Difference between revisions of "Kernel Self Protection Project/Get Involved"
(Blanked the page) |
m (add TZ to calendar link) |
||
(13 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
Want to get involved in the [[Kernel Self Protection Project]]? Here's how: | |||
= Join the conversations = | |||
* Subscribe to the [http://vger.kernel.org/vger-lists.html#linux-hardening '''upstream''' Linux kernel hardening mailing list], <code>'''linux'''-hardening@vger.kernel.org</code>, where development, maintenance, and administrivia happen. (And visit the [https://lore.kernel.org/linux-hardening/ list archive].) | |||
* Come to the every-2-weeks status update meeting. See the [https://calendar.google.com/calendar/u/0/embed?src=47005f8f50f21da6133d7239f3cb93d1624d2e1949963ea75dd86d5f2d5721e0@group.calendar.google.com&ctz=America/Los_Angeles calendar] for details. | |||
* Join the <code>#linux-hardening</code> IRC channel on [https://libera.chat/ Libera.Chat]. | |||
* Optionally subscribe to the [https://www.openwall.com/lists/kernel-hardening/ '''general''' Linux kernel hardening mailing list], <code>'''kernel'''-hardening@lists.openwall.com</code>, where new hardening topics and summaries of completed work are discussed. (And visit the [https://lore.kernel.org/kernel-hardening/ list archive].) | |||
** Note: when sending to <code>kernel-hardening@lists.openwall.com</code>, please also CC <code>linux-hardening@vger.kernel.org</code> too. | |||
= Introduce Yourself = | |||
Send an email to the lists to introduce yourself! | |||
* What topics are you interested in? | |||
* What do you want to learn about? | |||
* What experience do you have with security, the kernel, programming, or anything else you think is important. | |||
= Pick something to work on = | |||
Pick something from the [https://github.com/KSPP/linux/issues issue tracker] (or add a new one), coordinate on the mailing lists, and get started. If your employer is brave enough to understand how critical this work is, they'll pay you to work on it. If not, the [https://www.linuxfoundation.org/ Linux Foundation]'s [https://www.coreinfrastructure.org/faq Core Infrastructure Initiative] is in a great position to fund specific work proposals. We need kernel developers, compiler developers, testers, backporters, a documentation writers. | |||
= Contribute patches = | |||
Please send new topics and patch series to both [http://vger.kernel.org/vger-lists.html#linux-hardening linux-hardening@vger.kernel.org] and [https://www.openwall.com/lists/kernel-hardening kernel-hardening@lists.openwall.com] for the widest audience possible. | |||
When contributing patches for the Linux kernel, be sure to follow the Linux kernel [https://www.kernel.org/doc/html/latest/process/coding-style.html Coding Style Guide] and read about [https://www.kernel.org/doc/html/latest/process/submitting-patches.html Submitting Patches]. Even if you're only sending your patches to the mailing lists for some early review, it's best to get as much of the coding style and submission semantics correct to avoid reviewers needing to recommend changes in those areas. | |||
== grsecurity and other non-upstream patch sources == | |||
As with any other Free Software project, it is particularly important that if you're working on upstreaming work from other projects, be sure your patches are giving credit to the original authors, that licenses are compatible, and that copyright notices are retained, etc. | |||
In the case of new files, or other places where a copyright notice would be expected to be added, be sure to retain all copyright notices from the other project. This may require some examination of commit history. For example, [https://github.com/linux-scraping/linux-grsecurity/blob/grsec-test/grsecurity/Makefile#L3 grsecurity's copyright notice from their most recent public patch] does not include PaX Team's copyright notice, which is only listed in the patch for GCC plugins. For grsecurity copyright, when more specific details are not easy to find, the following could be used: | |||
Copyright (C) 2001-2017 PaX Team, Bradley Spengler, Open Source Security Inc. | |||
Additionally, grsecurity has asked that contributors include this in commit messages for non-trivial code ported from grsecurity: | |||
$CODE is {verbatim,modified} from Brad Spengler/PaX Team's code in the last | |||
public patch of grsecurity/PaX based on my understanding of the code. Changes | |||
or omissions from the original code are mine and don't reflect the original | |||
grsecurity/PaX code. |
Latest revision as of 00:31, 10 February 2023
Want to get involved in the Kernel Self Protection Project? Here's how:
Join the conversations
- Subscribe to the upstream Linux kernel hardening mailing list,
linux-hardening@vger.kernel.org
, where development, maintenance, and administrivia happen. (And visit the list archive.) - Come to the every-2-weeks status update meeting. See the calendar for details.
- Join the
#linux-hardening
IRC channel on Libera.Chat. - Optionally subscribe to the general Linux kernel hardening mailing list,
kernel-hardening@lists.openwall.com
, where new hardening topics and summaries of completed work are discussed. (And visit the list archive.)- Note: when sending to
kernel-hardening@lists.openwall.com
, please also CClinux-hardening@vger.kernel.org
too.
- Note: when sending to
Introduce Yourself
Send an email to the lists to introduce yourself!
- What topics are you interested in?
- What do you want to learn about?
- What experience do you have with security, the kernel, programming, or anything else you think is important.
Pick something to work on
Pick something from the issue tracker (or add a new one), coordinate on the mailing lists, and get started. If your employer is brave enough to understand how critical this work is, they'll pay you to work on it. If not, the Linux Foundation's Core Infrastructure Initiative is in a great position to fund specific work proposals. We need kernel developers, compiler developers, testers, backporters, a documentation writers.
Contribute patches
Please send new topics and patch series to both linux-hardening@vger.kernel.org and kernel-hardening@lists.openwall.com for the widest audience possible.
When contributing patches for the Linux kernel, be sure to follow the Linux kernel Coding Style Guide and read about Submitting Patches. Even if you're only sending your patches to the mailing lists for some early review, it's best to get as much of the coding style and submission semantics correct to avoid reviewers needing to recommend changes in those areas.
grsecurity and other non-upstream patch sources
As with any other Free Software project, it is particularly important that if you're working on upstreaming work from other projects, be sure your patches are giving credit to the original authors, that licenses are compatible, and that copyright notices are retained, etc.
In the case of new files, or other places where a copyright notice would be expected to be added, be sure to retain all copyright notices from the other project. This may require some examination of commit history. For example, grsecurity's copyright notice from their most recent public patch does not include PaX Team's copyright notice, which is only listed in the patch for GCC plugins. For grsecurity copyright, when more specific details are not easy to find, the following could be used:
Copyright (C) 2001-2017 PaX Team, Bradley Spengler, Open Source Security Inc.
Additionally, grsecurity has asked that contributors include this in commit messages for non-trivial code ported from grsecurity:
$CODE is {verbatim,modified} from Brad Spengler/PaX Team's code in the last public patch of grsecurity/PaX based on my understanding of the code. Changes or omissions from the original code are mine and don't reflect the original grsecurity/PaX code.