Fact-checked by Grok 2 weeks ago

kernel.org

Kernel.org, officially known as the , is the primary online repository and distribution platform for the source code, documentation, releases, and development tools of the , as well as various related open-source projects. It serves as the central hub for thousands of developers, maintainers, and users worldwide, facilitating collaboration, version control, and free access to the kernel that underpins billions of devices from servers to embedded systems. Operated by the Linux Kernel Organization (LKOrg), a 501(c)(3) established in as a California , kernel.org is managed by The , which provides technical, financial, and staffing support to ensure its reliability and security. The site's infrastructure includes repositories for kernel development, for issue tracking, and archives of historical releases, with stable kernel versions updated regularly to address bugs and security issues. Sponsors such as Akamai, Constellix, and contribute to its hosting and performance. The history of kernel.org traces back to the late 1990s, when H. Peter Anvin established it as a distribution point for the following ' relocation to to work at in 1997. Initially focused on hosting kernel tarballs and patches, it evolved into a full development platform with the adoption of in 2005, enabling . A significant event occurred in 2011, when the main server was compromised by an intruder who gained root access, leading to a complete rebuild of the infrastructure with enhanced security measures, including no volunteer root access and developer-signed files. Today, kernel.org remains essential to the ecosystem, supporting the kernel's ongoing evolution since its inception in 1991 by Torvalds as a free operating system clone.

Overview

Purpose and Role

kernel.org serves as the official website and primary archives for the , functioning as the central hub for its distribution and maintenance within the open-source ecosystem. Operated by the , a , it ensures the availability of kernel resources to developers, distribution maintainers, and users globally without commercial intent. This non-profit structure, recognized under as a public benefit entity and holding 501(c)(3) status, underscores its commitment to providing equal and widespread access to the and related for public benefit. As the repository, kernel.org plays a pivotal for developers who submit patches and maintain branches, as well as for distribution maintainers who integrate official kernel releases into their systems. It acts as the authoritative source for downloading kernel releases, patches, and associated projects, enabling seamless collaboration and updates across the worldwide community. Since its establishment, kernel.org has been the main point of access for these resources, hosting over 20 years of kernel version history that includes mainline development trees, stable releases, and branches to support ongoing and . This archival role highlights its enduring importance, as evidenced by events like the 2011 security breach that temporarily disrupted access but reinforced the site's critical position in the ecosystem.

Key Features

Kernel.org provides reliable access to Linux kernel resources through multiple protocols and services, ensuring developers and users can retrieve , documentation, and related materials efficiently. Core features include HTTP access to public archives via ://www.kernel.org/pub/, which hosts kernel releases, patches, and historical data, supplemented historically by FTP services that have been phased out in favor of HTTP for better performance and security. repositories enable , allowing collaborative development and tracking of changes across kernel trees and subsystems. Additionally, all official kernel releases are accompanied by PGP signatures to verify integrity and authenticity, using OpenPGP-compliant cryptography to protect against tampering. The platform is structured around specialized subdomains to optimize functionality and distribution. The main site at www.kernel.org serves as the entry point, offering overviews, release announcements, and links to resources. Git.kernel.org hosts the primary repositories for the and related projects, supporting cloning, pulling, and pushing for maintainers. Mirrors.kernel.org facilitates global access by directing users to regional mirrors, reducing latency and load on primary servers. Kernel.org supports a variety of file formats and compression types to accommodate diverse user needs and tools. Kernel source distributions are available as tarballs for full releases, while patches provide incremental updates in unified diff format, generated relative to the kernel source directory. Compression options include gzip for faster processing, xz for superior ratio and efficiency in modern workflows, and legacy bzip2 support, though xz has become the standard for new releases to balance size and decompression speed. Integration with external tools enhances usability for development and maintenance. at bugzilla.kernel.org serves as the centralized system for reporting and tracking upstream kernel bugs, with features for searching, subscribing to components, and managing reports across subsystems. Lore.kernel.org archives mailing lists, providing fast, searchable web interfaces, feeds, and downloads for threads, enabling easy reference to discussions and patch reviews dating back years. To ensure , kernel.org employs through a network of worldwide mirrors, including official sites in regions like (e.g., mirror) and partnerships such as Google's kernel.googlesource.com, which replicate repositories and archives across data centers. This distributed setup mitigates and supports global developer access, with tools like grokmirror facilitating of Git repositories.

History

Founding and Early Development

Kernel.org emerged in the context of the project, initiated by in 1991 as a free operating system kernel. In the early 1990s, Linux kernel distributions relied on informal FTP sites for sharing source code, with ftp.funet.fi serving as a primary mirror hosted by the University and Research Network (FUNET), where the initial Linux 0.01 release was uploaded in September 1991. These ad-hoc FTP mirrors supported the growing developer community but lacked centralized infrastructure. The domain kernel.org was registered on March 7, 1997, marking the transition to a dedicated online presence for resources. This setup occurred around the same time relocated to in 1997 to join Corporation, shifting from informal hosting arrangements to more reliable, purpose-built infrastructure for kernel distribution. Early development of kernel.org focused primarily on mirroring and archiving Linux kernel source code, managed by a team of volunteers that included H. Peter Anvin, who contributed to low-level kernel subsystems and helped establish the site's foundational operations. By 1998, as Linux gained widespread traction, kernel.org had evolved into the primary hub for kernel downloads and archives, supplanting earlier scattered FTP sites. During the late , the site transitioned to more structured archives, supporting stable kernel versions starting from the series released in 1996, which facilitated broader adoption by developers and distributions.

Evolution and Milestones

Following its early volunteer-based setup, kernel.org experienced significant formalization in with the establishment of the Linux Kernel Organization as a Public Benefit Corporation, aimed at streamlining the distribution of the and related . This milestone marked a shift toward more structured operations, enabling sustained growth in hosting and archiving capabilities. A pivotal development occurred in 2005 when kernel.org introduced repositories, coinciding with ' adoption of for development after the community parted ways with . This transition to a system revolutionized collaborative workflows, allowing developers worldwide to efficiently track changes and contribute to the codebase hosted on the site. During the 2010s, kernel.org expanded its infrastructure to better support the burgeoning community, including the launch of .kernel.org in late 2018 as a comprehensive archive for kernel mailing lists dating back to 1998. This addition, built on the public-inbox system, enhanced accessibility to historical discussions and patches, while parallel improvements in mirroring infrastructure ensured reliable global distribution of kernel resources. The 2011 security breach, detected on after an intrusion that began no later than , served as a critical turning point, prompting a comprehensive overhaul to bolster resilience. By 2025, kernel.org had archived over 1,000 versions across its directories, spanning from v1.0 in 1994 to the latest stable releases like 6.17, with heightened emphasis on maintaining branches such as 6.6 and 6.12 for extended stability in enterprise and systems.

Organization and Governance

Linux Kernel Organization

The Linux Kernel Organization was established in 2002 as a nonprofit under law, with the primary aim of distributing the and other to the public without charge. This formation provided a formal legal structure to support the ongoing development and dissemination of resources, evolving from earlier volunteer-driven initiatives that hosted kernel-related content on kernel.org. The organization's mission centers on ensuring free and reliable access to Linux kernel resources for developers, users, and the broader open-source community, while maintaining the infrastructure necessary for its distribution. Governed and managed by , which offers comprehensive technical, financial, and staffing support, the Linux Kernel Organization operates as a 501(c)(3) private operating foundation with no commercial activities, relying instead on donations, grants, and contributions from supporting entities. As the legal entity behind kernel.org, the Linux Kernel Organization owns the domain and underlying infrastructure, offering liability protection to volunteer maintainers and contributors who develop and steward the kernel. This structure safeguards the project's collaborative nature, allowing global participants to focus on technical contributions without personal legal exposure. As of 2025, the Linux Kernel Organization remains a dedicated nonprofit entity, continuing its core role in kernel distribution while supporting expanded open-source efforts, including hosting comprehensive kernel documentation resources.

Administration and Funding

The administration of kernel.org is handled by a small team of system administrators affiliated with the Foundation's Collaborative Projects IT team. A prominent figure in this team is Konstantin Ryabitsev, who oversees infrastructure maintenance for kernel.org and related initiatives, leveraging open-source tools such as PGP for code integrity and security processes. Daily operations are volunteer-driven, with core maintainers managing critical tasks including software updates, data backups, and synchronization across global mirror sites to ensure availability. Historically, the site relied entirely on unpaid volunteers without dedicated full-time staff, but Linux Foundation involvement since the mid-2000s has introduced professional support and resources to sustain these processes. Funding for kernel.org comes primarily from donations, grants provided by the Linux Foundation, and corporate sponsorships, as the site is operated by the Linux Kernel Organization, a 501(c)(3) nonprofit corporation. Sponsors include Akamai, Constellix, Fastly, Google, Red Hat, and others such as servers.com, contributing to operational costs; financial transparency is maintained through publicly available IRS tax filings. In March 2025, Akamai entered a multi-year agreement to provide infrastructure services, including cloud computing and content delivery network (CDN) support, at no cost. Following the 2011 security breach, administration prioritized enhanced audits and infrastructure redundancy measures, such as improved server isolation and systems, to mitigate risks and improve resilience. As of November 2025, the budget—supported by these sponsorships—enables advanced features like global CDN integration, with Akamai providing hosting for the primary distribution infrastructure. A key challenge for the administration remains balancing limited volunteer capacity with escalating demands from substantial traffic volumes, including millions of monthly downloads and accesses, which strain resources despite redundancy efforts.

Services and Content

Source Code Repositories

Kernel.org hosts the primary source code for the , utilizing for and tarball archives for stable releases. These enable developers worldwide to access, contribute to, and maintain the codebase, serving as the central hub for the open-source project. The repositories include several types of Git trees tailored to different stages of development. The mainline tree, maintained by , contains the most current integration of accepted changes and serves as the upstream for new releases. Stable trees, managed by dedicated maintainers, incorporate bug fixes and updates for recent kernel versions, while longterm trees support extended maintenance for production environments. Subsystem-specific trees, such as those for networking (netdev/net.git), (bluetooth/bluetooth.git), and sound (tiwai/sound.git), allow maintainers to develop and test features within their domains before upstreaming to the mainline. Additionally, tarball archives provide compressed snapshots of releases in formats like .tar.gz or .tar.xz, facilitating easy downloads without full Git history. Access to these Git repositories is primarily achieved through cloning via the git.kernel.org server, using commands such as git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git for the mainline tree or similar URLs for other trees. HTTP and rsync protocols are also supported for broader compatibility, with mirrors available for high-traffic scenarios. Tarballs are accessible via HTTP from https://www.kernel.org/pub/linux/kernel/, organized by version directories like v6.x/. Versioning in the repositories follows a structured release model. Prepatch trees, such as linux-next.git, aggregate experimental changes from subsystems for integration testing over 9-10 week cycles leading to mainline releases. The mainline advances with each stable release (e.g., v6.12), incorporating new features and drivers. Stable branches receive backported fixes for the two most recent versions, while longterm branches maintain support for older releases used in enterprise settings. All official tarball releases are PGP-signed by maintainers, including Linus Torvalds for mainline, to verify integrity and authenticity using keys from the pgpkeys.git repository. Since the migration to in 2005, initiated by to replace older tools like , kernel.org has preserved the full commit history of the . By 2025, the mainline repository exceeds 1 million commits, reflecting the project's growth and the accumulation of contributions from thousands of developers. Developers follow standardized workflows to interact with these repositories. They typically clone a relevant tree, create topic branches for local changes, apply patches or develop features, and test against the latest mainline or stable. Changes are submitted as pull requests or email patches to maintainers, who review and merge via git pull or git am into their trees. Pushing requires maintainer privileges, ensuring a hierarchical review process before upstream integration. Guidelines emphasize small, focused commits with clear descriptions, adherence to coding standards, and use of signed-off-by tags for traceability.

Documentation and Archives

The kernel.org website maintains a comprehensive documentation directory that provides essential resources for users and developers. This includes detailed guides on kernel internals, such as references for core subsystems, for drivers, and coding style guidelines to ensure consistent practices. These materials are derived from structured comments in the and files within the kernel tree. Documentation is available in multiple formats to accommodate different needs, including for web browsing, PDF for printable versions, and for direct integration or offline reading. Users can generate these formats from the source using build commands like make htmldocs for HTML or make pdfdocs for PDF, with outputs placed in a dedicated directory. The primary online access is through the HTML-rendered site at https://docs.kernel.org/, which is mirrored and updated from the kernel.org domain. Accessibility extends to both HTTP (https://www.kernel.org/doc/) and FTP protocols (ftp://ftp.kernel.org/pub/), allowing efficient downloads for archival or local builds. In addition to active documentation, kernel.org archives full historical kernel releases dating back to version 1.0, released in March 1994. These archives are organized by major version series in the /pub/linux// directory, with subdirectories such as v1.0/, v2.0/, and subsequent series up to the latest stable releases. Each version includes tarballs of , patches, and associated files like configuration templates. Maintenance of these resources occurs in tandem with kernel development cycles, ensuring updates align with each new release. Changelogs detailing modifications since the previous version, along with outlining key changes and requirements, are included in the archives and sets. For instance, every historical release directory contains a CHANGES file summarizing updates, while ongoing evolves through contributions to the source tree. This integration allows users to download complete historical snapshots that bundle with embedded for comprehensive historical analysis.

Community and Development Tools

Kernel.org provides essential tools for the Linux kernel community, enabling developers worldwide to report issues, discuss changes, and collaborate on contributions. Central to this is , hosted at bugzilla.kernel.org, which serves as the primary bug-tracking system for upstream issues. This tool allows users who compile their own kernels from source to file detailed reports on crashes, regressions, or other defects, ensuring that problems are systematically tracked and addressed by maintainers. Unlike distribution-specific trackers, focuses exclusively on core kernel bugs, with guidelines directing users to consult the kernel documentation before submission to avoid duplicates or misreports. Complementing Bugzilla is lore.kernel.org, a comprehensive archive of Linux kernel mailing lists dating back to 1998, offering searchable access to historical and ongoing discussions. This platform, built on the public-inbox system, indexes thousands of emails from lists like and subsystem-specific ones, facilitating research into past decisions and patch reviews. Its API enables integration with development tools, such as kworkflow, which automates patch retrieval, threading, and application from archived threads to streamline workflows. By preserving these interactions, lore.kernel.org supports patch submission processes, where developers reference prior conversations to justify changes during review. Community resources on kernel.org emphasize inclusive participation through structured guidelines and support mechanisms. The Developer Certificate of Origin (DCO) is enforced for all contributions, requiring developers to sign off on commits with a "Signed-off-by" line, certifying that the code is their own and can be licensed under the GPL. This process, integrated into submissions, ensures legal clarity and attribution. Links to kernelnewbies.org provide tutorials for newcomers, while subsystem mailing lists—accessible via lore.kernel.org—connect contributors to specialized groups for networking and mentorship. Engagement follows established protocols outlined in the kernel documentation, promoting review through email-based discussions and repositories. Developers submit patches as plain-text emails to relevant lists, maintaining context with tools like format-patch, and iterate based on feedback from maintainers and peers. This asynchronous model, using for status tracking, encourages thorough scrutiny before integration into upstream trees. By 2025, these tools handle thousands of daily interactions from a contributor base, with mailing lists alone processing over messages monthly across key archives. This scale underscores kernel.org's role in sustaining a vibrant, decentralized ecosystem.

Security and Incidents

2011 Security Breach

On August 28, 2011, administrators of kernel.org discovered evidence of a breach that had occurred earlier in the month, prompting the immediate takedown of affected servers for investigation. The intrusion began no later than , when attackers gained access to the primary , known as , using compromised user credentials obtained via a on a developer's personal machine. This access allowed the intruders to spread to multiple other servers within the kernel.org infrastructure, including build hosts, by installing the Phalanx —a self-injecting, off-the-shelf —and modifying SSH-related files such as openssh-server and openssh-clients, along with adding trojan startup scripts. The rootkit enabled logging of user activities, retention of exploit code, and the addition of backdoors, compromising 448 user accounts and their SSH keys. The breach caused temporary downtime for kernel.org services, but the distributed nature of the Git repositories ensured their integrity, as SHA-1 hashes prevented undetected tampering of the kernel source history. Tarballs generated on compromised servers raised concerns about potential modifications, though no tainted kernel releases were identified following audits. In response, all affected systems were backed up, fully wiped, and reinstalled from trusted sources, with the site returning online in early October 2011 after over a month of remediation. Authorities in the United States and Europe were notified to assist in the probe, which revealed no evidence of code alterations but highlighted vulnerabilities in credential management and system patching. The investigation, covered extensively by community outlets like , ultimately linked the attack to Donald Ryan Austin, a 27-year-old from . Austin was arrested in September 2016 and charged with four counts of intentionally causing damage to protected computers by installing malicious software on kernel.org servers, facing up to 10 years in prison per count if convicted. He allegedly exploited administrator credentials to deploy the and trojans, monitoring activities on servers like Hera and Odin1 during the intrusion period.

Post-Breach Security Enhancements

Following the 2011 security breach, kernel.org administrators undertook immediate remedial actions, including the complete reinstallation of all compromised servers and a comprehensive of approximately 450 user accounts to identify and revoke unauthorized access by late 2011. Developers were required to generate new PGP/GPG keys, integrate them into the community's , and resubmit public keys to maintainers, effectively rotating cryptographic keys to restore secure access. To prevent future unauthorized commits, kernel.org mandated two-factor authentication (2FA) for all repository write operations starting in August 2014. This policy builds on existing SSH private key requirements by adding token-based validation, supporting standards like HOTP/TOTP via soft tokens (e.g., ) or hardware like YubiKeys, with one-time codes tied to IP addresses and valid for 24 hours to 30 days. Yubico contributed 100 YubiKeys to facilitate adoption among kernel developers. Infrastructure enhancements post-breach emphasized hardened configurations, such as eliminating shell accounts from hosting systems to minimize attack vectors, alongside regular vulnerability assessments managed by IT teams responsible for kernel.org operations. Encrypted communications, including SSH with 2FA integration via tools like totpcgi and gitolite, became standard for developer interactions. By 2025, .org's security framework, integrated with security initiatives, incorporates zero-trust principles by prioritizing developer-side verification over infrastructure trust, as established after the 2011 incident, and employs automated PGP for tags and tarballs. All releases include detached PGP signatures to enable users to verify file integrity independently of mirrors, ensuring tamper detection through standards like GnuPG. Ongoing measures include mandatory PGP signing for all releases and tags, with public documentation guiding developers on secure key management, such as offline master key storage and smartcard-based subkeys, to maintain code authenticity. Mirror integrity is upheld via user-verified signatures, and the Linux Foundation publishes site news updates on security improvements, promoting transparency in infrastructure changes.

References

  1. [1]
    The Linux Kernel Archives
    No readable text found in the HTML.<|control11|><|separator|>
  2. [2]
    1. Introduction - The Linux Kernel documentation
    The Linux kernel, at over 8 million lines of code and well over 1000 contributors to each release, is one of the largest and most active free software projects ...
  3. [3]
    The Linux Kernel Organization
    Aug 6, 2024 · The Linux Kernel Organization is a California Public Benefit Corporation established in 2002 to distribute the Linux kernel and other Open Source software to ...
  4. [4]
    Releases - The Linux Kernel Archives
    May 26, 2025 · This site is operated by the Linux Kernel Organization, a 501(c)3 nonprofit corporation, with support from the following sponsors. Akamai ...
  5. [5]
    KS2011: Kernel.org report - LWN.net
    Oct 24, 2011 · H. Peter Anvin started with a history of kernel.org, which was initially set up when Linus moved to California and started working for Transmeta ...
  6. [6]
    The Cracking of Kernel.org - Linux Foundation
    Aug 31, 2011 · The main kernel.org server (known as “hera”) was recently compromised by an unknown intruder. This person was able to gain “root” access, meaning they had the ...Missing: history | Show results with:history
  7. [7]
    About Linux Kernel
    Aug 6, 2024 · Linux is a clone of the operating system Unix, written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net.
  8. [8]
    About - The Linux Kernel Archives
    Aug 6, 2024 · The Linux Kernel Organization is a California Public Benefit Corporation established in 2002 to distribute the Linux kernel and other Open Source software to ...
  9. [9]
    Linux Kernel Organization - Nonprofit Explorer - ProPublica
    Designated as a 501(c)(3) Organizations for any of the following purposes: religious, educational, charitable, scientific, literary, testing for public safety, ...Missing: corporation | Show results with:corporation
  10. [10]
    Submitting patches: the essential guide to getting your code into the ...
    linux-kernel@vger.kernel.org should be used by default for all patches, but the volume on that list has caused a number of developers to tune it out. Look in ...
  11. [11]
    Working with the kernel development community
    An introduction to how kernel development works. Read these documents first: an understanding of the material here will ease your entry into the kernel ...HOWTO do Linux kernel... · Linux Kernel Contribution... · Linux kernel coding styleMissing: canonical repository<|separator|>
  12. [12]
    2. How the development process works - The Linux Kernel Archives
    Linux kernel development in the early 1990's was a pretty loose affair, with relatively small numbers of users and developers involved. With a user base in the ...
  13. [13]
    FTP limited on mirrors.kernel.org
    Feb 3, 2015 · We've had to temporarily limit FTP access to mirrors.kernel.org due to high IO load. We have recently upgraded our hardware in order to increase capacity.
  14. [14]
    Linux kernel releases PGP signatures
    Feb 15, 2018 · All kernel releases are cryptographically signed using OpenPGP-compliant signatures. Everyone is strongly encouraged to verify the integrity of downloaded ...
  15. [15]
    Kernel Maintainer PGP guide
    PGP helps ensure the integrity of the code that is produced by the Linux kernel development community and, to a lesser degree, establish trusted communication ...Missing: HTTP FTP xz bzip2 Bugzilla
  16. [16]
    Mirroring kernel.org repositories
    Jun 3, 2013 · If you would like to mirror all or a subset of kernel.org git repositories, please use a tool we wrote for this purpose, called grokmirror.Missing: subdomains | Show results with:subdomains
  17. [17]
    Submitting patches: the essential guide to getting your code into the ...
    All changes to the Linux kernel occur in the form of patches, as generated by diff(1). When creating your patch, make sure to create it in “unified diff” format ...Missing: FTP subdomains mirrors bzip2
  18. [18]
    XZ data compression in Linux
    XZ is a general purpose data compression format with high compression ratio and relatively fast decompression. The primary compression algorithm (filter) is ...
  19. [19]
    README: Change gzip/bzip2 to xz compression format
    Mar 3, 2015 · Kernel.org is only hosting patches and kernel compressed with xz, so change the old gzip/bzip2 instances to xz. Signed-off-by: Yaowei Bai ...
  20. [20]
    Kernel.org Bugzilla Main Page
    This bugzilla is for reporting bugs against upstream Linux kernels. If you did not compile your own kernel from scratch, you are probably in the wrong place.Kernel.org Bugzilla QuickSearch · Browse · FAQ · Log InMissing: features FTP Git PGP subdomains mirrors tarballs patches gzip bzip2
  21. [21]
    Using bugzilla.kernel.org
    Getting bug reports for components . The kernel.org bugzilla uses a mechanism that allows anyone to subscribe/unsubscribe from bug reports for specific ...Missing: integration | Show results with:integration
  22. [22]
    List archives on lore.kernel.org
    Dec 12, 2018 · Fast, searchable web archives; Atom feeds per list or per individual thread; Downloadable mbox archives to make replying easy; Git-backed ...Missing: key HTTP FTP PGP subdomains tarballs patches xz bzip2
  23. [23]
    Git mirror available in Beijing - The Linux Kernel Archives
    Jan 11, 2020 · To start using the Beijing mirror, simply clone from that location or add a separate remote to your existing checkouts.Missing: subdomains | Show results with:subdomains
  24. [24]
    Worldwide Mirrors of git.kernel.org - Google Open Source Blog
    Apr 24, 2012 · Google provides a mirror of git.kernel.org at https://kernel.googlesource.com/, served from data centers in Asia, the US, and Europe.Missing: subdomains | Show results with:subdomains
  25. [25]
    The early days of Linux - LWN.net
    Apr 12, 2023 · The system was initially called Freax. A few weeks later, Linus asked Ari Lemmke, one of the administrators of ftp.funet.fi, to do an upload of ...
  26. [26]
    kernel.org - Whois.com
    kernel.org ; Registered On: 1997-03-07 ; Expires On: 2027-03-08 ; Updated On: 2025-05-28 ; Status: client transfer prohibited ; Name Servers: ns11.constellix.com
  27. [27]
    Profiles in Linux: H. Peter Anvin
    Jul 13, 2012 · H. Peter Anvin is one of the “old geeks” of Linux, and has been a key contributor since 1992, specializing in low level hardware.
  28. [28]
    Site news - The Linux Kernel Archives
    Mar 15, 2021 · Linux development started in 1991 and has been ongoing for the past 30 years at an ever-increasing pace. Many popular code collaboration ...
  29. [29]
    LKML archives on lore.kernel.org - LWN.net
    Jun 22, 2018 · A new archive of linux-kernel mailing list (LKML) posts going back to 1998 is now available at lore.kernel.org. It is based on public-inbox.
  30. [30]
    Linux maintainers were infected for 2 years by SSH-dwelling ...
    May 15, 2024 · Stealing kernel.org's keys to the kingdom · Occurred no later than August 12, 2011, and wasn't detected for another 17 days · Installed an off-the ...
  31. [31]
    Index of /pub/linux/kernel/
    Mar 20, 2003 · ... 2025 13:12 - next/ 13-Nov-2025 03:40 - people/ 14-May-2025 16:03 - ports/ 13-Mar-2003 01:34 - projects/ 11-Sep-2023 17:40 - testing/ 14 ...V6.x · V5.x · 4.x · Linux-3
  32. [32]
    Akamai Delivers Infrastructure Support to Ensure Uninterrupted ...
    Mar 27, 2025 · The Linux Kernel Organization is a California Public Benefit Corporation established in 2002 to distribute the Linux kernel and other open ...
  33. [33]
    Linux Kernel Organization - GuideStar Profile
    THE SPECIFIC PURPOSE OF THE LINUX KERNEL ORGANIZATION (LKO) IS TO PROVIDE EQUAL AND WIDESPREAD ACCESS TO THE LINUX OPERATING SYSTEM TO THE PUBLIC AND OPEN ...Missing: 2002 Corporation
  34. [34]
    15 Questions from Kernel.org SysAdmin Konstantin Ryabitsev's ...
    Mar 5, 2015 · Linux Foundation System Administrator Konstanin Ryabitsev works on the team that runs the systems behind Linux kernel development on kernel.org.
  35. [35]
    On the Job with a Linux Foundation Systems Administrator - Linux.com
    “Linux Foundation sysadmins are facilitating work on projects that everybody really cares about,” said Konstantin Ryabitsev, a Linux Foundation systems ...
  36. [36]
    Akamai Picks Up Hosting for Kernel.org - The New Stack
    Mar 27, 2025 · Akamai announced that it is picking up the hosting of kernel.org, the main distribution system for Linux kernel development.Missing: budget CDN
  37. [37]
    Kernel.org git repositories - The Linux Kernel Archives
    No information is available for this page. · Learn whyMissing: 2005 | Show results with:2005
  38. [38]
    torvalds/linux - https:∕∕git.kernel.org
    No information is available for this page. · Learn whyMissing: introduction 2005
  39. [39]
  40. [40]
  41. [41]
  42. [42]
  43. [43]
    Git User Manual - The Linux Kernel Archives
    Chapter 1, Repositories and Branches and Chapter 2, Exploring Git history explain how to fetch and study a project using git—​read these chapters to learn how ...
  44. [44]
  45. [45]
    gitworkflows(7) Manual Page
    Jun 20, 2025 · Git workflows involve splitting changes into small steps, using merges, topic branches, and integration branches like maint, master, next, and ...Managing Branches · Topic Branches · Merge Workflow
  46. [46]
    The Linux Kernel documentation
    The Linux Kernel documentation includes development guides, internal API manuals, development tools, and user-oriented manuals for administration and userspace ...Kernel subsystem... · Kernel Maintainer Handbook · Kernel Build System · Core API
  47. [47]
    Linux Kernel Documentation
    To build the documentation in HTML or PDF formats, use make htmldocs or make pdfdocs . The generated documentation is placed in Documentation/output . The ...
  48. [48]
    Including kernel-doc comments — The Linux Kernel documentation
    The Linux kernel source files may contain structured documentation comments, or kernel-doc comments to describe the functions and types and design of the code.
  49. [49]
    Introduction — The Linux Kernel documentation
    To build the documentation in HTML or PDF formats, use make htmldocs or make pdfdocs . The generated documentation is placed in Documentation/output . The ...
  50. [50]
    Linux Kernel Documentation
    - **Types of Documentation**: Limited content provided; mentions "Documentation on memory management" but lacks specifics on formats (e.g., HTML, PDF, text), API references, driver docs, or coding style guides.
  51. [51]
    Index of /pub/linux/kernel/v1.0/
    Index of /pub/linux/kernel/v1.0/ ../ CHANGES 13-Mar-1994 00:00 6281 linux-1.0.patch.alpha.bz2 14-Mar-1994 00:00 15K linux-1.0.patch.alpha.gz ...
  52. [52]
    Documentation/Changes - The Linux Kernel Archives
    This document is designed to provide a list of the minimum levels of software necessary to run the current kernel version. This document is originally based on ...
  53. [53]
  54. [54]
    Kernel Mailing Lists - The Linux Kernel Archives
    No information is available for this page. · Learn whyMissing: expansion 2010s
  55. [55]
    The lore.kernel.org API - kworkflow
    Sep 4, 2023 · For kw patch-hub , two types of data are requested to the lore archives: Public mailing lists archived. Messages sent to an archived mailing ...
  56. [56]
    lore+lei: part 1, getting started - people.kernel.org
    Nov 5, 2021 · Public-inbox started out as a distributed mailing list archival framework with powerful search capabilities. We were happy to adopt it for our ...
  57. [57]
    HOWTO do Linux kernel development — The Linux Kernel documentation
    ### Summary of Guidelines for Contributing to the Linux Kernel
  58. [58]
    Linux kernel - MARC: Mailing list ARChives
    linux-kernel · 2025-10-01 - 2025-11-01 (22100 messages) · 2025-09-01 - 2025-10-01 (44673 messages) · 2025-08-01 - 2025-09-01 (40885 messages) · 2025-07-01 - 2025-08 ...
  59. [59]
    kernel.org compromised - LWN.net
    Aug 31, 2011 · The main kernel.org page is currently carrying a notice that the site has suffered a security breach. " Earlier this month, a number of ...Missing: audits redundancy
  60. [60]
    Kernel.org Server Rooted and 448 users credentials compromised
    Aug 31, 2011 · The infection occurred no later than August 12 and wasn't detected for another 17 days. The systems were infected by an off-the-shelf, a self- ...Missing: timeline | Show results with:timeline
  61. [61]
    Linux kernel archives host compromised by attacker - Ars Technica
    Sep 1, 2011 · The kernel.org administrators have responded to the security failure by by taking the affected systems offline and contacting law enforcement ...
  62. [62]
    Kernel.org Back After Security Breach - InfoQ
    Oct 4, 2011 · After over a month since Kernel.org's security breach was announced (and subsequently taken off-line), the Kernel.org website has been brought back on-line.Missing: timeline | Show results with:timeline
  63. [63]
    Suspect in kernel.org breakin arrested - LWN.net
    Sep 2, 2016 · " [Donald Ryan] Austin is charged with causing damage to four servers located in the Bay Area by installing malicious software. Specifically, he ...
  64. [64]
    Florida Computer Programmer Arrested For Hacking
    Sep 20, 2016 · Austin is charged with causing damage to four servers located in the Bay Area by installing malicious software. Specifically, he is alleged to ...
  65. [65]
    Feds pin brazen kernel.org intrusion on 27-year-old programmer
    Sep 2, 2016 · Donald Ryan Austin, 27, of El Portal, Florida, used login credentials belonging to a Linux Kernel Organization system administrator to install a ...
  66. [66]
    Kernel.org's road to recovery - LWN.net
    Oct 4, 2011 · Keeping all those shell accounts off the system is clearly an important step toward a higher level of security. Kernel.org has its roots in the ...Missing: enhancements | Show results with:enhancements
  67. [67]
    Linux Kernel Git Repositories Add 2-Factor Authentication
    Aug 18, 2014 · For a few years now we have been mandating a fairly strict authentication policy for those developers who commit directly to the git ...
  68. [68]
    Embargoed hardware issues - The Linux Kernel documentation
    The repository contains the main development branch against the mainline kernel and backport branches for stable kernel versions as necessary. The initial ...