遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/2582)
<a href="https://www.bestpractices.dev/projects/2582"><img src="https://www.bestpractices.dev/projects/2582/badge"></a>
The LinuxTV community develops and maintains the Linux Kernel Media Subsystems and several userspace libraries and applications.
The Linux Kernel Media Subsystems provide support for devices like webcams, streaming capture and output, analog TV, digital TV, AM/FM radio, Sofware Digital Radio (SDR), remote controllers and encoders/decoders for compressed video formats. It offers native support for a large number of drivers for commonly available PCI cards and USB devices, but the subsystems are also targeted towards Linux based set-top-boxes and embedded devices like mobile phones.
The main goal is to develop the Linux Kernel media subsystem.
We also develop a series of userspace applications, tools and libraries: v4l-utils, ZBar, Kaffeine, XawTv, TVtime, Camorama, EDID decode, Digital TV tables. While several applications are used primarely by end users, for the developers of the project, their primary goal is to be able to test the Kernel development and to provide userspace libraries to enhance the media subsystem support.
For the Kernel: https://www.kernel.org/doc/html/latest/process/development-process.html.
We use Git for all sub-projects.
As most of the stuff is hardware-dependent, there's no way to implement unit tests. So, we designed a test suite to check if the Kernel drivers are properly implementing the media APIs. The main tool is v4l2-compliance. We also provide a set of other tools in order to test the hardware.
警告:需要URL,但找不到URL。
The Linux Kernel has several CI tools. One of them is at: https://kernelci.org/ We also have apps to check the compliance with hardware drivers with media APIs. We're in the process of adding CI for other sub-projects.
We don't implement cryptography at the project.
// X-Content-Type-Options was not set to "nosniff".
The Linux kernel self protection project develops hardening improvements for the Linux kernel; many of them have already been accepted into the Linux kernel mainline: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project There are a number of hardening mechanisms in the Linux kernel, such as Linux kernel stack protection. For userspace tools, that doesn't apply, as priviledged permission is not required.
https://01.org/lkp/documentation/0-day-test-service runs lots of these tools on all trees before release.
Look at all of the wonderful BUG_ON() calls in the kernel (hint, you really don't want those to ever trigger, but they are there...) Outside the Kernel, errors are properly handled by the library and tools, reporting runtime errors or using assert() calls.
后退