Click any tag below to further narrow down your results
Links
This article examines the average lifespan of kernel bugs, revealing they typically go undetected for over two years, with some lasting nearly 21 years. It highlights a tool that identifies historical bugs and discusses trends in bug discovery, particularly improvements in recent years.
There's a security flaw in the Amazon WorkSpaces client for Linux that affects versions 2023.0 to 2024.8. This flaw can allow local users to access another user's authentication token, potentially giving them access to their WorkSpace. To fix this, users should upgrade to version 2025.0 or later.
Hermes is a Linux-only command and control agent written in Python. It provides 18 built-in commands for tasks like file operations and system reconnaissance, using HTTP for communication. The installation process involves using the Mythic CLI to set it up.
ZMX is a tool designed for persisting terminal sessions, allowing users to attach and detach from shell sessions without terminating them. It focuses on session management without the additional complexity of window management features found in tools like tmux. It supports multiple clients connecting to the same session and maintains the terminal state and output when re-attaching.
This article explores Cloudflare's attempts to enhance the Linux networking stack, particularly through their soft-unicast method for sharing IP addresses. It details the technical hurdles faced with socket binding and NAT, and how the team developed innovative solutions like using TCP Fast Open to streamline connection management.
The article argues that Linux has become a viable alternative to Windows for desktop users, especially gamers. It highlights the author's positive experiences with a specific Linux distribution called Bazzite, emphasizing ease of use and greater control over the operating system. The author encourages readers to try Linux in 2026, suggesting it offers a more personalized computing experience.
This article explains a C++23 tool called Klint for incident response on Linux systems. It detects hidden kernel modules, rootkits, and other threats through multiple self-registering scanners. The tool runs in isolated processes and produces machine-readable JSON output for easy integration into automated workflows.
This article discusses a proof-of-concept for sleep obfuscation on Linux using sigreturn-oriented programming (SROP). It focuses on encrypting PT_LOAD segments and the heap to enhance security. The approach aims to protect processes from certain types of attacks.
Lynis is a security auditing tool for UNIX-based systems like Linux and macOS. It scans for vulnerabilities, configuration issues, and compliance with standards such as ISO27001 and PCI-DSS. System administrators and security professionals use it to enhance system defenses.
This article explains how Linux manages process memory using virtual memory areas (VMAs) and page tables. It covers concepts like memory mapping, page faults, and copy-on-write behavior during fork operations, providing insights into memory protection and management in the Linux kernel.
Kagi has launched an alpha version of its Orion browser for Linux, currently available only to paid Orion+ subscribers. A beta version is expected next month for those who signed up for updates. The browser focuses on privacy and offers a native experience using WebKit.
Vuls is a vulnerability scanner for Linux, FreeBSD, Windows, and macOS that operates without agents. It automates vulnerability detection, reports affected servers, and generates regular reports to streamline security management for system administrators.
This article details a recent OpenJDK commit that replaced a complex method for retrieving thread CPU time with a simpler and faster approach using `clock_gettime()`. The change cut performance latency significantly, improving the speed of `getCurrentThreadUserTime()` by up to 40 times. It also explains the technical reasons behind the original implementation and the advantages of the new method.
This article outlines a method to statically link PipeWire in Tuple's Linux pair programming tool without modifying PipeWire's source code. It details how to implement a fake dynamic linker to bypass the need for dlopen and related functions, allowing users to create a fully static executable.
The article details an experiment running `rm -rf /` on a Linux server to see what remains. It discusses the limited tools available after this destructive command and explores creative ways to recover functionality using bash builtins and scripts.
Google Big Sleep has published reports detailing several fixed vulnerabilities in the Linux kernel. The post provides a link to the full list of issues they discovered and addressed. This information is relevant for anyone concerned about Linux security.
Fail2Ban monitors log files for failed login attempts and bans offending IP addresses by updating firewall rules. It supports both IPv4 and IPv6 and can be configured for various services. While it helps reduce unauthorized access, it’s best used alongside stronger authentication methods like two-factor authentication.
The annual Maintainers Summit confirmed that Rust is no longer an experimental feature in the Linux kernel. It is now considered a core component, marking a significant shift in kernel development. The Rust for Linux team has achieved a major milestone.
This article reviews three new cloud-based services—Sprites, exe.dev, and shellbox—for Linux virtual machines aimed at developers. It analyzes their user experiences, pricing, and features, ultimately favoring exe.dev for its usability and setup efficiency.
The Linux kernel is considering enabling the -fms-extensions flag, which could improve code aesthetics and save stack space. Linus Torvalds supports this move, indicating it may be included in the upcoming Linux 6.19 release.
Researchers found a sophisticated malware framework called VoidLink that targets Linux machines, particularly in cloud environments. It has over 30 customizable modules for reconnaissance, privilege escalation, and stealth, indicating a shift towards targeting Linux systems by professional threat actors.
The author recounts their transition from Windows to Linux after years of frustration with Microsoft's updates and bugs. They detail the challenges faced during the switch and highlight how Linux has ultimately improved their workflow, especially in software development and music production.
CISA confirmed that a serious vulnerability in the Linux kernel, CVE-2024-1086, is being actively exploited in ransomware attacks. This flaw allows local attackers to escalate their privileges, potentially gaining root access and compromising entire systems. Federal agencies must secure their systems by June 20, 2024, or implement specific mitigations.
Meta has implemented a new scheduler called LAVD, originally designed for the Steam Deck, on its servers. This scheduler enhances load balancing and performance across various CPU and memory configurations. The article links to a presentation and slide deck for those interested in the technical details.
The article discusses potential shifts in Windows market share, highlighting Microsoft's waning appeal to consumers. Key factors include a lack of innovation, a new affordable MacBook from Apple, and the rise of Linux gaming options that could attract PC gamers away from Windows.
VoidLink is a sophisticated malware framework targeting Linux systems, designed for stealthy, long-term access in cloud environments. It features a flexible architecture with over 30 plugins, capable of adapting its behavior based on the detected environment and employing various evasion techniques. The framework is linked to Chinese-affiliated developers and shows signs of rapid evolution.
Homebrew 5.0.0 introduces default download concurrency, promotes Linux ARM64/AArch64 to Tier 1 support, and outlines future deprecations for macOS versions. Key features include improved cask handling and updates to various commands. Users should be aware of upcoming changes affecting compatibility and support.
The author reflects on their long history with Linux, starting from 1996, and discusses its evolution and significance in the tech landscape. They express a mix of nostalgia and concern over recent changes in Linux development and philosophy. Despite these changes, they still appreciate Linux for its flexibility and the community it fosters.
This article breaks down the input handling process in Linux, detailing both kernel-level and user-space components. It explains how input devices interact with the kernel, the role of the input core, and the pathway from hardware to user-space through various subsystems.
UAC is an incident response tool for collecting artifacts from various Unix-like systems. It automates data collection for forensic investigations, compliance checks, and more, using customizable YAML profiles without requiring installation. The tool supports diverse environments, including IoT devices and NAS systems.
Apptron is a local-first development platform that runs a full Linux environment in the browser with a VSCode-based editor. It supports various use cases, including software development and AI experiments, and allows users to extend and customize it as needed. Unlike cloud IDEs, all operations happen locally, ensuring no dependency on the cloud.
This article details the architecture and techniques of Singularity, a Loadable Kernel Module rootkit for Linux 6.x. It covers methods for process concealment, file system stealth, and privilege escalation, highlighting how it evades detection through advanced hooking and anti-forensic tactics.
The article argues that while AI can handle technical correctness, it lacks the ability to determine whether a solution should exist based on long-term judgment and design principles. Personal taste, shaped by experience and exposure to successful and failed ideas, is now the key differentiator in technology development. It emphasizes that human judgment is essential for making complex design decisions that AI cannot navigate.
The author shares their experience of upstreaming a patch to handle hotkeys on a 2005 Fujitsu Lifebook S2110 while exploring the Linux kernel. They detail the process of identifying the relevant driver for the hotkeys, troubleshooting issues with key events not firing in Player mode, and examining the kernel's ACPI interactions to resolve the problem.
The author reflects on their initial disdain for systemd, which replaced traditional init systems and introduced a binary logging format, but ultimately concludes that systemd has been a successful evolution in process management for Linux. They highlight its backward compatibility, improved logging, scheduling, and enhanced security features, arguing that it has addressed many shortcomings of previous init systems and brought valuable new functionality.
Patchman is a Django-based tool designed for monitoring patch statuses on Linux systems via a web interface. It allows users to track available package updates, categorize them as normal or security updates, and identify potential issues with installed packages. The system does not perform installations but provides detailed reporting and filtering options for hosts, packages, and repositories.
The article discusses how the author utilized the O3 tool to identify CVE-2025-37899, a remote zero-day vulnerability in the SMB implementation of the Linux kernel. It details the process of discovering the vulnerability and its implications for security practices in the Linux environment.
A new rootkit leveraging the io_uring interface has been discovered, capable of bypassing traditional Linux security measures. This malicious software operates at a low level, allowing it to evade detection and maintain persistence on infected systems, raising significant concerns for system administrators and security professionals.
The author discusses the challenge of creating a stable authenticated 0-click exploit for the Linux Kernel SMB3 Daemon (ksmbd), using real-world CVEs to demonstrate the process. They detail the selection of specific vulnerabilities, including a controlled SLUB overflow and an authenticated remote leak, to build an effective exploit chain. The article emphasizes the abundance of vulnerabilities in ksmbd and the importance of vulnerability research in developing exploits.
A new debugger for Linux, inspired by RemedyBG, is designed to be fast and efficient, featuring a text-based user interface and built from scratch without relying on gdb or lldb. It supports native code on x86 64-bit systems, but has limitations such as no remote debugging or GUI integration. While it includes many standard debugging features, its development is currently not active, focusing only on bug fixes and minor enhancements.
The article discusses the importance of tuning Linux swap settings for optimizing Kubernetes performance, particularly in environments with limited memory resources. It provides detailed insights into how swap can affect application performance and offers practical recommendations for configuring swap to enhance Kubernetes workloads.
The article explores a DBMS interview question posed by Joran Dirk Greef regarding the behavior of Direct I/O operations in Linux when using the O_DIRECT flag. It examines the constraints of aligned reads and the implications of bypassing the page cache, ultimately discussing the expected return values from the read(2) system call under these conditions. The author shares insights into filesystem behavior and kernel source code relevant to the topic.
The article discusses the exploitation of CVE-2025-37947 in ksmbd, focusing on the challenges and methodologies used to achieve local privilege escalation. It details the vulnerability's root cause, the proof of concept implementation, and the kernel memory allocation intricacies that enable the exploit. The author emphasizes the importance of understanding memory management for effective exploitation.
Microsoft has resolved a boot issue affecting Linux on dual-boot systems with Secure Boot enabled after the August 2024 Windows security updates. The problem stemmed from an incorrectly applied Secure Boot Advanced Targeting update, which has now been fixed in the May 2025 Patch Tuesday updates. Users are advised to update their devices to incorporate this resolution.
Talos is a Linux distribution designed specifically for Kubernetes, emphasizing a no-SSH approach to enhance security and simplify operations. It automates the deployment and management of Kubernetes clusters, allowing users to focus on their applications rather than the underlying infrastructure. Talos operates in a minimalistic environment, making it suitable for cloud-native applications and modern DevOps practices.
Linux is experiencing growth on business desktops and laptops, increasing from 1.6% to 1.9% between January and June 2025, with a notable rise to 2.5% for new assets. The trend is attributed to heightened cybersecurity concerns and a shift towards DevOps practices, with Europe leading in adoption rates. Despite this gradual growth, challenges remain due to software compatibility and user familiarity with Linux compared to Windows and Mac systems.
Somo is a user-friendly alternative to netstat for monitoring sockets and ports on Linux and macOS, offering features like filtering, sorting, and JSON output. It provides interactive capabilities to kill processes and can be installed using various package managers or built from source. The tool supports shell completions and allows customization via config files for repeated commands.
A new Linux malware called "Plague" has been discovered, allowing attackers persistent SSH access while evading traditional detection methods for over a year. It employs advanced obfuscation techniques and environment tampering to eliminate traces of malicious activity, making it particularly difficult to identify and analyze. Researchers emphasize its sophisticated nature and the ongoing threat it poses to Linux systems.
A new Linux CLI program called term.everything allows users to run GUI windows directly in their terminal, utilizing a built-from-scratch Wayland compositor. Users can experiment with various applications, including games and web browsers, but may encounter issues with some apps failing to launch. The program, written in TypeScript and C++, provides a unique way to experience graphical applications through terminal emulation.
FlipSwitch is a novel syscall hooking technique developed to bypass the changes introduced in Linux kernel 6.9 that neutralized traditional hooking methods. By directly patching the syscall dispatcher's machine code, FlipSwitch allows rootkits to redirect syscalls while remaining stealthy, posing ongoing challenges for kernel security. Detection methods, including YARA rules, have been devised to identify this rootkit in memory or on disk.
The author details their experience building a high-end Linux PC, emphasizing component choices like the Intel Core Ultra 9 285K CPU, a 4TB Samsung 990 Pro SSD, and an MSI GeForce RTX 3060 Ti GPU. They share insights on the selection process, performance considerations, and the importance of compatibility with Linux, particularly regarding network cards and power supplies.
The author reflects on the benefits of self-hosting and tech independence, emphasizing the importance of owning a domain and the satisfaction derived from building and managing personal tech solutions. They share their journey into self-hosting various services and highlight the significance of open-source tools in fostering a collaborative tech community. The article advocates for starting small in self-hosting while appreciating the learning and rewards that come with it.
Unit 42 researchers have identified a surge in ELF-based malware targeting cloud infrastructure, predicting that threat actors will increasingly use complex tools to exploit Linux environments. The study highlights five specific malware families, their evolving techniques, and the urgent need for enhanced detection and prevention mechanisms in cloud security.
A tech enthusiast successfully hosts a blog on a Nintendo Wii using the NetBSD operating system, highlighting the process of softmodding the console and installing necessary software. Despite the Wii's limited hardware capabilities, the author demonstrates that it can handle a static website, although performance issues arise when serving encrypted pages.
The author describes their experience modernizing the outdated ftape kernel driver for QIC-80 tape drives using Claude Code, an AI coding assistant. After several iterations and manual adjustments, they successfully created a loadable kernel module that could communicate with modern Linux kernels, highlighting the collaborative potential of AI tools in software development.
Kali Linux users will soon face issues with the `apt update` command due to a new signing key that must be manually downloaded and installed. Users can resolve the issue by using a provided command to download the new keyring file to their system. The article also addresses concerns about the key change and provides links for further verification and support.
The article discusses the challenges of coordination within the open-source Linux ecosystem, particularly on the desktop, contrasting it with the more unified environments of Windows and MacOS. It highlights the importance of a standardized API and reflects on the history and impact of the Language Server Protocol (LSP) in software development, emphasizing that the governance structure of Linux allows it to exist despite coordination issues.
A Rust-based Linux kernel module for rootkit detection was developed during an internship at Thalium to enhance malware detection capabilities in various Linux environments. The article discusses the importance of detecting kernel rootkits and outlines the tools and techniques used for this purpose, including leveraging the Linux kernel's tracing APIs and the limitations of existing malware detection solutions.
The article discusses the use of /dev/shm, a RAM-based filesystem in Unix/Linux systems, which allows users to store files directly in memory for enhanced performance. It highlights the advantages of using /dev/shm to handle files efficiently, particularly for tasks in linguistics, while noting that files in this temporary space are lost upon reboot. The author emphasizes the significant speed improvements when working with large files stored in RAM.
SharpEye is a robust Linux intrusion detection and system security monitoring framework developed by innora.ai, utilizing machine learning and advanced analytics to detect and alert on various security threats in real-time. It features comprehensive modules for monitoring system resources, user accounts, network connections, and container security, offering real-time alerting and a web dashboard for efficient management. With all core modules fully implemented and tested, SharpEye is designed for effective protection against modern security challenges.
Linux Integration Services Automation (LISA) is a comprehensive system for validating Linux quality, featuring a test framework and customizable test suites. Originally designed for Microsoft Azure and Windows HyperV, LISA now supports various Linux platforms and enables automated environment management for testing. Contributions are welcome as LISA continues to evolve with new features.
Ansible’s service module simplifies the management of services across Linux and Windows environments, allowing users to control services remotely without logging into each server. It provides a consistent interface for starting, stopping, and restarting services, which helps reduce downtime, automate operations, and manage risks in distributed IT infrastructures. The article includes practical examples and use cases to illustrate the module's functionality.
The XZ-Utils backdoor, discovered in March 2024, remains present in at least 35 Linux images on Docker Hub, posing risks to users and organizations. Despite being reported, Debian has chosen not to remove the compromised images, citing low risk, which has raised concerns among researchers about the potential for accidental use in automated builds. Users are advised to ensure they are using updated versions of the affected library to mitigate risks.
The article discusses a Linux-based cryptominer that has been discovered, detailing its operation and potential impact on system performance and security. It also highlights the methods used by the malware to hide its presence and evade detection. Users are advised to take necessary precautions to protect their systems from such threats.
Caracal is a Rust-based tool that leverages eBPF techniques to conceal specific target processes and programs from being visible in various system monitoring tools. It requires a Linux-based OS and the installation of specific dependencies like bpf-linker and Rust's nightly toolchain. Caracal is intended for educational purposes and is distributed under the GPLv3 license.
Microsoft and VIAcode offer a free guide for migrating Linux workloads to Microsoft Azure, highlighting the benefits of running Linux on Azure, including significant cost savings and a zero-downtime migration framework. The guide includes expert insights, case studies, and strategies for optimizing performance and AI-readiness post-migration.
Linux has surpassed a 5% share of the U.S. desktop market, reflecting growing discontent with Windows and macOS, and a rise in user-friendly distributions. This milestone indicates a cultural shift towards open-source software, driven by privacy concerns and economic factors. While the achievement is celebrated, challenges such as software availability and user experience remain critical for further growth.
Two new vulnerabilities in Linux have been disclosed that can be exploited together to gain full root access. Additionally, CISA has warned of active exploitation of an older vulnerability affecting the Linux kernel, emphasizing the need for organizations to apply patches immediately.
The article provides an in-depth guide to understanding Linux control groups (cgroups), particularly focusing on cgroup v2 introduced in kernel 4.5. It discusses how to create cgroups to manage resource allocations for processes and demonstrates practical examples of applying memory and CPU limits using a NixOS virtual machine. The author emphasizes the Unix philosophy of treating everything as a file to interact with the Linux kernel effectively.
Google is developing a Linux Terminal app for Android that allows on-device app development and the potential to run graphical Linux applications and games. This initiative aims to transform Android into a competitive desktop platform, addressing previous limitations in app development directly on the OS. There are ongoing improvements in performance and functionality, with future possibilities including gaming support.
The Containerization package enables applications to utilize Linux containers on Apple silicon, leveraging Swift and the Virtualization.framework. It offers APIs for managing OCI images, creating optimized Linux kernels, and facilitating lightweight virtual machines with fast boot times, while allowing interaction with remote registries and containerized processes. Users can build the package from source and contribute to its ongoing development.
A new campaign utilizing ClickFix attacks is now targeting both Windows and Linux systems, with the threat group APT36 adapting social engineering tactics to trick users into executing malicious commands. The Linux variant involves redirecting victims to a CAPTCHA page that prompts them to run a benign command, potentially paving the way for future attacks. Users are advised to avoid executing unknown commands to mitigate the risk of malware infections.
A blog is currently hosted on a Nintendo Wii using the NetBSD operating system, showcasing the viability of running general-purpose software on unconventional hardware. The author details the process of softmodding the Wii and installing NetBSD, alongside the challenges and limitations faced while serving a static website on this retro gaming console. Despite performance constraints, the project highlights the potential for using outdated hardware in modern applications.
A new Linux malware named Koske uses seemingly harmless panda JPEG images to deploy sophisticated malware directly into system memory, leveraging vulnerabilities in exposed JupyterLab instances. The malware, believed to be developed with AI assistance, deploys cryptocurrency miners and employs advanced tactics to maintain persistence and evade detection. Researchers warn that the adaptability of Koske could lead to even more dangerous variants in the future.
RingReaper is a stealthy post-exploitation agent for Linux that utilizes the io_uring asynchronous I/O interface to minimize detection by EDR solutions. By replacing traditional system calls with io_uring operations, RingReaper effectively reduces the risk of triggering security alerts, even when some traditional calls are necessary. The tool is intended for educational purposes and demonstrates advanced evasion techniques against security monitoring.
Falco is a cloud native runtime security tool for Linux that monitors real-time events and detects potential threats using custom rules. Originally developed by Sysdig and now maintained under the Cloud Native Computing Foundation, it integrates with container runtimes and Kubernetes, offering features like a command-line utility, plugins, and a structured codebase across multiple repositories. The project encourages community involvement and provides comprehensive documentation for setup and contributions.
Daniel Almeida's article explores the intricacies of GPU drivers, focusing on the Tyr Rust driver for Linux and its interaction with the Vulkan-based VkCube application. It explains the roles of User Mode Drivers (UMDs) and Kernel Mode Drivers (KMDs), detailing how they manage GPU workloads, memory allocation, and job submission. The piece sets the stage for further discussions on Arm's CSF hardware in subsequent entries of the series.
YAMS is a persistent memory solution that offers content-addressed storage with features like deduplication, compression, and both full-text and semantic search capabilities. It supports platforms such as Linux and macOS, provides a portable CLI and server, and allows extensibility through plugins, making it a versatile tool for managing data efficiently. Installation and configuration are facilitated through a setup script and Meson build system, with detailed documentation available online.
A significant security vulnerability has been discovered in Lenovo webcams that are based on Linux, potentially allowing unauthorized access and control. Users are advised to update their firmware and take precautions to secure their devices against possible exploitation.
KoviD is an open-source Loadable Kernel Module designed for educational and defensive security research, providing a platform for security professionals to understand and combat rootkit techniques within Linux systems. It enables users to analyze rootkit behavior, develop detection methods, and improve security strategies in a controlled environment. The project emphasizes responsible usage and compliance with legal regulations to ensure ethical testing practices.
The article discusses alternatives to Windows for users whose hardware does not support Windows 11, highlighting free options like Linux and Chrome OS Flex. It emphasizes the ease of installation and use for newcomers, allowing them to continue utilizing older PCs productively without the need for expensive upgrades. The guide provides steps for installation and reassures users about the simplicity of transitioning from Windows to these operating systems.
The article explores Linux capabilities as a fine-grained access control mechanism that allows for more secure privilege management by dividing the traditional superuser privileges into distinct units. It demonstrates how these capabilities can be manipulated to create potential security vulnerabilities, particularly in the context of privilege escalation and backdooring. Additionally, it provides commands for viewing and managing capabilities on Linux systems.
The article explains how modern operating systems, specifically Linux, manage shared libraries with load-time relocation. It details the challenges of loading shared libraries due to their unknown memory addresses and discusses the role of the dynamic loader in adjusting the shared libraries for their runtime locations. The focus is primarily on load-time relocation, which is one of the methods used in handling shared libraries in the Linux environment.
This article guides readers through the process of building a micro Linux distribution from scratch, focusing on the RISC-V architecture. It aims to provide a simplified understanding of operating systems, the Linux kernel, and essential concepts related to creating a minimal operating system environment, while also noting that advanced users might find some explanations oversimplified.
The article discusses how the Linux kernel executes ELF (Executable and Linkable Format) binaries, detailing the structure of ELF files and the process involved in loading them. It explains the key components of the ELF format, including program header entries, and describes the steps the kernel takes to prepare and execute an ELF binary, emphasizing the complexity of the handling process.
The article explores the intricate process that occurs between a program's execution request to the OS kernel and the execution of the main function. It delves into the execve system call, the structure of ELF executable files, and the various components involved in loading and executing a program on Linux systems.
The upcoming Android 16 QPR2 update enhances the Linux Terminal by expanding its file access to nearly all shared storage on the device, moving beyond the current limitation of just the Downloads folder. This improvement facilitates easier file sharing between the Android host and the Linux virtual machine, enabling users to utilize Linux tools more effectively on their mobile devices. The update is currently available in beta and is expected to roll out in early December.
The article explains the Linux boot process, detailing the sequence of events from when the power button is pressed to the execution of the first line of C code within the Linux kernel. It covers the roles of the CPU, firmware (BIOS and UEFI), and the bootloader (GRUB) in facilitating the transition to the operating system. The piece emphasizes the technical intricacies involved in initializing hardware and preparing the system for the Linux kernel to take over.
The GitHub repository "recall-for-linux" by rolflobker aims to bring Microsoft Recall's features to Linux users, offering tools for data storage, screen capturing, OCR, and more. The installation process is intentionally made simple, although the project humorously highlights concerns over privacy and data collection. Future updates are promised, including AI integration and data monetization.
The article presents a detailed diagram of the entire Linux Network Stack, covering various components such as virtualization, network sockets, the upper and lower layers of the network stack, and network functions accelerated by NIC. It also includes tips for optimizations and statistics for each section. This resource is part of the book "Operativni sustavi i računalne mreže - Linux u primjeni."
The article presents a detailed diagram of the Linux disk I/O subsystem, illustrating its various components and the commands associated with each layer. It covers layers from the application to hardware, including the Virtual Filesystem, block layers, disk scheduler, and device drivers. This diagram is part of a broader work on Linux applications in operating systems and computer networks.