🚀 Apache Iggy 0.6.0 is coming!
Featuring a full server's core rewrite to the thread-per-core, shared-nothing design based on io_uring runtime (by compio), along with WebSocket transport for edge devices & web apps.
Share your feedback: github.com/apache/iggy/...
#iggy #asf #apache
Featuring a full server's core rewrite to the thread-per-core, shared-nothing design based on io_uring runtime (by compio), along with WebSocket transport for edge devices & web apps.
Share your feedback: github.com/apache/iggy/...
#iggy #asf #apache
November 12, 2025 at 6:36 AM
🚀 Apache Iggy 0.6.0 is coming!
Featuring a full server's core rewrite to the thread-per-core, shared-nothing design based on io_uring runtime (by compio), along with WebSocket transport for edge devices & web apps.
Share your feedback: github.com/apache/iggy/...
#iggy #asf #apache
Featuring a full server's core rewrite to the thread-per-core, shared-nothing design based on io_uring runtime (by compio), along with WebSocket transport for edge devices & web apps.
Share your feedback: github.com/apache/iggy/...
#iggy #asf #apache
spooky io_uring at a distance
October 23, 2025 at 6:39 AM
spooky io_uring at a distance
I'm embarrassed to say that I installed Postgres 18 and just tried to use the `io_method = io_uring` on my Mac.
What can I say except, it's early. Kind of. Wouldn't it be nice if Apple actually added stuff like `io_uring` though.
What can I say except, it's early. Kind of. Wouldn't it be nice if Apple actually added stuff like `io_uring` though.
September 26, 2025 at 3:08 PM
I'm embarrassed to say that I installed Postgres 18 and just tried to use the `io_method = io_uring` on my Mac.
What can I say except, it's early. Kind of. Wouldn't it be nice if Apple actually added stuff like `io_uring` though.
What can I say except, it's early. Kind of. Wouldn't it be nice if Apple actually added stuff like `io_uring` though.
PostgreSQL 18 is here 🎉 🐘
• Async I/O (io_uring/worker), faster reads
• More index hits (skip scan, OR)
• uuidv7(), virtual generated cols
• OAuth2;
Ask for Xata access and try PostgreSQL 18.
• Async I/O (io_uring/worker), faster reads
• More index hits (skip scan, OR)
• uuidv7(), virtual generated cols
• OAuth2;
Ask for Xata access and try PostgreSQL 18.
September 25, 2025 at 5:49 PM
PostgreSQL 18 is here 🎉 🐘
• Async I/O (io_uring/worker), faster reads
• More index hits (skip scan, OR)
• uuidv7(), virtual generated cols
• OAuth2;
Ask for Xata access and try PostgreSQL 18.
• Async I/O (io_uring/worker), faster reads
• More index hits (skip scan, OR)
• uuidv7(), virtual generated cols
• OAuth2;
Ask for Xata access and try PostgreSQL 18.
あんまし期待せずio_uringの日本語情報を探してみたらめっさ詳しい記事があってありがてぇ…ってなってる qiita.com/tmsn/items/0...
Linuxにおける非同期IOの実装について - Qiita
はじめに Linux 5.1に新しい非同期IOの仕組みとしてio_uringがマージされてから既に1年以上経ってしまいましたが、これまでのLinuxにおける非同期IOの使い方や実装を見ていきながら、io_uringが登場した背景やLinux AIO(libaio)の問題点...
qiita.com
September 18, 2025 at 8:51 AM
あんまし期待せずio_uringの日本語情報を探してみたらめっさ詳しい記事があってありがてぇ…ってなってる qiita.com/tmsn/items/0...
September 24, 2024 at 8:12 PM
Eu abro o arquivo, obtendo um descritor, mas ao invés de ler o arquivo eu faço uma chamada pra interface io_uring (en.wikipedia.org/wiki/Io_uring) passando o descritor, o número máximo de bytes a ler, e um ponteiro pra um buffer que aloquei. A operação me retorna um handle.
io_uring - Wikipedia
en.wikipedia.org
November 21, 2024 at 3:48 AM
Eu abro o arquivo, obtendo um descritor, mas ao invés de ler o arquivo eu faço uma chamada pra interface io_uring (en.wikipedia.org/wiki/Io_uring) passando o descritor, o número máximo de bytes a ler, e um ponteiro pra um buffer que aloquei. A operação me retorna um handle.
IO_uring Zero-Copy Receive Support Ready For Linux 6.15 Networking - https://www.phoronix.com/news/IO_uring-Zero-Copy-Receive-Net
IO_uring Zero-Copy Receive Support Ready For Linux 6.15 Networking
It's looking like IO_uring zero-copy receive support should be ready for the Linux 6.15 kernel cycle this spring...
www.phoronix.com
February 7, 2025 at 7:06 PM
IO_uring Zero-Copy Receive Support Ready For Linux 6.15 Networking - https://www.phoronix.com/news/IO_uring-Zero-Copy-Receive-Net
TypeScriptでio_uringなんて触ることあるのかと思って覗きにいったらDocker設定の話だった。びっくりした。
enable io_uring · bluesky-social/atproto@6fc62d2
github.com
August 31, 2024 at 5:07 PM
TypeScriptでio_uringなんて触ることあるのかと思って覗きにいったらDocker設定の話だった。びっくりした。
Async Rust is not safe with io_uring
https://tonbo.io/blog/async-rust-is-not-safe-with-io-uring
https://tonbo.io/blog/async-rust-is-not-safe-with-io-uring
October 30, 2024 at 11:35 AM
Async Rust is not safe with io_uring
https://tonbo.io/blog/async-rust-is-not-safe-with-io-uring
https://tonbo.io/blog/async-rust-is-not-safe-with-io-uring
Io_uring and Networking in 2023 [pdf]
Io_uring and Networking in 2023 [pdf]
kernel.dk
February 17, 2023 at 2:00 AM
Io_uring and Networking in 2023 [pdf]
P99CONF starts today! It's a free online conference and I'm giving a (pre-recorded) talk about HTTP + Rust + io_uring + kTLS. I'll be in the chat room :) https://www.p99conf.io
October 23, 2024 at 9:25 AM
P99CONF starts today! It's a free online conference and I'm giving a (pre-recorded) talk about HTTP + Rust + io_uring + kTLS. I'll be in the chat room :) https://www.p99conf.io
CVE-2025-21655 - Linux Kernel io_uring EventFD RCU Refcount Vulnerability
CVE ID : CVE-2025-21655
Published : Jan. 20, 2025, 2:15 p.m. | 25 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved:
io_uring/eventfd: ensure io_eventfd_...
CVE ID : CVE-2025-21655
Published : Jan. 20, 2025, 2:15 p.m. | 25 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved:
io_uring/eventfd: ensure io_eventfd_...
CVE-2025-21655 - Linux Kernel io_uring EventFD RCU Refcount Vulnerability
In the Linux kernel, the following vulnerability has been resolved: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period io_eventfd_do_signal() is invoked from an RCU callback, but when dropping the reference to the io_ev_fd, it calls io_eventfd_free() directly if the refcount drops to zero. This isn't correct, as any potential freeing of …
cvefeed.io
January 20, 2025 at 2:49 PM
CVE-2025-21655 - Linux Kernel io_uring EventFD RCU Refcount Vulnerability
CVE ID : CVE-2025-21655
Published : Jan. 20, 2025, 2:15 p.m. | 25 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved:
io_uring/eventfd: ensure io_eventfd_...
CVE ID : CVE-2025-21655
Published : Jan. 20, 2025, 2:15 p.m. | 25 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved:
io_uring/eventfd: ensure io_eventfd_...
RingReaper – New Linux EDR Evasion Tool Using io_uring Kernel Feature
RingReaper - New Linux EDR Evasion Tool Using io_uring Kernel Feature
cybersecuritynews.com
July 7, 2025 at 12:50 PM
RingReaper – New Linux EDR Evasion Tool Using io_uring Kernel Feature
Had lots of fun with io_uring during these past days.
May 17, 2025 at 10:17 AM
Had lots of fun with io_uring during these past days.
📌 Vulnerability in Linux io_uring Mechanism Allows Rootkits to Bypass Detection Tools https://www.cyberhub.blog/article/4779-vulnerability-in-linux-iouring-mechanism-allows-rootkits-to-bypass-detection-tools
Vulnerability in Linux io_uring Mechanism Allows Rootkits to Bypass Detection Tools
A vulnerability in the io_uring mechanism of Linux allows rootkits to bypass common detection tools. This flaw, exploited by rootkits, renders Linux security tools ineffective, enabling attackers to execute with elevated privileges without being detected. The impacts include a compromise in the security of Linux systems, with rootkits able to hide and operate freely.
www.cyberhub.blog
April 28, 2025 at 6:40 AM
📌 Vulnerability in Linux io_uring Mechanism Allows Rootkits to Bypass Detection Tools https://www.cyberhub.blog/article/4779-vulnerability-in-linux-iouring-mechanism-allows-rootkits-to-bypass-detection-tools
📌 Significant security flaw in Linux's 'io_uring' allows rootkits to bypass detection. Major risk for Linux systems. #CyberSecurity #Linux https://tinyurl.com/22gbp8t4
Significant Security Flaw in Linux Execution System Allows Undetected Rootkit Operations
A significant security flaw in the Linux execution security system, caused by the 'io_uring' interface, allows rootkits to operate undetected on systems while bypassing advanced enterprise security software. This vulnerability enables attackers to exploit the 'io_uring' interface to conceal their malicious activities, making detection by traditional security tools difficult. The impacts include the ability for rootkits to remain hidden and continue operating undetected, posing a major risk to the security of Linux systems.
tinyurl.com
April 24, 2025 at 10:42 PM
📌 Significant security flaw in Linux's 'io_uring' allows rootkits to bypass detection. Major risk for Linux systems. #CyberSecurity #Linux https://tinyurl.com/22gbp8t4
lsr: ls with io_uring
404 · tangled · tangled
It seems we couldn't find what you were looking for. Sorry about that!
tangled.sh
July 18, 2025 at 2:09 PM
lsr: ls with io_uring
Io_uring, kTLS and Rust for zero syscall HTTPS server | Discussion
io_uring, kTLS and Rust for zero syscall HTTPS server
Around the turn of the century we started to get a bigger need for high capacity web servers. For example there was the C10k problem paper.
blog.habets.se
August 22, 2025 at 5:00 AM
Io_uring, kTLS and Rust for zero syscall HTTPS server | Discussion
Welcome to Lord of the io_uring — unixism.net/loti/
Welcome to Lord of the io_uring — Lord of the io_uring documentation
unixism.net
August 28, 2025 at 4:28 AM
Welcome to Lord of the io_uring — unixism.net/loti/
Async Rust is not safe with io_uring
https://tonbo.io/blog/async-rust-is-not-safe-with-io-uring
https://tonbo.io/blog/async-rust-is-not-safe-with-io-uring
October 30, 2024 at 11:00 AM
Async Rust is not safe with io_uring
https://tonbo.io/blog/async-rust-is-not-safe-with-io-uring
https://tonbo.io/blog/async-rust-is-not-safe-with-io-uring
I'm looking at the man pages for io_uring(7) and I see this given as an example of safe, concurrent code you should use in general, but this has a data race between *cqring->head, head++ and the store right? I'm not going insane?
March 26, 2025 at 5:14 AM
I'm looking at the man pages for io_uring(7) and I see this given as an example of safe, concurrent code you should use in general, but this has a data race between *cqring->head, head++ and the store right? I'm not going insane?
Watch out for any Linux malware sneakily evading syscall-watching antivirus
Google dumped io_uring after $1M in bug bounties
A proof-of-concept program has been released to demonstrate a so-called monitoring "blind spot" in how some Linux antivirus and other endpoint protection…
#hackernews #news
Google dumped io_uring after $1M in bug bounties
A proof-of-concept program has been released to demonstrate a so-called monitoring "blind spot" in how some Linux antivirus and other endpoint protection…
#hackernews #news
Watch out for any Linux malware sneakily evading syscall-watching antivirus
Google dumped io_uring after $1M in bug bounties
A proof-of-concept program has been released to demonstrate a so-called monitoring "blind spot" in how some Linux antivirus and other endpoint protection tools use the kernel's io_uring interface.…
go.theregister.com
April 30, 2025 at 5:13 PM
Watch out for any Linux malware sneakily evading syscall-watching antivirus
Google dumped io_uring after $1M in bug bounties
A proof-of-concept program has been released to demonstrate a so-called monitoring "blind spot" in how some Linux antivirus and other endpoint protection…
#hackernews #news
Google dumped io_uring after $1M in bug bounties
A proof-of-concept program has been released to demonstrate a so-called monitoring "blind spot" in how some Linux antivirus and other endpoint protection…
#hackernews #news