Posts
469
Following
90
Followers
94
n00b Kernel Hacker
- Intern @ NVIDIA Korea (Security System Software) (2024.06 ~)
- Ex-Intern @ Panmneisa (CXL emulation stuff) (~2023.12)
- Undergraduate majoring CSE (estimated graduation: Feb. 2025)
- Working as reviewer at Linux Slab subsystem
- Born in August 6, 2000

Opinions are my own.

My interests are:
Memory Management,
Computer Architecture,
Circuit Design,
Virtualization
@kees Haha, will exploit writers be considering a different job after this? (but I guess they are way too creative though)
0
0
3
Edited 1 year ago
@ljs lol I recall reading it in "Linux Kernel in a Nutshell" book and I was shocked in the same way

(picture taken from the book http://www.kroah.com/lkn/ under CC BY-SA 2.5)
2
0
2
@lkundrak Aha, just PLA.

I wanted to create something like this when I was a child, but I had no 3D printers ;)
1
0
2
@lkundrak cute! what's the material for printing?
1
0
0
Edited 1 year ago
@vbabka thanks :) but at the same time, on bright side, I have free time that allows me to learn how QEMU/PCI/CXL works without much work pressure.
0
0
1
@ljs Invesgating how chocolates are made?
1
0
2
@vbabka It's not declared thrown away - but no one in the company needs my work, and there is no specific task nor requirement. And I can decide what to do.

So I asked if I'm allowed to contribute my work to upstream community and I was told "No, it's our company's property"

I'm not sure why they even hired (even if it's intern) me.
1
0
1
Edited 1 year ago

I'm really excited about making Use-After-Free exploits much harder in the .

CONFIG_RANDOM_KMALLOC_CACHES has landed:
https://git.kernel.org/linus/3c6152940584

CONFIG_SLAB_VIRTUAL is coming:
https://lore.kernel.org/lkml/20230915105933.495735-15-matteorizzo@google.com/

2
10
3
@vbabka internship assignment :(
1
0
1
re: dark topics
Show content
@ljs
Sorry for what you had to go through.

Reminds me of my parents' lives. It hasn't been long since the quality of life in South Korea greatly improved.

My father and mother couldn't even finish high school because they had to work to support their family.

They tried their best not to make me (and my sisters) experience the same thing. I am always thankful to them.

These days the situation is much better. Many people are not forced to work and give up studying. And on the internet you can find most things you need for studying something.
0
0
2
@lkundrak lol how they are even tested
0
0
1
writing code that will not be used at all is utterly frustrating and akin to creating garbage.
2
0
1
Edited 1 year ago
Buried in the work... feeling like being a piece of shit. Oh, I should visit this:

https://hypebeast.com/2023/9/joan-cornella-vip-solo-exhibition-allrightsreserved-meet-project-em-gallery-seoul
1
0
3
@jbowen what kind of positions have you applied for?
good luck anyway!
1
0
1

Jonathan Corbet

It has happened at last: after many iterations, that x86 shadow-stack patch series has been accepted into the mainline for 6.6:

https://lwn.net/ml/linux-kernel/CAHk-=wipDVFEfSJxbnUSDqENs5i8RzSsgJOFdb69pH=b7BOFiQ@mail.gmail.com/

For those who haven't been following this saga, see https://lwn.net/Articles/926649/
0
11
18
@cwayne @vbabka maybe the flu or just powerful cold?

Hope everyone get well soon anyway!
1
0
2
@ljs @vbabka @lkundrak
too bad that I m not unkind enough to be tagged
1
0
2
@mntmn cool laptop XD
but be careful when it rains
1
0
1
Edited 1 year ago
Here is a hopefully-useful notice about Linux kernel security issues, as it seems like this knowledge isn't distributed very widely based on the number of emails I get on a weekly basis:

- The kernel security team does not have any "early notice"
announcement list for security fixes for anyone, as that would only
make things more insecure for everyone.

- The kernel community does not assign CVEs, nor do we deal with them
at all. This is documented in the kernel's security policy, yet we
still have a number of people asking for CVE numbers even after
reading that policy. See my longer "CVEs are dead..." talk for full
details about how the CVE process is broken for projects like Linux:
https://kernel-recipes.org/en/2019/talks/cves-are-dead-long-live-the-cve/

- You HAVE to take all of the stable/LTS releases in order to have a
secure and stable system. If you attempt to cherry-pick random
patches you will NOT fix all of the known, and unknown, problems,
but rather you will end up with a potentially more insecure system,
and one that contains known bugs. Reliance on an "enterprise"
distribution to provide this for your systems is up to you, discuss
it with them as to how they achieve this result as this is what you
are paying for. If you aren't paying for it, just use Debian, they
know what they are doing and track the stable kernels and have a
larger installed base than any other Linux distro. For embedded,
use Yocto, they track the stable releases, or keep your own
buildroot-based system up to date with the new releases.

- Test all stable/LTS releases on your workload and hardware before
putting the kernel into "production" as everyone runs a different %
of the kernel source code from everyone else (servers run about
1.5mil lines of code, embedded runs about 3.5mil lines of code, your
mileage will vary). If you can't test releases before moving them
into production, you might want to solve that problem first.

- A fix for a known bug is better than the potential of a fix causing a
future problem as future problems, when found, will be fixed then.

I think I need to give another talk about this issue to go into the above in more detail. So much for me giving a technical talk at Kernel Recipes this year...
11
228
246
As mentioned[1] to Lorenzo Stoakes, I'd like to buy a glass of beer to people who gave the first hundred stars to damo[2]. If you are in the first hundred group and find me from any offline venue, please let me know you're one of the group so that I can buy you a glass of beer :) I will attend the Open Source Summit Europe[3] and hopefully Linux Plumbers[4] for the rest of this year :)

[1] https://shorturl.at/szZ45
[2] https://github.com/awslabs/damo
[3] https://events.linuxfoundation.org/open-source-summit-europe/
[4] https://lpc.events/event/17/

#linux #kernel #damon #damo
0
1
2
Show older