavior. It makes "heroes" out of security people, as if the people who don't just fix normal bugs aren't as important. In fact, all the boring normal bugs are way more important, just because there's[sic] a lot more of them. I don't think some spectacular security hole should be glorified or cared about as being any more "special" than a random spectacular crash due to bad locking.

Linux distributions typically release security updates to fix vulnerabilities in the Linux kernel. Many offer long-term support releases that receive security updates for a certain Linux kernel version for an extended period of time.

In 2024, researchers disclosed that the Linux kernel contained a serious vulnerability, CVE-2024-50264, located in the AF_VSOCK subsystem. This bug is a use-after-free flaw, a class of memory corruption issue that occurs when a program continues to use memory after it has been freed.[310][311] Such flaws are particularly dangerous in the kernel, as they can allow attackers to escalate privileges. The bug was resolved in May 2025.[312]

[edit]

Licensing terms

[edit]

Initially, Torvalds released Linux under a license which forbade any commercial use.[313] This was changed in version 0.12 by a switch to the GNU General Public License version 2 (GPLv2).[22] This license allows distribution and sale of possibly modified and unmodified versions of Linux but requires that all those copies be released under the same license and be accompanied by - or that, on request, free access is given to - the complete corresponding source code.[314] Torvalds has described licensing Linux under the GPLv2 as the "best thing I ever did".[313]

The Linux kernel is licensed explicitly under GNU General Public License version 2 only (GPL-2.0-only) with an explicit syscall exception (Linux-syscall-note),[8][11][12] without offering the licensee the option to choose any later version, which is a common GPL extension. Contributed code must be available under GPL-compatible license.[13][204]

There was considerable debate about how easily the license could be changed to use later GPL versions (including version 3), and whether this change is even desirable.[315] Torvalds himself specifically indicated upon the release of version 2.4.0 that his own code is released only under version 2.[316] However, the terms of the GPL state that if no version is specified, then any version may be used,[317] and Alan Cox pointed out that very few other Linux contributors had specified a particular version of the GPL.[318]

In September 2006, a survey of 29 key kernel programmers indicated that 28 preferred GPLv2 to the then-current GPLv3 draft. Torvalds commented, "I think a number of outsiders... believed that I personally was just the odd man out because I've been so publicly not a huge fan of the GPLv3."[319] This group of high-profile kernel developers, including Torvalds, Greg Kroah-Hartman and Andrew Morton, commented on mass media about their objections to the GPLv3.[320] They referred to clauses regarding DRM/tivoization, patents, "additional restrictions" and warned a Balkanisation of the "Open Source Universe" by the GPLv3.[320][321] Torvalds, who decided not to adopt the GPLv3 for the Linux kernel, reiterated his criticism even years later.[322]

Loadable kernel modules

[edit]

It is debated whether some loadable kernel modules (LKMs) are to be considered derivative works under copyright law, and thereby whether or not they fall under the terms of the GPL.

In accordance with the license rules, LKMs using only a public subset of the kernel interfaces[229][230] are non-derived works, thus Linux gives system administrators the mechanisms to load out-of-tree binary objects into the kernel address space.[13]

There are some out-of-tree loadable modules that make legitimate use of the dma_buf kernel feature.[323] GPL compliant code can certainly use it. However, a different possible use case would be Nvidia Optimus that pairs a fast GPU with an Intel integrated GPU, where the Nvidia GPU writes into the Intel framebuffer when it is active. But, Nvidia cannot use this infrastructure because it necessitates bypassing a rule that can only be used by LKMs that are also GPL.[231] Alan Cox replied on LKML, rejecting a request from one of Nvidia's engineers to remove this technical enforcement from the API.[324] Torvalds clearly stated on the LKML that "[I] claim that binary-only kernel modules ARE derivative "by default"'".[325]

On the other hand, Torvalds has also said that "[one] gray area in particular is something like a driver that was originally written for another operating system (i.e., clearly not a derived work of Linux in origin). THAT is a gray area, and _that_ is the area where I personally believe that some modules may be considered to not be derived works simply because they weren't designed for Linux and don't depend on any special Linux behaviour".[326] Proprietary graphics drivers, in particular, are heavily discussed.

Whenever proprietary modules are loaded into Linux, the kernel marks itself as being "tainted",[327] and therefore bug reports from tainted kernels will often be ignored by developers.

Firmware binary blobs

[edit]

The official kernel, that is, Torvalds's git branch at the kernel.org repository, contains binary blobs released under the terms of the GNU GPLv2 license.[8][13] Linux can also load binary blobs, proprietary firmware, drivers, or other executable modules from the filesystem, and link them into kernel space.[328]

When necessary (e.g., for accessing boot devices or for speed), firmware can be built-in to the kernel, meaning building the firmware into vmlinux; however, this is not always a viable option for technical or legal issues (e.g., it is not permitted to do this with firmware that is not GPL compatible, although this is quite common nonetheless).[329]

Trademark

[edit]

Linux is a registered trademark of Linus Torvalds in the United States, the European Union, and some other countries.[330][331] A legal battle over the trademark began in 1996, when William Della Croce, a lawyer who was never involved in the development of Linux, started requesting licensing fees for the use of the word Linux. After it was proven that the word was in common use long before Della Croce's claimed first use, the trademark was awarded to Torvalds.[332][333][334]

Removal of Russian maintainers

[edit]

In October 2024, during the Russian invasion of Ukraine, kernel developer Greg Kroah-Hartman removed some kernel developers whose email addresses suggested a connection to Russia from their roles as maintainers.[335][336] Linus Torvalds responded that he did not support Russian aggression and would not revert the patch, insinuating that opponents of the patch were Russian trolls.[337] James Bottomley, a kernel developer, issued an apology for the handling of the situation and clarified that the action was a consequence of U.S. sanctions against Russia.[338]

See also

[edit]

Notes

[edit]

References

[edit]

Further reading

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
from Grokipedia

The Linux kernel is a free and open-source, monolithic, Unix-like operating system kernel originally developed by Finnish software engineer Linus Torvalds as a personal project in 1991 to create a Unix-compatible terminal emulator for his Intel 80386-based PC.
It manages core system functions including hardware abstraction, process management, memory allocation, and device drivers, forming the foundational layer beneath user-space applications and libraries in Linux-based operating systems.
Released under the GNU General Public License, the kernel's source code is maintained on kernel.org, with Torvalds overseeing merges from thousands of global contributors via a distributed development model emphasizing stability through biannual release cycles.
Its modular architecture allows dynamic loading of kernel modules for drivers and filesystems, balancing the efficiency of its monolithic design—where core components execute in a single address space—with adaptability for diverse hardware.
The Linux kernel powers approximately 80% of web servers, 70% of embedded systems, the Android mobile platform utilized by billions of devices, and nearly all of the world's top supercomputers, underscoring its scalability from resource-constrained IoT devices to high-performance computing clusters.

History

Conception and early development

Linus Torvalds, a 21-year-old computer science student at the , initiated development of the Linux kernel in April 1991 as a personal hobby project. Motivated by his exposure to Unix during a 1990 university course and dissatisfaction with the limitations of Andrew Tanenbaum's operating system—which prioritized educational simplicity over performance and full freedom for modification—Torvalds sought to create a kernel for his newly acquired 80386-based PC, purchased on January 5, 1991, equipped with 4 MB RAM and a 40 MB hard disk. He began with basic task switching in assembly language, demonstrating two processes alternately printing "A" and "B" to the screen, before expanding into C code using compiler tools like gcc and bash. On August 25, 1991, Torvalds publicly announced the project on the , posting: "I'm doing a (free) operating system (just a , won't be big and like ) for 386(486) AT clones," primarily to solicit feedback on technical issues such as brain-damaged drivers, without initially intending broad distribution. The kernel, initially named "Freax," incorporated early drivers for keyboard input, VGA display, and serial ports to enable terminal emulation and modem-based news reading. Version 0.01 of the kernel was released on September 17, 1991, via FTP upload to ftp.funet.fi, comprising approximately 10,000 lines of code that booted into a minimal shell but lacked a proper , , or production stability. The FTP administrator, Ari Lemmke, renamed the directory from "freax" to "," a name that persisted despite remnant "Freax" references in the source. Early enhancements followed rapidly, including implementation over the 1991 Christmas holidays and contributions from hobbyist developers responding to postings, fostering collaborative growth beyond Torvalds' solo efforts. By version 0.02 in October 1991, the kernel supported basic multitasking on x86 hardware, setting the stage for wider adoption under the GNU General Public License adopted in early 1992.

Expansion and key milestones (1990s-2000s)

The Linux kernel achieved a significant milestone with the release of version 1.0.0 on , 1994, comprising 176,250 lines of code and providing support for single-processor 80386 architectures. This version marked the kernel's transition from experimental status to a more robust foundation, enabling reliable operation for basic tasks and attracting initial adoption among hobbyists and early developers. In the mid-1990s, the kernel expanded with version 2.0.0, released on June 9, 1996, which introduced (SMP) capabilities to leverage multiple processors effectively. This feature enhanced performance for parallel workloads, contributing to Linux's growing use in server environments and supercomputing clusters where cost-effective was prioritized over alternatives. By the late 1990s, corporate interest surged, with firms like announcing support in 1998, accelerating contributions and integration into enterprise systems. Entering the 2000s, version 2.4.0 arrived on January 4, 2001, delivering improved SMP scalability for up to 32 processors, native USB support, ISA , and handling, alongside optimizations for processors like the Pentium 4. These advancements solidified its suitability for production servers, with approximately 375 developers involved and an estimated 15 million users by that point. Adoption extended to embedded applications, exemplified by devices like the in 1999, highlighting the kernel's versatility beyond desktops. The decade culminated in version 2.6.0 on December 17, 2003, featuring the O(1) scheduler for constant-time task switching, kernel preemption to reduce latency, a redesigned block I/O layer, and enhanced virtual memory and threading subsystems. These improvements broadened appeal for real-time and multimedia workloads, spurring further server dominance and early desktop viability amid rising enterprise deployments. Throughout this period, the contributor base expanded from individual efforts to include substantial corporate input, driving rapid feature maturation while maintaining open-source governance.

Maturation and recent advancements (2010s-2026)

The Linux kernel underwent significant maturation in the , marked by the release of version 3.0 on July 21, 2011, which introduced symbolic versioning to reflect substantial architectural refinements without implying backward incompatibility, alongside enhanced support for filesystems like and improved power management. Subsequent major releases, including 4.0 on April 12, 2015, emphasized scalability for large-scale deployments, while version 5.0 on March 3, 2019, incorporated refinements in networking and storage stacks. By the , the kernel reached version 6.0 on October 2, 2022, with (LTS) variants like 6.1 providing stability for enterprise and embedded systems, culminating in version 6.17 released on September 28, 2025. Kernel codebase expansion accelerated, surpassing 40 million lines of code by January 2025, roughly doubling from a decade prior at an approximate rate of 400,000 lines every two months, driven by additions in drivers, subsystems, and abstractions rather than bloat alone. Contributor numbers grew to 11,089 by 2025, with development cycles incorporating around 11,000 changesets per release, reflecting broader community and corporate input while maintaining rigorous review processes. Security enhancements intensified through the Kernel Self-Protection Project (KSPP), initiated in 2015 to consolidate hardening efforts, introducing features like pointer authentication, , and stack-smashing protections to mitigate common exploit vectors such as buffer overflows. These measures, including lockdown mode for restricting kernel in production, addressed vulnerabilities empirically observed in real-world attacks, prioritizing runtime over performance trade-offs where causal risks warranted. Extended Berkeley Packet Filter () matured as a cornerstone for kernel extensibility, evolving from its foundational extensions to enable safe, sandboxed program execution for networking, tracing, and without modifying core code, with significant growth in 2024-2025 including advanced map types and verifier improvements. Integration of the Rust programming language began with initial support merged into version 6.1 in December 2022, targeting memory-safe drivers to reduce classes of bugs prevalent in C, such as use-after-free errors, with expansions in 6.13 (January 2025) enabling in-place expansion and broader subsystem compatibility. This approach leverages Rust's borrow checker for compile-time guarantees, empirically lowering defect rates in experimental modules while coexisting with C codebases. Recent advancements through early 2026 emphasized hardware enablement, including refined and ARM64 support for , alongside performance optimizations in scheduling and I/O for cloud-native workloads, the 6.19-rc8 prepatch released on February 1, 2026, stable updates such as 6.18.8, 6.12.68, and 6.6.122, modernized swapping mechanisms, and sub-schedulers enabled by the sched_ext framework, solidifying the kernel's dominance in servers exceeding 90% and embedded devices.

Development and governance

Linus Torvalds and core maintainers

, born December 28, 1969, in , , initiated the Linux kernel project in 1991 as a personal hobby while studying at the , releasing the initial version on September 17, 1991, via the comp.os.minix group. As the kernel's creator and lead maintainer, oversees the mainline development branch, utilizing the version control system he developed in 2005 to manage the codebase. He coordinates bi-monthly release cycles, opening a two-week merge window for integrating changes from subsystem maintainers before stabilization periods leading to new versions every 2-3 months. Torvalds acts as the ultimate gatekeeper, reviewing and merging pull requests from core subsystem maintainers into the mainline tree, a role he has maintained for over three decades despite the kernel's growth to support tens of thousands of contributors. His management style emphasizes technical merit and stability, often expressed through direct feedback on the (LKML), prioritizing empirical testing over abstract policies. In a 2024 interview, Torvalds highlighted the value of aging maintainers, arguing their experience ensures robust amid challenges in recruiting new ones capable of handling complex subsystems. The Linux kernel's governance relies on a hierarchy of core maintainers documented in the MAINTAINERS file, which as of 2021 listed over 2,280 subsystems with designated stewards responsible for specific domains like networking, filesystems, and drivers. These maintainers—such as for stable releases—review patches, maintain subsystem trees, and forward vetted changes to Torvalds, enforcing coding standards and resolving conflicts within their scopes. The structure distributes workload across hundreds of experts, with Torvalds intervening on cross-subsystem issues or final merges to preserve kernel integrity. In October 2024, Torvalds endorsed the delisting of about a dozen maintainers affiliated with Russian entities, citing compliance with and ethical considerations in open-source collaboration.

Contribution process and coding standards

Contributions to the Linux kernel are made through patches submitted via to public mailing lists, ensuring open review and transparency. Developers typically use to manage changes, generating patches with the git format-patch command to produce a format that includes a subject line like "[PATCH 001/123] subsystem: summary phrase," a detailed commit message explaining the problem and solution, and a section separated by "---". Each patch must include a Signed-off-by line from the author and any other contributors, affirming adherence to the Developer's , which certifies original work or proper rights transfer under GPL-compatible licenses. Patches are directed to subsystem-specific maintainers—identified via the MAINTAINERS file or the scripts/get_maintainer.pl script—and copied to the [email protected] list, with stable fixes additionally Cc'd to [email protected]. The review process involves community feedback, often requiring multiple iterations labeled as [PATCH V2], with changelogs summarizing revisions. Maintainers evaluate patches for correctness, style, and impact, merging accepted ones into subsystem trees during the kernel's three-month development cycles, which feature a brief merge window after each stable release where integrates changes into the mainline repository. Over 1,000 developers participate per cycle, with code required to be GPL-compatible and buildable independently. issues follow a separate channel to [email protected] before public disclosure. Coding standards prioritize readability and maintainability, as detailed in the kernel's official authored by . Indentation uses 8-character tabs exclusively, with no spaces; lines are limited to 80 columns, though longer lines may be justified for clarity in non-user-visible code. Naming favors short, descriptive identifiers without or encoded types, and terms like "master/slave" are replaced with "primary/secondary" for neutrality. Spacing requires spaces after keywords like if or for but not around expressions in parentheses, and no trailing whitespace is permitted. Brace placement follows a variant of K&R style: opening braces share the line with control statements or functions, while closing braces stand alone except when followed by else or do. Torvalds explicitly rejects standards and 4-space indents, favoring the kernel's conventions to align with developers' habits rather than general tools. Compliance is checked using the scripts/checkpatch.pl script, which flags violations; deliberate deviations require explanation in commit messages, as the style aims to minimize during collaborative maintenance. Additional tools like clang-format or indent with kernel-specific options support formatting, but manual adherence remains essential.

Community dynamics and corporate influence

The Linux kernel's development community encompasses over 11,000 contributors across approximately 1,800 organizations as of , with the majority being employees of technology corporations rather than independent volunteers. This structure has evolved from early hobbyist efforts into a hybrid model where corporate resources drive the bulk of commits, bug fixes, and feature implementations, enabling but introducing dependencies on commercial priorities. For instance, in the 6.15 kernel cycle concluded in May , led with the highest number of changesets, followed by and , collectively representing a significant share of the approximately 13,800 patches merged. Corporate influence is evident in the funding and direction of subsystems, where companies like prioritize graphics and CPU drivers, while (owned by since 2019) and SUSE focus on enterprise features such as storage and networking stacks. Analysis of kernel contributions indicates that professional developers, compensated by employers, have authored more than 70% of since at least the mid-2010s, with top firms accounting for over half of total changes in recent cycles. This concentration empowers efficient development—evidenced by the kernel's growth to over 40 million lines of by early 2025—but can skew efforts toward hardware integration or cloud-specific optimizations, as seen in Google's Android-related submissions. Community dynamics revolve around a meritocratic enforced through the (LKML) and maintainer hierarchies, where technical merit trumps affiliation, though corporate-backed developers often dominate maintainer roles. Conflicts arise from differing incentives, such as when vendors push non-mainline patches for short-term product needs, leading to integration delays or rejections by , who retains final merge authority. Maintainers, many long-term and aging (with average tenures exceeding a decade), mediate these tensions, fostering a of rigorous review that has sustained stability despite scale; however, reliance on corporate employment raises concerns about burnout and agenda alignment, as individual volunteers contribute under 30% of changes. This interplay has proven resilient, with even competitors like increasing contributions (3.1% of 6.15 changesets) for Azure compatibility, yet the open-source GPL licensing prevents any single entity from monopolizing control. Empirical tracking via metadata confirms that while corporations amplify output—adding roughly 400,000 lines every two months—the community's decentralized review process mitigates capture risks, as evidenced by consistent rejection of subpar corporate submissions.

Challenges in sustainability and succession planning

The Linux kernel's development model faces significant challenges in , primarily due to its heavy reliance on as the central maintainer since 1991. Torvalds has repeatedly stated there is no formal successor designated, arguing that such decisions should emerge naturally rather than through premature appointment, as naming one could create unnecessary conflicts or undermine the process. This approach, while avoiding forced hierarchies, leaves the project vulnerable to disruptions if Torvalds becomes unavailable, with no established protocol for transitioning authority to the network of maintainers who handle subsystems. Discussions in 2025 highlighted this gap, noting that while the kernel's decentralized subsystems provide some resilience, the final merge window controlled by Torvalds represents a . To address this, the Linux kernel community formalized a continuity plan in January 2026, which activates if Torvalds becomes unwilling or unable to continue, including due to incapacity. The plan directs the most recent Maintainers Summit organizer—or the Linux Foundation Technical Advisory Board (TAB) chair as backup—to initiate discussions within 72 hours with recent summit participants and the TAB, convening a meeting to evaluate options for managing top-level repository merges and potentially appoint one or more replacements, with the Linux Foundation supporting implementation. Sustainability concerns extend to maintainer burnout and workforce renewal, exacerbated by the kernel's expanding , which exceeded 30 million lines of code by 2023 and continues to grow rapidly. A 2025 research paper analyzing the kernel's development bottlenecks identified over-dependence on a small cadre of experienced maintainers, many aging without adequate influx of new talent, leading to ad-hoc tooling and stalled review processes. Kernel maintainers have publicly reported fatigue from handling thousands of patches annually, with efforts like automated testing and contribution maturity models proposed to alleviate this but facing slow adoption. Despite Torvalds asserting in 2024 that an aging developer base brings valuable stability and counters burnout narratives by pointing to sustained contribution levels, empirical data shows maintenance concentrated among few engineers, risking knowledge silos. Corporate funding, while enabling much of the kernel's work through employer-sponsored developers from firms like and , introduces sustainability risks via misaligned incentives and fluctuating commitments. The , which stewards kernel-related efforts, allocated only about 2.3% of its revenue directly to the project, down from higher shares in prior years, prioritizing broader initiatives over core maintenance. This model sustains day-to-day operations but struggles with long-term planning, as corporate priorities may shift, leaving unpaid or volunteer-driven areas under-resourced amid rising security demands and hardware complexity. Proposals for dedicated funding pools and mentorship programs aim to bolster retention, yet implementation lags, underscoring the tension between volunteer ethos and professional demands.

Technical architecture

Kernel interfaces and APIs

The Linux kernel exposes interfaces to user-space applications primarily through system calls, which serve as the fundamental mechanism for requesting kernel services such as process creation, file operations, and network communication. These calls transition the processor from user mode to kernel mode, invoking kernel code via a standardized interface that abstracts hardware-specific details. System calls are numbered, with the kernel maintaining tables mapping numbers to functions; for instance, on x86_64 architectures, the syscall instruction triggers entry, while ARM uses svc (supervisor call). Beyond raw system calls, the kernel provides higher-level abstractions like the (VFS), which unifies access to diverse filesystems by presenting a consistent interface for operations such as opening, reading, and writing files, regardless of the underlying storage type. The VFS layer employs in-memory structures like inodes and dentries to cache metadata, enabling efficient pathname resolution and supporting features like file locking and permissions checks. User-space programs interact with VFS via system calls like open(), read(), and write(), which the C library wrappers invoke. Additional interfaces include special filesystems such as and , which expose kernel runtime information and configuration parameters as virtual files readable and writable from user space, facilitating debugging, monitoring, and dynamic tuning without recompiling the kernel. For device-specific control, system calls allow passing commands and data structures directly to drivers, though this mechanism is criticized for lacking portability and . Networking configuration often utilizes sockets, a bidirectional interface for exchanging messages between kernel modules and user-space processes, used in tools like for managing routes and interfaces. The kernel's user-space API documentation categorizes these interfaces into system calls, security mechanisms (e.g., filters), device I/O (e.g., via character or block devices), and miscellaneous elements like signals and timers, ensuring modularity while maintaining across kernel versions. Internal kernel APIs, distinct from user-space ones, facilitate module development but are not directly accessible from applications; changes to these require recompilation or module updates. This design promotes stability, with deprecations announced via kernel mailing lists to minimize disruptions for distributions and embedded systems.

Process scheduling and management

The Linux kernel manages processes through a combination of data structures and mechanisms that handle creation, execution, synchronization, and termination. Each process is represented by a task_struct structure, which encapsulates essential state information including process ID (PID), priority, scheduling parameters, memory mappings, file descriptors, and kernel stack pointer. This structure enables the kernel to track and manipulate processes efficiently during context switches, which occur when the scheduler selects a different runnable task for execution on a CPU core. Process creation typically begins with system calls like fork() or clone(), which duplicate the parent process's task_struct and allocate necessary resources, followed by execve() to load a new program image. Termination is handled via exit(), which releases resources and notifies parents through wait queues. Process scheduling in the Linux kernel determines the allocation of among runnable tasks, balancing fairness, throughput, and responsiveness across general-purpose, real-time, and deadline-oriented workloads. The kernel supports multiple scheduling classes, including the default fair class for non-real-time tasks, real-time classes (SCHED_FIFO for first-in-first-out and SCHED_RR for round-robin with time slices), and deadline scheduling (SCHED_DEADLINE for tasks with explicit bandwidth and period requirements). Priorities range from -20 (highest) to 19 (lowest) for values in the fair class, influencing CPU share inversely; higher values yield less . Control groups () extend management by allowing hierarchical resource limits, such as CPU shares or quotas, integrated via the schedtune or cpu subsystems to isolate workloads like containers. Early Linux kernels up to version 2.4 employed a simple O(N) scheduler that scanned all tasks linearly for selection, leading to scalability issues under high load. The 2.6 kernel series introduced the O(1) scheduler in 2002, using per-priority runqueues and expiration timers to achieve constant-time decisions and improved desktop interactivity by favoring recently woken tasks. However, persistent complaints about fairness and latency prompted further evolution. The (CFS), introduced by Ingo Molnar and merged into kernel 2.6.23 on October 9, 2007, became the default for fair scheduling, replacing the O(1) implementation. CFS models an "ideal" fair scheduler by tracking each task's virtual runtime (vruntime)—a measure of weighted consumed—and maintains runnable tasks in a red-black tree ordered by vruntime. The scheduler selects the leftmost (lowest vruntime) task, aiming to equalize vruntime across tasks while approximating proportional share allocation based on nice values; for instance, a task with nice 0 receives roughly twice the CPU as one with nice 10. Granularity is enforced with a minimum runtime slice of about 1 millisecond, adjusted by sched_min_granularity_ns, to prevent excessive context switches. CFS heuristics boost interactive tasks by reducing vruntime lag for short sleepers, though this has drawn criticism for ad-hoc tuning over strict proportionality. In kernel 6.6, released September 17, 2023, the Earliest Eligible Virtual Deadline First (EEVDF) scheduler succeeded CFS as the primary fair scheduler, proposed by Peter Zijlstra to address CFS's dependencies and improve latency under load. EEVDF treats vruntime as a virtual deadline, selecting the task with the earliest eligible deadline (vruntime plus a lag term) via a similar , but with proportional lag bounds to bound service deviations. This yields provably lower worst-case latency—up to 40% reductions in tail latencies on certain benchmarks—while maintaining fairness without sleep s, as eligibility is determined by actual runnability rather than estimated . EEVDF integrates seamlessly with existing CFS interfaces, enabling gradual adoption, and supports multi-core scalability through per-CPU runqueues and load balancing. Real-time and deadline classes remain unchanged, coexisting via the Completely Fair Scheduler framework's class hierarchy. Management extends to synchronization via futexes for user-space locking, signals for , and for debugging, all mediated by the scheduler to minimize disruptions. The kernel enforces preemption models—voluntary, full, or voluntary with high-priority preemption ticks—to throughput for responsiveness, configurable via /proc/sys/kernel/sched_latency_ns and related tunables. Empirical benchmarks, such as those from kernel developers, show EEVDF outperforming CFS in mixed workloads by reducing average scheduling latency from 10-20 microseconds to under 5 microseconds on x86 systems, though gains vary by hardware and configuration.

Memory management and synchronization

The Linux kernel's memory management subsystem implements a demand-paged architecture, where each process maintains an independent divided into user and kernel segments, with the kernel segment providing a direct mapping to physical memory for efficient access. Physical memory is organized into pages of typically 4 KiB, managed by the buddy page allocator, which employs a binary to allocate and free contiguous blocks of pages in powers of two, minimizing fragmentation while supporting zones such as DMA (for legacy devices requiring addresses below 16 MB), Normal (for general use), and Movable (for hot-pluggable memory). This zoned approach accommodates hardware constraints like ISA DMA limits and NUMA topologies, with the allocator tracking free pages via per-zone freelists and using thresholds—low, min, and high—to trigger reclaim or kswapd daemon activity when allocations risk exhaustion. Kernel allocations for small, frequently used objects rely on the slab allocator layer atop the page allocator, with SLUB as the default implementation since kernel version 2.6.23, offering per-CPU caches for low-latency access, slab merging to reduce metadata overhead, and debugging features like redzoning for corruption detection. SLUB improves upon predecessors like SLAB by simplifying internals, enabling better scalability on multiprocessor systems, and integrating with vmalloc for non-contiguous virtual mappings when contiguous physical pages are unavailable. User-space memory requests via syscalls like mmap or brk are handled through the virtual memory area (VMA) descriptors in the mm_struct per-process structure, employing copy-on-write for efficient forking and demand paging to load pages only on fault, backed by swap space on secondary storage during pressure. Out-of-memory conditions invoke the OOM killer, which selects and terminates processes based on heuristics like oom_score_adj, prioritizing those consuming disproportionate resources to preserve system stability. Synchronization in the kernel ensures thread-safe access to shared data structures amid concurrent execution on multiprocessor systems, primarily through categorized as sleeping locks (e.g., mutexes for preemptible contexts allowing scheduler yielding), spinning locks (e.g., spinlocks for short-held critical sections to avoid context-switch overhead), and advanced mechanisms like (RCU). Mutexes, implemented via struct mutex, block acquiring threads by enqueueing them on wait queues and invoking the scheduler, suitable for longer operations in process context but unsuitable for handlers due to potential deadlocks. Spinlocks, using atomic operations, busy-wait on uncontended paths for minimal latency in or softirq contexts, with variants like rwlock_t permitting multiple readers or exclusive writers to optimize read-heavy workloads. RCU, introduced in kernel 2.5.8 in , provides a lock-free primitive optimized for read-mostly data structures, where readers traverse via rcu_read_lock/unlock without blocking writers, who perform synchronize_rcu to wait for quiescent states (e.g., voluntary context switches) before freeing updated elements, leveraging grace-period detection for scalability up to thousands of CPUs. This mechanism relies on memory barriers to enforce ordering—such as smp_mb() for full bidirectional fences—and integrates with the scheduler for expedited variants, reducing contention in subsystems like networking and filesystems compared to traditional locking. Additional include semaphores for counting-based exclusion and seqlocks for writer-biased fast reads with validation, all underpinned by and CPU-specific barriers to prevent reordering that could violate in weakly ordered memory models like or PowerPC. These tools collectively address concurrency challenges, with guidelines emphasizing hierarchical locking to avert deadlocks and per-CPU variables for locality in NUMA environments.

Device support and filesystems

The Linux kernel employs a unified device model that represents hardware as a of buses, devices, and , managed through the struct device and struct driver abstractions within the core kernel framework. This model facilitates dynamic binding of to devices via mechanisms like platform data, device trees for embedded systems, and for PCs, enabling support for diverse hardware ranging from x86 servers to ARM-based mobile devices. Device are typically implemented as loadable kernel modules (LKMs), which can be inserted or removed at runtime using tools like , promoting modularity in the otherwise design. Key subsystems orchestrate device management: the PCI subsystem handles enumeration and resource allocation for expansion cards, supporting standards up to PCIe 6.0 as of kernel version 6.10 released in July 2024; the USB core supports controllers from EHCI to xHCI, accommodating thousands of peripherals through class drivers for storage, networking, and human-interface devices. Network device support encompasses Ethernet controllers from vendors like and , wireless via cfg80211 and mac80211 for standards including 802.11ax, while graphics leverage DRM () for GPUs from , , and (via open-source Nouveau or proprietary modules). Block devices are abstracted through the block layer, interfacing with storage protocols like NVMe, , and , with hotplug capabilities via libraries like libata. Challenges persist with proprietary hardware, where binary blobs are sometimes required, though community efforts prioritize reverse-engineered open-source alternatives for longevity and auditability. The (VFS) serves as the kernel's abstraction layer for filesystem operations, providing a uniform interface to user space via system calls like open(), read(), and mount(), while hiding implementation details of underlying filesystems through structures such as superblocks, inodes, directory entries (dentries), and file objects. Introduced in early kernel versions and refined over decades, VFS enables seamless support for local, networked, and special-purpose filesystems, with caching mechanisms like and dentry cache optimizing performance. As of Linux kernel 6.11 (September 2024), the kernel natively supports over 50 filesystem types, viewable via /proc/filesystems, including journaling filesystems for . remains the de facto standard for general-purpose storage, offering extents, delayed allocation, and quotas on partitions up to 1 exabyte; provides copy-on-write snapshots, subvolumes, and built-in for resilience; excels in high-throughput scenarios with scalable metadata and reflink for deduplication; optimizes for NAND flash with log-structured design, widely used in Android. Network filesystems like NFSv4.2 enable distributed access with pNFS for parallelism, while fuse allows user-space implementations such as NTFS-3G for Windows compatibility. Deprecated options like face removal post-2025 due to maintenance burdens and security vulnerabilities, urging migration to modern alternatives.
FilesystemKey FeaturesPrimary Use Case
Journaling, extents, large filesGeneral-purpose, boot partitions
Snapshots, compression, Data integrity, backups
High performance, online defragEnterprise storage, media
Flash-friendly, GC optimizationMobile, SSDs

Features and performance

Security enhancements and mitigations

The Linux kernel employs a range of enhancements designed to enforce s, filter system calls, and mitigate common exploit techniques such as buffer overflows and code reuse attacks. The (LSM) framework, introduced in kernel version 2.6.0, provides a hook-based for stacking multiple security modules, enabling fine-grained policy enforcement without modifying core kernel code. Prominent LSMs include SELinux, which implements via type enforcement, , and multi-level , integrated into the mainline kernel since version 2.6.0 released in December 2003; SELinux policies define contexts for processes, files, and other objects, restricting operations based on labels rather than discretionary permissions. AppArmor, another LSM focused on path-based confinement, confines processes to specific file paths and resources through per-application profiles; it has been available in the mainline kernel since version 2.6.36 in October 2010, offering simpler policy authoring compared to SELinux while supporting mediation of syscalls, file access, and network operations. Exploit mitigations in the kernel address memory corruption and information leakage vulnerabilities. Kernel Address Space Layout Randomization (KASLR), enabled by default on supported architectures since kernel version 3.14 in July 2014, randomizes the base virtual address of the kernel image and modules at boot, complicating return-oriented programming attacks by obscuring code locations; refinements in version 4.8 introduced separate randomization for physical and virtual addresses to further evade physical memory attacks. Stack protection, via the CONFIG_STACKPROTECTOR option available since kernel version 2.6.22, inserts random "canaries" between local variables and return addresses on the stack, detecting overflows by verifying the canary value before function return and triggering a kernel panic if corrupted. Secure Computing Mode (seccomp), introduced in kernel version 2.6.12 in March 2005, allows processes to transition into a restricted mode using Berkeley Packet Filter (BPF) rules to whitelist permitted syscalls, thereby reducing the kernel's attack surface exposed to untrusted code; seccomp filters are irrevocable and can log or kill processes attempting disallowed calls. Ongoing developments emphasize kernel self-protection against its own flaws, including hardened usercopy checks to prevent kernel heap overflows and safeguards against freelist manipulation, as outlined in the kernel self-protection documentation since version 4.13. Recent releases, such as kernel 6.14 in February 2025, incorporate refined mitigations for CPU vulnerabilities like Spectre and Meltdown, including indirect branch tracking and array bounds checks, alongside enhancements to LSM stacking for concurrent use of modules like SELinux and . These features collectively prioritize runtime integrity and confinement, though their effectiveness depends on proper configuration and hardware support, with from vulnerability disclosures showing reduced exploit success rates in hardened kernels.

Hardware support and portability

The Linux kernel's hardware support encompasses a vast array of processors, peripherals, and system-on-chip platforms through its modular driver framework, which includes subsystems for networking, storage, , audio, and input devices. Device drivers, frequently distributed as loadable kernel modules (LKMs), enable runtime loading and unloading to match detected hardware, minimizing kernel bloat and enhancing efficiency across diverse configurations. Core detection mechanisms rely on standardized buses like PCI for discrete components, USB for peripherals, and platform-specific interfaces such as I2C or SPI for embedded systems. For system description, the kernel employs the Device Tree (DT) for many ARM-based and embedded platforms, providing a machine-readable hardware topology that supplants hardcoded configurations and aids portability to new boards. tables serve a similar role on x86 and compatible systems, enumerating resources like interrupts and memory regions. Graphics support includes open-source drivers for , , and Mali GPUs via the subsystem, while storage leverages protocols like NVMe, , and over various host controllers. Networking hardware, from Ethernet controllers to Wi-Fi chipsets, is handled by dedicated drivers supporting standards like and 10/100/1000 Mbps PHYs. Portability across CPU architectures stems from the kernel's layered design, confining instruction-set-specific logic to the arch/ directory while exposing portable abstractions for scheduling, memory, and file systems in the core. This enables bootstrapping on new instruction set architectures (ISAs) by implementing essentials like page tables, exception handling, and context switching, often requiring under 10,000 lines of architecture-specific code for initial functionality. As of Linux kernel 6.11 (released September 2024), actively maintained architectures number around 20, including x86 (32/64-bit) for desktops and servers, ARM/ARM64 (common in smartphones, tablets, Raspberry Pi, and servers), RISC-V (emerging in embedded devices and new hardware), PowerPC (used in older systems and specialized hardware), MIPS, s390 (for mainframes), SPARC, LoongArch, and ARC, spanning desktops, servers, mobile devices, and real-time embedded controllers. Recent integrations, such as full RISC-V support since version 5.17 (March 2022), demonstrate ongoing expansion to emerging ISAs without disrupting existing ports. Challenges in portability include maintaining deprecated architectures like (Itanium), which risks upstream removal absent active maintainers, and adapting to hardware evolutions like ARMv9 or vector extensions via incremental patches. Vendor contributions, such as those from for Snapdragon SoCs or for zSeries mainframes, bolster support but can introduce dependencies on non-free blobs for full functionality on proprietary hardware. This modular extensibility has facilitated Linux's deployment on over 90% of public cloud instances and most Android devices as of 2024, underscoring its hardware-agnostic robustness.

Innovations like Rust integration and live patching

The Linux kernel introduced initial support for the Rust programming language in version 6.1, released on December 11, 2022, enabling developers to write certain kernel components, such as drivers, in Rust alongside the traditional C codebase. This integration aims to exploit Rust's ownership and borrowing model to prevent memory safety issues like buffer overflows and use-after-free errors, which have historically plagued C-based kernel code and contributed to vulnerabilities. By 2025, Rust abstractions for subsystems like networking—such as the first Rust-written network PHY driver merged in kernel 6.8—and storage layers have progressed, though adoption remains limited to experimental and sample implementations rather than core kernel functions. Kernel maintainers have established processes for reviewing Rust code, but challenges persist, including resistance to Rust-specific abstractions for hardware interactions like DMA mapping and the departure of key contributors in 2024, slowing broader upstream acceptance. As of kernel 6.17, released September 28, 2025, Rust requires a minimum compiler version of 1.78.0 and supports building on kernels as old as 6.1 with backported infrastructure, yet it imposes additional build complexity without guaranteeing stability for production use outside vendor-specific modules. Live kernel patching, a mechanism to apply limited runtime modifications without rebooting, entered the upstream kernel in version 4.0, released April 12, 2015, building on earlier vendor efforts like Oracle's Ksplice. It operates by redirecting function calls via ftrace hooks to replacement code in loadable modules, allowing fixes for critical bugs or security issues while minimizing disruption to running systems. Essential requirements include architecture-specific reliable stack tracing to avoid tracing inconsistencies that could lead to crashes, and patches must be semantically equivalent to avoid state corruption—typically restricting changes to small, function-level alterations rather than structural modifications. By design, live patching supports only a subset of updates, primarily high-priority security patches, as validated by vendors like Red Hat (kpatch), SUSE, and Canonical, who extend the upstream framework for enterprise environments. As of kernel 6.17, the feature remains stable but demands careful validation, with ELF-formatted livepatch modules handling relocations dynamically to both the core kernel and loaded modules. Limitations include incompatibility with kernel modules that alter traced functions and potential for subtle regressions if patches exceed safe boundaries, underscoring its role as a targeted innovation rather than a universal replacement for reboots.

Adoption and economic impact

Dominance in servers and cloud computing

The Linux kernel powers the operating systems of nearly all major cloud providers, including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), where custom variants such as linux-aws, linux-azure, and linux-gcp optimize for virtualization, networking, and storage performance. These providers support Linux-based virtual machines comprising over 90% of public cloud workloads, driven by the kernel's scalability, low overhead, and ability to handle massive parallel processing without proprietary licensing costs. Hyperscale data centers, which form the backbone of cloud services, rely on Linux for its modular architecture that enables fine-tuned resource allocation and energy efficiency tweaks, such as recent kernel modifications proposed to reduce data center power consumption by up to 30% through smarter network packet delivery. In traditional server environments, Linux dominates web hosting and enterprise deployments, operating approximately 96% of the top one million web servers as of , according to usage surveys that detect server OS footprints. This prevalence stems from the kernel's robust process scheduling, filesystem support (e.g., and for high-throughput I/O), and device drivers tailored for server hardware like multi-socket CPUs and NVMe storage, outperforming alternatives in reliability under load. Enterprise distributions built on the kernel, such as , lead in paid server deployments, with IDC reporting sustained growth in Linux server revenues exceeding $1 billion quarterly in recent years. High-performance computing further underscores Linux's server supremacy, with the kernel running 100% of the supercomputers since November 2017, including exascale systems like and that achieve petaflop-scale performance through kernel features like for resource isolation and real-time scheduling extensions. This ubiquity in servers and clouds—handling an estimated 92% of virtual machines across major platforms—arises from causal factors including the kernel's free availability for modification, vast driver ecosystem supporting diverse hardware, and empirical superiority in uptime metrics compared to closed-source alternatives, as evidenced by hyperscalers' internal optimizations rather than .

Use in embedded systems and mobile devices

The Linux kernel's modularity, extensive hardware , and ability to operate on resource-limited hardware make it a preferred choice for embedded systems, where it supports real-time constraints through configurations like patches. It powers approximately 39.5% of the embedded market, including sectors such as automotive , medical devices, and . Common applications include network routers via distributions like , IoT sensors and gateways for , industrial controllers, and smart thermostats, leveraging the kernel's networking stack and device tree support for diverse microcontrollers. Build systems such as and enable tailored kernel builds, optimizing for specific hardware like processors increasingly adopted in IoT. In mobile devices, the Linux kernel underpins Android, the dominant operating system for smartphones and tablets, providing core services including process management, memory allocation, security enforcement via SELinux, and power optimization through features like wakelocks and dynamic voltage scaling. Android employs modified (LTS) kernels with vendor-specific patches; for Android 15 released in 2024, compatible versions include the 6.6 and 6.1 series. This integration enables Android to run on over 3 billion active devices as of 2023, handling inputs, , and multimedia acceleration while abstracting ARM-based SoCs from manufacturers like and . The kernel's binder IPC mechanism facilitates communication between Android's framework and native components, contributing to its scalability across low-end feature phones to high-end flagships. Despite steady growth in server and embedded applications, the Linux kernel's adoption on personal desktops has remained marginal, with global market share hovering below 5% as of mid-2025. According to web analytics from StatCounter, Linux desktop usage reached 4.09% worldwide in June 2025, up from approximately 3% in prior years, reflecting incremental gains driven by dissatisfaction with Windows 11's hardware requirements and telemetry features. In the United States, the figure climbed to 5.03% by June 2025, surpassing previous highs and correlating with broader resistance to proprietary OS upgrades. Regional variations are pronounced; for instance, India's desktop share stood at 16.21% as of July 2024, bolstered by cost-sensitive markets favoring free software. Among gamers, Steam Hardware Survey data indicates a lower 2.89% penetration in July 2025, underscoring that growth is uneven across user segments. This modest uptick traces to external pressures rather than inherent kernel advantages for casual users, including the impending end-of-life for in October 2025 and privacy concerns over integrations. Government mandates for open-source alternatives in some sectors have also contributed, as seen in European public administrations favoring for cost and reasons. However, projections for broader adoption remain tempered; even optimistic estimates suggest desktop share may not exceed 10% by 2030 without systemic changes in hardware ecosystem support. Kernel enhancements, such as improved stacks and Rust-based components for stability, have aided niche appeal among developers but have not catalyzed mass migration. Key barriers to wider desktop uptake stem from hardware and software incompatibilities rooted in the kernel's open-source model, which relies on community-driven drivers rather than vendor-provided binaries. Proprietary peripherals like certain WiFi chipsets and printers often require manual configuration or third-party modules, deterring non-technical users. (DRM) limitations impair streaming, as Linux kernels struggle with hardware-accelerated decoding on par with Windows, exacerbating gaps in . Fragmentation across distributions compounds this, with inconsistent kernel configurations leading to variable device support and complicating OEM pre-installation, which remains rare outside niche vendors like System76. Software ecosystem deficiencies further impede adoption, as major proprietary applications—such as and certain enterprise tools—lack native kernel-compatible versions, forcing reliance on emulation layers like Wine that introduce performance overheads. Gaming, while improving via Proton, still faces kernel-level hurdles with anti-cheat systems requiring direct hardware access incompatible with Linux's security model. User experience barriers, including installation complexities like partition management, perpetuate a of Linux as suited only for experts, reinforced by minimal marketing from kernel maintainers or distro projects compared to commercial rivals. These factors, absent strong incentives like widespread integration, sustain desktop Linux as a specialized rather than general-purpose option.

Licensing under GPL and compliance issues

The Linux kernel has been licensed under the GNU General Public License version 2 (GPLv2) exclusively since the release of version 0.12 on February 5, 1992, when adopted it over his initial -leaning license to promote collaborative development while enforcing reciprocity. The GPLv2 requires that any distribution of the kernel or derivative works in binary form must include access to the complete corresponding , including modifications, under the same license terms, ensuring that users can study, modify, and redistribute the software freely. This mechanism aims to prevent enclosures of kernel-derived code, mandating that improvements benefit the broader community rather than being locked into closed ecosystems. Compliance issues arise primarily when vendors, especially in embedded systems and appliances, distribute modified kernel binaries—such as custom builds for routers, set-top boxes, or IoT devices—without providing the required or offering it upon request, violating sections 3 and 6 of the GPLv2. For instance, failure to disclose patches or configurations integrated into can hinder independent verification and further development, undermining the license's intent; such violations have been documented in sectors where hardware manufacturers prioritize features over . The kernel's explicit "GPLv2 only" designation, without the "or later" clause, reflects a deliberate choice by maintainers like Torvalds to avoid GPLv3's additional restrictions on hardware-level code execution controls (e.g., anti-Tivoization provisions), prioritizing broad adoption over stricter anti-circumvention rules. Enforcement of GPLv2 compliance for the kernel remains decentralized and limited, relying on individual copyright holders rather than systematic litigation, as major contributors have not delegated broad enforcement authority to organizations like the (SFC). The Linux kernel development community issued a formal enforcement statement in 2018 emphasizing the importance of reciprocal sharing for sustainability, yet practical actions are rare due to the distributed nature of copyrights and a cultural preference for collaboration over confrontation. Notable cases include a 2021 lawsuit by developer Harald Welte against for incorporating GPL-licensed kernel modifications into its SmartCast platform without source disclosure, highlighting obligations under GPLv2. Earlier disputes, such as allegations against in the mid-2000s for embedding kernel code in its without full sourcing, underscore ongoing tensions between commercial virtualization and requirements, though many resolve via settlements or compliance corrections rather than court rulings. Discussions at events like the 2024 Linux Plumbers Conference reveal persistent challenges, with enforcers noting that kernel-specific violations often evade scrutiny compared to user-space GPL components like . Overall, while the GPLv2 has facilitated the kernel's growth to over 30 million lines of code by 2021, uneven enforcement risks eroding trust in the ecosystem's openness.

Loadable modules and binary blobs

Loadable kernel modules (LKMs) enable dynamic extension of the Linux kernel's functionality at runtime, allowing components such as device drivers, filesystems, and system calls to be inserted or removed without rebooting the system. Implemented as relocatable object files (typically with .ko extensions), these modules are loaded into kernel memory via commands like insmod or modprobe, which resolve dependencies and handle symbol exports from the core kernel. This modularity, present since early kernel versions around 1996, reduces the monolithic kernel's size at boot and facilitates hardware-specific additions on demand. Under the kernel's GPLv2 license, LKMs accessing GPL-protected symbols—marked with __GPL__ or similar annotations—must be compatibly licensed, or they trigger a kernel taint flag indicating potential licensing incompatibility. The kernel exports a syscall interface exception to permit non-GPL user-space interactions, but proprietary LKMs risk violating clauses if they substantially link to GPL code, though blurs strict interpretation. Kernel developers have implemented measures like symbol versioning and since 6.6 (released December 2023) to break compatibility with proprietary modules, aiming to deter their development while preserving open-source drivers. Binary blobs, often proprietary for hardware initialization (e.g., chips or GPUs), are loaded by kernel drivers as opaque data blobs via the request_firmware() interface, stored in /lib/firmware. These non-source-provided binaries, required for full hardware support in devices from vendors like or , execute on separate hardware microcontrollers rather than directly in kernel space, mitigating some GPL linkage concerns. Distributing kernels with built-in non-GPL blobs could infringe if treated as combined works, but runtime loading from separate files avoids this, as affirmed by kernel maintainers' practices since the early 2000s. Linus Torvalds and kernel maintainers tolerate binary blobs pragmatically to ensure hardware compatibility, rejecting purist bans proposed in 2006 that would exclude vast proprietary ecosystems. The counters that such inclusions compromise the kernel's freedom, inspiring projects like (initiated 2008) that excise blobs via deblob scripts. No lawsuits have enforced GPL violations against blob usage, reflecting maintainers' interpretation that acts as user-supplied data, not derivative code—prioritizing empirical functionality over ideological purity despite ongoing debates.

Trademark protections and forks

The trademark for "Linux" is owned by Linus Torvalds, who first used the mark in connection with the kernel he initiated in 1991. Torvalds registered the trademark in the United States in 1994 to protect against unauthorized commercial exploitation that could dilute its association with the original kernel development, following concerns over potential confusion in the marketplace. In 1996, a trademark squatter named William Della Croce III attempted to register "Linux" for himself, leading to a dispute resolved in November 1997 when Della Croce assigned the mark to Torvalds as part of a settlement, affirming Torvalds' ownership and preventing further claims. Torvalds has delegated administration of the to the , which issues sublicenses to entities wishing to use "" in product names, such as Linux distributions or hardware certified as Linux-compatible. These sublicenses require adherence to usage guidelines, including proper attribution stating that "Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries," avoidance of the mark as a generic noun or verb, and ensuring the product maintains compatibility with the upstream kernel to prevent . Sublicense fees, historically up to $5,000 annually for commercial users, support enforcement efforts rather than generating profit, as Torvalds has emphasized that the process operates at a net loss due to legal overhead. Non-compliance can result in demands to cease use, as seen in cases where vendors failed to attribute ownership or misrepresented compatibility. The GNU General Public License (GPL) permits unrestricted forking of the kernel , enabling derivatives for specialized uses like embedded systems or proprietary modifications. However, the imposes limits on branding: forks cannot use "Linux" in a manner implying official endorsement or equivalence to the mainline kernel unless they comply with sublicense terms and demonstrate sufficient fidelity to upstream standards. This distinction preserves the mark's value by avoiding dilution from incompatible or degraded variants; for instance, heavily modified kernels in devices like Android or proprietary appliances are often or described without invoking the "Linux" to sidestep infringement risks. Upstream maintainers do not transfer rights to forks, requiring divergent projects to adopt distinct , such as "Android kernel" rather than "Linux," to prevent marketplace confusion. Enforcement focuses on curative measures like requests rather than litigation, aligning with the open-source while safeguarding the kernel's reputational integrity.

Controversies and criticisms

Political interventions in maintainer selection

In September 2018, the Linux kernel community adopted the Contributor Covenant Code of Conduct, replacing the prior Code of Conflict, amid pressure from the Linux Foundation and following public criticism of Linus Torvalds' communication style. The new code emphasized inclusive behavior, constructive criticism, and reporting violations to the Linux Foundation's Technical Advisory Board (TAB), with maintainers required to enforce it under threat of repercussions, including potential removal from their roles. This shift was viewed by some developers as an external imposition prioritizing ideological conformity over technical merit, though proponents argued it addressed toxicity without altering code review standards. Torvalds, the kernel's principal maintainer, temporarily stepped back from duties on September 16, 2018, after issuing an apology for past outbursts, effectively ceding interim control to Greg Kroah-Hartman; he returned in October after undergoing coaching on behavior. The has since influenced maintainer accountability, with enforcement actions targeting perceived violations. In November 2024, restricted Kent Overstreet's participation in kernel development, citing repeated failures to adhere to conduct expectations during interactions, such as disputes over the filesystem; this barred him from submitting patches or serving as maintainer without TAB approval, sparking debate over whether such measures prioritize interpersonal norms over expertise. Overstreet contested the decision, arguing it stemmed from disagreements on technical governance rather than malice, but upheld it as necessary for community health. Critics, including Overstreet, have described the Contributor Covenant—authored by Coraline Ada Ehmke—as introducing subjective political criteria that could disadvantage contributors not aligning with its diversity-focused language, though no explicit DEI quotas for maintainers have been documented. Geopolitical factors have also prompted maintainer removals, decoupled from technical performance. In October 2024, removed approximately 15-20 entries from the MAINTAINERS file corresponding to developers using Russian email domains, primarily affiliated with state-linked entities like and Baikal Electronics, to comply with amid the Russia-Ukraine conflict. Torvalds endorsed the action, stating it prevented potential exploitation by "Russian troll factories" while affirming the kernel's openness to individual Russian contributors unaffiliated with sanctioned firms. This intervention, driven by legal obligations of the U.S.-based , raised concerns among some in the open-source community about politicizing maintainer selection based on nationality or affiliation rather than code quality, potentially reducing the contributor pool without evidence of misconduct.

Debates over code bloat and maintainability

The Linux kernel's codebase has expanded substantially since its inception, reaching over 40 million lines of code by January 2025, up from approximately 27.8 million in 2020 and 15 million in 2015. This growth, averaging around 400,000 lines every two months in recent years, is primarily driven by additions for hardware drivers, support, and new features to accommodate diverse systems from servers to embedded devices. Critics argue this constitutes , complicating maintenance and increasing the risk of bugs due to the monolithic structure where much functionality resides in kernel space rather than user space. Linus Torvalds, the kernel's creator, acknowledged bloat concerns in a 2009 LinuxCon keynote, stating, "Linux is bloated" and that the kernel had become "huge and scary" with a "scary" iCache footprint exacerbated by ongoing feature additions. He noted the absence of a clear plan to address it, attributing the issue to relentless expansion without sufficient modularization or trimming. Maintainability analyses, such as a 2002 study, highlight that while lines of code per module grow linearly, inter-module coupling—measured by common coupling instances—increases quadratically with version numbers, potentially hindering long-term sustainability unless refactoring occurs. Defenders counter that the size reflects necessary support for an ever-expanding hardware ecosystem, with the kernel's configuration system allowing users to compile only required components, mitigating effective bloat in deployments. Despite these debates, the kernel remains actively maintained by thousands of contributors, though the scale demands rigorous review processes to preserve stability. Ongoing discussions in developer communities emphasize balancing feature completeness with code hygiene, as unchecked growth could strain volunteer-driven efforts amid corporate influences pushing or niche drivers.

Conflicts between meritocracy and corporate agendas

The Linux kernel's development process emphasizes , wherein patches are accepted based on rigorous technical review by maintainers, irrespective of contributors' affiliations or identities. This model has sustained the project's growth, with corporations like , (owned by ), and funding over 80% of commits through employee contributions as of 2020 analyses. However, as corporate employment dominates the contributor base—exemplified by Red Hat's control of key maintainers—conflicts emerge when business imperatives, such as standardized HR policies or strategic technical shifts, override pure code quality assessments. A focal point of tension occurred in September 2018 with the adoption of the Contributor Covenant Code of Conduct (CoC), supplanting the kernel's prior "Code of Conflict," which tolerated heated but substantive technical debates. The , reliant on corporate sponsorships from entities including and , endorsed the CoC to enforce behavioral norms aligned with broader industry diversity and inclusion efforts. Critics within the community, including developers who threatened to retract their code, contended that the CoC introduced subjective social criteria—such as prohibitions on "" interpreted beyond technical contexts—potentially prioritizing ideological over merit-based evaluation, thereby enabling corporate agendas to censor dissent under guise of civility. signed the CoC on September 16, 2018, but announced an indefinite break from kernel work minutes later, acknowledging his own "abusive" communication style after years of publicly berating submitters for subpar code. Torvalds returned in late following personal efforts to moderate his feedback, yet the CoC's enforcement has periodically reignited disputes, as in November 2024 when the Linux Foundation's Technical Advisory Board restricted bcachefs maintainer Kent Overstreet's participation for violations deemed to undermine "welcoming" conduct, despite his technical expertise. Overstreet's case, involving disputes with other maintainers, was cited by supporters as necessary for collaboration but by detractors as an example of corporate-influenced stifling meritocratic rigor, given the Foundation's ties to firms enforcing similar policies internally. Further strains involve corporate-driven technical mandates, such as the integration of support starting in kernel version 6.1 (December 2022), advocated by and engineers for enhanced amid rising security concerns in code. Opponents argue this reflects vendor agendas to embed safer abstractions benefiting their cloud infrastructures, rather than addressing root causes through refined practices, potentially fragmenting the architecture that meritocratic consensus has preserved. These episodes underscore a causal tension: while corporate resources enable scale, they risk subordinating apolitical judgment to profit-oriented or sociocultural priorities, as evidenced by maintainer dependencies where patches aligning with employer roadmaps gain precedence.

References

  1. https://wiki.gentoo.org/wiki/Linux_firmware
Add your contribution
Related Hubs
Contribute something
User Avatar
No comments yet.