Coverity is a static analyzer that scans the kernel code and reports issues that can hide coding mistakes and vulnerabilities. Currently, it reports around 5,000 outstanding defects in the Linux kernel. I’m dedicated to fixing those defects and, this talk is a status...
Do you know how batteries and battery chargers are handled in the Linux kernel subsystem? While not as complex as the DRM subsystem, the power-supply subsystem is a key part of embedded mobile devices running Linux. This talk will be an quick overview of the subsystem...
Throughout 2018 several computer vulnerabilities got into the spotlight, possessing all the ingredients needed to attract attention: the core issue was unusually located in the processor rather than the software; almost all personal computers, servers and portable...
The Spectre and Meltdown vulnerabilities are part of a class of hardware flaws which have existed for years, but which have only recently been discovered. David will describe the problems, and explain the techniques used for mitigating them in software — from...
Since linux 4.8 the GPIO sysfs interface is deprecated. Due to its many drawbacks and bad design decisions a new user space interface has been implemented in the form of the GPIO character device which is now the preferred method of interaction with GPIOs which can’t...