Linux Kernel Internals and Development (LFD420)


Seminar - Ziel

Learn how to develop for the Linux kernel. In this instructor-led course you’ll learn how Linux is architected, the basic methods for developing on the kernel, and how to efficiently work with the Linux developer community. If you are interested in learning about the Linux kernel, this is the definitive course on the subject.

In this course you will learn how Linux is architected, how kernel algorithms work, hardware and memory management, modularization techniques and debugging, how the kernel developer community operates and how to efficiently work with it, and much more.

Teilnehmer - Zielgruppe

This course is designed to provides experienced programmers with a solid understanding of the Linux kernel. Students should be proficient in the C programming language, basic Linux (UNIX) utilities such as ls, grep and tar, and be comfortable with any of the available text editors (e.g. emacs, vi, etc.).

Kurs - Voraussetzungen

To make the most of this course, you must:

Be proficient in the C programming language, basic Linux (UNIX) utilities such as ls, grep and tar, and be comfortable with any of the available text editors (e.g. emacs, vi, etc.) Experience with any major Linux distribution is helpful but not strictly required.


  • 4 Tage
  • 09:00 Uhr bis 17:00 Uhr


  • nach Absprache

Seminar-Inhalt / Agenda


  • Objectives
  • Who You Are
  • The Linux Foundation
  • Linux Foundation Training
  • Certification Programs and Digital Badging
  • Linux Distributions
  • Platforms
  • Preparing Your System
  • Using and Downloading a Virtual Machine
  • Things change in Linux
  • Documentation and Links
  • Course Registration


  • Procedures
  • Kernel Versions
  • Kernel Sources and Use of git

How to Work in OSS Projects **

  • Overview on How to Contribute Properly
  • Stay Close to Mainline for Security and Quality
  • Study and Understand the Project DNA
  • Figure Out What Itch You Want to Scratch
  • Identify Maintainers and Their Work Flows and Methods
  • Get Early Input and Work in the Open
  • Contribute Incremental Bits, Not Large Code Dumps
  • Leave Your Ego at the Door: Don’t Be Thin-Skinned
  • Be Patient, Develop Long Term Relationships, Be Helpful

Kernel Architecture I

  • UNIX and Linux **
  • Monolithic and Micro Kernels
  • Object-Oriented Methods
  • Main Kernel Tasks
  • User-Space and Kernel-Space
  • Kernel Mode Linux **

Kernel Programming Preview

  • Error Numbers and Getting Kernel Output
  • Task Structure
  • Memory Allocation
  • Transferring Data between User and Kernel Spaces
  • Linked Lists
  • String to Number Conversions
  • Jiffies
  • Labs


  • What are Modules?
  • A Trivial Example
  • Compiling Modules
  • Modules vs Built-in
  • Module Utilities
  • Automatic Loading/Unloading of Modules
  • Module Usage Count
  • The module struct
  • Module Licensing
  • Exporting Symbols
  • Resolving Symbols **
  • Labs

Kernel Architecture II

  • Processes, Threads, and Tasks
  • Process Context
  • Kernel Preemption
  • Real Time Preemption Patch
  • Dynamic Kernel Patching
  • Run-time Alternatives **
  • Porting to a New Platform **
  • Labs

Kernel Initialization

  • Overview of System Initialization
  • System Boot
  • Das U-Boot for Embedded Systems**

Kernel Configuration and Compilation

  • Installation and Layout of the Kernel Source
  • Kernel Browsers
  • Kernel Configuration Files
  • Kernel Building and Makefiles
  • initrd and initramfs
  • Labs

System Calls

  • What are System Calls?
  • Available System Calls
  • How System Calls are Implemented
  • Adding a New System Call
  • Labs

Kernel Style and General Considerations

  • Coding Style
  • kernel-doc **
  • Using Generic Kernel Routines and Methods
  • Making a Kernel Patch
  • sparse
  • Using likely() and unlikely()
  • Writing Portable Code, CPU, 32/64-bit, Endianness
  • Writing for SMP
  • Writing for High Memory Systems
  • Power Management
  • Keeping Security in Mind
  • Mixing User- and Kernel-Space Headers **
  • Labs

Race Conditions and Synchronization Methods

  • Concurrency and Synchronization Methods
  • Atomic Operations
  • Bit Operations
  • Spinlocks
  • Seqlocks
  • Disabling Preemption
  • Mutexes
  • Semaphores
  • Completion Functions
  • Read-Copy-Update (RCU)
  • Reference Counts
  • Labs

SMP and Threads

  • SMP Kernels and Modules
  • Processor Affinity
  • SMP Algorithms – Scheduling, Locking, etc.
  • Per-CPU Variables **
  • Labs


  • What are Processes?
  • TWhat are Processes?
  • The task_struct
  • Creating User Processes and Threads
  • Creating Kernel Threads
  • Destroying Processes and Threads
  • Executing User-Space Processes From Within the Kernel
  • Labshe task_struct
  • Creating User Processes and Threads
  • Creating Kernel Threads
  • Destroying Processes and Threads
  • Executing User-Space Processes From Within the Kernel
  • Labs

Process Limits and Capabilities **

  • Process Limits
  • Capabilities
  • Labs

Monitoring and Debugging

  • Debuginfo Packages
  • Tracing and Profiling
  • sysctl
  • SysRq Key
  • oops Messages
  • Kernel Debuggers
  • debugfs
  • Labs


  • Main Scheduling Tasks
  • SMP
  • Scheduling Priorities
  • Scheduling System Calls
  • The 2.4 schedule() Function
  • O(1) Scheduler
  • Time Slices and Priorities
  • Load Balancing
  • Priority Inversion and Priority Inheritance **
  • The CFS Scheduler
  • Calculating Priorities and Fair Times
  • Scheduling Classes
  • CFS Scheduler Details
  • Labs

Memory Addressing

  • Virtual Memory Management
  • Systems With and Without MMU and the TLB
  • Memory Addresses
  • High and Low Memory
  • Memory Zones
  • Special Device Nodes
  • NUMA
  • Paging
  • Page Tables
  • page structure
  • Kernel Samepage Merging (KSM) **
  • Labs

Huge Pages

  • Huge Page Support
  • libhugetlbfs
  • Transparent Huge Pages
  • Labs

Memory Allocation

  • Requesting and Releasing Pages
  • Buddy System
  • Slabs and Cache Allocations
  • Memory Pools
  • kmalloc()
  • vmalloc()
  • Early Allocations and bootmem()
  • Memory Defragmentation
  • Labs

Process Address Space

  • Allocating User Memory and Address Spaces
  • Locking Pages
  • Memory Descriptors and Regions
  • Access Rights
  • Allocating and Freeing Memory Regions
  • Page Faults
  • Labs

Disk Caches and Swapping

  • Caches
  • Page Cache Basics
  • What is Swapping?
  • Swap Areas
  • Swapping Pages In and Out
  • Controlling Swappiness
  • The Swap Cache
  • Reverse Mapping **
  • OOM Killer
  • Labs

Device Drivers**

  • Types of Devices
  • Device Nodes
  • Character Drivers
  • An Example
  • Labs


  • What are Signals?
  • Available Signals
  • System Calls for Signals
  • Sigaction
  • Signals and Threads
  • How the Kernel Installs Signal Handlers
  • How the Kernel Sends Signals
  • How the Kernel Invokes Signal Handlers
  • Real Time Signals
  • Labs

Closing and Evaluation Survey

  • Evaluation Survey

Weitere Schulungen zu Thema Linux Foundation

Kubernetes for App Developers (LFD459)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

This course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster. It also serves as preparation for the Certified Kubernetes Application Developer (CKAD) exam. Starting with a simple Python script, this course will show you how ...

ONAP Essentials (LFS463)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

This course aims to provide you the conceptual and hands-on skills around ONAP, focusing -on: -The basics of Network Function Virtualization (NFV) -An introduction to The Linux Foundation ONAP project -Overview of the ONAP project’s architecture, subprojects and demos In ...

Linux for System Engineers (LFS311)

- u.a. in Berlin, Frankfurt am Main, Leipzig, Heidelberg, Offenbach

In this course you will learn advanced Linux administration skills including how to design, deploy and maintain a network running under Linux, how to administer the network services, the skills to create and operate a network in any major Linux distribution, how to securely ...

Linux Security (LFS416)

- u.a. in Bremen, Leipzig, Düsseldorf, Koblenz, Freiburg

In this course you will learn how to assess security risks in your enterprise Linux environment, the best techniques and tools to increase security, server hardening, how to deploy and use monitoring and attack detection tools, how to gain visibility into possible ...