Posts
4301
Following
310
Followers
445
Software Engineer at Opinsys Oy
Entrepreneur at Siltakatu Solutions Oy

OpenPGP: 3AB05486C7752FE1
I dared to apply this to my -next:

https://lore.kernel.org/keyrings/Z_e9CVsmiXD3QYkg@kernel.org/

It's a good timing, given that we are at -rc1. key_put() is exactly type of code where:

1. You need to be extremely conservative.
2. Still there's a chance for breakage.
3. struct key is widely accessed kernel object in various context's. Thus, it is practically impossible to consider every possible use case.

I'll put this to my v6.16 PR if it turns out to not cause too much devastation :-)

#linux #kernel #keyring
0
0
0
2
0
0

Jarkko Sakkinen

Flying to Berlin in near future to meet up friends from Tallinn :-) It's cheaper than train + boat.
0
0
1

Jarkko Sakkinen

literally me
0
2
1

Jarkko Sakkinen

"marvel's mignight suns" is a cool game but why they have to talk so much, and why i need to hang out.

i don't hang out IRL either 🤷
0
0
0

Jarkko Sakkinen

thank you mr showerhead for giving this freedom my US comrades (pun intended).

https://www.whitehouse.gov/presidential-actions/2025/04/maintaining-acceptable-water-pressure-in-showerheads/
0
0
0

Jarkko Sakkinen

Edited yesterday

container hack for build: unshare + chroot. unshare guarantees unmounts, given a ephemeral file system namespace :-)

#!/bin/sh

set -eu

rootfs_dir=$1
adm_user=$2

if [ "$#" -eq 3 ]; then
  proxy_address=""
  cmdline=$3
else
  proxy_address=$3
  cmdline=$4
fi

sudo unshare --mount --pid --fork sh -c "
  mount --bind /sys '$rootfs_dir/sys'
  mount --bind /dev '$rootfs_dir/dev'
  mount -t proc proc '$rootfs_dir/proc'
  mount -t devpts devpts '$rootfs_dir/dev/pts'
  chroot '$rootfs_dir' su - '$adm_user' -c 'export PUAVO_CACHE_PROXY=\"$proxy_address\"; $cmdline'
"
0
1
1

Jarkko Sakkinen

Anyone interested on keyring:

https://web.git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git/commit/?h=keys-graveyard

If this would work out then possibly also radiate to /proc/keys.

I.e. it could also similarly "knock for reference" but that is not within scope of this patch.

#linux #kernel #keyring
1
0
0

Happy International Asexuality Day!

0
6
3

My fourth Obnam 3 development session. Put into place the scaffolding to add chunk encryption, but didn't have the time to actually implement the encryption.

Small steps and tea is the way to reach goals while having fun.

(Obnam 3 is my Sunday project to experiment with implementing fundamental components for backup software.)

https://obnam.org/blog/2025/obnam3-04

1
1
0

vitaut 🤍❤️🤍 🇺🇦

BREAKING: The C++ committee imposes tariffs on non-US locales.

3
5
2

Jarkko Sakkinen

Telegram asked me pin, which was 26214, which is same as the number of colors on #Amiga 1200 ;-)

That at least what I recall...
0
1
0

Jarkko Sakkinen

Edited 6 days ago

Quite cool, I have to say. fwupdmgr managed to update my HP USB-C Dock G5.

1
0
0

Jarkko Sakkinen

recycle is now free, the program to create .rex loops: https://www.reasonstudios.com/recycle
0
0
1
Edited 8 days ago

fun Linux fact: because MAP_SHARED|MAP_ANONYMOUS is actually a file-backed mapping under the hood, unmapping part of such a mapping does not discard the data stored in that part:

$ cat mremap.c
#define _GNU_SOURCE
#include <err.h>
#include <stdio.h>
#include <sys/mman.h>
int main(void) {
char *p = mmap(NULL, 0x2000, PROT_READ|PROT_WRITE, MAP_SHARED|MAP_ANONYMOUS, -1, 0);
if (p == MAP_FAILED) err(1, "mmap");
p[0x1000] = 'X';
if (munmap(p+0x1000, 0x1000)) err(1, "munmap");
// that 'X' we just wrote... is it gone?
// nope, let's bring it back!
p = mremap(p, 0x1000, 0x2000, MREMAP_MAYMOVE);
if (p == MAP_FAILED) err(1, "mremap");
printf("p[0x1000]='%c'\n", p[0x1000]);
}
$ gcc -o mremap mremap.c
$ ./mremap
p[0x1000]='X'
$
1
3
0

Jarkko Sakkinen

0
2
3
Edited 14 days ago

US government’s attack on free speech, science, and research is causing a brain drain

How do you create a brain drain and lose your status as eminent destination for scientists and researchers?

The United States seems to be sending out questionnaires to researchers at universities and research institutes outside of the United States, asking them about their political leanings. Dutch universities are strongly advising Dutch researches not to respond to the questionnaire

https://www.osnews.com/story/141972/us-governments-attack-on-free-speech-science-and-research-is-causing-a-brain-drain/

0
3
0
Show older