Recent from talks
Be the first to start a discussion here.
Be the first to start a discussion here.
Be the first to start a discussion here.
Be the first to start a discussion here.
Contribute something
Welcome to the community hub built to collect knowledge and have discussions related to Linux kernel.
Nothing was collected or created yet.
Linux kernel
View on Wikipediafrom Wikipedia
| Linux Kernel | |
|---|---|
Linux kernel 6.1.0 kernel booting, under Debian | |
| Original author | Linus Torvalds |
| Developers | Community contributors Linus Torvalds |
| Initial release | 0.02 (5 October 1991) |
| Stable release | |
| Preview release | 6.18-rc4[4] |
| Repository | |
| Written in | C (with GNU extensions;[5] C11 (gnu11)[6] since 5.18, C89 (gnu89) before),[7] Assembly language |
| Available in | English |
| License | GPL-2.0-only with Linux-syscall-note[8][9][10][a] |
| Website | kernel |
The Linux kernel is a free and open-source[14]: 4 Unix-like kernel that is used in many computer systems worldwide. The kernel was created by Linus Torvalds in 1991 and was soon adopted as the kernel for the GNU operating system (OS) which was created to be a free replacement for Unix. Since the late 1990s, it has been included in many operating system distributions, many of which are called Linux. One such Linux kernel operating system is Android which is used in many mobile and embedded devices.
Most of the kernel code is written in C as supported by the GNU Compiler Collection (GCC) which has extensions beyond standard C.[14]: 18 [15] The code also contains assembly code for architecture-specific logic such as optimizing memory use and task execution.[14]: 379–380 The kernel has a modular design such that modules can be integrated as software components – including dynamically loaded. The kernel is monolithic in an architectural sense since the entire OS kernel runs in kernel space.
Linux is provided under the GNU General Public License version 2, although it contains files under other compatible licenses.[13]
History
[edit]
In 1991, Linus Torvalds was a computer science student enrolled at the University of Helsinki. During his time there, he began to develop an operating system as a side-project inspired by UNIX, for a personal computer.[16] He started with a task switcher in Intel 80386 assembly language and a terminal driver.[16] On 25 August 1991, Torvalds posted the following to comp.os.minix, a newsgroup on Usenet:[17]
I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones. This has been brewing since April, and is starting to get ready. I'd like any feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical layout of the file-system (due to practical reasons) among other things).
I've currently ported bash(1.08) and gcc(1.40), and things seem to work. This implies that I'll get something practical within a few months [...]
Yes - it's free of any minix code, and it has a multi-threaded fs. It is NOT protable [sic] (uses 386 task switching etc), and it probably never will support anything other than AT-harddisks, as that's all I have :-(.
On 17 September 1991, Torvalds prepared version 0.01 of Linux and put on the "ftp.funet.fi" – FTP server of the Finnish University and Research Network (FUNET). It was not even executable since its code still needed Minix to compile and test it.[18]
On 5 October 1991, Torvalds announced the first "official" version of Linux, version 0.02.[19][18]
[As] I mentioned a month ago, I'm working on a free version of a Minix-lookalike for AT-386 computers. It has finally reached the stage where it's even usable (though may not be depending on what you want), and I am willing to put out the sources for wider distribution. It is just version 0.02...but I've successfully run bash, gcc, gnu-make, gnu-sed, compress, etc. under it.
Linux grew rapidly as many developers, including the MINIX community, contributed to the project.[citation needed] At the time, the GNU Project had completed many components for its free UNIX replacement, GNU, but its kernel, the GNU Hurd, was incomplete. The project adopted the Linux kernel for its OS.[20]
Torvalds labeled the kernel with major version 0 to indicate that it was not yet intended for general use.[21] Version 0.11, released in December 1991, was the first version to be self-hosted; compiled on a computer running the Linux kernel.
When Torvalds released version 0.12 in February 1992, he adopted the GNU General Public License version 2 (GPLv2) over his previous self-drafted license, which had not permitted commercial redistribution.[22] In contrast to Unix, all source files of Linux are freely available, including device drivers.[23]
The initial success of Linux was driven by programmers and testers across the world. With the support of the POSIX APIs, through the libC that, whether needed, acts as an entry point to the kernel address space, Linux could run software and applications that had been developed for Unix.[24]

On 19 January 1992, the first post to the new newsgroup alt.os.linux was submitted.[25] On 31 March 1992, the newsgroup was renamed comp.os.linux.[26]
The fact that Linux is a monolithic kernel rather than a microkernel was the topic of a debate between Andrew S. Tanenbaum, the creator of MINIX, and Torvalds.[27] The Tanenbaum–Torvalds debate started in 1992 on the Usenet group comp.os.minix as a general discussion about kernel architectures.[28][29]
Version 0.96 released in May 1992 was the first capable of running the X Window System.[30][31] In March 1994, Linux 1.0.0 was released with 176,250 lines of code.[32] As indicated by the version number, it was the first version considered suitable for a production environment.[21] In June 1996, after release 1.3, Torvalds decided that Linux had evolved enough to warrant a new major number, and so labeled the next release as version 2.0.0.[33][34] Significant features of 2.0 included symmetric multiprocessing (SMP), support for more processors types and support for selecting specific hardware targets and for enabling architecture-specific features and optimizations.[24] The make *config family of commands of kbuild enable and configure options for building ad hoc kernel executables (vmlinux) and loadable modules.[35][36]
Version 2.2, released on 20 January 1999,[37] improved locking granularity and SMP management, added m68k, PowerPC, Sparc64, Alpha, and other 64-bit platforms support.[38] Furthermore, it added new file systems including Microsoft's NTFS read-only capability.[38] In 1999, IBM published its patches to the Linux 2.2.13 code for the support of the S/390 architecture.[39]
Version 2.4.0, released on 4 January 2001,[40] contained support for ISA Plug and Play, USB, and PC Cards. Linux 2.4 added support for the Pentium 4 and Itanium (the latter introduced the ia64 ISA that was jointly developed by Intel and Hewlett-Packard to supersede the older PA-RISC), and for the newer 64-bit MIPS processor.[41] Development for 2.4.x changed a bit in that more features were made available throughout the series, including support for Bluetooth, Logical Volume Manager (LVM) version 1, RAID support, InterMezzo and ext3 file systems.
Version 2.6.0 was released on 17 December 2003.[42] The development for 2.6.x changed further towards including new features throughout the series. Among the changes that have been made in the 2.6 series are: integration of μClinux into the mainline kernel sources, PAE support, support for several new lines of CPUs, integration of Advanced Linux Sound Architecture (ALSA) into the mainline kernel sources, support for up to 232 users (up from 216), support for up to 229 process IDs (64-bit only, 32-bit architectures still limited to 215),[43] substantially increased the number of device types and the number of devices of each type, improved 64-bit support, support for file systems which support file sizes of up to 16 terabytes, in-kernel preemption, support for the Native POSIX Thread Library (NPTL), User-mode Linux integration into the mainline kernel sources, SELinux integration into the mainline kernel sources, InfiniBand support, and considerably more.
Starting with 2.6.x releases, the kernel supported a large number of file systems; some designed for Linux, like ext3, ext4, FUSE, Btrfs,[44] and others native to other operating systems like JFS, XFS, Minix, Xenix, Irix, Solaris, System V, Windows and MS-DOS.[45]
Though development had not used a version control system thus far, in 2002, Linux developers adopted BitKeeper, which was made freely available to them even though it was not free software. In 2005, because of efforts to reverse-engineer it, the company which owned the software revoked its support of the Linux community. In response, Torvalds and others wrote Git. The new system was written within weeks, and in two months the first official kernel made using it was released.[46]
In 2005 the stable team was formed as a response to the lack of a kernel tree where people could work on bug fixes, and it would keep updating stable versions.[47] In February 2008 the linux-next tree was created to serve as a place where patches aimed to be merged during the next development cycle gathered.[48][49] Several subsystem maintainers also adopted the suffix -next for trees containing code which they mean to submit for inclusion in the next release cycle. As of January 2014[update], the in-development version of Linux is held in an unstable branch named linux-next.[50]
The 20th anniversary of Linux was celebrated by Torvalds in July 2011 with the release of version 3.0.0.[33] As 2.6 had been the version number for 8 years, a new uname26 personality that reports 3.x as 2.6.40+x had to be added to the kernel so that old programs would work.[51]
Version 3.0 was released on 22 July 2011.[52] On 30 May 2011, Torvalds announced that the big change was "NOTHING. Absolutely nothing." and asked, "...let's make sure we really make the next release not just an all new shiny number, but a good kernel too."[53] After the expected 6–7 weeks of the development process, it would be released near the 20th anniversary of Linux.
On 11 December 2012, Torvalds decided to reduce kernel complexity by removing support for i386 processors—specifically by not having to emulate[54] the atomic CMPXCHG instruction introduced with the i486 to allow reliable mutexes—making the 3.7 kernel series the last one still supporting the original processor.[55][56] The same series unified support for the ARM processor.[57]
The numbering change from 2.6.39 to 3.0, and from 3.19 to 4.0, involved no meaningful technical differentiation; the major version number was increased simply to avoid large minor numbers.[52][58] Stable 3.x.y kernels were released until 3.19 in February 2015. Version 3.11, released on 2 September 2013,[59] added many new features such as new O_TMPFILE flag for to reduce temporary file vulnerabilities, experimental AMD Radeon dynamic power management, low-latency network polling, and zswap (compressed swap cache).[60]
In April 2015, Torvalds released kernel version 4.0.[33] By February 2015, Linux had received contributions from nearly 12,000 programmers from more than 1,200 companies, including some of the world's largest software and hardware vendors.[61] Version 4.1 of Linux, released in June 2015, contains over 19.5 million lines of code contributed by almost 14,000 programmers.[62]
Linus Torvalds announced that kernel version 4.22 would instead be numbered 5.0 in March 2019, stating that "'5.0' doesn't mean anything more than that the 4.x numbers started getting big enough that I ran out of fingers and toes."[63] It featured many major additions such as support for the AMD Radeon FreeSync and NVIDIA Xavier display, fixes for F2FS, EXT4 and XFS, restored support for swap files on the Btrfs file system and continued work on the Intel Icelake Gen11 graphics and on the NXP i.MX8 SoCs.[64][65] This release was noticeably larger than the rest, Torvalds mentioning that "The overall changes for all of the 5.0 release are much bigger."[63]
A total of 1,991 developers, of whom 334 were first-time collaborators, added more than 553,000 lines of code to version 5.8, breaking the record previously held by version 4.9.[66]
Popularity
[edit]According to the Stack Overflow's annual Developer Survey of 2019, more than 53% of all respondents have developed software for Linux and about 27% for Android,[67] although only about 25% develop with Linux-based operating systems.[68]
Most websites run on Linux-based operating systems,[69][70] and all of the world's 500 most powerful supercomputers run on Linux.[71]
Linux distributions bundle the kernel with system software (e.g., the GNU C Library, systemd, and other Unix utilities and daemons) and a wide selection of application software, but their usage share in desktops is low in comparison to other operating systems.
Android, which runs on a modified Linux kernel, accounts for the majority of mobile device operating systems,[72][73][74] and is increasingly being used in embedded devices, making it a significant driver of Linux adoption.[24]
Value
[edit]
The cost to redevelop version 2.6.0 of the Linux kernel in a traditional proprietary development setting has been estimated to be US$612 million (€467M, £394M) in 2004 prices using the COCOMO person-month estimation model.[75] In 2006, a study funded by the European Union put the redevelopment cost of kernel version 2.6.8 higher, at €882M ($1.14bn, £744M).[76]
This topic was revisited in October 2008 by Amanda McPherson, Brian Proffitt, and Ron Hale-Evans. Using David A. Wheeler's methodology, they estimated redevelopment of the 2.6.25 kernel now costs $1.3bn (part of a total $10.8bn to redevelop Fedora 9).[77] Again, Garcia-Garcia and Alonso de Magdaleno from University of Oviedo (Spain) estimate that the value annually added to kernel was about €100M between 2005 and 2007 and €225M in 2008, it would cost also more than €1bn (about $1.4bn as of February 2010) to develop in the European Union.[78]
As of 7 March 2011[update], using then-current LOC (lines of code) of a 2.6.x Linux kernel and wage numbers with David A. Wheeler's calculations it would cost approximately $3bn (about €2.2bn) to redevelop the Linux kernel as it keeps getting bigger. An updated calculation as of 26 September 2018[update], using then-current 20,088,609 LOC (lines of code) for the 4.14.14 Linux kernel and the current US national average programmer salary of $75,506 show that it would cost approximately $14,725,449,000 (£11,191,341,000) to rewrite the existing code.[79]
Distribution
[edit]Most who use Linux do so via a Linux distribution. Some distributions ship the vanilla or stable kernel. However, several vendors (such as Red Hat and Debian) maintain a customized source tree. These are usually updated at a slower pace than the vanilla branch, and they usually include all fixes from the relevant stable branch, but at the same time they can also add support for drivers or features which had not been released in the vanilla version the distribution vendor started basing its branch from.
Developers
[edit]Community
[edit]Graph of the sizes of Linux Kernel versions in millions of lines of code[80]. View source data.
The community of Linux kernel developers comprises about 5000–6000 members. According to the "2017 State of Linux Kernel Development", a study issued by the Linux Foundation, covering the commits for the releases 4.8 to 4.13, about 1500 developers were contributing from about 200–250 companies on average. The top 30 developers contributed a little more than 16% of the code. For companies, the top contributors are Intel (13.1%) and Red Hat (7.2%), Linaro (5.6%), IBM (4.1%), the second and fifth places are held by the 'none' (8.2%) and 'unknown' (4.1%) categories.[81]
"Instead of a roadmap, there are technical guidelines. Instead of a central resource allocation, there are persons and companies who all have a stake in the further development of the Linux kernel, quite independently from one another: People like Linus Torvalds and I don’t plan the kernel evolution. We don’t sit there and think up the roadmap for the next two years, then assign resources to the various new features. That's because we don’t have any resources. The resources are all owned by the various corporations who use and contribute to Linux, as well as by the various independent contributors out there. It's those people who own the resources who decide..."
— Andrew Morton, 2005
Conflict
[edit]Notable conflicts among Linux kernel developers:
- In July 2007, Con Kolivas announced that he would cease developing for the Linux kernel.[82][83]
- In July 2009, Alan Cox quit his role as the TTY layer maintainer after disagreement with Torvalds.[84]
- In December 2010, there was a discussion between Linux SCSI maintainer James Bottomley and SCST maintainer Vladislav Bolkhovitin about which SCSI target stack should be included in the Linux kernel.[85] This made some Linux users upset.[86]
- In June 2012, Torvalds made it very clear that he did not agree with NVIDIA releasing its drivers as closed.[87]
- In April 2014, Torvalds banned Kay Sievers from submitting patches to the Linux kernel for failing to deal with bugs that caused systemd to negatively interact with the kernel.[88]
- In October 2014, Lennart Poettering accused Torvalds of tolerating the rough discussion style on Linux kernel related mailing lists and of being a bad role model.[89]
- In March 2015, Christoph Hellwig filed a lawsuit against VMware for infringement of the copyright on the Linux kernel.[90] Linus Torvalds made it clear that he did not agree with this and similar initiatives by calling lawyers a festering disease.[91]
- In April 2021, a team from the University of Minnesota was found to be submitting "bad faith" patches to the kernel as part of its research. This resulted in the immediate reversion of all patches ever submitted by a member of the university. In addition, a warning was issued by a senior maintainer that any future patch from the university would be rejected on sight.[92][93]
Prominent Linux kernel developers have been aware of the importance of avoiding conflicts between developers.[94] For a long time there was no code of conduct for kernel developers due to opposition by Torvalds.[95] However, a Linux Kernel Code of Conflict was introduced on 8 March 2015.[96] It was replaced on 16 September 2018 by a new Code of Conduct based on the Contributor Covenant. This coincided with a public apology by Torvalds and a brief break from kernel development.[97][98] On 30 November 2018, complying with the Code of Conduct, Jarkko Sakkinen of Intel sent out patches replacing instances of "fuck" appearing in source code comments with suitable versions focused on the word 'hug'.[99]
Developers who feel treated unfairly can report this to the Linux Foundation Technical Advisory Board.[100] In July 2013, the maintainer of the USB 3.0 driver Sage Sharp asked Torvalds to address the abusive commentary in the kernel development community. In 2014, Sharp backed out of Linux kernel development, saying that "The focus on technical excellence, in combination with overloaded maintainers, and people with different cultural and social norms, means that Linux kernel maintainers are often blunt, rude, or brutal to get their job done".[101] At the linux.conf.au (LCA) conference in 2018, developers expressed the view that the culture of the community has gotten much better in the past few years. Daniel Vetter, the maintainer of the Intel drm/i915 graphics kernel driver, commented that the "rather violent language and discussion" in the kernel community has decreased or disappeared.[102]
Laurent Pinchart asked developers for feedback on their experiences with the kernel community at the 2017 Embedded Linux Conference Europe. The issues brought up were discussed a few days later at the Maintainers Summit. Concerns over the lack of consistency in how maintainers responded to patches submitted by developers were echoed by Shuah Khan, the maintainer of the kernel self-test framework. Torvalds contended that there would never be consistency in the handling of patches because different kernel subsystems have, over time, adopted different development processes. Therefore, it was agreed upon that each kernel subsystem maintainer would document the rules for patch acceptance.[103]
Development
[edit]Linux is evolution, not intelligent design!
Codebase
[edit]The kernel source code, a.k.a. source tree, is managed in the Git version control system – also created by Torvalds.[107]
As of 2021[update], the 5.11 release of the Linux kernel had around 30.34 million lines of code. Roughly 14% of the code is part of the "core," including architecture-specific code, kernel code, and memory management code, while 60% is drivers.
Contributions
[edit]Contributions are submitted as patches, in the form of text messages on the Linux kernel mailing list (LKML) (and often also on other mailing lists dedicated to particular subsystems). The patches must conform to a set of rules and to a formal language that, among other things, describes which lines of code are to be deleted and what others are to be added to the specified files. These patches can be automatically processed so that system administrators can apply them in order to make just some changes to the code or to incrementally upgrade to the next version.[108] Linux is distributed also in GNU zip (gzip) and bzip2 formats.
A developer who wants to change the Linux kernel writes and tests a code change. Depending on how significant the change is and how many subsystems it modifies, the change will either be submitted as a single patch or in multiple patches of source code. In case of a single subsystem that is maintained by a single maintainer, these patches are sent as e-mails to the maintainer of the subsystem with the appropriate mailing list in Cc. The maintainer and the readers of the mailing list will review the patches and provide feedback. Once the review process has finished the subsystem maintainer accepts the patches in the relevant Git kernel tree. If the changes to the Linux kernel are bug fixes that are considered important enough, a pull request for the patches will be sent to Torvalds within a few days. Otherwise, a pull request will be sent to Torvalds during the next merge window. The merge window usually lasts two weeks and starts immediately after the release of the previous kernel version.[109] The Git kernel source tree names all developers who have contributed to the Linux kernel in the Credits directory and all subsystem maintainers are listed in Maintainers.[110]
As with many large open-source software projects, developers are required to adhere to the Contributor Covenant, a code of conduct intended to address harassment of minority contributors.[111][112] Additionally, to prevent offense the use of inclusive terminology within the source code is mandated.[113]
Programming language
[edit]Linux is written in a special C programming language supported by GCC, a compiler that extends the C standard in many ways, for example using inline sections of code written in the assembly language (in GCC's "AT&T-style" syntax) of the target architecture.
In September 2021, the GCC version requirement for compiling and building the Linux kernel increased from GCC 4.9 to 5.1, allowing the potential for the kernel to be moved from using C code based on the C89 standard to using code written with the C11 standard,[114] with the migration to the standard taking place in March 2022, with the release of Linux 5.18.[115]
Initial support for the Rust programming language was added in Linux 6.1[116] which was released in December 2022,[117] with later kernel versions, such as Linux 6.2 and Linux 6.3, further improving the support.[118][119]
Coding style
[edit]Since 2002, code must adhere to the 21 rules of the Linux Kernel Coding Style.[120][121]
Versioning
[edit]As for most software, the kernel is versioned as a series of dot-separated numbers.
For early versions, the version consisted of three or four dot-separated numbers called major release, minor release and revision.[14]: 9 At that time, odd-numbered minor releases were for development and testing, while even numbered minor releases for production. The optional fourth digit indicated a patch level.[21] Development releases were indicated with a release candidate suffix (-rc).
The current versioning conventions are different. The odd/even number implying dev/prod has been dropped, and a major version is indicated by the first two numbers together. While the time-frame is open for the development of the next major, the -rcN suffix is used to identify the n'th release candidate for the next version.[122] For example, the release of the version 4.16 was preceded by seven 4.16-rcN (from -rc1 to -rc7). Once a stable version is released, its maintenance is passed to the stable team. Updates to a stable release are identified by a three-number scheme (e.g., 4.16.1, 4.16.2, ...).[122]
Toolchain
[edit]The kernel is usually built with the GNU toolchain. The GNU C compiler, GNU cc, part of the GNU Compiler Collection (GCC), is the default compiler for mainline Linux. Sequencing is handled by GNU make. The GNU Assembler (often called GAS or GNU as) outputs the object files from the GCC generated assembly code. Finally, the GNU Linker (GNU ld) produces a statically linked executable kernel file called vmlinux. Both as and ld are part of GNU Binary Utilities (binutils).
GNU cc was for a long time the only compiler capable of correctly building Linux. In 2004, Intel claimed to have modified the kernel so that its C compiler was also capable of compiling it.[123] There was another such reported success in 2009, with a modified 2.6.22 version.[124][125] Support for the Intel compiler has been dropped in 2023.[126]
Since 2010, effort has been underway to build Linux with Clang, an alternative compiler for the C language;[127] as of 12 April 2014, the official kernel could almost be compiled by Clang.[128][129] The project dedicated to this effort is named LLVMLinux after the LLVM compiler infrastructure upon which Clang is built.[130] LLVMLinux does not aim to fork either Linux or the LLVM, therefore it is a meta-project composed of patches that are eventually submitted to the upstream projects. By enabling Linux to be compiled by Clang, developers may benefit from shorter compilation times.[131]
In 2017, developers completed upstreaming patches to support building the Linux kernel with Clang in the 4.15 release, having backported support for X86-64 and AArch64 to the 4.4, 4.9, and 4.14 branches of the stable kernel tree. Google's Pixel 2 shipped with the first Clang built Linux kernel,[132] though patches for Pixel (1st generation) did exist.[133] 2018 saw ChromeOS move to building kernels with Clang by default,[134] while Android made Clang[135] and LLVM's linker LLD[136] required for kernel builds in 2019. Google moved its production kernel used throughout its datacenters to being built with Clang in 2020.[137] The ClangBuiltLinux group coordinates fixes to both Linux and LLVM to ensure compatibility, both composed of members from LLVMLinux and having upstreamed patches from LLVMLinux.
Debugging
[edit]
As with any software, problems with the Linux kernel can be difficult to troubleshoot. Common challenges relate to userspace vs. kernel space access, misuse of synchronization primitives, and incorrect hardware management.[14]: 364
An oops is a non-fatal error in the kernel. After such an error, operations continue with suspect reliability.[138]
A panic (generated by panic()) is a fatal error. After such an error, the kernel prints a message and halts the computer.[14]: 371
The kernel provides for debugging by printing via printk() which stores messages in a circular buffer (overwriting older entries with newer). The syslog(2) system call provides for reading and clearing the message buffer and for setting the maximum log level of the messages to be sent to the console.[139] Kernel messages are also exported to userland through the /dev/kmsg interface.[140]
The ftrace mechanism allow for debugging by tracing. It is used for monitoring and debugging Linux at runtime and it can analyze user space latencies due to kernel misbehavior.[141][142][143][144] Furthermore, ftrace allows users to trace Linux at boot-time.[145]
kprobes and kretprobes can break into kernel execution (like debuggers in userspace) and collect information non-disruptively.[146] kprobes can be inserted into code at (almost) any address, while kretprobes work at function return. uprobes have similar purposes but they also have some differences in usage and implementation.[147]
With KGDB Linux can be debugged in much the same way as userspace programs. KGDB requires an additional machine that runs GDB and that is connected to the target to be debugged using a serial cable or Ethernet.[148]
Change process
[edit]The Linux kernel project integrates new code on a rolling basis. Standard operating procedure is that software checked into the project must work and compile without error.
Each kernel subsystem is assigned a maintainer who is responsible for reviewing patches against the kernel code standards and keeping a queue of patches that can be submitted to Torvalds within a merge window that is usually several weeks.
Patches are merged by Torvalds into the source code of the prior stable Linux kernel release, creating the release candidate (-rc) for the next stable release. Once the merge window is closed, only fixes to the new code in the development release are accepted. The -rc development release of the kernel goes through regression testing and once it is considered stable by Torvalds and the subsystem maintainers, a new version is released and the development process starts over again.[149]
Mainline Linux
[edit]
The Git tree that contains the Linux kernel source code is referred to as mainline Linux. Every stable kernel release originates from the mainline tree,[150] and is frequently published on kernel.org. Mainline Linux has only solid support for a small subset of the many devices that run Linux. Non-mainline support is provided by independent projects, such as Yocto or Linaro, but in many cases the kernel from the device vendor is needed.[151] Using a vendor kernel likely requires a board support package.
Maintaining a kernel tree outside of mainline Linux has proven to be difficult.[152]
Mainlining refers to the effort of adding support for a device to the mainline kernel,[153] while there was formerly only support in a fork or no support at all. This usually includes adding drivers or device tree files. When this is finished, the feature or security fix is considered mainlined.[154]
Linux-like kernel
[edit]The maintainer of the stable branch, Greg Kroah-Hartman, has applied the term Linux-like to downstream kernel forks by vendors that add millions of lines of code to the mainline kernel.[155] In 2019, Google stated that it wanted to use the mainline Linux kernel in Android so the number of kernel forks would be reduced.[156] The term Linux-like has also been applied to the Embeddable Linux Kernel Subset, which does not include the full mainline Linux kernel but a small modified subset of the code.[157]
Linux forks
[edit]
There are certain communities that develop kernels based on the official Linux. Some interesting bits of code from these forks that include Linux-libre, Compute Node Linux, INK, L4Linux, RTLinux, and User-Mode Linux (UML) have been merged into the mainline.[158] Some operating systems developed for mobile phones initially used heavily modified versions of Linux, including Google Android, Firefox OS, HP webOS, Nokia Maemo and Jolla Sailfish OS. In 2010, the Linux community criticised Google for effectively starting its own kernel tree:[159][160]
This means that any drivers written for Android hardware platforms, can not get merged into the main kernel tree because they have dependencies on code that only lives in Google's kernel tree, causing it to fail to build in the kernel.org tree. Because of this, Google has now prevented a large chunk of hardware drivers and platform code from ever getting merged into the main kernel tree. Effectively creating a kernel branch that a number of different vendors are now relying on.[161]
— Greg Kroah-Hartman, 2010
Today Android uses a customized Linux[162] where major changes are implemented in device drivers, but some changes to the core kernel code is required. Android developers also submit patches to the official Linux that finally can boot the Android operating system. For example, a Nexus 7 can boot and run the mainline Linux.[162]
At a 2001 presentation at the Computer History Museum, Torvalds had this to say in response to a question about distributions of Linux using precisely the same kernel sources or not:
They're not... well they are, and they're not. There is no single kernel. Every single distribution has their own changes. That's been going on since pretty much day one. I don't know if you may remember Yggdrasil was known for having quite extreme changes to the kernel and even today all of the major vendors have their own tweaks because they have some portion of the market they're interested in and quite frankly that's how it should be. Because if everybody expects one person, me, to be able to track everything that's not the point of GPL. That's not the point of having an open system. So actually the fact that a distribution decides that something is so important to them that they will add patches for even when it's not in the standard kernel, that's a really good sign for me. So that's for example how something like ReiserFS got added. And the reason why ReiserFS is the first journaling filesystem that was integrated in the standard kernel was not because I love Hans Reiser. It was because SUSE actually started shipping with ReiserFS as their standard kernel, which told me "ok." This is actually in production use. Normal People are doing this. They must know something I don't know. So in a very real sense what a lot of distribution houses do, they are part of this "let's make our own branch" and "let's make our changes to this." And because of the GPL, I can take the best portions of them.[163]
— Linus Torvalds, 2001
Long-term support
[edit]
The latest version and older versions are maintained separately. Most of the latest kernel releases were supervised by Torvalds.[164]
The Linux kernel developer community maintains a stable kernel by applying fixes for software bugs that have been discovered during the development of the subsequent stable kernel. Therefore, www.kernel.org always lists two stable kernels. The next stable Linux kernel is released about 8 to 12 weeks later.
Some releases are designated for long-term support as longterm with bug fix releases for two or more years.[165]
Size
[edit]Some projects have attempted to reduce the size of the Linux kernel. One of them is TinyLinux. In 2014, Josh Triplett started the -tiny source tree for a reduced size version.[166][167][168][169]
Architecture and features
[edit]

Even though seemingly contradictory, the Linux kernel is both monolithic and modular. The kernel is classified as a monolithic kernel architecturally since the entire OS runs in kernel space. The design is modular since it can be assembled from modules that in some cases are loaded and unloaded at runtime.[14]: 338 [170] It supports features once only available in closed source kernels of non-free operating systems.
The rest of the article makes use of the UNIX and Unix-like operating systems convention of the manual pages. The number that follows the name of a command, interface, or other feature specifies the section (i.e. the type of the OS' component or feature) it belongs to. For example execve(2) refers to a system call, and exec(3) refers to a userspace library wrapper.
The following is an overview of architectural design and of noteworthy features.
- Concurrent computing and (with the availability of enough CPU cores for tasks that are ready to run) even true parallel execution of many processes at once (each of them having one or more threads of execution) on SMP and NUMA architectures.
- Selection and configuration of hundreds of kernel features and drivers (using one of the make *config family of commands before building),[171][36][35] modification of kernel parameters before boot (usually by inserting instructions into the lines of the GRUB2 menu), and fine tuning of kernel behavior at run-time (using the sysctl(8) interface to /proc/sys/).[172][173][174]
- Configuration (again using the make *config commands) and run-time modifications of the policies[175] (via nice(2), setpriority(2), and the family of sched_*(2) syscalls) of the task schedulers that allow preemptive multitasking (both in user mode and, since the 2.6 series, in kernel mode[176][177]); the earliest eligible virtual deadline first scheduling (EEVDF) scheduler,[178] is the default scheduler of Linux since 2023 and it uses a red-black tree which can search, insert and delete process information (task struct) with O(log n) time complexity, where n is the number of runnable tasks.[179][180]
- Advanced memory management with paged virtual memory.
- Inter-process communications and synchronization mechanism.
- A virtual filesystem on top of several concrete filesystems (ext4, Btrfs, XFS, JFS, FAT32, and many more).
- Configurable I/O schedulers, ioctl(2)[181] syscall that manipulates the underlying device parameters of special files (it is a non standard system call, since arguments, returns, and semantics depends on the device driver in question), support for POSIX asynchronous I/O[182] (however, because they scale poorly with multithreaded applications, a family of Linux specific I/O system calls (io_*(2)[183]) had to be created for the management of asynchronous I/O contexts suitable for concurrent processing).
- OS-level virtualization (with Linux-VServer), paravirtualization and hardware-assisted virtualization (with KVM or Xen, and using QEMU for hardware emulation);[184][185][186][187][188][189] On the Xen hypervisor, the Linux kernel provides support to build Linux distributions (such as openSUSE Leap and many others) that work as Dom0, that are virtual machine host servers that provide the management environment for the user's virtual machines (DomU).[190]
- I/O Virtualization with VFIO and SR-IOV. Virtual Function I/O (VFIO) exposes direct device access to user space in a secure memory (IOMMU) protected environment. With VFIO, a VM Guest can directly access hardware devices on the VM Host Server. This technique improves performance, if compared both to Full virtualization and Paravirtualization. However, with VFIO, devices cannot be shared with multiple VM guests. Single Root I/O Virtualization (SR-IOV) combines the performance gains of VFIO and the ability to share a device with several VM Guests (but it requires special hardware that must be capable to appear to two or more VM guests as different devices).[191]
- Security mechanisms for discretionary and mandatory access control (SELinux, AppArmor, POSIX ACLs, and others).[192][193]
- Several types of layered communication protocols (including the Internet protocol suite).
- Asymmetric multiprocessing via the RPMsg subsystem.
Most device drivers and kernel extensions run in kernel space (ring 0 in many CPU architectures), with full access to the hardware. Some exceptions run in user space; notable examples are filesystems based on FUSE/CUSE, and parts of UIO.[194][195] Furthermore, the X Window System and Wayland, the windowing system and display server protocols that most people use with Linux, do not run within the kernel. Differently, the actual interfacing with GPUs of graphics cards is an in-kernel subsystem called Direct Rendering Manager (DRM).
Unlike standard monolithic kernels, device drivers are easily configured as modules, and loaded or unloaded while the system is running and can also be pre-empted under certain conditions in order to handle hardware interrupts correctly and to better support symmetric multiprocessing.[177] By choice, Linux has no stable device driver application binary interface.[196]
Linux typically makes use of memory protection and virtual memory and can also handle non-uniform memory access,[197] however the project has absorbed μClinux which also makes it possible to run Linux on microcontrollers without virtual memory.[198]
The hardware is represented in the file hierarchy. User applications interact with device drivers via entries in the /dev or /sys directories.[199] Process information is mapped into the /proc directory.[199]
Interfaces
[edit]
Linux started as a clone of UNIX, and aims toward POSIX and Single UNIX Specification compliance.[201] The kernel provides system calls and other interfaces that are Linux-specific. In order to be included in the official kernel, the code must comply with a set of licensing rules.[8][13]
The Linux application binary interface (ABI) between the kernel and the user space has four degrees of stability (stable, testing, obsolete, removed);[202] The system calls are expected to never change in order to preserve compatibility for userspace programs that rely on them.[203]
Loadable kernel modules (LKMs), by design, cannot rely on a stable ABI.[196] Therefore, they must always be recompiled whenever a new kernel executable is installed in a system, otherwise they will not be loaded. In-tree drivers that are configured to become an integral part of the kernel executable (vmlinux) are statically linked by the build process.
There is no guarantee of stability of source-level in-kernel API[196] and, because of this, device driver code, as well as the code of any other kernel subsystem, must be kept updated with kernel evolution. Any developer who makes an API change is required to fix any code that breaks as the result of their change.[204]
Kernel-to-userspace API
[edit]The set of the Linux kernel API that regards the interfaces exposed to user applications is fundamentally composed of UNIX and Linux-specific system calls.[205] A system call is an entry point into the Linux kernel.[206] For example, among the Linux-specific ones there is the family of the clone(2) system calls.[207] Most extensions must be enabled by defining the _GNU_SOURCE macro in a header file or when the user-land code is being compiled.[208]
System calls can only be invoked via assembly instructions that enable the transition from unprivileged user space to privileged kernel space in ring 0. For this reason, the C standard library (libC) acts as a wrapper to most Linux system calls, by exposing C functions that, if needed,[209] transparently enter the kernel which will execute on behalf of the calling process.[205] For system calls not exposed by libC, such as the fast userspace mutex,[210] the library provides a function called syscall(2) which can be used to explicitly invoke them.[211]
Pseudo filesystems (e.g., the sysfs and procfs filesystems) and special files (e.g., /dev/random, /dev/sda, /dev/tty, and many others) constitute another layer of interface to kernel data structures representing hardware or logical (software) devices.[212][213]
Kernel-to-userspace ABI
[edit]Because of the differences existing between the hundreds of various implementations of the Linux OS, executable objects, even though they are compiled, assembled, and linked for running on a specific hardware architecture (that is, they use the ISA of the target hardware), often cannot run on different Linux distributions. This issue is mainly due to distribution-specific configurations and a set of patches applied to the code of the Linux kernel, differences in system libraries, services (daemons), filesystem hierarchies, and environment variables.
The main standard concerning application and binary compatibility of Linux distributions is the Linux Standard Base (LSB).[214][215] However, the LSB goes beyond what concerns the Linux kernel, because it also defines the desktop specifications, the X libraries and Qt that have little to do with it.[216] The LSB version 5 is built upon several standards and drafts (POSIX, SUS, X/Open, File System Hierarchy (FHS), and others).[217]
The parts of the LSB more relevant to the kernel are the General ABI (gABI),[218] especially the System V ABI[219][220] and the Executable and Linking Format (ELF),[221][222] and the Processor Specific ABI (psABI), for example the Core Specification for X86-64.[223][224]
The standard ABI for how x86_64 user programs invoke system calls is to load the syscall number into the rax register, and the other parameters into rdi, rsi, rdx, r10, r8, and r9, and finally to put the syscall assembly instruction in the code.[225][226][227]
In-kernel API
[edit]
There are several internal kernel APIs between kernel subsystems. Some are available only within the kernel subsystems, while a somewhat limited set of in-kernel symbols (i.e., variables, data structures, and functions) is exposed to dynamically loadable modules (e.g., device drivers loaded on demand) whether they're exported with the EXPORT_SYMBOL() and EXPORT_SYMBOL_GPL() macros[229][230] (the latter reserved to modules released under a GPL-compatible license).[231]
Linux provides in-kernel APIs that manipulate data structures (e.g., linked lists, radix trees,[232] red-black trees,[233] queues) or perform common routines (e.g., copy data from and to user space, allocate memory, print lines to the system log, and so on) that have remained stable at least since Linux version 2.6.[234][235][236]
In-kernel APIs include libraries of low-level common services used by device drivers:
- SCSI Interfaces and libATA – respectively, a peer-to-peer packet based communication protocol for storage devices attached to USB, SATA, SAS, Fibre Channel, FireWire, ATAPI device,[237] and an in-kernel library to support [S]ATA host controllers and devices.[238]
- Direct Rendering Manager (DRM) and Kernel Mode Setting (KMS) – for interfacing with GPUs and supporting the needs of modern 3D-accelerated video hardware,[239] and for setting screen resolution, color depth and refresh rate[240]
- DMA buffers (DMA-BUF) – for sharing buffers for hardware direct memory access across multiple device drivers and subsystems[241][242][243]
- Video4Linux – for video capture hardware
- Advanced Linux Sound Architecture (ALSA) – for sound cards
- New API – for network interface controllers
- mac80211 and cfg80211 – for wireless network interface controllers[244][245]
In-kernel ABI
[edit]The Linux developers chose not to maintain a stable in-kernel ABI. Modules compiled for a specific version of the kernel cannot be loaded into another version without being recompiled.[196]
Process management
[edit]Linux, as other kernels, has the ability to manage processes including creating, suspending, resuming and terminating. Unlike other operating systems, the Linux kernel implements processes as a group of threads called tasks. If two tasks share the same TGID, then they are called in the kernel terminology a task group. Each task is represented by a task_struct data structure. When a process is created it is assigned a globally unique identifier called PID and cannot be shared[246][247]
A new process can be created by calling clone[248] family of system calls or fork system call. Processes can be suspended and resumed by the kernel by sending signals like SIGSTOP and SIGCONT. A process can terminate itself by calling exit system call, or terminated by another process by sending signals like SIGKILL, SIGABRT or SIGINT.
If the executable is dynamically linked to shared libraries, a dynamic linker is used to find and load the needed objects, prepare the program to run and then run it.[249]
The Native POSIX Thread Library (NPTL)[250] provides the POSIX standard thread interface (pthreads) to userspace. The kernel isn't aware of processes nor threads but it is aware of tasks, thus threads are implemented in userspace. Threads in Linux are implemented as tasks sharing resources, while if they aren't sharing called to be independent processes.
The kernel provides the futex(7) (fast user-space mutex) mechanisms for user-space locking and synchronization.[251] The majority of the operations are performed in userspace but it may be necessary to communicate with the kernel using the futex(2) system call.[210]
As opposed to userspace threads described above, kernel threads run in kernel space.[252] They are threads created by the kernel itself for specialized tasks; they are privileged like the kernel and aren't bound to any process or application.
Scheduling
[edit]The Linux process scheduler is modular, in the sense that it enables different scheduling classes and policies.[253][254] Scheduler classes are plugable scheduler algorithms that can be registered with the base scheduler code. Each class schedules different types of processes. The core code of the scheduler iterates over each class in order of priority and chooses the highest priority scheduler that has a schedulable entity of type struct sched_entity ready to run.[14]: 46–47 Entities may be threads, group of threads, and even all the processes of a specific user.
Linux provides both user preemption as well as full kernel preemption.[14]: 62–63 Preemption reduces latency, increases responsiveness,[255] and makes Linux more suitable for desktop and real-time applications.
For normal tasks, by default, the kernel uses the Completely Fair Scheduler (CFS) class[needs update], introduced in version 2.6.23.[179] The scheduler is defined as a macro in a C header as SCHED_NORMAL. In other POSIX kernels, a similar policy known as SCHED_OTHER allocates CPU timeslices (i.e, it assigns absolute slices of the processor time depending on either predetermined or dynamically computed priority of each process). The Linux CFS does away with absolute timeslices and assigns a fair proportion of CPU time, as a function of parameters like the total number of runnable processes and the time they have already run; this function also takes into account a kind of weight that depends on their relative priorities (nice values).[14]: 46–50
With user preemption, the kernel scheduler can replace the current process with the execution of a context switch to a different one that therefore acquires the computing resources for running (CPU, memory, and more). It makes it according to the CFS algorithm (in particular, it uses a variable called vruntime for sorting entities and then chooses the one that has the smaller vruntime, - i.e., the schedulable entity that has had the least share of CPU time), to the active scheduler policy and to the relative priorities.[256] With kernel preemption, the kernel can preempt itself when an interrupt handler returns, when kernel tasks block, and whenever a subsystem explicitly calls the schedule() function.
The kernel also contains two POSIX-compliant[257] real-time scheduling classes named SCHED_FIFO (realtime first-in-first-out) and SCHED_RR (realtime round-robin), both of which take precedence over the default class.[253] An additional scheduling policy known as SCHED DEADLINE, implementing the earliest deadline first algorithm (EDF), was added in kernel version 3.14, released on 30 March 2014.[258][259] SCHED_DEADLINE takes precedence over all the other scheduling classes.
Real-time PREEMPT_RT patches, included into the mainline Linux since version 2.6, provide a deterministic scheduler, the removal of preemption and interrupt disabling (where possible), PI Mutexes (i.e., locking primitives that avoid priority inversion),[260][261] support for High Precision Event Timers (HPET), preemptive read-copy-update (RCU), (forced) IRQ threads, and other minor features.[262][263][264]
In 2023, Peter Zijlstra proposed replacing CFS with an earliest eligible virtual deadline first scheduling (EEVDF) scheduler,[265][266] to prevent the need for CFS "latency nice" patches.[267] The EEVDF scheduler replaced CFS in version 6.6 of the Linux kernel.[178]
Synchronization
[edit]The kernel has different causes of concurrency (e.g., interrupts, bottom halves, preemption of kernel and users tasks, symmetrical multiprocessing).[14]: 167
For protecting critical regions (sections of code that must be executed atomically), shared memory locations (like global variables and other data structures with global scope), and regions of memory that are asynchronously modifiable by hardware (e.g., having the C volatile type qualifier), Linux provides a large set of tools. They consist of atomic types (which can only be manipulated by a set of specific operators), spinlocks, semaphores, mutexes,[268][14]: 176–198 [269] and lockless algorithms (e.g., RCUs).[270][271][272] Most lock-less algorithms are built on top of memory barriers for the purpose of enforcing memory ordering and prevent undesired side effects due to compiler optimization.[273][274][275][276]
PREEMPT_RT code included in mainline Linux provide RT-mutexes, a special kind of Mutex which do not disable preemption and have support for priority inheritance.[277][278] Almost all locks are changed into sleeping locks when using configuration for realtime operation.[279][264][278] Priority inheritance avoids priority inversion by granting a low-priority task which holds a contended lock the priority of a higher-priority waiter until that lock is released.[280][281]
Linux includes a kernel lock validator called Lockdep.[282][283]
Interrupts
[edit]Although the management of interrupts could be seen as a single job, it is divided into two. This split in two is due to the different time constraints and to the synchronization needs of the tasks whose the management is composed of. The first part is made up of an asynchronous interrupt service routine (ISR) that in Linux is known as the top half, while the second part is carried out by one of three types of the so-called bottom halves (softirq, tasklets, and work queues).[14]: 133–137
Linux interrupt service routines can be nested. A new IRQ can trap into a high priority ISR that preempts any other lower priority ISR.
Memory
[edit]The Linux kernel manages both physical and virtual memory. It divides physical memory into zones,[284] each of which has a specific purpose.
- ZONE_DMA: this zone is suitable for DMA.
- ZONE_NORMAL: for normal memory operations.
- ZONE_HIGHMEM: part of physical memory that is only accessible to the kernel using temporary mapping.
Those zones are the most common, but others exist.[284]
Linux implements virtual memory with 4 or 5-level page tables.[285] The kernel is not pageable (meaning it is always resident in physical memory and cannot be swapped to the disk) and there is no memory protection (no SIGSEGV signals, unlike in user space), therefore memory violations lead to instability and system crashes.[14]: 20 User memory is pageable by default, although paging for specific memory areas can be disabled with the mlock() system call family.
Page frame information is maintained in apposite data structures (of type struct page) that are populated immediately after boot and kept until shutdown, regardless of whether they are associated with virtual pages. The physical address space is divided into different zones, according to architectural constraints and intended use. NUMA systems with multiple memory banks are also supported.[286]
Small chunks of memory can be dynamically allocated in kernel space via the family of kmalloc() APIs and freed with the appropriate variant of kfree(). vmalloc() and kvfree() are used for large virtually contiguous chunks. alloc_pages() allocates the desired number of entire pages.

The kernel used to include the SLAB, SLUB and SLOB allocators as configurable alternatives.[288][289] The SLOB allocator was removed in Linux 6.4[290] and the SLAB allocator was removed in Linux 6.8.[291] The sole remaining allocator is SLUB, which aims for simplicity and efficiency,[289] is PREEMPT_RT compatible[292] and was introduced in Linux 2.6.
Virtual filesystem
[edit]Since Linux supports numerous filesystems with different features and functionality, it is necessary to implement a generic filesystem that is independent from underlying filesystems. The virtual file system interfaces with other Linux subsystems, userspace, or APIs and abstracts away the different implementations of underlying filesystems. VFS implements system calls like create, open, read, write and close.
VFS implements a generic superblock[293] and inode block that is independent from the one that the underlying filesystem has.
In this subsystem directories and files are represented by a struct file data structure. When userspace requests access to a file it is returned a file descriptor (non negative integer value) but in kernel space it is a struct file structure. This structure stores all the information the kernel knows about a file or directory.
sysfs and procfs are virtual filesystems that expose hardware information and userspace programs' runtime information. These filesystems aren't present on disk and instead the kernel implements them as a callback or routine which gets called when they are accessed by userspace.
Supported architectures
[edit]
While not originally designed to be portable,[17][294] Linux is now one of the most widely ported operating system kernels, running on a diverse range of systems from the ARM architecture to IBM z/Architecture mainframe computers. The first port was performed on the Motorola 68000 platform. The modifications to the kernel were so fundamental that Torvalds viewed the Motorola version as a fork and a "Linux-like operating system".[294] However, that moved Torvalds to lead a major restructure of the code to facilitate porting to more computing architectures. The first Linux that, in a single source tree, had code for more than i386 alone, supported the DEC Alpha AXP 64-bit platform.[295][296][294]
Linux runs as the main operating system on IBM's Summit; as of October 2019[update], all of the world's 500 fastest supercomputers run some operating system based on the Linux kernel,[71] a big change from 1998 when the first Linux supercomputer got added to the list.[297]
Linux has also been ported to various handheld devices such as Apple's iPhone 3G and iPod.[298]
Supported devices
[edit]In 2007, the LKDDb project has been started to build a comprehensive database of hardware and protocols known by Linux kernels.[299] The database is built automatically by static analysis of the kernel sources. Later in 2014, the Linux Hardware project was launched to automatically collect a database of all tested hardware configurations with the help of users of various Linux distributions.[300]
Live patching
[edit]This section needs to be updated. (September 2023) |
Rebootless updates can even be applied to the kernel by using live patching technologies such as Ksplice, kpatch and kGraft. Minimalistic foundations for live kernel patching were merged into the Linux kernel mainline in kernel version 4.0, which was released on 12 April 2015. Those foundations, known as livepatch and based primarily on the kernel's ftrace functionality, form a common core capable of supporting hot patching by both kGraft and kpatch, by providing an application programming interface (API) for kernel modules that contain hot patches and an application binary interface (ABI) for the userspace management utilities. However, the common core included into Linux kernel 4.0 supports only the x86 architecture and does not provide any mechanisms for ensuring function-level consistency while the hot patches are applied.
Security
[edit]Kernel bugs present potential security issues. For example, they may allow for privilege escalation or create denial-of-service attack vectors. Over the years, numerous bugs affecting system security were found and fixed.[301] New features are frequently implemented to improve the kernel's security.[302][303]
Capabilities(7) have already been introduced in the section about the processes and threads. Android makes use of them and systemd gives administrators detailed control over the capabilities of processes.[304]
Linux offers a wealth of mechanisms to reduce kernel attack surface and improve security which are collectively known as the Linux Security Modules (LSM).[305] They comprise the Security-Enhanced Linux (SELinux) module, whose code has been originally developed and then released to the public by the NSA,[306] and AppArmor[193] among others. SELinux is now actively developed and maintained on GitHub.[192] SELinux and AppArmor provide support to access control security policies, including mandatory access control (MAC), though they profoundly differ in complexity and scope.
Another security feature is the Seccomp BPF (SECure COMPuting with Berkeley Packet Filters) which works by filtering parameters and reducing the set of system calls available to user-land applications.[307]
Critics have accused kernel developers of covering up security flaws, or at least not announcing them; in 2008, Torvalds responded to this with the following:[308][309]
I personally consider security bugs to be just "normal bugs". I don't cover them up, but I also don't have any reason what-so-ever to think it's a good idea to track them and announce them as something special...one reason I refuse to bother with the whole security circus is that I think it glorifies—and thus encourages—the wrong behavior. It makes "heroes" out of security people, as if the people who don't just fix normal bugs aren't as important. In fact, all the boring normal bugs are way more important, just because there's[sic] a lot more of them. I don't think some spectacular security hole should be glorified or cared about as being any more "special" than a random spectacular crash due to bad locking.
Linux distributions typically release security updates to fix vulnerabilities in the Linux kernel. Many offer long-term support releases that receive security updates for a certain Linux kernel version for an extended period of time.
In 2024, researchers disclosed that the Linux kernel contained a serious vulnerability, CVE-2024-50264, located in the AF_VSOCK subsystem. This bug is a use-after-free flaw, a class of memory corruption issue that occurs when a program continues to use memory after it has been freed.[310][311] Such flaws are particularly dangerous in the kernel, as they can allow attackers to escalate privileges. The bug was resolved in May 2025.[312]
Legal
[edit]Licensing terms
[edit]Initially, Torvalds released Linux under a license which forbade any commercial use.[313] This was changed in version 0.12 by a switch to the GNU General Public License version 2 (GPLv2).[22] This license allows distribution and sale of possibly modified and unmodified versions of Linux but requires that all those copies be released under the same license and be accompanied by - or that, on request, free access is given to - the complete corresponding source code.[314] Torvalds has described licensing Linux under the GPLv2 as the "best thing I ever did".[313]
The Linux kernel is licensed explicitly under GNU General Public License version 2 only (GPL-2.0-only) with an explicit syscall exception (Linux-syscall-note),[8][11][12] without offering the licensee the option to choose any later version, which is a common GPL extension. Contributed code must be available under GPL-compatible license.[13][204]
There was considerable debate about how easily the license could be changed to use later GPL versions (including version 3), and whether this change is even desirable.[315] Torvalds himself specifically indicated upon the release of version 2.4.0 that his own code is released only under version 2.[316] However, the terms of the GPL state that if no version is specified, then any version may be used,[317] and Alan Cox pointed out that very few other Linux contributors had specified a particular version of the GPL.[318]
In September 2006, a survey of 29 key kernel programmers indicated that 28 preferred GPLv2 to the then-current GPLv3 draft. Torvalds commented, "I think a number of outsiders... believed that I personally was just the odd man out because I've been so publicly not a huge fan of the GPLv3."[319] This group of high-profile kernel developers, including Torvalds, Greg Kroah-Hartman and Andrew Morton, commented on mass media about their objections to the GPLv3.[320] They referred to clauses regarding DRM/tivoization, patents, "additional restrictions" and warned a Balkanisation of the "Open Source Universe" by the GPLv3.[320][321] Torvalds, who decided not to adopt the GPLv3 for the Linux kernel, reiterated his criticism even years later.[322]
Loadable kernel modules
[edit]It is debated whether some loadable kernel modules (LKMs) are to be considered derivative works under copyright law, and thereby whether or not they fall under the terms of the GPL.
In accordance with the license rules, LKMs using only a public subset of the kernel interfaces[229][230] are non-derived works, thus Linux gives system administrators the mechanisms to load out-of-tree binary objects into the kernel address space.[13]
There are some out-of-tree loadable modules that make legitimate use of the dma_buf kernel feature.[323] GPL compliant code can certainly use it. However, a different possible use case would be Nvidia Optimus that pairs a fast GPU with an Intel integrated GPU, where the Nvidia GPU writes into the Intel framebuffer when it is active. But, Nvidia cannot use this infrastructure because it necessitates bypassing a rule that can only be used by LKMs that are also GPL.[231] Alan Cox replied on LKML, rejecting a request from one of Nvidia's engineers to remove this technical enforcement from the API.[324] Torvalds clearly stated on the LKML that "[I] claim that binary-only kernel modules ARE derivative "by default"'".[325]
On the other hand, Torvalds has also said that "[one] gray area in particular is something like a driver that was originally written for another operating system (i.e., clearly not a derived work of Linux in origin). THAT is a gray area, and _that_ is the area where I personally believe that some modules may be considered to not be derived works simply because they weren't designed for Linux and don't depend on any special Linux behaviour".[326] Proprietary graphics drivers, in particular, are heavily discussed.
Whenever proprietary modules are loaded into Linux, the kernel marks itself as being "tainted",[327] and therefore bug reports from tainted kernels will often be ignored by developers.
Firmware binary blobs
[edit]The official kernel, that is, Torvalds's git branch at the kernel.org repository, contains binary blobs released under the terms of the GNU GPLv2 license.[8][13] Linux can also load binary blobs, proprietary firmware, drivers, or other executable modules from the filesystem, and link them into kernel space.[328]
When necessary (e.g., for accessing boot devices or for speed), firmware can be built-in to the kernel, meaning building the firmware into vmlinux; however, this is not always a viable option for technical or legal issues (e.g., it is not permitted to do this with firmware that is not GPL compatible, although this is quite common nonetheless).[329]
Trademark
[edit]Linux is a registered trademark of Linus Torvalds in the United States, the European Union, and some other countries.[330][331] A legal battle over the trademark began in 1996, when William Della Croce, a lawyer who was never involved in the development of Linux, started requesting licensing fees for the use of the word Linux. After it was proven that the word was in common use long before Della Croce's claimed first use, the trademark was awarded to Torvalds.[332][333][334]
Removal of Russian maintainers
[edit]In October 2024, during the Russian invasion of Ukraine, kernel developer Greg Kroah-Hartman removed some kernel developers whose email addresses suggested a connection to Russia from their roles as maintainers.[335][336] Linus Torvalds responded that he did not support Russian aggression and would not revert the patch, insinuating that opponents of the patch were Russian trolls.[337] James Bottomley, a kernel developer, issued an apology for the handling of the situation and clarified that the action was a consequence of U.S. sanctions against Russia.[338]
See also
[edit]- Linux – Family of Unix-like operating systems
- Linux kernel version history – Version history of the Linux kernel
- Comparison of operating systems
- Comparison of operating system kernels
- Microkernel – Kernel that provides fewer services than a traditional kernel
- Minix 3 – Unix-like operating system
- macOS – Operating system for Apple computers
- Microsoft Windows – Computer operating systems
Notes
[edit]- ^ As a whole, Linux source is provided under the terms of the GPL-2.0-only license with an explicit syscall exception.[11][12] Aside from that, individual files can be provided under a different license which is required to be compatible with the GPL-2.0-only license (i.e., the GNU General Public License version 2) or a dual license, with one of the choices being the GPL version 2 or a GPLv2 compatible license.[13]
References
[edit]- ^ "Linux Logos and Mascots". Linux Online. 2008. Archived from the original on 15 August 2010. Retrieved 19 September 2024.
- ^ Greg Kroah-Hartman (2 November 2025). "Linux 6.17.7". Retrieved 2 November 2025.
- ^ Greg Kroah-Hartman (2 November 2025). "Linux 6.12.57". Retrieved 2 November 2025.
- ^ Linus Torvalds (2 November 2025). "Linux 6.18-rc4". Retrieved 2 November 2025.
- ^ Russell, Paul Rusty. "GNU Extensions". Unreliable Guide To Hacking The Linux Kernel. Retrieved 4 August 2025.
- ^ MaskRay (12 May 2024). "Exploring GNU extensions in the Linux kernel". MaskRay. Retrieved 4 August 2025.
- ^ Bergmann, Arnd (3 March 2022). "Kbuild: move to -std=gnu11". Linux kernel mailing list (Mailing list). Archived from the original on 16 July 2023. Retrieved 19 October 2025.
- ^ a b c d "COPYING". git.kernel.org. Archived from the original on 2 September 2021. Retrieved 2 September 2021.
- ^ "GNU General Public License v2.0 only". spdx.org. Archived from the original on 16 July 2022. Retrieved 2 September 2021.
- ^ "Linux Syscall Note". spdx.org. Archived from the original on 30 January 2023. Retrieved 2 September 2021.
- ^ a b "GPL-2.0". git.kernel.org. Archived from the original on 16 July 2023. Retrieved 2 September 2021.
- ^ a b "Linux-syscall-note". git.kernel.org. Archived from the original on 18 January 2023. Retrieved 2 September 2021.
- ^ a b c d e f "Linux kernel licensing rules". The Linux Kernel documentation. Archived from the original on 7 March 2020. Retrieved 6 January 2020.
- ^ a b c d e f g h i j k l m n Love, Robert (2010). Linux kernel development (3rd ed.). Upper Saddle River, NJ: Addison-Wesley. ISBN 978-0-672-32946-3. LCCN 2010018961. OCLC 268788260. OL 25534863M.
- ^ "Extensions to the C Language Family". gcc.gnu.org. Archived from the original on 20 November 2020. Retrieved 13 November 2020.
- ^ a b Richardson, Marjorie (1 November 1999). "Interview: Linus Torvalds". Linux Journal. Archived from the original on 14 May 2011. Retrieved 20 August 2009.
- ^ a b Torvalds, Linus Benedict (26 August 1991). "What would you like to see most in minix?". Newsgroup: comp.os.minix. Usenet: 1991Aug25.205708.9541@klaava.Helsinki.FI. Archived from the original on 9 May 2013. Retrieved 14 September 2016.
- ^ a b Welsh, Matt; Dalheimer, Matthias Kalle; Kaufman, Lar (1999). "1: Introduction to Linux". Running Linux (3rd ed.). Sebastopol, California: O'Reilly Media, Inc. p. 5. ISBN 1-56592-976-4. OCLC 50638246.
- ^ "Free minix-like kernel sources for 386-AT - Google Groups". groups.google.com. 5 October 1991. Archived from the original on 1 March 2021. Retrieved 19 March 2020.
- ^ Williams, Sam (March 2002). "Chapter 9: The GNU General Public License". Free as in Freedom: Richard Stallman's Crusade for Free Software. O'Reilly. ISBN 0-596-00287-4. Retrieved 12 November 2010.
- ^ a b c Christine Bresnahan & Richard Blum (2016). LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202. John Wiley & Sons. p. 107. ISBN 9781119150794.
- ^ a b Torvalds, Linus. "Release Notes for Linux v0.12". The Linux Kernel Archives. Archived from the original on 19 August 2007. Retrieved 21 February 2007.
- ^ Fred Hantelmann (2016). LINUX Start-up Guide: A self-contained introduction. Springer Science & Business Media. p. 1. ISBN 9783642607493.
- ^ a b c Fred Hantelmann (2016). LINUX Start-up Guide: A self-contained introduction. Springer Science & Business Media. p. 16. ISBN 9783642607493.
- ^ Summers, David W. (19 January 1992). "Troubles with Partitions". Newsgroup: alt.os.linux. Usenet: 1992Jan19.085628.18752@cseg01.uark.edu. Archived from the original on 2 June 2013. Retrieved 7 January 2007.
- ^ Clegg, Alan B. (31 March 1992). "It's here!". Newsgroup: comp.os.linux. Usenet: 1992Mar31.131811.19832@rock.concert.net. Archived from the original on 2 June 2013. Retrieved 7 January 2007.
- ^ "Appendix A: The Tanenbaum-Torvalds Debate". Open Sources: Voices from the Open Source Revolution. O'Reilly. 1999. ISBN 1-56592-582-3. Retrieved 22 November 2006.
- ^ Tanenbaum, Andy (29 January 1992). "LINUX is obsolete". Newsgroup: comp.os.minix. Usenet: 12595@star.cs.vu.nl. Archived from the original on 17 October 2011. Retrieved 10 May 2006.
- ^ Tanenbaum, Andy (12 May 2006). "Tanenbaum-Torvalds Debate: Part II". VU University Amsterdam. Archived from the original on 5 August 2015. Retrieved 6 January 2007.
- ^ "0.96 out next week". www.krsaborio.net.
- ^ "refs/tags/v0.96a - pub/scm/linux/kernel/git/nico/archive - Git at Google". kernel.googlesource.com. Archived from the original on 27 July 2025. Retrieved 3 May 2025.
- ^ Hayward, David (22 November 2012). "The history of Linux: how time has shaped the penguin". TechRadar. Archived from the original on 19 March 2020. Retrieved 26 March 2020.
- ^ a b c Christine Bresnahan & Richard Blum (2016). LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202. John Wiley & Sons. p. 108. ISBN 9781119150794.
- ^ Torvalds, Linus (9 June 1996). "Linux 2.0 really _is_ released." LKML (Mailing list). Archived from the original on 2 April 2015. Retrieved 8 March 2015.
- ^ a b "Kernel Build System — The Linux Kernel documentation". Kernel.org. Archived from the original on 22 July 2020. Retrieved 17 July 2020.
- ^ a b "Kconfig make config — The Linux Kernel documentation". Kernel.org. Archived from the original on 17 July 2020. Retrieved 13 September 2020.
- ^ Torvalds, Linus (20 January 1999). "2.2.0-final". LKML (Mailing list). Archived from the original on 2 April 2015. Retrieved 8 March 2015.
- ^ a b "The Wonderful World of Linux 2.2". 26 January 1999. Archived from the original on 6 November 2014. Retrieved 27 October 2008.
- ^ "Linux/390 Observations and Notes". linuxvm.org. Archived from the original on 26 February 2019. Retrieved 29 March 2020.
- ^ Torvalds, Linus (4 January 2001). "And oh, btw." LKML (Mailing list). Archived from the original on 26 January 2016. Retrieved 8 March 2015.
- ^ "The Wonderful World of Linux 2.4". Archived from the original on 17 March 2005. Retrieved 27 October 2008.
- ^ Torvalds, Linus (17 December 2003). "Linux 2.6.0". LKML (Mailing list). Archived from the original on 2 April 2015. Retrieved 28 February 2015.
- ^ "proc(5) - Linux manual page" (see /proc/sys/kernel/pid_max). Archived from the original on 7 February 2014. Retrieved 19 February 2014.
- ^ "btrfs Wiki". btrfs.wiki.kernel.org. Archived from the original on 25 April 2012. Retrieved 17 July 2020.
- ^ Fred Hantelmann (2016). LINUX Start-up Guide: A self-contained introduction. Springer Science & Business Media. pp. 1–2. ISBN 9783642607493.
- ^ Linux Kernel Mailing List (17 June 2005). "Linux 2.6.12". git-commits-head (Mailing list). Archived from the original on 26 January 2016. Retrieved 23 January 2008.
- ^ Kroah-Hartman, Greg (3 August 2006). "Adrian Bunk is now taking over the 2.6.16-stable branch". LKML (Mailing list). Archived from the original on 26 January 2016. Retrieved 21 February 2015.
- ^ Rothwell, Stephen (12 February 2008). "Announce: Linux-next (Or Andrew's dream :-))". LKML (Mailing list). Archived from the original on 24 November 2010. Retrieved 30 October 2010.
- ^ Corbet, Jonathan (21 October 2010). "linux-next and patch management process". LWN.net. Eklektix, Inc. Archived from the original on 21 June 2010. Retrieved 30 October 2010.
- ^ "The Linux Kernel Archives". Kernel.org. Archived from the original on 30 January 1998. Retrieved 22 January 2014.
- ^ "Add a personality to report 2.6.x version numbers [LWN.net]". lwn.net. Archived from the original on 16 July 2020. Retrieved 15 July 2020.
- ^ a b Torvalds, Linus (21 July 2011). "Linux 3.0 release". Linux kernel mailing list. Archived from the original on 18 October 2019. Retrieved 16 May 2013.
- ^ Torvalds, Linus (30 May 2011). "Linux 3.0-rc1". LKML (Mailing list). Archived from the original on 31 May 2011. Retrieved 1 July 2013.
- ^ Torvalds, Linus (10 April 2001). "Re: [PATCH] i386 rw_semaphores fix". yarchive.net. Retrieved 26 May 2024.
- ^ Vaughan-Nichols, Steven J. (13 December 2012). "Good-Bye 386: Linux to drop support for i386 chips with next major release". ZDNet. CBS Interactive. Archived from the original on 17 February 2015. Retrieved 6 February 2013.
- ^ Fingas, Jon (15 December 2012). "Linux to drop i386 support in the 3.8 kernel, make us upgrade our Doom rig". Engadget. AOL. Archived from the original on 2 April 2015. Retrieved 22 March 2015.
- ^ Vaughan-Nichols, Steven J. (11 December 2012). "Linux 3.7 arrives, ARM developers rejoice". ZDNet. CBS Interactive. Archived from the original on 5 November 2014. Retrieved 6 February 2013.
- ^ Torvalds, Linus (12 April 2015). "Linux 4.0 released". LKML (Mailing list). Archived from the original on 13 April 2015. Retrieved 12 April 2015.
- ^ Torvalds, Linus (2 September 2013). "Linux 3.11". LKML (Mailing list). Archived from the original on 26 February 2014. Retrieved 3 September 2013.
- ^ "Linux 3.11". kernelnewbies.org. 2 September 2013. Archived from the original on 14 November 2021. Retrieved 21 January 2014.
- ^ "The Linux Foundation Releases Linux Development Report". Linux Foundation. 18 February 2015. Archived from the original on 19 July 2016. Retrieved 20 February 2015.
- ^ Michael Larabel (23 June 2014). "Linux Kernel At 19.5 Million Lines Of Code, Continues Rising". Phoronix. Archived from the original on 23 November 2020. Retrieved 23 June 2015.
- ^ a b Torvalds, Linus (3 March 2019). "Linus Torvalds: Linux 5.0". LKML. Archived from the original on 25 August 2024. Retrieved 25 August 2024.
- ^ Prakash, Abhishek (11 January 2023). "Linux Kernel 5.0 Released! Check Out The New Features". It's FOSS. Archived from the original on 25 August 2024. Retrieved 25 August 2024.
- ^ Larabel, Micheal (6 January 2019). "The Many New Features & Improvements Of The Linux 5.0 Kernel". www.phoronix.com. Archived from the original on 16 October 2024. Retrieved 25 August 2024.
- ^ Corbet, Jonathan (3 August 2020). "Some statistics from the 5.8 kernel cycle". LWN - Linux Weekly News. Archived from the original on 4 September 2020. Retrieved 11 August 2020.
- ^ "Stack Overflow Developer Survey 2019 - most popular technologies". Stack Overflow. Archived from the original on 8 October 2020. Retrieved 17 March 2020.
- ^ "Stack Overflow Developer Survey 2019 - development environments and tools". Stack Overflow. Archived from the original on 7 March 2020. Retrieved 17 March 2020.
- ^ "Usage Statistics and Market Share of Operating Systems for Websites, March 2020". w3techs.com. Retrieved 17 March 2020.
- ^ "Usage Statistics and Market Share of Unix for Websites, March 2020". w3techs.com. Archived from the original on 25 September 2021. Retrieved 17 March 2020.
- ^ a b "TOP500 Supercomputer Sites: Operating system Family / Linux". Top500.org. Archived from the original on 19 November 2012. Retrieved 10 August 2025.
- ^ "Gartner Says Sales of Tablets Will Represent Less Than 10 Percent of All Devices in 2014" (Press release). Egham, UK: Gartner. 15 October 2014. Archived from the original on 17 October 2014. Retrieved 19 October 2014.
- ^ Lunden, Ingrid (15 October 2014). "Tablet Sales Growth Plummets In 2014 As Android Smartphones Continue To Soar: Gartner". TechCrunch. AOL. Archived from the original on 23 October 2014. Retrieved 23 October 2014.
- ^ "Global PC Shipments Exceed Forecast with Mild Improvement in Consumer Demand, While Apple Moves to #5 Spot, According to IDC" (Press release). Framingham, MA: IDC. 8 October 2014. Archived from the original on 11 October 2014. Retrieved 19 October 2014.
- ^ Wheeler, David A. "Linux Kernel 2.6: It's Worth More!". Archived from the original on 20 August 2011. Retrieved 18 January 2007.
- ^ "Economic impact of FLOSS on innovation and competitiveness of the EU ICT sector" (PDF) (Table 3 on page 50). Archived (PDF) from the original on 15 February 2010. Retrieved 8 January 2011.
- ^ "Estimating Total Development Cost Of a Linux Distribution" (PDF) (Table on page 6). Archived from the original (PDF) on 11 July 2010.
- ^ "The Billion Dollar Kernel". Linux.slashdot.org. 24 February 2010. Archived from the original on 15 May 2011. Retrieved 12 November 2010.
- ^ Wheeler, David. "The Linux Kernel: It's Worth More!". Archived from the original on 24 February 2021. Retrieved 17 September 2012.
- ^ "The Linux Kernel Archives". www.kernel.org. Archived from the original on 21 February 2011. Retrieved 28 February 2023.
- ^ a b "2017 State of Linux Kernel Development". The Linux Foundation. 25 October 2017. Archived from the original on 27 May 2020. Retrieved 27 May 2020.
- ^ "Why I quit: kernel developer Con Kolivas". APC Magazine. ACP Magazines. 24 July 2007. Archived from the original on 7 July 2011. Retrieved 15 August 2011.
- ^ Corbet, Jonathan (25 July 2007). "Re: -mm merge plans for 2.6.23". LWN.net. Archived from the original on 11 February 2018. Retrieved 10 February 2018.
- ^ Cox, Alan (28 July 2009). "Re: [PATCH] kdesu broken". Archived from the original on 11 February 2018. Retrieved 10 February 2018.
- ^ Rodrigues, Goldwyn (22 January 2011). "A tale of two SCSI targets". Archived from the original on 15 February 2018. Retrieved 14 February 2018.
- ^ Steinmetz, Andreas (17 January 2013). "LIO - the broken iSCSI target implementation". Archived from the original on 15 February 2018. Retrieved 14 February 2018.
- ^ Paul, Ryan (19 June 2012). "Linus Torvalds says "f–k you" to NVIDIA". Archived from the original on 15 February 2018. Retrieved 14 February 2018.
- ^ John Gold (3 April 2014). "Linus Torvalds suspends key Linux developer: Kernel panic as Systemd dev pokes the bear". Archived from the original on 24 March 2019. Retrieved 24 March 2019.
- ^ Poettering, Lennart (6 October 2014). "On the sickness of the Linux Kernel Community". Google+. Archived from the original on 27 May 2018. Retrieved 10 February 2018.
- ^ Brodkin, Jon (6 March 2015). "VMware alleged to have violated Linux's open source license for years". Ars Technica. Archived from the original on 15 February 2018. Retrieved 14 February 2018.
- ^ McCarthy, Kieren (26 August 2016). "Having offended everyone else in the world, Linus Torvalds calls own lawyers a 'nasty festering disease'". The Register. Archived from the original on 15 February 2018. Retrieved 14 February 2018.
- ^ Kroah-Hartman, Greg. "[PATCH 000/190] Revertion of all of the umn.edu commits". Linux Kernel Mailing List Archive. Archived from the original on 13 January 2022. Retrieved 13 January 2022.
- ^ Chin, Monica (30 April 2021). "How a university got itself banned from the Linux kernel". The Verge. Archived from the original on 13 January 2022. Retrieved 13 January 2022.
- ^ Corbet, Jonathan (10 September 2007). "KS2007: Developer relations and development process". LWN.net. Archived from the original on 12 February 2018. Retrieved 11 February 2018.
- ^ Brodkin, Jon (16 July 2013). "Linus Torvalds defends his right to shame Linux kernel developers". ARS Technica. Archived from the original on 17 February 2018. Retrieved 11 February 2018.
- ^ Corbet, Jonathan (9 March 2015). "The kernel's code of conflict". LWN.net. Archived from the original on 12 February 2018. Retrieved 11 February 2018.
- ^ Corbet, Jonathan (18 September 2018). "Code, conflict, and conduct". LWN.net. Archived from the original on 19 September 2018. Retrieved 19 September 2018.
- ^ Cohen, Noam (19 September 2018). "After Years of Abusive E-mails, the Creator of Linux Steps Aside". The New Yorker. Archived from the original on 20 February 2020. Retrieved 24 September 2018.
- ^ Larabel, Michael. "Dropping Profanity In Kernel Code Comments: Linux Gets "Hugs"". Phoronix. Archived from the original on 21 April 2019. Retrieved 15 June 2019.
- ^ "Code of Conflict". Retrieved 4 February 2018.[permanent dead link]
- ^ Sharwood, Simon (6 October 2015). "Linux kernel dev who asked Linus Torvalds to stop verbal abuse quits over verbal abuse". The Register. Archived from the original on 29 March 2020. Retrieved 4 February 2018.
- ^ Edge, Jake (31 January 2018). "Too many lords, not enough stewards". LWN.net. Archived from the original on 9 November 2020. Retrieved 4 February 2018.
- ^ Corbet, Jonathan (6 November 2017). "Bash the kernel maintainers". LWN.net. Archived from the original on 26 January 2021. Retrieved 4 February 2018.
- ^ "Linux Evolution" (PDF). 26 March 2008. Archived (PDF) from the original on 14 December 2013. Retrieved 6 November 2013.
- ^ "Perpetual Development: A Model of the Linux Kernel Life Cycle" (PDF). 25 October 2011. Archived (PDF) from the original on 17 October 2013. Retrieved 6 November 2013.
- ^ Kroah-Hartman, Greg (12 February 2008). "Re: Announce: Linux-next (Or Andrew's dream :-))". Linux Kernel Mailing List (Mailing list). Archived from the original on 2 February 2017. Retrieved 30 January 2017.
- ^ Robert Love (2010). Linux Kernel Development: Linux Kernel Development. Pearson Education. p. 11. ISBN 9780768696790.
- ^ Robert Love (2010). Linux Kernel Development: Linux Kernel Development. Pearson Education. p. 12. ISBN 9780768696790.
- ^ "How the development process works". Archived from the original on 9 December 2017. Retrieved 4 February 2018.
- ^ Robert Love (2010). Linux Kernel Development: Linux Kernel Development. Pearson Education. p. 13. ISBN 9780768696790.
- ^ "Contributor Covenant Code of Conduct". The Linux Kernel documentation. Archived from the original on 6 October 2021. Retrieved 6 October 2021.
- ^ "Linux Kernel Contributor Covenant Code of Conduct Interpretation". The Linux Kernel Documentation. Archived from the original on 6 October 2021. Retrieved 6 October 2021.
- ^ Williams, Dan. "[PATCH] CodingStyle: Inclusive Terminology". Linux Kernel Mailing List. Archived from the original on 22 October 2021. Retrieved 22 October 2021.
- ^ Tim Anderson. "Linux kernel minimum compiler raised to GCC 5.1, allowing potential C11 use". The Register. Retrieved 12 May 2023.
- ^ Larabel, Michael. "The Switch Has Been Made From C89 To C11/GNU11 With Linux 5.18". www.phoronix.com. Archived from the original on 12 May 2023. Retrieved 12 May 2023.
- ^ Proven, Liam. "Linux 6.1: Rust to hit mainline kernel". The Register. Archived from the original on 12 October 2022. Retrieved 12 May 2023.
- ^ Sharwood, Simon (11 December 2022). "Linus Torvalds reveals Linux kernel 6.1". The Register. Archived from the original on 12 May 2023. Retrieved 12 May 2023.
- ^ Corbet, Jonathan. "Rust in the 6.2 kernel". LWN.net. Archived from the original on 3 June 2023. Retrieved 12 May 2023.
- ^ Larabel, Michael. "More Rust Code Readied For Linux 6.3 - Closer To Having Rust Drivers Upstreamed". Phoronix. Archived from the original on 12 May 2023. Retrieved 12 May 2023.
- ^ "HOWTO do Linux kernel development — The Linux Kernel documentation". Kernel.org. Archived from the original on 7 March 2020. Retrieved 4 January 2020.
- ^ "Linux kernel coding style — The Linux Kernel documentation". Kernel.org. Archived from the original on 5 January 2020. Retrieved 4 January 2020.
- ^ a b "How the development process works — The Linux Kernel documentation". Kernel.org. Archived from the original on 9 December 2017. Retrieved 26 March 2020.
- ^ Kubbilun, Ingo A. (2 June 2004). "Linux kernel patch for Intel Compiler" (in German). Pyrillion.org. Archived from the original on 22 July 2011. Retrieved 12 November 2010.
- ^ timothy (26 February 2009). "High Performance Linux Kernel Project — LinuxDNA". Slashdot Linux. Dice Holdings. Archived from the original on 18 October 2019. Retrieved 30 October 2010.
- ^ Ryan, Justin (25 February 2009). "LinuxDNA Supercharges Linux with the Intel C/C++ Compiler". Linux Journal. Belltown Media, Inc. Archived from the original on 9 November 2020. Retrieved 30 October 2010.
- ^ Larabel, Michael (5 March 2023). "Linux 6.3 Drops Support For The Intel ICC Compiler". Phoronix. Archived from the original on 6 March 2023. Retrieved 6 March 2023.
- ^ Lelbach, Bryce (25 October 2010). "Clang builds a working Linux Kernel (Boots to RL5 with SMP, networking and X, self hosts)". cfe-dev (Mailing list). Archived from the original on 7 September 2015.
- ^ Larabel, Michael (12 April 2014). "Linux 3.15 Can Almost Be Compiled Under LLVM's Clang". Phoronix. Archived from the original on 13 August 2020. Retrieved 10 June 2014.
- ^ Larabel, Michael (22 August 2014). "Patch By Patch, LLVM Clang Gets Better At Building The Linux Kernel". Phoronix. Archived from the original on 13 August 2020. Retrieved 10 August 2025.
- ^ Edge, Jake (7 May 2013). "LFCS: The LLVMLinux project". LWN.net. Archived from the original on 10 August 2020. Retrieved 3 March 2015.
- ^ Möller, Jan-Simon (2 February 2014). "LLVMLinux: The Linux Kernel with Dragon Wings" (PDF). LLVM Project. Archived (PDF) from the original on 3 August 2020. Retrieved 3 March 2015.
- ^ Desaulniers, Nick; Hackmann, Greg; Hines, Stephen (18 October 2017). "2017 LLVM Developers' Meeting: Compiling Android userspace and Linux kernel with LLVM" (video). youtube.com. llvm.org. Archived from the original on 31 December 2020. Retrieved 10 August 2025.
- ^ Hackmann, Greg (2 February 2017). "marlin-nougat-mr1-clang Patch Series". Archived from the original on 10 December 2020. Retrieved 6 December 2020.
- ^ Kaehlcke, Matthias (22 October 2018). "cros-kernel2: Make clang the default compiler for kernel builds". Archived from the original on 10 December 2020. Retrieved 6 December 2020.
- ^ Larabel, Michael (4 February 2019). "Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google". Phoronix. Archived from the original on 25 November 2020. Retrieved 6 December 2020.
- ^ Desaulniers, Nick (10 December 2019). "vts: kernel: enforce vts_kernel_toolchain for all TARGET_ARCH for R". Archived from the original on 10 December 2020. Retrieved 6 December 2020.
- ^ Desaulniers, Nick (19 November 2020). "Re: violating function pointer signature". LKML. Archived from the original on 14 April 2021. Retrieved 6 December 2020.
- ^ Bradford, John (8 March 2003). "Re: what's an OOPS". LKML (Mailing list). Archived from the original on 31 October 2014. Retrieved 30 October 2010.
- ^ "syslog(2) - Linux manual page". man7.org. Archived from the original on 13 October 2020. Retrieved 15 August 2020.
- ^ "kmsg: export printk records to the /dev/kmsg interface [LWN.net]". lwn.net. Archived from the original on 2 October 2015. Retrieved 16 August 2020.
- ^ See what your computer is doing with Ftrace utilities, 24 January 2019, archived from the original on 15 December 2021, retrieved 9 May 2021
- ^ "Debugging the kernel using Ftrace - part 1 [LWN.net]". lwn.net. Archived from the original on 9 November 2020. Retrieved 15 September 2020.
- ^ "Debugging the kernel using Ftrace - part 2 [LWN.net]". lwn.net. Archived from the original on 31 March 2020. Retrieved 15 September 2020.
- ^ "ftrace - Function Tracer — The Linux Kernel documentation". Kernel.org. Archived from the original on 19 September 2020. Retrieved 15 September 2020.
- ^ "Boot-time tracing — The Linux Kernel documentation". Kernel.org. Archived from the original on 31 October 2020. Retrieved 19 September 2020.
- ^ "Kernel Probes (Kprobes) — The Linux Kernel documentation". Kernel.org. Archived from the original on 11 October 2020. Retrieved 6 October 2020.
- ^ "Uprobe-tracer: Uprobe-based Event Tracing — The Linux Kernel documentation". Kernel.org. Archived from the original on 4 December 2020. Retrieved 6 October 2020.
- ^ "Using kgdb, kdb and the kernel debugger internals". mirrors.edge.kernel.org. Archived from the original on 26 January 2021. Retrieved 3 November 2020.
- ^ Gene Sally (2010). Pro Linux Embedded Systems. Apress. p. 252. ISBN 9781430272267.
- ^ Billimoria, Kaiwan N. (2021). Linux Kernel Programming A Comprehensive Guide to Kernel Internals, Writing Kernel Modules, and Kernel Synchronization. Birmingham: Packt Publishing, Limited. p. 55. ISBN 978-1-78995-592-7. OCLC 1240585605.
- ^ Vaduva, Alexandru; Gonzalez, Alex; Simmonds, Chris (2016). Linux : embedded development : leverage the power of Linux to develop captivating and powerful embedded Linux projects : a course in three modules. Birmingham, UK: Packt Publishing. p. 663. ISBN 978-1-78712-445-5. OCLC 960471438.
- ^ Karim Yaghmour (2008). Building embedded Linux systems (2nd ed.). Sebastopol [Calif.]: O'Reilly Media. p. 387. ISBN 978-0-596-52968-0. OCLC 273049576.
- ^ Yaghmour, Karim (2011). Embedded Android. Sebastopol, CA: O'Reilly Media. p. 44. ISBN 978-1-4493-2798-9. OCLC 812180000.
- ^ "SoC (System on a Chip)". OpenWrt Wiki. 6 November 2014. Archived from the original on 23 August 2022. Retrieved 15 March 2021.
- ^ "What to do about CVE numbers [LWN.net]". lwn.net. Archived from the original on 23 April 2021. Retrieved 15 March 2021.
- ^ Amadeo, Ron (20 November 2019). "Google outlines plans for mainline Linux kernel support in Android". Ars Technica. Archived from the original on 9 April 2021. Retrieved 31 March 2021.
- ^ Bruchon, Jody (24 April 2021), jbruchon/elks, archived from the original on 2 May 2021, retrieved 27 April 2021
- ^ "The state of preempt-rt". linuxplumbersconf.org. Archived from the original on 15 October 2016. Retrieved 14 June 2016.
- ^ Meyer, David (3 February 2010). "Linux developer explains Android kernel code removal". ZDNet. CBS Interactive. Archived from the original on 15 October 2016. Retrieved 3 February 2010.
- ^ "Chapter 03: maemo Platform Overview". maemo Technology Overview. Nokia. 2008. Archived from the original on 16 June 2008. Retrieved 9 April 2010.
- ^ Kroah-Hartman, Greg (2 February 2010). "Android and the Linux kernel community". Archived from the original on 27 April 2019. Retrieved 3 February 2010.
- ^ a b Roger Ye (2017). Android System Programming. Packt Publishing. p. 14. ISBN 9781787120389.
- ^ Torvalds, Linus (19 September 2001). "The Origins of Linux—Linus Torvalds". YouTube. Archived from the original on 15 December 2021. Retrieved 6 December 2020.
- ^ "Linux MAINTAINERS file". Archived from the original on 12 January 2013.
- ^ Alexandru Vaduva, Alex Gonzalez & Chris Simmonds (2016). Linux: Embedded Development. Packt Publishing. p. 663. ISBN 9781787124455.
- ^ "Linux for little systems [LWN.net]". lwn.net. Archived from the original on 27 July 2025. Retrieved 22 November 2024.
- ^ "Kernel tinification [LWN.net]". lwn.net. Archived from the original on 12 November 2024. Retrieved 22 November 2024.
- ^ Brown, Eric (13 April 2017). "Shrinking the Linux Kernel and File System for IoT". Linux.com. Archived from the original on 6 October 2024. Retrieved 22 November 2024.
- ^ Shizukuishi, Takuya; Matsubara, Katsuya (30 March 2020). "An efficient tinification of the linux kernel for minimizing resource consumption". Proceedings of the 35th Annual ACM Symposium on Applied Computing. pp. 1228–1237. doi:10.1145/3341105.3373913. ISBN 978-1-4503-6866-7. Archived from the original on 20 January 2025. Retrieved 22 November 2024.
- ^ "README". git.kernel.org. Archived from the original on 24 July 2012. Retrieved 24 March 2021.
- ^ "KernelBuild - Linux Kernel Newbies". kernelnewbies.org. Archived from the original on 19 October 2020. Retrieved 13 September 2020.
- ^ "The Sysctl Interface". Linux.it. Archived from the original on 17 February 2020. Retrieved 13 September 2020.
- ^ "sysctl(8) - Linux manual page". man7.org. Archived from the original on 30 September 2020. Retrieved 13 September 2020.
- ^ "procfs(5) - Linux manual page". man7.org. Archived from the original on 24 September 2020. Retrieved 13 September 2020.
- ^ "sched(7) - Linux manual page". man7.org. Archived from the original on 17 July 2020. Retrieved 27 July 2020.
- ^ "FAQ: Preemption". kernelnewbies.org. 22 August 2009. Archived from the original on 7 August 2020. Retrieved 7 May 2015.
- ^ a b Jonathan Corbet (24 February 2003). "Driver porting: the preemptible kernel". LWN.net. Archived from the original on 10 August 2020. Retrieved 7 May 2015.
- ^ a b "EEVDF Scheduler Merged For Linux 6.6, Intel Hybrid Cluster Scheduling Re-Introduced". Phoronix. Archived from the original on 11 September 2023. Retrieved 10 September 2023.
- ^ a b Molnár, Ingo (13 April 2007). "[patch] Modular Scheduler Core and Completely Fair Scheduler [CFS]". LKML (Mailing list). Archived from the original on 3 November 2020. Retrieved 30 March 2020.
- ^ "Completely Fair Scheduler | Linux Journal". Linuxjournal.com. Archived from the original on 3 August 2020. Retrieved 30 March 2020.
- ^ "ioctl(2) - Linux manual page". man7.org. Archived from the original on 20 July 2020. Retrieved 11 August 2020.
- ^ "aio(7) - Linux manual page". man7.org. Archived from the original on 12 April 2020. Retrieved 11 August 2020.
- ^ "io_setup(2) - Linux manual page". man7.org. Archived from the original on 20 August 2020. Retrieved 11 August 2020.
- ^ "KVM". Linux-kvm.org. Archived from the original on 28 March 2020. Retrieved 29 March 2020.
- ^ "TechComparison - Linux Virtualization Wiki". Virt.kernelnewbies.org. Archived from the original on 3 August 2020. Retrieved 29 March 2020.
- ^ "Virtualization_support_through_KVM in Linux_2_6_20 - Linux Kernel Newbies". Kernelnewbies.org. Archived from the original on 29 November 2019. Retrieved 29 March 2020.
- ^ Coekaerts, Wim. "Linux mainline contains all the Xen code bits for Dom0 and DomU support". blogs.oracle.com. Archived from the original on 3 August 2020. Retrieved 29 March 2020.
- ^ "Xen celebrates full Dom0 and DomU support in Linux 3.0 – blog.xen.org". 7 June 2011. Archived from the original on 7 June 2011. Retrieved 29 March 2020.
- ^ Wilk, Konrad Rzeszutek (31 January 2014). "Linux 3.14 and PVH". Xen Project. Archived from the original on 29 March 2020. Retrieved 29 March 2020.
- ^ "Introduction to Xen Virtualization | Virtualization Guide | openSUSE Leap 15.2". doc.opensuse.org. Archived from the original on 28 September 2020. Retrieved 29 September 2020.
- ^ "Virtualization technology | Virtualization Guide | openSUSE Leap 15.3". doc.opensuse.org. Archived from the original on 30 September 2021. Retrieved 30 September 2021.
- ^ a b "SELinux Project". GitHub. Archived from the original on 12 December 2019. Retrieved 10 January 2020.
- ^ a b "AppArmor". The Linux Kernel documentation. Archived from the original on 8 May 2020. Retrieved 10 January 2020.
- ^ Jake Edge (25 November 2008). "Character devices in user space". LWN.net. Archived from the original on 26 January 2021. Retrieved 7 May 2015.
- ^ Jonathan Corbet (2 May 2007). "UIO: user-space drivers". LWN.net. Archived from the original on 11 November 2020. Retrieved 7 May 2015.
- ^ a b c d "stable-api-nonsense - Linux kernel source tree". git.kernel.org. Archived from the original on 5 March 2021. Retrieved 18 April 2020.
- ^ Gorman, Mel (15 February 2004). Understanding the Linux Virtual Memory Manager (PDF). Prentice Hall. p. 26. ISBN 0-13-145348-3. Archived (PDF) from the original on 3 May 2019. Retrieved 27 January 2020.
- ^ Greg Ungerer. "uClinux mainline Announcement". Archived from the original on 31 October 2007. Retrieved 15 January 2008.
- ^ a b Nguyen, Binh (30 July 2004). "Linux Filesystem Hierarchy: Chapter 1. Linux Filesystem Hierarchy". The Linux Documentation Project. Archived from the original on 2 December 2020. Retrieved 28 November 2012.
- ^ "Admin Guide README". Kernel.org git repositories.
- ^ "Linux kernel release 5.x — The Linux Kernel documentation". Kernel.org. Archived from the original on 7 March 2020. Retrieved 4 January 2020.
- ^ "README\ABI\Documentation - kernel/git/torvalds/linux.git - Linux kernel source tree". git.kernel.org. Archived from the original on 1 October 2020. Retrieved 18 April 2020.
- ^ "syscalls\stable\ABI\Documentation - kernel/git/torvalds/linux.git - Linux kernel source tree". git.kernel.org. Archived from the original on 2 October 2020. Retrieved 18 April 2020.
- ^ a b "1.Intro.rst - Documentation/process/1.Intro.rst - Linux source code (v5.8) - Bootlin". elixir.bootlin.com. Archived from the original on 14 April 2021. Retrieved 8 August 2020.
- ^ a b "syscalls". man7. Archived from the original on 15 January 2020. Retrieved 28 January 2020.
- ^ "intro(2) - Linux manual page". man7.org. Archived from the original on 17 July 2020. Retrieved 16 July 2020.
- ^ "clone". man7.org. Archived from the original on 18 January 2020. Retrieved 28 January 2020.
- ^ "feature_test_macros". man7.org. Archived from the original on 19 January 2020. Retrieved 28 January 2020.
- ^ "vdso(7) - Linux manual page". man7.org. Archived from the original on 2 February 2020. Retrieved 2 February 2020.
- ^ a b "futex(2) - Linux manual page". man7.org. Archived from the original on 31 January 2020. Retrieved 2 February 2020.
- ^ "syscall(2) - Linux manual page". man7.org. Archived from the original on 21 January 2020. Retrieved 2 February 2020.
- ^ "sysfs(5) - Linux manual page". man7.org. Archived from the original on 18 January 2020. Retrieved 6 January 2020.
- ^ "Rules on how to access information in sysfs — The Linux Kernel documentation". Kernel.org. Archived from the original on 7 March 2020. Retrieved 6 January 2020.
- ^ "Linux Foundation Referenced Specifications". refspecs.linuxbase.org. Retrieved 3 February 2020.
- ^ "LSB Specifications". refspecs.linuxbase.org. Retrieved 3 February 2020.
- ^ "Linux Standard Base Desktop Specification, Generic Part". refspecs.linuxbase.org. Retrieved 3 February 2020.
- ^ "Normative References". refspecs.linuxfoundation.org. Archived from the original on 12 August 2020. Retrieved 3 February 2020.
- ^ "Linux Standard Base Core Specification, Generic Part". refspecs.linuxfoundation.org. Archived from the original on 29 November 2019. Retrieved 3 February 2020.
- ^ "System V Application Binary Interface - Edition 4.1" (PDF). Sco.com. Archived (PDF) from the original on 13 December 2019. Retrieved 3 February 2020.
- ^ "Xinuos Inc. | Developers | Gabi | 17 December 2003 | System V Application Binary Interface - DRAFT". Sco.com. Archived from the original on 3 February 2020. Retrieved 3 February 2020.
- ^ "Executable And Linking Format (ELF)". Refspecs.linuxbase.org. Retrieved 3 February 2020.
- ^ "elf(5) - Linux manual page". man7.org. Archived from the original on 30 November 2020. Retrieved 18 November 2020.
- ^ "Linux Standard Base Core Specification for X86-64". Refspecs.linuxbase.org. Retrieved 3 February 2020.
- ^ "System V Application Binary Interface - DRAFT". Refspecs.linuxbase.org. Retrieved 3 February 2020.
- ^ Seyfarth, Ray (2012). Introduction to 64 Bit Intel Assembly Language Programming for Linux. CreateSpace Independent Publishing Platform. p. 170. ISBN 9781478119203.
- ^ Drysdale, David (9 July 2014). "Anatomy of a system call, part 1 [LWN.net]". lwn.net. Archived from the original on 18 August 2020. Retrieved 16 July 2020.
- ^ "Anatomy of a system call, part 2 [LWN.net]". lwn.net. Archived from the original on 6 August 2020. Retrieved 16 July 2020.
- ^ Deucher, Alex (7 October 2014). "AMD's New Unified Open Source Driver". X.Org Foundation. Archived from the original on 21 January 2015. Retrieved 21 January 2015.
- ^ a b "Symbols - Unreliable Guide To Hacking The Linux Kernel — The Linux Kernel documentation". Kernel.org. Archived from the original on 3 August 2020. Retrieved 8 February 2020.
- ^ a b "Exported symbols and the internal API [LWN.net]". Lwn.net. Archived from the original on 31 March 2020. Retrieved 15 March 2020.
- ^ a b "Unexporting kallsyms_lookup_name() [LWN.net]". Lwn.net. Archived from the original on 1 April 2020. Retrieved 15 March 2020.
- ^ "Trees I: Radix trees [LWN.net]". lwn.net. Archived from the original on 8 November 2020. Retrieved 13 November 2020.
- ^ "Trees II: red-black trees [LWN.net]". lwn.net. Archived from the original on 13 November 2020. Retrieved 13 November 2020.
- ^ "Unreliable Guide To Hacking The Linux Kernel". Kernel.org (1st ed.). 2005. Archived from the original on 16 February 2020. Retrieved 15 March 2020.
- ^ "Unreliable Guide To Hacking The Linux Kernel — The Linux Kernel documentation". Kernel.org. Archived from the original on 7 March 2020. Retrieved 15 March 2020.
- ^ "Unreliable Guide To Locking — The Linux Kernel documentation". Kernel.org. Archived from the original on 7 March 2020. Retrieved 15 March 2020.
- ^ "SCSI Interfaces Guide — The Linux Kernel documentation". Kernel.org. Archived from the original on 2 June 2020. Retrieved 11 June 2020.
- ^ "libATA Developer's Guide — The Linux Kernel documentation". Kernel.org. Archived from the original on 30 May 2020. Retrieved 11 June 2020.
- ^ "DRM Internals — The Linux Kernel documentation". Kernel.org. Archived from the original on 1 June 2020. Retrieved 11 June 2020.
- ^ "Kernel Mode Setting (KMS) — The Linux Kernel documentation". Kernel.org. Archived from the original on 11 June 2020. Retrieved 11 June 2020.
- ^ "Introduce DMA buffer sharing mechanism [LWN.net]". lwn.net. Archived from the original on 11 June 2020. Retrieved 11 June 2020.
- ^ "Sharing CPU and GPU buffers on Linux*". 01.org. 12 May 2016. Archived from the original on 11 June 2020. Retrieved 11 June 2020.
- ^ "Buffer Sharing and Synchronization — The Linux Kernel documentation". Kernel.org. Archived from the original on 1 June 2020. Retrieved 11 June 2020.
- ^ "About mac80211". Linux Kernel Organization, Inc. Archived from the original on 1 February 2021. Retrieved 8 June 2014.
- ^ "Linux 802.11 Driver Developer's Guide — The Linux Kernel documentation". Kernel.org. Archived from the original on 19 November 2021. Retrieved 19 November 2021.
- ^ "clone(2) - Linux manual page". man7.org. Archived from the original on 15 July 2020. Retrieved 15 July 2020.
- ^ "clone3(), fchmodat4(), and fsinfo() [LWN.net]". lwn.net. Archived from the original on 15 June 2020. Retrieved 15 July 2020.
- ^ "[PATCH v3 1/2] fork: add clone3 [LWN.net]". lwn.net. Archived from the original on 16 July 2020. Retrieved 16 July 2020.
- ^ "ld-linux.so(8) - Linux manual page". man7.org. Archived from the original on 26 November 2020. Retrieved 18 November 2020.
- ^ "nptl(7) - Linux manual page". man7.org. Archived from the original on 25 July 2020. Retrieved 25 July 2020.
- ^ "futex(7) - Linux manual page". man7.org. Archived from the original on 15 July 2020. Retrieved 25 July 2020.
- ^ "Kernel threads made easy [LWN.net]". lwn.net. Archived from the original on 31 March 2020. Retrieved 15 August 2020.
- ^ a b Bar, Moshe (1 April 2000). "The Linux Scheduler". Linux Journal. Belltown Media, Inc. Archived from the original on 2 February 2021. Retrieved 14 April 2012.
- ^ BKK19-TR03 - The Linux Kernel Scheduler - Overview, 23 April 2019, archived from the original on 15 December 2021, retrieved 17 May 2021
- ^ "Lowering Latency in Linux: Introducing a Preemptible Kernel | Linux Journal". Linuxjournal.com. Archived from the original on 9 August 2020. Retrieved 17 August 2020.
- ^ "CFS Scheduler — The Linux Kernel documentation". Kernel.org. Archived from the original on 1 May 2021. Retrieved 1 May 2021.
- ^ "IEEE Standard for Information Technology – Portable Operating System Interface, POSIX.1b, Real-time extensions (IEEE Std 1003.1b-1993)". Archived from the original on 16 November 2010. Retrieved 17 March 2016.
- ^ Larabel, Michael (24 January 2014). "The Linux 3.14 Kernel Already Has Many Exciting Features". Phoronix. Archived from the original on 13 August 2020. Retrieved 3 February 2014.
- ^ "Linux kernel 3.14, Section 1.1. Deadline scheduling class for better real-time scheduling". kernelnewbies.org. 30 March 2014. Archived from the original on 15 January 2021. Retrieved 2 April 2014.
- ^ "RT-mutex implementation design — The Linux Kernel documentation". Kernel.org. Archived from the original on 26 November 2021. Retrieved 17 December 2021.
- ^ "RT-mutex subsystem with PI support — The Linux Kernel documentation". Kernel.org. Archived from the original on 26 November 2021. Retrieved 17 December 2021.
- ^ McKenney, Paul (10 August 2005). "A realtime preemption overview". LWN.net. Archived from the original on 10 August 2020. Retrieved 5 February 2012.
- ^ "OSADL Project: Realtime Linux". OSADL. Archived from the original on 4 February 2021. Retrieved 5 February 2012.
- ^ a b Rostedt, Steven (24 October 2018). "Real-Time is coming to Linux. What does that mean for you?" (PDF). Archived (PDF) from the original on 27 July 2025. Retrieved 10 August 2025.
- ^ "EEVDF Scheduler May Be Ready For Landing With Linux 6.6". Phoronix. Archived from the original on 29 August 2023. Retrieved 31 August 2023.
- ^ "[PATCH 00/10] sched: EEVDF using latency-nice [LWN.net]". LWN.net. Archived from the original on 2 September 2023. Retrieved 10 September 2023.
- ^ "An EEVDF CPU scheduler for Linux [LWN.net]". LWN.net. Archived from the original on 1 September 2023. Retrieved 31 August 2023.
- ^ "locking — The Linux Kernel documentation". Kernel.org. Archived from the original on 23 January 2022. Retrieved 17 December 2021.
- ^ "locking.rst - Documentation/kernel-hacking/locking.rst - Linux source code (v5.11.10) - Bootlin". elixir.bootlin.com. Archived from the original on 14 April 2021. Retrieved 29 March 2021.
- ^ "What is RCU, Fundamentally? [LWN.net]". lwn.net. Archived from the original on 4 May 2021. Retrieved 29 March 2021.
- ^ "What is RCU? Part 2: Usage [LWN.net]". lwn.net. Archived from the original on 8 March 2021. Retrieved 29 March 2021.
- ^ "RCU part 3: the RCU API [LWN.net]". lwn.net. Archived from the original on 22 March 2021. Retrieved 29 March 2021.
- ^ "Linux-Kernel Memory Model". open-std.org. Retrieved 29 March 2021.
- ^ "A formal kernel memory-ordering model (part 1) [LWN.net]". lwn.net. Archived from the original on 14 April 2021. Retrieved 29 March 2021.
- ^ "A formal kernel memory-ordering model (part 2) [LWN.net]". lwn.net. Archived from the original on 14 April 2021. Retrieved 29 March 2021.
- ^ Stern, Alan. "Explanation of the Linux-Kernel Memory Consistency Model". Archived from the original on 14 April 2021. Retrieved 29 March 2021.
- ^ "kernel/git/torvalds/linux.git - Linux kernel source tree". git.kernel.org. Archived from the original on 10 November 2021. Retrieved 17 December 2021.
- ^ a b "Lock types and their rules — The Linux Kernel documentation". Kernel.org. Archived from the original on 4 November 2021. Retrieved 17 December 2021.
- ^ "Short subjects: Realtime, Futexes, and ntfs3". Lwn.net. Archived from the original on 8 December 2022. Retrieved 20 February 2022.
- ^ "RT-mutex subsystem with PI support — The Linux Kernel documentation". Kernel.org. Archived from the original on 18 March 2022. Retrieved 20 February 2022.
- ^ "RT-mutex implementation design — the Linux Kernel documentation". Archived from the original on 16 June 2020. Retrieved 27 November 2021.
- ^ "Runtime locking correctness validator — The Linux Kernel documentation". Kernel.org. Archived from the original on 15 December 2021. Retrieved 17 December 2021.
- ^ "Interrupts, threads, and lockdep [LWN.net]". lwn.net. Archived from the original on 27 November 2021. Retrieved 17 December 2021.
- ^ a b "Physical Memory — The Linux Kernel documentation". docs.kernel.org. Archived from the original on 29 January 2025. Retrieved 26 January 2025.
- ^ "Page Tables — The Linux Kernel documentation". www.kernel.org. Retrieved 21 July 2024.
- ^ "Physical Memory — The Linux Kernel documentation". www.kernel.org. Archived from the original on 22 July 2024. Retrieved 21 July 2024.
- ^ "The Linux Storage Stack Diagram". Thomas-krenn.com. Archived from the original on 3 August 2020. Retrieved 19 March 2020.
- ^ "The SLUB allocator". Lwn.net. 11 April 2007. Archived from the original on 9 March 2022. Retrieved 20 February 2022.
- ^ a b "Slab allocators in the Linux Kernel: SLAB, SLOB, SLUB" (PDF). Events.static.linuxfound.org. Retrieved 20 February 2022.
- ^ Corbet, Jonathan (28 April 2023). "6.4 Merge window, part 1 [LWN.net]". LWN.net. Archived from the original on 12 May 2023. Retrieved 12 May 2023.
- ^ "The first half of the 6.8 merge window [LWN.net]". lwn.net. Archived from the original on 15 September 2024. Retrieved 21 July 2024.
- ^ "Kernel/Git/Torvalds/Linux.git - Linux kernel source tree". Git.kernel.org. Archived from the original on 10 November 2021. Retrieved 10 November 2021.
- ^ "The Superblock (System Administration Guide: Basic Administration)". docs.oracle.com. Archived from the original on 29 January 2025. Retrieved 26 January 2025.
- ^ a b c Torvalds, Linus (January 1999). "The Linux Edge". Open Sources: Voices from the Open Source Revolution. O'Reilly. ISBN 1-56592-582-3. Retrieved 13 October 2013.
- ^ "Porting Linux to the DEC Alpha: The Kernel and Shell". Archived from the original on 5 September 2019. Retrieved 5 October 2019.
- ^ "Linux on Alpha: A Strategic Choice". Archived from the original on 4 September 2019. Retrieved 5 October 2019.
- ^ "Avalon Cluster | TOP500 Supercomputer Sites". Top500.org. Archived from the original on 5 October 2019. Retrieved 5 October 2019.
- ^ Wang, David (6 May 2010). "Android Now Running On iPhone 3G". TechHive. IDG. Archived from the original on 22 July 2010. Retrieved 11 July 2010.
- ^ "LKDDb". LKDDb Project. Archived from the original on 25 February 2021. Retrieved 26 January 2021.
- ^ "Linux Hardware". Linux Hardware Project. Archived from the original on 26 January 2021. Retrieved 26 January 2021.
- ^ Mookhey, K. K.; Burghate, Nilesh (1 July 2005). Linux: Security, Audit and Control Features. US: ISACA. p. 14. ISBN 1-893209-78-4. LCCN 2005284667. OCLC 69327696. OL 12217098M. Archived from the original on 2 June 2013. Retrieved 31 December 2010.
- ^ Hatch, Brian (15 July 2008). Hacking Exposed Linux: Linux Security Secrets and Solutions. McGraw-Hill Osborne Media. p. 524. ISBN 978-0-07-226257-5. OCLC 234073834. OL 9585473M. Archived from the original on 2 June 2013. Retrieved 31 December 2010.
- ^ Jaeger, Trent (7 October 2008). Operating System Security. Morgan and Claypool Publishers. p. 122. ISBN 978-1-59829-212-1. OCLC 141384425. OL 12496480M. Archived from the original on 2 June 2013. Retrieved 31 December 2010.
- ^ Corbet, Jonathan. "CAP_PERFMON — and new capabilities in general". lwn.net. Archived from the original on 4 August 2020. Retrieved 2 August 2020.
- ^ "Linux Security Module Usage". The Linux Kernel documentation. Archived from the original on 2 May 2020. Retrieved 10 January 2020.
- ^ "SELinux Frequently Asked Questions (FAQ)". National Security Agency. Archived from the original on 18 September 2019. Retrieved 10 January 2020.
- ^ "Seccomp BPF (SECure COMPuting with filters)". The Linux Kernel documentation. Archived from the original on 7 March 2020. Retrieved 10 January 2020.
- ^ Andrews, Jeremy (16 July 2008). "Security Bugs and Full Disclosure". KernelTrap. Archived from the original on 19 July 2008. Retrieved 31 December 2010.
- ^ Spengler, Brad (16 July 2008). "Linux's unofficial security-through-coverup policy". Full Disclosure (Mailing list). Archived from the original on 7 August 2020. Retrieved 31 December 2010.
- ^ "NVD – CVE-2024-50264". nvd.nist.gov. 18 November 2024. Retrieved 11 September 2025.
- ^ "CVE-2024-50264". Ubuntu. 19 November 2024. Retrieved 11 September 2025.
- ^ "CVE-2024-50264". cve.org. 19 November 2024. Retrieved 11 September 2025.
- ^ a b Yamagata, Hiroo (3 August 1997). "The Pragmatist of Free Software". HotWired. Archived from the original on 10 February 2007. Retrieved 21 February 2007.
- ^ "GPL-v2". gnu.org. Archived from the original on 25 December 2019. Retrieved 28 January 2020.
- ^ Corbet, Jonathan (31 January 2006). "GPLv3 and the kernel". LWN.net. Archived from the original on 10 August 2020. Retrieved 21 February 2007.
- ^ Torvalds, Linus (8 September 2000). "Linux-2.4.0-test8". LKML (Mailing list). Archived from the original on 15 May 2020. Retrieved 21 February 2007.
- ^ "gnu.org". Gnu.org. Archived from the original on 2 February 2021. Retrieved 18 October 2017.
- ^ Cox, Alan (20 January 2006). "Re: GPL V3 and Linux". LKML (Mailing list). Archived from the original on 26 January 2021. Retrieved 21 February 2007.
- ^ Shankland, Stephen (25 September 2006). "Top Linux programmers pan GPL 3". News.com. CNET. Archived from the original on 14 September 2013. Retrieved 21 February 2007.
- ^ a b James E.J. Bottomley; Mauro Carvalho Chehab; Thomas Gleixner; Christoph Hellwig; Dave Jones; Greg Kroah-Hartman; Tony Luck; Andrew Morton; Trond Myklebust; David Woodhouse (15 September 2006). "Kernel developers' position on GPLv3: The Dangers and Problems with GPLv3". LWN.net. Archived from the original on 18 January 2021. Retrieved 11 March 2015.
- ^ Petreley, Nicholas (27 September 2006). "A fight against evil or a fight for attention?". linuxjournal.com. Archived from the original on 2 March 2018. Retrieved 11 March 2015.
- ^ "Linus Torvalds says GPL v3 violates everything that GPLv2 stood for". Debconf 2014. 2014. Archived from the original on 8 May 2018. Retrieved 21 March 2018.
- ^ Clark, Rob; Semwal, Sumit (1 November 2012). "DMA Buffer Sharing Framework: An Introduction" (PDF). Embedded Linux Conference. Archived (PDF) from the original on 8 August 2014. Retrieved 2 August 2014.
- ^ Cox, Alan (10 October 2012). "[PATCH] dma-buf: Use EXPORT_SYMBOL". Direct Rendering Infrastructure (Mailing list). Archived from the original on 22 January 2013. Retrieved 3 September 2013.
- ^ Torvalds, Linus (10 December 2003). "RE: Linux GPL and binary module exception clause?". LKML (Mailing list). Archived from the original on 15 June 2011. Retrieved 31 December 2010.
- ^ Torvalds, Linus (3 December 2003). "Re: Linux GPL and binary module exception clause?". LKML (Mailing list). Archived from the original on 28 April 2020. Retrieved 12 November 2010.
- ^ "Tainted kernels — The Linux Kernel documentation". Kernel.org. Archived from the original on 7 March 2020. Retrieved 13 January 2020.
- ^ "Linux Firmware API — The Linux Kernel documentation". Kernel.org. Archived from the original on 13 January 2020. Retrieved 13 January 2020.
- ^ "Built-in firmware — The Linux Kernel documentation". Kernel.org. Archived from the original on 10 June 2020. Retrieved 10 June 2020.
- ^ "Linux TM registration in the US". uspto.gov. Archived from the original on 24 February 2021. Retrieved 6 September 2019.
- ^ "Linux TM registration in the EU". euipo.europa.eu. Archived from the original on 9 June 2016. Retrieved 28 November 2020.
- ^ Hughes, Phil (1 August 1997). "Linux Trademark Dispute". Linux Journal. Belltown Media, Inc. Archived from the original on 30 April 2010. Retrieved 8 December 2010.
- ^ Hughes, Phil (1 March 1997). "Action Taken on Linux Trademark". Linux Journal. Belltown Media, Inc. Archived from the original on 3 March 2010. Retrieved 8 December 2010.
- ^ Gisselberg, Tonya (2010). "The Trademark History of Linux, the Operating System" (PDF). Gisselberg Law Firm, Inc. Archived from the original (PDF) on 11 July 2011. Retrieved 8 December 2010.
- ^ Kroah-Hartman, Greg. "[PATCH] MAINTAINERS: Remove some entries due to various compliance requirements". Linux kernel mailing list (Mailing list). Retrieved 11 August 2025.
- ^ Purdy, Kevin (24 October 2024). "Removal of Russian coders spurs debate about Linux kernel's politics". Ars Technica. Retrieved 18 November 2024.
- ^ Torvalds, Linus (23 October 2024). "Re: [PATCH] Revert "MAINTAINERS: Remove some entries due to various compliance requirements."". Linux kernel mailing list (Mailing list). Retrieved 11 August 2025.
- ^ Bottomley, James (24 October 2024). "Re: linux: Goodbye from a Linux community volunteer". Linux kernel mailing list (Mailing list). Retrieved 11 August 2025.
Further reading
[edit]- Torvalds, Linus; Diamond, David (2001). Just for Fun: The Story of an Accidental Revolutionary. HarperBusiness. ISBN 978-0066620732.
- Bezroukov, Nikolai. "Ch 4: A benevolent dictator". Portraits of Open Source Pioneers (e-book). Softpanorama. Archived from the original on 13 October 2005. Retrieved 3 October 2005.
- "LinkSys and binary modules". LWN.net Weekly Edition. 16 October 2003. Archived from the original on 1 August 2016. Retrieved 21 July 2016.
- "Everyone's Favorite Linux Mascot". Archived from the original on 16 August 2005. Retrieved 16 June 2005.
- Pranevich, Joseph (December 2003). "The Wonderful World of Linux 2.6". Archived from the original on 16 July 2003.
- "LinuxChanges". Archived from the original on 31 October 2005. Retrieved 31 October 2005.
- "Seminar Paper on Linux Kernel 2.6". Archived from the original on 2 February 2007.
- "Linux Device Drivers" (3rd ed.). Archived from the original on 27 July 2016. Retrieved 21 July 2016.
- "Understanding the Linux Kernel" (Book) (3rd ed.). Archived from the original on 17 December 2005. Retrieved 22 December 2005.
- Rosen, Rami (2014). Linux Kernel Networking (PDF). Berkeley, CA: Apress. doi:10.1007/978-1-4302-6197-1. ISBN 978-1-4302-6196-4. Retrieved 10 August 2025.
- "Linux: The GPL And Binary Modules". Archived from the original on 23 July 2005.
- "Anatomy of the Linux kernel". IBM. Archived from the original on 27 June 2007. Retrieved 9 June 2007.
- Tanenbaum, Andrew; Bos, Herbert (2015). Modern Operating Systems. United States of America: Pearson. p. 722. ISBN 9781292061429. OCLC 892574803.
External links
[edit]Wikimedia Commons has media related to Linux kernel.
Wikibooks has more on the topic of: Linux kernel
- Official website
- Linux kernel documentation index
- Linux kernel man pages
- Kernel bugzilla, and regressions for each recent kernel version
- Kernel Newbies, a source of various kernel-related information
- Kernel coverage at LWN.net, an authoritative source of kernel-related information
- Bootlin's Elixir Cross Referencer, a Linux kernel source code cross-reference
- Greg Kroah Hartman on the Linux kernel on YouTube
- Virtual filesystem, linux generic filesystem implementation
Linux kernel
View on Grokipediafrom Grokipedia
The Linux kernel is a free and open-source, monolithic, Unix-like operating system kernel originally developed by Finnish software engineer Linus Torvalds as a personal project in 1991 to create a Unix-compatible terminal emulator for his Intel 80386-based PC.[1]
It manages core system functions including hardware abstraction, process management, memory allocation, and device drivers, forming the foundational layer beneath user-space applications and libraries in Linux-based operating systems.[2][3]
Released under the GNU General Public License, the kernel's source code is maintained on kernel.org, with Torvalds overseeing merges from thousands of global contributors via a distributed development model emphasizing stability through biannual release cycles.[4]
Its modular architecture allows dynamic loading of kernel modules for drivers and filesystems, balancing the efficiency of its monolithic design—where core components execute in a single address space—with adaptability for diverse hardware.[3]
The Linux kernel powers approximately 80% of web servers, 70% of embedded systems, the Android mobile platform utilized by billions of devices, and nearly all of the world's top supercomputers, underscoring its scalability from resource-constrained IoT devices to high-performance computing clusters.[5][6]
History
Conception and early development
Linus Torvalds, a 21-year-old computer science student at the University of Helsinki, initiated development of the Linux kernel in April 1991 as a personal hobby project. Motivated by his exposure to Unix during a 1990 university course and dissatisfaction with the limitations of Andrew Tanenbaum's Minix operating system—which prioritized educational simplicity over performance and full freedom for modification—Torvalds sought to create a Unix-like kernel for his newly acquired Intel 80386-based PC, purchased on January 5, 1991, equipped with 4 MB RAM and a 40 MB hard disk.[7] He began with basic task switching in Intel assembly language, demonstrating two processes alternately printing "A" and "B" to the screen, before expanding into C code using GNU compiler tools like gcc and bash.[7][8] On August 25, 1991, Torvalds publicly announced the project on the comp.os.minix Usenet newsgroup, posting: "I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for 386(486) AT clones," primarily to solicit feedback on technical issues such as brain-damaged drivers, without initially intending broad distribution. The kernel, initially named "Freax," incorporated early drivers for keyboard input, VGA display, and serial ports to enable terminal emulation and modem-based news reading.[7][8] Version 0.01 of the kernel was released on September 17, 1991, via FTP upload to ftp.funet.fi, comprising approximately 10,000 lines of code that booted into a minimal shell but lacked a proper file system, virtual memory, or production stability.[9] The FTP administrator, Ari Lemmke, renamed the directory from "freax" to "linux," a name that persisted despite remnant "Freax" references in the source.[7] Early enhancements followed rapidly, including virtual memory implementation over the 1991 Christmas holidays and contributions from hobbyist developers responding to Usenet postings, fostering collaborative growth beyond Torvalds' solo efforts.[8] By version 0.02 in October 1991, the kernel supported basic multitasking on x86 hardware, setting the stage for wider adoption under the GNU General Public License adopted in early 1992.[8]Expansion and key milestones (1990s-2000s)
The Linux kernel achieved a significant milestone with the release of version 1.0.0 on March 14, 1994, comprising 176,250 lines of code and providing support for single-processor Intel 80386 architectures.[6] This version marked the kernel's transition from experimental status to a more robust foundation, enabling reliable operation for basic Unix-like tasks and attracting initial adoption among hobbyists and early developers.[6] In the mid-1990s, the kernel expanded with version 2.0.0, released on June 9, 1996, which introduced symmetric multiprocessing (SMP) capabilities to leverage multiple processors effectively.[10] This feature enhanced performance for parallel workloads, contributing to Linux's growing use in server environments and supercomputing clusters where cost-effective scalability was prioritized over proprietary alternatives.[11] By the late 1990s, corporate interest surged, with firms like IBM announcing support in 1998, accelerating contributions and integration into enterprise systems.[12] Entering the 2000s, version 2.4.0 arrived on January 4, 2001, delivering improved SMP scalability for up to 32 processors, native USB support, ISA Plug and Play, and PC Card handling, alongside optimizations for processors like the Pentium 4.[13] These advancements solidified its suitability for production servers, with approximately 375 developers involved and an estimated 15 million users by that point.[4] Adoption extended to embedded applications, exemplified by devices like the TiVo digital video recorder in 1999, highlighting the kernel's versatility beyond desktops.[14] The decade culminated in version 2.6.0 on December 17, 2003, featuring the O(1) scheduler for constant-time task switching, kernel preemption to reduce latency, a redesigned block I/O layer, and enhanced virtual memory and threading subsystems.[15] [16] These improvements broadened appeal for real-time and multimedia workloads, spurring further server dominance and early desktop viability amid rising enterprise deployments.[14] Throughout this period, the contributor base expanded from individual efforts to include substantial corporate input, driving rapid feature maturation while maintaining open-source governance.[4]Maturation and recent advancements (2010s-2026)
The Linux kernel underwent significant maturation in the 2010s, marked by the release of version 3.0 on July 21, 2011, which introduced symbolic versioning to reflect substantial architectural refinements without implying backward incompatibility, alongside enhanced support for filesystems like Btrfs and improved power management. Subsequent major releases, including 4.0 on April 12, 2015, emphasized scalability for large-scale deployments, while version 5.0 on March 3, 2019, incorporated refinements in networking and storage stacks.[17] By the 2020s, the kernel reached version 6.0 on October 2, 2022, with long-term support (LTS) variants like 6.1 providing stability for enterprise and embedded systems, culminating in version 6.17 released on September 28, 2025.[18] Kernel codebase expansion accelerated, surpassing 40 million lines of code by January 2025, roughly doubling from a decade prior at an approximate rate of 400,000 lines every two months, driven by additions in drivers, subsystems, and abstractions rather than bloat alone.[19] [20] Contributor numbers grew to 11,089 by 2025, with development cycles incorporating around 11,000 changesets per release, reflecting broader community and corporate input while maintaining rigorous review processes.[21] [22] Security enhancements intensified through the Kernel Self-Protection Project (KSPP), initiated in 2015 to consolidate hardening efforts, introducing features like pointer authentication, control-flow integrity, and stack-smashing protections to mitigate common exploit vectors such as buffer overflows.[23] These measures, including lockdown mode for restricting kernel debugging in production, addressed vulnerabilities empirically observed in real-world attacks, prioritizing runtime integrity over performance trade-offs where causal risks warranted.[24] Extended Berkeley Packet Filter (eBPF) matured as a cornerstone for kernel extensibility, evolving from its 2014 foundational extensions to enable safe, sandboxed program execution for networking, tracing, and security without modifying core code, with significant ecosystem growth in 2024-2025 including advanced map types and verifier improvements.[25] [26] Integration of the Rust programming language began with initial support merged into version 6.1 in December 2022, targeting memory-safe drivers to reduce classes of bugs prevalent in C, such as use-after-free errors, with expansions in 6.13 (January 2025) enabling in-place expansion and broader subsystem compatibility.[27] [28] This approach leverages Rust's borrow checker for compile-time guarantees, empirically lowering defect rates in experimental modules while coexisting with C codebases.[29] Recent advancements through early 2026 emphasized hardware enablement, including refined RISC-V and ARM64 support for edge computing, alongside performance optimizations in scheduling and I/O for cloud-native workloads, the 6.19-rc8 prepatch released on February 1, 2026, stable updates such as 6.18.8, 6.12.68, and 6.6.122, modernized swapping mechanisms, and sub-schedulers enabled by the sched_ext framework, solidifying the kernel's dominance in servers exceeding 90% market share and embedded devices.[30][31][32][33][34]Development and governance
Linus Torvalds and core maintainers
Linus Torvalds, born December 28, 1969, in Helsinki, Finland, initiated the Linux kernel project in 1991 as a personal hobby while studying at the University of Helsinki, releasing the initial version on September 17, 1991, via the comp.os.minix Usenet group. As the kernel's creator and lead maintainer, Torvalds oversees the mainline development branch, utilizing the Git version control system he developed in 2005 to manage the codebase. He coordinates bi-monthly release cycles, opening a two-week merge window for integrating changes from subsystem maintainers before stabilization periods leading to new versions every 2-3 months.[35] Torvalds acts as the ultimate gatekeeper, reviewing and merging pull requests from core subsystem maintainers into the mainline tree, a role he has maintained for over three decades despite the kernel's growth to support tens of thousands of contributors. His management style emphasizes technical merit and stability, often expressed through direct feedback on the Linux Kernel Mailing List (LKML), prioritizing empirical testing over abstract policies. In a 2024 interview, Torvalds highlighted the value of aging maintainers, arguing their experience ensures robust code review amid challenges in recruiting new ones capable of handling complex subsystems.[36] The Linux kernel's governance relies on a hierarchy of core maintainers documented in the MAINTAINERS file, which as of 2021 listed over 2,280 subsystems with designated stewards responsible for specific domains like networking, filesystems, and drivers. These maintainers—such as Greg Kroah-Hartman for stable releases—review patches, maintain subsystem trees, and forward vetted changes to Torvalds, enforcing coding standards and resolving conflicts within their scopes.[37][38] The structure distributes workload across hundreds of experts, with Torvalds intervening on cross-subsystem issues or final merges to preserve kernel integrity. In October 2024, Torvalds endorsed the delisting of about a dozen maintainers affiliated with Russian entities, citing compliance with international sanctions and ethical considerations in open-source collaboration.[39]Contribution process and coding standards
Contributions to the Linux kernel are made through patches submitted via email to public mailing lists, ensuring open review and transparency. Developers typically use Git to manage changes, generating patches with thegit format-patch command to produce a canonical format that includes a subject line like "[PATCH 001/123] subsystem: summary phrase," a detailed commit message explaining the problem and solution, and a diff section separated by "---".[40] Each patch must include a Signed-off-by line from the author and any other contributors, affirming adherence to the Developer's Certificate of Origin, which certifies original work or proper rights transfer under GPL-compatible licenses.[40] Patches are directed to subsystem-specific maintainers—identified via the MAINTAINERS file or the scripts/get_maintainer.pl script—and copied to the [email protected] list, with stable fixes additionally Cc'd to [email protected].[40] [41]
The review process involves community feedback, often requiring multiple iterations labeled as [PATCH V2], with changelogs summarizing revisions.[40] Maintainers evaluate patches for correctness, style, and impact, merging accepted ones into subsystem trees during the kernel's three-month development cycles, which feature a brief merge window after each stable release where Linus Torvalds integrates changes into the mainline repository.[41] Over 1,000 developers participate per cycle, with code required to be GPL-compatible and buildable independently.[41] Security issues follow a separate channel to [email protected] before public disclosure.[40]
Coding standards prioritize readability and maintainability, as detailed in the kernel's official style guide authored by Linus Torvalds.[42] Indentation uses 8-character tabs exclusively, with no spaces; lines are limited to 80 columns, though longer lines may be justified for clarity in non-user-visible code.[42] Naming favors short, descriptive identifiers without Hungarian notation or encoded types, and terms like "master/slave" are replaced with "primary/secondary" for neutrality.[42] Spacing requires spaces after keywords like if or for but not around expressions in parentheses, and no trailing whitespace is permitted.[42]
Brace placement follows a variant of K&R style: opening braces share the line with control statements or functions, while closing braces stand alone except when followed by else or do.[42] Torvalds explicitly rejects GNU standards and 4-space indents, favoring the kernel's conventions to align with developers' habits rather than general tools.[42] Compliance is checked using the scripts/checkpatch.pl script, which flags violations; deliberate deviations require explanation in commit messages, as the style aims to minimize cognitive load during collaborative maintenance.[42] [40] Additional tools like clang-format or indent with kernel-specific options support formatting, but manual adherence remains essential.[42]
Community dynamics and corporate influence
The Linux kernel's development community encompasses over 11,000 contributors across approximately 1,800 organizations as of 2025, with the majority being employees of technology corporations rather than independent volunteers.[21] This structure has evolved from early hobbyist efforts into a hybrid model where corporate resources drive the bulk of code commits, bug fixes, and feature implementations, enabling scalability but introducing dependencies on commercial priorities. For instance, in the 6.15 kernel cycle concluded in May 2025, Intel led with the highest number of changesets, followed by Red Hat and Google, collectively representing a significant share of the approximately 13,800 patches merged.[22] Corporate influence is evident in the funding and direction of subsystems, where companies like Intel prioritize graphics and CPU drivers, while Red Hat (owned by IBM since 2019) and SUSE focus on enterprise features such as storage and networking stacks. Analysis of kernel contributions indicates that professional developers, compensated by employers, have authored more than 70% of code since at least the mid-2010s, with top firms accounting for over half of total changes in recent cycles.[43][44] This concentration empowers efficient development—evidenced by the kernel's growth to over 40 million lines of code by early 2025—but can skew efforts toward proprietary hardware integration or cloud-specific optimizations, as seen in Google's Android-related submissions.[19] Community dynamics revolve around a meritocratic governance enforced through the Linux Kernel Mailing List (LKML) and maintainer hierarchies, where technical merit trumps affiliation, though corporate-backed developers often dominate maintainer roles. Conflicts arise from differing incentives, such as when vendors push non-mainline patches for short-term product needs, leading to integration delays or rejections by Linus Torvalds, who retains final merge authority. Maintainers, many long-term and aging (with average tenures exceeding a decade), mediate these tensions, fostering a culture of rigorous review that has sustained stability despite scale; however, reliance on corporate employment raises concerns about burnout and agenda alignment, as individual volunteers contribute under 30% of changes.[45][46] This interplay has proven resilient, with even competitors like Microsoft increasing contributions (3.1% of 6.15 changesets) for Azure compatibility, yet the open-source GPL licensing prevents any single entity from monopolizing control. Empirical tracking via git metadata confirms that while corporations amplify output—adding roughly 400,000 lines every two months—the community's decentralized review process mitigates capture risks, as evidenced by consistent rejection of subpar corporate submissions.[22][20]Challenges in sustainability and succession planning
The Linux kernel's development model faces significant challenges in succession planning, primarily due to its heavy reliance on Linus Torvalds as the central maintainer since 1991. Torvalds has repeatedly stated there is no formal successor designated, arguing that such decisions should emerge naturally rather than through premature appointment, as naming one could create unnecessary conflicts or undermine the process.[47] This approach, while avoiding forced hierarchies, leaves the project vulnerable to disruptions if Torvalds becomes unavailable, with no established protocol for transitioning authority to the network of lieutenant maintainers who handle subsystems. Discussions in 2025 highlighted this gap, noting that while the kernel's decentralized subsystems provide some resilience, the final merge window controlled by Torvalds represents a single point of failure.[48] To address this, the Linux kernel community formalized a continuity plan in January 2026, which activates if Torvalds becomes unwilling or unable to continue, including due to incapacity. The plan directs the most recent Maintainers Summit organizer—or the Linux Foundation Technical Advisory Board (TAB) chair as backup—to initiate discussions within 72 hours with recent summit participants and the TAB, convening a meeting to evaluate options for managing top-level repository merges and potentially appoint one or more replacements, with the Linux Foundation supporting implementation.[49][50] Sustainability concerns extend to maintainer burnout and workforce renewal, exacerbated by the kernel's expanding codebase, which exceeded 30 million lines of code by 2023 and continues to grow rapidly. A 2025 research paper analyzing the kernel's development bottlenecks identified over-dependence on a small cadre of experienced maintainers, many aging without adequate influx of new talent, leading to ad-hoc tooling and stalled review processes. Kernel maintainers have publicly reported fatigue from handling thousands of patches annually, with efforts like automated testing and contribution maturity models proposed to alleviate this but facing slow adoption.[51][52] Despite Torvalds asserting in 2024 that an aging developer base brings valuable stability and counters burnout narratives by pointing to sustained contribution levels, empirical data shows maintenance concentrated among few engineers, risking knowledge silos.[36][53] Corporate funding, while enabling much of the kernel's work through employer-sponsored developers from firms like Intel and Red Hat, introduces sustainability risks via misaligned incentives and fluctuating commitments. The Linux Foundation, which stewards kernel-related efforts, allocated only about 2.3% of its 2024 revenue directly to the Linux project, down from higher shares in prior years, prioritizing broader initiatives over core maintenance. This model sustains day-to-day operations but struggles with long-term planning, as corporate priorities may shift, leaving unpaid or volunteer-driven areas under-resourced amid rising security demands and hardware complexity. Proposals for dedicated funding pools and mentorship programs aim to bolster retention, yet implementation lags, underscoring the tension between volunteer ethos and professional demands.[54][55]Technical architecture
Kernel interfaces and APIs
The Linux kernel exposes interfaces to user-space applications primarily through system calls, which serve as the fundamental mechanism for requesting kernel services such as process creation, file operations, and network communication.[56] These calls transition the processor from user mode to kernel mode, invoking kernel code via a standardized interface that abstracts hardware-specific details.[57] System calls are numbered, with the kernel maintaining tables mapping numbers to functions; for instance, on x86_64 architectures, thesyscall instruction triggers entry, while ARM uses svc (supervisor call).[58]
Beyond raw system calls, the kernel provides higher-level abstractions like the Virtual File System (VFS), which unifies access to diverse filesystems by presenting a consistent interface for operations such as opening, reading, and writing files, regardless of the underlying storage type.[59] The VFS layer employs in-memory structures like inodes and dentries to cache metadata, enabling efficient pathname resolution and supporting features like file locking and permissions checks.[59] User-space programs interact with VFS via system calls like open(), read(), and write(), which the C library wrappers invoke.[60]
Additional interfaces include special filesystems such as procfs and sysfs, which expose kernel runtime information and configuration parameters as virtual files readable and writable from user space, facilitating debugging, monitoring, and dynamic tuning without recompiling the kernel.[60] For device-specific control, ioctl system calls allow passing commands and data structures directly to drivers, though this mechanism is criticized for lacking portability and type safety.[60] Networking configuration often utilizes Netlink sockets, a bidirectional interface for exchanging messages between kernel modules and user-space processes, used in tools like iproute2 for managing routes and interfaces.[60]
The kernel's user-space API documentation categorizes these interfaces into system calls, security mechanisms (e.g., seccomp filters), device I/O (e.g., via character or block devices), and miscellaneous elements like signals and timers, ensuring modularity while maintaining backward compatibility across kernel versions.[60] Internal kernel APIs, distinct from user-space ones, facilitate module development but are not directly accessible from applications; changes to these require recompilation or module updates.[61] This design promotes stability, with deprecations announced via kernel mailing lists to minimize disruptions for distributions and embedded systems.[62]
Process scheduling and management
The Linux kernel manages processes through a combination of data structures and mechanisms that handle creation, execution, synchronization, and termination. Each process is represented by atask_struct structure, which encapsulates essential state information including process ID (PID), priority, scheduling parameters, memory mappings, file descriptors, and kernel stack pointer. This structure enables the kernel to track and manipulate processes efficiently during context switches, which occur when the scheduler selects a different runnable task for execution on a CPU core. Process creation typically begins with system calls like fork() or clone(), which duplicate the parent process's task_struct and allocate necessary resources, followed by execve() to load a new program image. Termination is handled via exit(), which releases resources and notifies parents through wait queues.[63][64]
Process scheduling in the Linux kernel determines the allocation of CPU time among runnable tasks, balancing fairness, throughput, and responsiveness across general-purpose, real-time, and deadline-oriented workloads. The kernel supports multiple scheduling classes, including the default fair class for non-real-time tasks, real-time classes (SCHED_FIFO for first-in-first-out and SCHED_RR for round-robin with time slices), and deadline scheduling (SCHED_DEADLINE for tasks with explicit bandwidth and period requirements). Priorities range from -20 (highest) to 19 (lowest) for nice values in the fair class, influencing CPU share inversely; higher nice values yield less CPU time. Control groups (cgroups) extend management by allowing hierarchical resource limits, such as CPU shares or quotas, integrated via the schedtune or cpu subsystems to isolate workloads like containers.[65][66]
Early Linux kernels up to version 2.4 employed a simple O(N) scheduler that scanned all tasks linearly for selection, leading to scalability issues under high load. The 2.6 kernel series introduced the O(1) scheduler in 2002, using per-priority runqueues and expiration timers to achieve constant-time decisions and improved desktop interactivity by favoring recently woken tasks. However, persistent complaints about fairness and latency prompted further evolution.[67]
The Completely Fair Scheduler (CFS), introduced by Ingo Molnar and merged into kernel 2.6.23 on October 9, 2007, became the default for fair scheduling, replacing the O(1) implementation. CFS models an "ideal" fair scheduler by tracking each task's virtual runtime (vruntime)—a measure of weighted CPU time consumed—and maintains runnable tasks in a red-black tree ordered by vruntime. The scheduler selects the leftmost (lowest vruntime) task, aiming to equalize vruntime across tasks while approximating proportional share allocation based on nice values; for instance, a task with nice 0 receives roughly twice the CPU as one with nice 10. Granularity is enforced with a minimum runtime slice of about 1 millisecond, adjusted by sched_min_granularity_ns, to prevent excessive context switches. CFS heuristics boost interactive tasks by reducing vruntime lag for short sleepers, though this has drawn criticism for ad-hoc tuning over strict proportionality.[65][67][68]
In kernel 6.6, released September 17, 2023, the Earliest Eligible Virtual Deadline First (EEVDF) scheduler succeeded CFS as the primary fair scheduler, proposed by Peter Zijlstra to address CFS's heuristic dependencies and improve latency under load. EEVDF treats vruntime as a virtual deadline, selecting the task with the earliest eligible deadline (vruntime plus a lag term) via a similar red-black tree structure, but with proportional lag bounds to bound service deviations. This yields provably lower worst-case latency—up to 40% reductions in tail latencies on certain benchmarks—while maintaining fairness without sleep heuristics, as eligibility is determined by actual runnability rather than estimated interactivity. EEVDF integrates seamlessly with existing CFS interfaces, enabling gradual adoption, and supports multi-core scalability through per-CPU runqueues and load balancing. Real-time and deadline classes remain unchanged, coexisting via the Completely Fair Scheduler framework's class hierarchy.[69][70][71]
Management extends to synchronization via futexes for user-space locking, signals for inter-process communication, and ptrace for debugging, all mediated by the scheduler to minimize disruptions. The kernel enforces preemption models—voluntary, full, or voluntary with high-priority preemption ticks—to trade off throughput for responsiveness, configurable via /proc/sys/kernel/sched_latency_ns and related tunables. Empirical benchmarks, such as those from kernel developers, show EEVDF outperforming CFS in mixed workloads by reducing average scheduling latency from 10-20 microseconds to under 5 microseconds on Intel x86 systems, though gains vary by hardware and configuration.[72][65]
Memory management and synchronization
The Linux kernel's memory management subsystem implements a demand-paged virtual memory architecture, where each process maintains an independent virtual address space divided into user and kernel segments, with the kernel segment providing a direct mapping to physical memory for efficient access.[73] Physical memory is organized into pages of typically 4 KiB, managed by the buddy page allocator, which employs a binary buddy system to allocate and free contiguous blocks of pages in powers of two, minimizing fragmentation while supporting zones such as DMA (for legacy devices requiring addresses below 16 MB), Normal (for general use), and Movable (for hot-pluggable memory). This zoned approach accommodates hardware constraints like ISA DMA limits and NUMA topologies, with the allocator tracking free pages via per-zone freelists and using watermark thresholds—low, min, and high—to trigger reclaim or kswapd daemon activity when allocations risk exhaustion.[73] Kernel allocations for small, frequently used objects rely on the slab allocator layer atop the page allocator, with SLUB as the default implementation since kernel version 2.6.23, offering per-CPU caches for low-latency access, slab merging to reduce metadata overhead, and debugging features like redzoning for corruption detection.[74] SLUB improves upon predecessors like SLAB by simplifying internals, enabling better scalability on multiprocessor systems, and integrating with vmalloc for non-contiguous virtual mappings when contiguous physical pages are unavailable.[75] User-space memory requests via syscalls like mmap or brk are handled through the virtual memory area (VMA) descriptors in the mm_struct per-process structure, employing copy-on-write for efficient forking and demand paging to load pages only on fault, backed by swap space on secondary storage during pressure.[73] Out-of-memory conditions invoke the OOM killer, which selects and terminates processes based on heuristics like oom_score_adj, prioritizing those consuming disproportionate resources to preserve system stability.[76] Synchronization in the kernel ensures thread-safe access to shared data structures amid concurrent execution on multiprocessor systems, primarily through primitives categorized as sleeping locks (e.g., mutexes for preemptible contexts allowing scheduler yielding), spinning locks (e.g., spinlocks for short-held critical sections to avoid context-switch overhead), and advanced mechanisms like read-copy-update (RCU).[77] Mutexes, implemented via struct mutex, block acquiring threads by enqueueing them on wait queues and invoking the scheduler, suitable for longer operations in process context but unsuitable for interrupt handlers due to potential deadlocks.[77] Spinlocks, using atomic test-and-set operations, busy-wait on uncontended paths for minimal latency in interrupt or softirq contexts, with variants like rwlock_t permitting multiple readers or exclusive writers to optimize read-heavy workloads.[78] RCU, introduced in kernel 2.5.8 in 2002, provides a lock-free synchronization primitive optimized for read-mostly data structures, where readers traverse via rcu_read_lock/unlock without blocking writers, who perform synchronize_rcu to wait for quiescent states (e.g., voluntary context switches) before freeing updated elements, leveraging grace-period detection for scalability up to thousands of CPUs.[79] This mechanism relies on memory barriers to enforce ordering—such as smp_mb() for full bidirectional fences—and integrates with the scheduler for expedited variants, reducing contention in subsystems like networking and filesystems compared to traditional locking.[79] Additional primitives include semaphores for counting-based exclusion and seqlocks for writer-biased fast reads with validation, all underpinned by compiler and CPU-specific barriers to prevent reordering that could violate causality in weakly ordered memory models like ARM or PowerPC.[80] These tools collectively address concurrency challenges, with guidelines emphasizing hierarchical locking to avert deadlocks and per-CPU variables for locality in NUMA environments.[78]Device support and filesystems
The Linux kernel employs a unified device model that represents hardware as a hierarchy of buses, devices, and drivers, managed through thestruct device and struct driver abstractions within the core kernel framework. This model facilitates dynamic binding of drivers to devices via mechanisms like platform data, device trees for embedded systems, and ACPI for PCs, enabling support for diverse hardware ranging from x86 servers to ARM-based mobile devices. Device drivers are typically implemented as loadable kernel modules (LKMs), which can be inserted or removed at runtime using tools like modprobe, promoting modularity in the otherwise monolithic kernel design.[81][82]
Key subsystems orchestrate device management: the PCI subsystem handles enumeration and resource allocation for expansion cards, supporting standards up to PCIe 6.0 as of kernel version 6.10 released in July 2024; the USB core supports controllers from EHCI to xHCI, accommodating thousands of peripherals through class drivers for storage, networking, and human-interface devices. Network device support encompasses Ethernet controllers from vendors like Intel and Broadcom, wireless via cfg80211 and mac80211 for Wi-Fi standards including 802.11ax, while graphics leverage DRM (Direct Rendering Manager) for GPUs from AMD, Intel, and NVIDIA (via open-source Nouveau or proprietary modules). Block devices are abstracted through the block layer, interfacing with storage protocols like NVMe, SATA, and SCSI, with hotplug capabilities via libraries like libata. Challenges persist with proprietary hardware, where binary blobs are sometimes required, though community efforts prioritize reverse-engineered open-source alternatives for longevity and auditability.[81]
The Virtual File System (VFS) serves as the kernel's abstraction layer for filesystem operations, providing a uniform interface to user space via system calls like open(), read(), and mount(), while hiding implementation details of underlying filesystems through structures such as superblocks, inodes, directory entries (dentries), and file objects. Introduced in early kernel versions and refined over decades, VFS enables seamless support for local, networked, and special-purpose filesystems, with caching mechanisms like page cache and dentry cache optimizing performance.[59]
As of Linux kernel 6.11 (September 2024), the kernel natively supports over 50 filesystem types, viewable via /proc/filesystems, including journaling filesystems for data integrity. Ext4 remains the de facto standard for general-purpose storage, offering extents, delayed allocation, and quotas on partitions up to 1 exabyte; Btrfs provides copy-on-write snapshots, subvolumes, and built-in RAID for resilience; XFS excels in high-throughput scenarios with scalable metadata and reflink for deduplication; F2FS optimizes for NAND flash with log-structured design, widely used in Android. Network filesystems like NFSv4.2 enable distributed access with pNFS for parallelism, while fuse allows user-space implementations such as NTFS-3G for Windows compatibility. Deprecated options like ReiserFS face removal post-2025 due to maintenance burdens and security vulnerabilities, urging migration to modern alternatives.[83][84]
| Filesystem | Key Features | Primary Use Case |
|---|---|---|
| ext4 | Journaling, extents, large files | General-purpose, boot partitions |
| Btrfs | Snapshots, compression, RAID | Data integrity, backups |
| XFS | High performance, online defrag | Enterprise storage, media |
| F2FS | Flash-friendly, GC optimization | Mobile, SSDs |
Features and performance
Security enhancements and mitigations
The Linux kernel employs a range of security enhancements designed to enforce mandatory access controls, filter system calls, and mitigate common exploit techniques such as buffer overflows and code reuse attacks. The Linux Security Modules (LSM) framework, introduced in kernel version 2.6.0, provides a hook-based architecture for stacking multiple security modules, enabling fine-grained policy enforcement without modifying core kernel code. Prominent LSMs include SELinux, which implements mandatory access control via type enforcement, role-based access control, and multi-level security, integrated into the mainline kernel since version 2.6.0 released in December 2003; SELinux policies define security contexts for processes, files, and other objects, restricting operations based on labels rather than discretionary permissions.[85] AppArmor, another LSM focused on path-based confinement, confines processes to specific file paths and resources through per-application profiles; it has been available in the mainline kernel since version 2.6.36 in October 2010, offering simpler policy authoring compared to SELinux while supporting mediation of syscalls, file access, and network operations.[86] Exploit mitigations in the kernel address memory corruption and information leakage vulnerabilities. Kernel Address Space Layout Randomization (KASLR), enabled by default on supported architectures since kernel version 3.14 in July 2014, randomizes the base virtual address of the kernel image and modules at boot, complicating return-oriented programming attacks by obscuring code locations; refinements in version 4.8 introduced separate randomization for physical and virtual addresses to further evade physical memory attacks.[87] Stack protection, via the CONFIG_STACKPROTECTOR option available since kernel version 2.6.22, inserts random "canaries" between local variables and return addresses on the stack, detecting overflows by verifying the canary value before function return and triggering a kernel panic if corrupted.[88] Secure Computing Mode (seccomp), introduced in kernel version 2.6.12 in March 2005, allows processes to transition into a restricted mode using Berkeley Packet Filter (BPF) rules to whitelist permitted syscalls, thereby reducing the kernel's attack surface exposed to untrusted code; seccomp filters are irrevocable and can log or kill processes attempting disallowed calls.[89] Ongoing developments emphasize kernel self-protection against its own flaws, including hardened usercopy checks to prevent kernel heap overflows and slab allocation safeguards against freelist manipulation, as outlined in the kernel self-protection documentation since version 4.13.[87] Recent releases, such as kernel 6.14 in February 2025, incorporate refined mitigations for CPU speculative execution vulnerabilities like Spectre and Meltdown, including indirect branch tracking and array bounds checks, alongside enhancements to LSM stacking for concurrent use of modules like SELinux and AppArmor.[90] These features collectively prioritize runtime integrity and confinement, though their effectiveness depends on proper configuration and hardware support, with empirical evidence from vulnerability disclosures showing reduced exploit success rates in hardened kernels.[91]Hardware support and portability
The Linux kernel's hardware support encompasses a vast array of processors, peripherals, and system-on-chip platforms through its modular driver framework, which includes subsystems for networking, storage, graphics, audio, and input devices.[92] Device drivers, frequently distributed as loadable kernel modules (LKMs), enable runtime loading and unloading to match detected hardware, minimizing kernel bloat and enhancing efficiency across diverse configurations.[93] Core detection mechanisms rely on standardized buses like PCI for discrete components, USB for peripherals, and platform-specific interfaces such as I2C or SPI for embedded systems.[94] For system description, the kernel employs the Device Tree (DT) for many ARM-based and embedded platforms, providing a machine-readable hardware topology that supplants hardcoded configurations and aids portability to new boards.[94] ACPI tables serve a similar role on x86 and compatible systems, enumerating resources like interrupts and memory regions. Graphics support includes open-source drivers for Intel, AMD, and ARM Mali GPUs via the Direct Rendering Manager (DRM) subsystem, while storage leverages protocols like NVMe, SATA, and SCSI over various host controllers. Networking hardware, from Ethernet controllers to Wi-Fi chipsets, is handled by dedicated drivers supporting standards like IEEE 802.11 and 10/100/1000 Mbps PHYs.[62] Portability across CPU architectures stems from the kernel's layered design, confining instruction-set-specific logic to thearch/ directory while exposing portable abstractions for scheduling, memory, and file systems in the core.[95] This enables bootstrapping on new instruction set architectures (ISAs) by implementing essentials like page tables, exception handling, and context switching, often requiring under 10,000 lines of architecture-specific code for initial functionality.[95] As of Linux kernel 6.11 (released September 2024), actively maintained architectures number around 20, including x86 (32/64-bit) for desktops and servers, ARM/ARM64 (common in smartphones, tablets, Raspberry Pi, and servers), RISC-V (emerging in embedded devices and new hardware), PowerPC (used in older systems and specialized hardware), MIPS, s390 (for mainframes), SPARC, LoongArch, and ARC, spanning desktops, servers, mobile devices, and real-time embedded controllers.[96] Recent integrations, such as full RISC-V support since version 5.17 (March 2022), demonstrate ongoing expansion to emerging ISAs without disrupting existing ports.[96]
Challenges in portability include maintaining deprecated architectures like IA-64 (Itanium), which risks upstream removal absent active maintainers, and adapting to hardware evolutions like ARMv9 or RISC-V vector extensions via incremental patches.[96] Vendor contributions, such as those from Qualcomm for Snapdragon SoCs or IBM for zSeries mainframes, bolster support but can introduce dependencies on non-free firmware blobs for full functionality on proprietary hardware.[62] This modular extensibility has facilitated Linux's deployment on over 90% of public cloud instances and most Android devices as of 2024, underscoring its hardware-agnostic robustness.
Innovations like Rust integration and live patching
The Linux kernel introduced initial support for the Rust programming language in version 6.1, released on December 11, 2022, enabling developers to write certain kernel components, such as drivers, in Rust alongside the traditional C codebase.[97][98] This integration aims to exploit Rust's ownership and borrowing model to prevent memory safety issues like buffer overflows and use-after-free errors, which have historically plagued C-based kernel code and contributed to vulnerabilities.[99] By 2025, Rust abstractions for subsystems like networking—such as the first Rust-written network PHY driver merged in kernel 6.8—and storage layers have progressed, though adoption remains limited to experimental and sample implementations rather than core kernel functions.[100][101] Kernel maintainers have established processes for reviewing Rust code, but challenges persist, including resistance to Rust-specific abstractions for hardware interactions like DMA mapping and the departure of key contributors in 2024, slowing broader upstream acceptance.[102][103] As of kernel 6.17, released September 28, 2025, Rust requires a minimum compiler version of 1.78.0 and supports building on kernels as old as 6.1 with backported infrastructure, yet it imposes additional build complexity without guaranteeing stability for production use outside vendor-specific modules.[18][104] Live kernel patching, a mechanism to apply limited runtime modifications without rebooting, entered the upstream kernel in version 4.0, released April 12, 2015, building on earlier vendor efforts like Oracle's Ksplice.[105][106] It operates by redirecting function calls via ftrace hooks to replacement code in loadable modules, allowing fixes for critical bugs or security issues while minimizing disruption to running systems.[106] Essential requirements include architecture-specific reliable stack tracing to avoid tracing inconsistencies that could lead to crashes, and patches must be semantically equivalent to avoid state corruption—typically restricting changes to small, function-level alterations rather than structural modifications. By design, live patching supports only a subset of updates, primarily high-priority security patches, as validated by vendors like Red Hat (kpatch), SUSE, and Canonical, who extend the upstream framework for enterprise environments.[107] As of kernel 6.17, the feature remains stable but demands careful validation, with ELF-formatted livepatch modules handling relocations dynamically to both the core kernel and loaded modules.[108] Limitations include incompatibility with kernel modules that alter traced functions and potential for subtle regressions if patches exceed safe boundaries, underscoring its role as a targeted innovation rather than a universal replacement for reboots.[109]Adoption and economic impact
Dominance in servers and cloud computing
The Linux kernel powers the operating systems of nearly all major cloud providers, including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), where custom variants such as linux-aws, linux-azure, and linux-gcp optimize for virtualization, networking, and storage performance.[110] These providers support Linux-based virtual machines comprising over 90% of public cloud workloads, driven by the kernel's scalability, low overhead, and ability to handle massive parallel processing without proprietary licensing costs.[111] Hyperscale data centers, which form the backbone of cloud services, rely on Linux for its modular architecture that enables fine-tuned resource allocation and energy efficiency tweaks, such as recent kernel modifications proposed to reduce data center power consumption by up to 30% through smarter network packet delivery.[112] In traditional server environments, Linux dominates web hosting and enterprise deployments, operating approximately 96% of the top one million web servers as of 2024, according to usage surveys that detect server OS footprints.[113] This prevalence stems from the kernel's robust process scheduling, filesystem support (e.g., ext4 and Btrfs for high-throughput I/O), and device drivers tailored for server hardware like multi-socket CPUs and NVMe storage, outperforming alternatives in reliability under load. Enterprise distributions built on the kernel, such as Red Hat Enterprise Linux, lead in paid server deployments, with IDC reporting sustained growth in Linux server revenues exceeding $1 billion quarterly in recent years.[114] High-performance computing further underscores Linux's server supremacy, with the kernel running 100% of the TOP500 supercomputers since November 2017, including exascale systems like El Capitan and Frontier that achieve petaflop-scale performance through kernel features like cgroups for resource isolation and real-time scheduling extensions.[115] This ubiquity in servers and clouds—handling an estimated 92% of virtual machines across major platforms—arises from causal factors including the kernel's free availability for modification, vast driver ecosystem supporting diverse hardware, and empirical superiority in uptime metrics compared to closed-source alternatives, as evidenced by hyperscalers' internal optimizations rather than vendor lock-in.[5]Use in embedded systems and mobile devices
The Linux kernel's modularity, extensive hardware driver ecosystem, and ability to operate on resource-limited hardware make it a preferred choice for embedded systems, where it supports real-time constraints through configurations like PREEMPT_RT patches.[116] It powers approximately 39.5% of the embedded market, including sectors such as automotive infotainment, medical devices, and consumer electronics.[21] Common applications include network routers via distributions like OpenWrt, IoT sensors and gateways for edge computing, industrial controllers, and smart thermostats, leveraging the kernel's networking stack and device tree support for diverse microcontrollers.[117] [118] Build systems such as Yocto Project and Buildroot enable tailored kernel builds, optimizing for specific hardware like RISC-V processors increasingly adopted in IoT.[119] [120] In mobile devices, the Linux kernel underpins Android, the dominant operating system for smartphones and tablets, providing core services including process management, memory allocation, security enforcement via SELinux, and power optimization through features like wakelocks and dynamic voltage scaling.[121] [122] Android employs modified Long Term Support (LTS) kernels with vendor-specific patches; for Android 15 released in 2024, compatible versions include the 6.6 and 6.1 series.[123] This integration enables Android to run on over 3 billion active devices as of 2023, handling touchscreen inputs, sensor fusion, and multimedia acceleration while abstracting ARM-based SoCs from manufacturers like Qualcomm and MediaTek.[121] The kernel's binder IPC mechanism facilitates communication between Android's framework and native components, contributing to its scalability across low-end feature phones to high-end flagships.[124]Desktop adoption trends and barriers
Despite steady growth in server and embedded applications, the Linux kernel's adoption on personal desktops has remained marginal, with global market share hovering below 5% as of mid-2025. According to web analytics from StatCounter, Linux desktop usage reached 4.09% worldwide in June 2025, up from approximately 3% in prior years, reflecting incremental gains driven by dissatisfaction with Windows 11's hardware requirements and telemetry features.[125][126] In the United States, the figure climbed to 5.03% by June 2025, surpassing previous highs and correlating with broader resistance to proprietary OS upgrades.[127] Regional variations are pronounced; for instance, India's desktop share stood at 16.21% as of July 2024, bolstered by cost-sensitive markets favoring free software.[127] Among gamers, Steam Hardware Survey data indicates a lower 2.89% penetration in July 2025, underscoring that growth is uneven across user segments.[128] This modest uptick traces to external pressures rather than inherent kernel advantages for casual users, including the impending end-of-life for Windows 10 in October 2025 and privacy concerns over Microsoft integrations.[129] Government mandates for open-source alternatives in some sectors have also contributed, as seen in European public administrations favoring Linux for cost and security reasons.[126] However, projections for broader adoption remain tempered; even optimistic estimates suggest desktop share may not exceed 10% by 2030 without systemic changes in hardware ecosystem support.[129] Kernel enhancements, such as improved graphics stacks and Rust-based components for stability, have aided niche appeal among developers but have not catalyzed mass migration.[21] Key barriers to wider desktop uptake stem from hardware and software incompatibilities rooted in the kernel's open-source model, which relies on community-driven drivers rather than vendor-provided binaries. Proprietary peripherals like certain WiFi chipsets and printers often require manual configuration or third-party modules, deterring non-technical users.[130] Digital rights management (DRM) limitations impair high-definition video streaming, as Linux kernels struggle with hardware-accelerated decoding on par with Windows, exacerbating usability gaps in media consumption.[131] Fragmentation across distributions compounds this, with inconsistent kernel configurations leading to variable device support and complicating OEM pre-installation, which remains rare outside niche vendors like System76.[132] Software ecosystem deficiencies further impede adoption, as major proprietary applications—such as Adobe Creative Suite and certain enterprise tools—lack native kernel-compatible versions, forcing reliance on emulation layers like Wine that introduce performance overheads.[130] Gaming, while improving via Proton, still faces kernel-level hurdles with anti-cheat systems requiring direct hardware access incompatible with Linux's security model.[133] User experience barriers, including installation complexities like partition management, perpetuate a perception of Linux as suited only for experts, reinforced by minimal marketing from kernel maintainers or distro projects compared to commercial rivals.[133] These factors, absent strong incentives like widespread binary blob integration, sustain desktop Linux as a specialized rather than general-purpose option.[132]Legal framework
Licensing under GPL and compliance issues
The Linux kernel has been licensed under the GNU General Public License version 2 (GPLv2) exclusively since the release of version 0.12 on February 5, 1992, when Linus Torvalds adopted it over his initial proprietary-leaning license to promote collaborative development while enforcing copyleft reciprocity.[134] The GPLv2 requires that any distribution of the kernel or derivative works in binary form must include access to the complete corresponding source code, including modifications, under the same license terms, ensuring that users can study, modify, and redistribute the software freely.[135] This copyleft mechanism aims to prevent proprietary enclosures of kernel-derived code, mandating that improvements benefit the broader community rather than being locked into closed ecosystems. Compliance issues arise primarily when vendors, especially in embedded systems and appliances, distribute modified kernel binaries—such as custom builds for routers, set-top boxes, or IoT devices—without providing the required source code or offering it upon request, violating sections 3 and 6 of the GPLv2.[136] For instance, failure to disclose patches or configurations integrated into firmware can hinder independent verification and further development, undermining the license's intent; such violations have been documented in sectors where hardware manufacturers prioritize proprietary features over openness.[137] The kernel's explicit "GPLv2 only" designation, without the "or later" clause, reflects a deliberate choice by maintainers like Torvalds to avoid GPLv3's additional restrictions on hardware-level code execution controls (e.g., anti-Tivoization provisions), prioritizing broad adoption over stricter anti-circumvention rules.[138] Enforcement of GPLv2 compliance for the kernel remains decentralized and limited, relying on individual copyright holders rather than systematic litigation, as major contributors have not delegated broad enforcement authority to organizations like the Software Freedom Conservancy (SFC).[139] The Linux kernel development community issued a formal enforcement statement in 2018 emphasizing the importance of reciprocal sharing for sustainability, yet practical actions are rare due to the distributed nature of copyrights and a cultural preference for collaboration over confrontation.[136] Notable cases include a 2021 lawsuit by developer Harald Welte against Vizio for incorporating GPL-licensed kernel modifications into its SmartCast platform without source disclosure, highlighting derivative work obligations under GPLv2.[140] Earlier disputes, such as allegations against VMware in the mid-2000s for embedding kernel code in its hypervisor without full sourcing, underscore ongoing tensions between commercial virtualization and copyleft requirements, though many resolve via settlements or compliance corrections rather than court rulings.[141] Discussions at events like the 2024 Linux Plumbers Conference reveal persistent challenges, with enforcers noting that kernel-specific violations often evade scrutiny compared to user-space GPL components like BusyBox.[137] Overall, while the GPLv2 has facilitated the kernel's growth to over 30 million lines of code by 2021, uneven enforcement risks eroding trust in the ecosystem's openness.[142]Loadable modules and binary blobs
Loadable kernel modules (LKMs) enable dynamic extension of the Linux kernel's functionality at runtime, allowing components such as device drivers, filesystems, and system calls to be inserted or removed without rebooting the system. Implemented as relocatable object files (typically with.ko extensions), these modules are loaded into kernel memory via commands like insmod or modprobe, which resolve dependencies and handle symbol exports from the core kernel. This modularity, present since early kernel versions around 1996, reduces the monolithic kernel's size at boot and facilitates hardware-specific additions on demand.[143][144]
Under the kernel's GPLv2 license, LKMs accessing GPL-protected symbols—marked with __GPL__ or similar annotations—must be compatibly licensed, or they trigger a kernel taint flag indicating potential licensing incompatibility. The kernel exports a syscall interface exception to permit non-GPL user-space interactions, but proprietary LKMs risk violating derivative work clauses if they substantially link to GPL code, though dynamic loading blurs strict interpretation. Kernel developers have implemented measures like symbol versioning and randomization since Linux 6.6 (released December 2023) to break compatibility with proprietary modules, aiming to deter their development while preserving open-source drivers.[145][146]
Binary blobs, often proprietary firmware for hardware initialization (e.g., Wi-Fi chips or GPUs), are loaded by kernel drivers as opaque data blobs via the request_firmware() interface, stored in /lib/firmware. These non-source-provided binaries, required for full hardware support in devices from vendors like Broadcom or Intel, execute on separate hardware microcontrollers rather than directly in kernel space, mitigating some GPL linkage concerns. Distributing kernels with built-in non-GPL blobs could infringe if treated as combined works, but runtime loading from separate files avoids this, as affirmed by kernel maintainers' practices since the early 2000s.[147][148]
Linus Torvalds and kernel maintainers tolerate binary blobs pragmatically to ensure hardware compatibility, rejecting purist bans proposed in 2006 that would exclude vast proprietary ecosystems. The Free Software Foundation counters that such inclusions compromise the kernel's freedom, inspiring projects like Linux-libre (initiated 2008) that excise blobs via deblob scripts. No lawsuits have enforced GPL violations against blob usage, reflecting maintainers' interpretation that firmware acts as user-supplied data, not derivative code—prioritizing empirical functionality over ideological purity despite ongoing debates.[146][149][150]
Trademark protections and forks
The trademark for "Linux" is owned by Linus Torvalds, who first used the mark in connection with the kernel he initiated in 1991.[151] Torvalds registered the trademark in the United States in 1994 to protect against unauthorized commercial exploitation that could dilute its association with the original kernel development, following concerns over potential confusion in the marketplace.[152] In 1996, a trademark squatter named William Della Croce III attempted to register "Linux" for himself, leading to a dispute resolved in November 1997 when Della Croce assigned the mark to Torvalds as part of a settlement, affirming Torvalds' ownership and preventing further claims.[153] Torvalds has delegated administration of the trademark to the Linux Foundation, which issues sublicenses to entities wishing to use "Linux" in product names, such as Linux distributions or hardware certified as Linux-compatible.[151] These sublicenses require adherence to usage guidelines, including proper attribution stating that "Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries," avoidance of the mark as a generic noun or verb, and ensuring the product maintains compatibility with the upstream kernel to prevent consumer deception.[154] Sublicense fees, historically up to $5,000 annually for commercial users, support enforcement efforts rather than generating profit, as Torvalds has emphasized that the process operates at a net loss due to legal overhead.[155] Non-compliance can result in demands to cease use, as seen in cases where vendors failed to attribute ownership or misrepresented compatibility.[156] The GNU General Public License (GPL) permits unrestricted forking of the Linux kernel source code, enabling derivatives for specialized uses like embedded systems or proprietary modifications. However, the trademark imposes limits on branding: forks cannot use "Linux" in a manner implying official endorsement or equivalence to the mainline kernel unless they comply with sublicense terms and demonstrate sufficient fidelity to upstream standards.[154] This distinction preserves the mark's value by avoiding dilution from incompatible or degraded variants; for instance, heavily modified kernels in devices like Android or proprietary appliances are often rebranded or described without invoking the "Linux" trademark to sidestep infringement risks.[157] Upstream maintainers do not transfer trademark rights to forks, requiring divergent projects to adopt distinct nomenclature, such as "Android kernel" rather than "Linux," to prevent marketplace confusion.[157] Enforcement focuses on curative measures like rebranding requests rather than litigation, aligning with the open-source ethos while safeguarding the kernel's reputational integrity.[158]Controversies and criticisms
Political interventions in maintainer selection
In September 2018, the Linux kernel community adopted the Contributor Covenant Code of Conduct, replacing the prior Code of Conflict, amid pressure from the Linux Foundation and following public criticism of Linus Torvalds' communication style.[159] The new code emphasized inclusive behavior, constructive criticism, and reporting violations to the Linux Foundation's Technical Advisory Board (TAB), with maintainers required to enforce it under threat of repercussions, including potential removal from their roles.[160] This shift was viewed by some developers as an external imposition prioritizing ideological conformity over technical merit, though proponents argued it addressed toxicity without altering code review standards.[160] Torvalds, the kernel's principal maintainer, temporarily stepped back from duties on September 16, 2018, after issuing an apology for past outbursts, effectively ceding interim control to Greg Kroah-Hartman; he returned in October after undergoing coaching on behavior.[161] The Code of Conduct has since influenced maintainer accountability, with enforcement actions targeting perceived violations. In November 2024, the TAB restricted Kent Overstreet's participation in kernel development, citing repeated failures to adhere to conduct expectations during interactions, such as disputes over the Bcachefs filesystem; this barred him from submitting patches or serving as maintainer without TAB approval, sparking debate over whether such measures prioritize interpersonal norms over expertise.[162] Overstreet contested the decision, arguing it stemmed from disagreements on technical governance rather than malice, but the TAB upheld it as necessary for community health.[162] Critics, including Overstreet, have described the Contributor Covenant—authored by Coraline Ada Ehmke—as introducing subjective political criteria that could disadvantage contributors not aligning with its diversity-focused language, though no explicit DEI quotas for maintainers have been documented.[163] Geopolitical factors have also prompted maintainer removals, decoupled from technical performance. In October 2024, Greg Kroah-Hartman removed approximately 15-20 entries from the MAINTAINERS file corresponding to developers using Russian email domains, primarily affiliated with state-linked entities like MCST and Baikal Electronics, to comply with international sanctions amid the Russia-Ukraine conflict.[164] Torvalds endorsed the action, stating it prevented potential exploitation by "Russian troll factories" while affirming the kernel's openness to individual Russian contributors unaffiliated with sanctioned firms.[164] This intervention, driven by legal obligations of the U.S.-based Linux Foundation, raised concerns among some in the open-source community about politicizing maintainer selection based on nationality or affiliation rather than code quality, potentially reducing the contributor pool without evidence of misconduct.[164]Debates over code bloat and maintainability
The Linux kernel's codebase has expanded substantially since its inception, reaching over 40 million lines of code by January 2025, up from approximately 27.8 million in 2020 and 15 million in 2015.[165] [19] This growth, averaging around 400,000 lines every two months in recent years, is primarily driven by additions for hardware drivers, architecture support, and new features to accommodate diverse systems from servers to embedded devices.[19] Critics argue this constitutes code bloat, complicating maintenance and increasing the risk of bugs due to the monolithic structure where much functionality resides in kernel space rather than user space.[166] Linus Torvalds, the kernel's creator, acknowledged bloat concerns in a 2009 LinuxCon keynote, stating, "Linux is bloated" and that the kernel had become "huge and scary" with a "scary" iCache footprint exacerbated by ongoing feature additions.[167] [168] He noted the absence of a clear plan to address it, attributing the issue to relentless expansion without sufficient modularization or trimming.[169] Maintainability analyses, such as a 2002 study, highlight that while lines of code per module grow linearly, inter-module coupling—measured by common coupling instances—increases quadratically with version numbers, potentially hindering long-term sustainability unless refactoring occurs. [170] Defenders counter that the size reflects necessary support for an ever-expanding hardware ecosystem, with the kernel's configuration system allowing users to compile only required components, mitigating effective bloat in deployments.[166] Despite these debates, the kernel remains actively maintained by thousands of contributors, though the scale demands rigorous review processes to preserve stability.[170] Ongoing discussions in developer communities emphasize balancing feature completeness with code hygiene, as unchecked growth could strain volunteer-driven efforts amid corporate influences pushing proprietary or niche drivers.[171]Conflicts between meritocracy and corporate agendas
The Linux kernel's development process emphasizes meritocracy, wherein patches are accepted based on rigorous technical review by maintainers, irrespective of contributors' affiliations or identities.[172] This model has sustained the project's growth, with corporations like Intel, Red Hat (owned by IBM), and Google funding over 80% of commits through employee contributions as of 2020 analyses. However, as corporate employment dominates the contributor base—exemplified by Red Hat's control of key maintainers—conflicts emerge when business imperatives, such as standardized HR policies or strategic technical shifts, override pure code quality assessments. A focal point of tension occurred in September 2018 with the adoption of the Contributor Covenant Code of Conduct (CoC), supplanting the kernel's prior "Code of Conflict," which tolerated heated but substantive technical debates.[172] The Linux Foundation, reliant on corporate sponsorships from entities including Google and Intel, endorsed the CoC to enforce behavioral norms aligned with broader industry diversity and inclusion efforts.[173] Critics within the community, including developers who threatened to retract their code, contended that the CoC introduced subjective social criteria—such as prohibitions on "harassment" interpreted beyond technical contexts—potentially prioritizing ideological conformity over merit-based evaluation, thereby enabling corporate agendas to censor dissent under guise of civility.[174] Linus Torvalds signed the CoC on September 16, 2018, but announced an indefinite break from kernel work minutes later, acknowledging his own "abusive" communication style after years of publicly berating submitters for subpar code.[175][176] Torvalds returned in late 2018 following personal efforts to moderate his feedback, yet the CoC's enforcement has periodically reignited disputes, as in November 2024 when the Linux Foundation's Technical Advisory Board restricted bcachefs maintainer Kent Overstreet's participation for violations deemed to undermine "welcoming" conduct, despite his technical expertise.[162] Overstreet's case, involving disputes with other maintainers, was cited by supporters as necessary for collaboration but by detractors as an example of corporate-influenced governance stifling meritocratic rigor, given the Foundation's ties to firms enforcing similar policies internally.[162] Further strains involve corporate-driven technical mandates, such as the integration of Rust support starting in kernel version 6.1 (December 2022), advocated by Google and Microsoft engineers for enhanced memory safety amid rising security concerns in C code.[177] Opponents argue this reflects vendor agendas to embed safer abstractions benefiting their cloud infrastructures, rather than addressing root causes through refined C practices, potentially fragmenting the monolithic kernel architecture that meritocratic consensus has preserved.[177] These episodes underscore a causal tension: while corporate resources enable scale, they risk subordinating apolitical engineering judgment to profit-oriented or sociocultural priorities, as evidenced by maintainer employment dependencies where patches aligning with employer roadmaps gain precedence.[178]References
- https://wiki.gentoo.org/wiki/Linux_firmware