Posts
4480
Following
316
Followers
475
Linux kernel hacker and maintainer etc.

OpenPGP: 3AB05486C7752FE1

Jarkko Sakkinen

Cheap #3D #printing services in the #EU region? I just need to print one a spare part that is not complex and #ThingVerse is feasible for acquiring the model.
3
1
0
E.g. I get room keys as a security feature. I did read the Matrix spec. But IRL I find myself carrying USB stick from computer to another in order to have anything readable if a room is encrypted. I.e. I can either use recovery key or authorization request to activate a client but it gets you only hafl-way there.

This makes me feel that UX was designed to fit the security features and not other way around. And if you talk to a Matrix cult member they will say to you that you're not getting it.
1
0
1
I miss the 90s, IRC and Polish hacking groups bombing IRCNet with regular netsplits :-) And who needs security when you have OTR (innovation from 2004).

In software security a protocol built without security is easier to guard than a protocol with "security features". IRC has this right too. I feel that this some annual thing to praise the IRC and hate the world 🤷
1
0
2
I need to visit local museum and go to see the first IRC server and ask for guidance in this misguided world (the first ever is 400 m away from my home door, i.e. living at a holy place).
1
0
4

Jarkko Sakkinen

Edited 9 months ago
After having to use Matrix for a while and seeing how bad Slack and Discord are, I wish there was a criminal law that would allow IRC only for IM. Steady performer, zero fucks. #IRC
1
2
8

Jarkko Sakkinen

Edited 9 months ago
After four weeks doing Rust it became clear to me that LSP is quite useful sometimes, when you have to deal with a language that was not designed to be written by humans.

[That said: even less so by Copilot, Bob or Clippy]

;-)

I've managed mostly with vim and rusty-tags so far but to help with code exploration I installed vscodium. Seems to do the job since it has a vim emulation plugin and works together with rust-analyzer. And LSP does not work too well in terminal anyhow...

PS. This is the most useful documentation that I found on topic: https://bootlin.com/pub/conferences/2020/elce/opdenacker-using-vs-code-for-embedded-development/opdenacker-using-vs-code-for-embedded-development.pdf
0
0
2

The end result:

$ df -h
Filesystem      Size  Used Avail Use% Mounted on
/dev/sda1       932G   14G  918G   2% /
vendorfw         16G   79M   16G   1% /usr/lib/firmware/vendor
devtmpfs        4.0M     0  4.0M   0% /dev
tmpfs            16G     0   16G   0% /dev/shm
tmpfs           6.3G   22M  6.2G   1% /run
tmpfs            16G   18M   16G   1% /tmp
/dev/nvme0n1p5  974M  234M  673M  26% /boot
/dev/sda1       932G   14G  918G   2% /home
/dev/nvme0n1p4  499M  129M  371M  26% /boot/efi
tmpfs           3.2G  864K  3.2G   1% /run/user/1000

$ sudo btrfs filesystem show  
Label: 'fedora'  uuid: ff4c6159-93b4-49db-b9fe-13fdb502563c
	Total devices 1 FS bytes used 12.33GiB
	devid    2 size 931.51GiB used 20.06GiB path /dev/sda1
0
0
0

Jarkko Sakkinen

Edited 9 months ago

I installed Asahi Linux to a 128 GB rootfs (out of 1 TB of internal storage). It is connected to a dock with an external 1 TB M.2 drive. Fedora sees this drive as /dev/sda.

Migrating the subvolume of /home was just a matter of creating a single all encompassing BTRFS partition to /dev/sda and then:

sudo btrfs device add /dev/sda1 /home -f
sudo btrfs device remove /dev/nvme0n1p6 /home -f

Now there is an airtight separation / and /home physically, and also they pool space only within their own cages.

Apple firmware supports only booting macOS from external storage, thus the rootfs must always reside in the internal storage, but I think this is already quite sustainable way to deal with it.

This bottleneck/policy can be mitigated but it does not pay the price. It can be overcome by installing macOS to an external storage and consuming internal storage in its full extent for Asahi Linux. Just mentioning this last for completeness ;-)

Encryption can/could be done by following https://davidalger.com/posts/fedora-asahi-remix-on-apple-silicon-with-luks-encryption/ with “a twist’ (since different partition/drive topology).

#apple #macos #linux #asahilinux

1
2
3

Jarkko Sakkinen

US Ambassador to Finland's immediate reaction of Trump's win in 2016 while still serving 😅 #Trump #diplomacy
0
0
0

Jarkko Sakkinen

my friends have started to bully me as "jarkko.js" (those are my name letters). did not came to mind when picking username for my github account duh...
1
0
1

Jarkko Sakkinen

Since I guess Google knows Rust better than me I guess I'm doing the state of art with custom target JSON-files, i.e. deploying them to a random directory in the project directory :-)

I kind of hoped that there would be a place (let's say .cargo/targets or similar) under the project that gets automatically recognized by the tooling. Then you could just put that to rust-toolchain.xml like any other target.

https://security.googleblog.com/2024/09/deploying-rust-in-existing-firmware.html

#cargo #rust #rustup
0
0
1
@kernellogger I'm also going to try out your instructions, try to polish them and come up with something :-) I'll share the results when I have something. Compiling kernel is my thing (I guess) ;-)
1
0
1
@kernellogger Finding out what would be a sustainable approach to test kernel patches with a distribution kernel is already a conference presentation. If I was in Linux conference, would not miss that one. It is *rarely* covered topic.
2
0
0

Jarkko Sakkinen

Let’s imagine you want to do this in Rust:

#[link_section = ".note.jarkko"]

What is the default alignment?

#rust

0
0
1
@vathpela @kernellogger @securepaul Yeah all this helps! It's just before I take a few days and play with all these cool ideas that you and others kindly provided, anything I would right now would probably be uttermostly incorrect :-) Lot's of stuff to process. Thank you!
0
0
0
Show older