GitHub / cirosantilli / linux-kernel-module-cheat
The perfect emulation setup to study and develop the Linux kernel, kernel modules, QEMU, gem5 and x86_64, ARMv7 and ARMv8 userland and baremetal assembly, ANSI C, C++ and POSIX. GDB step debug and KGDB just work. Powered by Buildroot and crosstool-NG. Highly automated. Thoroughly documented. Automated tests. "Tested" in an Ubuntu 24.04 host.
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cirosantilli%2Flinux-kernel-module-cheat
PURL: pkg:github/cirosantilli/linux-kernel-module-cheat
Stars: 4,372
Forks: 618
Open issues: 71
License: gpl-3.0
Language: Python
Size: 11.1 MB
Dependencies parsed at: Pending
Created at: about 9 years ago
Updated at: 27 days ago
Pushed at: 4 months ago
Last synced at: 25 days ago
Commit Stats
Commits: 1774
Authors: 9
Mean commits per author: 197.11
Development Distribution Score: 0.005
More commit stats: https://commits.ecosyste.ms/hosts/GitHub/repositories/cirosantilli/linux-kernel-module-cheat
Topics: buildroot, gdb, kgdb, linux-kernel, linux-kernel-module, qemu
Funding Links https://github.com/sponsors/cirosantilli
OpenSSF Scorecard report
1.4
Overall Score
Security Checks
no binaries found in the repo
Determines if the project has generated executable (binary) artifacts in the source repository.
license file detected
Determines if the project has defined a license.
Show details
branch protection not enabled on development/release branches
Determines if the default and release branches are protected with GitHub's branch protection settings.
Show details
no effort to earn an OpenSSF best practices badge detected
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Found 0/30 approved changesets -- score normalized to 0
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
project is not fuzzed
Determines if the project uses fuzzing.
Show details
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Determines if the project is "actively maintained".
dependency not pinned by hash detected -- score normalized to 0
Determines if the project has declared and pinned the dependencies of its build process.
Show details
no SAST tool detected
Determines if the project uses static code analysis.
Show details
security policy file not detected
Determines if the project has published a security policy.
Show details
Project has not signed or included provenance with any releases.
Determines if the project cryptographically signs release artifacts.
Show details
54 existing vulnerabilities detected
Determines if the project has open, known unfixed vulnerabilities.
Show details
no workflows found
Determines if the project's GitHub Action workflows avoid dangerous patterns.
packaging workflow not detected
Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.