lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAPNrq4yXdbdfq4hrtZdZn_5UDPduGoTCNJb1-9u-Qf1nf2RgXQ@mail.gmail.com>
Date:	Sat, 4 Jan 2014 20:01:36 +0530
From:	"Gideon D'souza" <gidisrael@...il.com>
To:	linux-kernel@...r.kernel.org
Subject: How does a newbie find work?

Hey Guys,

I've been looking to hacking at the kernel for a long time now.

I've managed to have a good setup, build the latest stable kernel and
boot from it. I've read some of the docs, Coding Styles etc and
watched GregKH's talks on youtube. I'm also reading Robert Love's
Linux Kernel Development.


Id like now to get my hands dirty but I can't seem to find something
simple to do. I posted to kernel janitors and kernel mentors, but no
dice. The bugs list looks thoroughly contrived.

I've made small contributions to other OSS projects before but now I'm
at a loss for how to study the kernel code base, what to try to
break/change to study how the kernel works.

Is there some simple work a newbie like me can take up? Any maintainer
need some grunt work done? Or perhaps someone could suggest a pet
project I could try to understand things better? (Should I be learning
how to write device drivers?)

Things that are very interesting to me so far are the KVM and the Scheduler.


Regards,
Gideon
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ