Andrey Konovalov's Avatar

Andrey Konovalov

@andreyknvl

Security engineer at http://xairy.io. Focusing on the Linux kernel. Maintaining @linkersec.bsky.social. Trainings at http://xairy.io/trainings.

160
Followers
89
Following
44
Posts
24.11.2024
Joined
Posts Following

Latest posts by Andrey Konovalov @andreyknvl

Preview
πŸ“² Debugging the Pixel 8 kernel via KGDB Instructions for getting kernel log, building custom kernel, and enabling KGDB on Pixel 8

Extended the Pixel 8 KGDB article with the instructions on how to set up GEF. slub-dump, buddy-dump, and some other commands now work. Huge thanks to bata24 for implementing all required pieces.

xairy.io/articles/pix...

11.03.2026 22:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Gonna be teaching Exploiting the Android Kernel training at Zer0Con 2026 on March 30th β€” April 1st. This is a new training focused on data-only Android kernel exploitation techniques. Just a bit of time left to sign up. Pay attention to the requirements.

zer0con.org#training-sec...

10.03.2026 00:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
January/February updates Β· xairy/linux-kernel-exploitation@80d541e

Updates for the Linux kernel exploitation collection πŸ˜‹

github.com/xairy/linux-...

04.03.2026 23:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Fuzzing the Linux Kernel This training guides security researchers and software engineers through the field of Linux kernel fuzzing. In a series of lectures and practical labs, the training explores using fuzzing for finding ...

Gonna be teaching Fuzzing the Linux Kernel training online via Ringzer0 on March 20–25. Covers using/extending syzkaller and KASAN and related areas. I don't deliver this training often, so don't miss the opportunity.

ringzer0.training/countermeasu...

13.02.2026 13:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

The end of a good time

slab: remove struct kmem_cache_cpu
git.kernel.org/pub/scm/linu...

slab: remove cpu (partial) slabs usage from allocation paths
git.kernel.org/pub/scm/linu...

12.02.2026 02:14 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
November/December updates Β· xairy/linux-kernel-exploitation@50a2069

Updates for the Linux kernel exploitation collection πŸ˜‹

github.com/xairy/linux-...

26.01.2026 23:08 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...

Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices.

projectzero.google/2026/01/pixe...

15.01.2026 18:56 πŸ‘ 58 πŸ” 35 πŸ’¬ 1 πŸ“Œ 2
REcon 2026 - Premier Reverse Engineering Conference REcon 2026 - Premier reverse engineering and cybersecurity conference in Montreal

🚨 REcon 2026 is LIVE!
πŸš€ Call for papers and registration are now open!

Join the world's top reverse engineers & exploit devs in Montreal:
πŸ›  Trainings: June 15-18
πŸ“… Conference: June 19-21
Tickets & early bird now open β†’ recon.cx

Limited spots – see you in MTL! #REcon2026 #ReverseEngineering

13.01.2026 21:11 πŸ‘ 8 πŸ” 3 πŸ’¬ 0 πŸ“Œ 2
Preview
🀫 Unlocking secret ThinkPad functionality for emulating USB devices Enabling and using xDCI controller on ThinkPad X1 Carbon 6th Gen

@andreyknvl.bsky.social I don't know if this ever got brought up, but for a much more convenient way of doing this, Steam Deck supports this out of the box. You flip the toggle in BIOS, which is exposed by default, and then you can use the gadget directly within the OS. xairy.io/articles/thi...

13.01.2026 00:45 πŸ‘ 3 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Gonna be teaching Exploiting the Linux Kernel training at @offensivecon.bsky.social in Berlin on May 11–14th. Half of the spots already taken, so don't miss out. Also note that you can get a conference ticket as a bundle with a training.

23.12.2025 00:41 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

🚨 In 2026, Andrey Konovalov - @andreyknvl.bsky.social - returns to OffensiveCon with a training on "Exploiting the Linux Kernel". Find more details hereπŸ”—https://buff.ly/dKDboYt

πŸš€ Don't miss this chance to improve your skillsβ€”sign up now!

20.12.2025 13:11 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1
Post image

The trainings' content is unique and exclusive to #offensivecon26, so don’t miss out!

NEW: Get your training + conference ticket bundle and secure a conference ticket before the conference ticket shop opens!

Tickets: buff.ly/z8YNgoY

Don't worry, the conference ticket shop will open…at some point

16.12.2025 09:12 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

This is still not fixed btw.

08.11.2025 11:48 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

kernelCTF: CVE-2025-38477

kernelCTF entry for a race condition in the network scheduler subsystem.

Most notably, shows a technique of putting controlled data into unmapped sections of vmlinux.

github.com/n132/securit...

07.11.2025 20:11 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Defeating KASLR by Doing Nothing at All

Article by Seth Jenkins about a few problems with physical memory KASLR on arm64 devices.

googleprojectzero.blogspot.com/2025/11/defe...

06.11.2025 16:13 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
September/October updates Β· xairy/linux-kernel-exploitation@b26cc4a

Updates for the Linux kernel exploitation collection πŸ˜‹

github.com/xairy/linux-...

06.11.2025 19:58 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers

Article by Robin Bastide about exploiting a NULL-pointer-dereference that led to a UAF access to the kernel stack in the NVIDIA GPU driver.

blog.quarkslab.com/nvidia_gpu_k...

25.10.2025 00:44 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Merge commit: git.kernel.org/pub/scm/linu...
RFC to replace per-CPU partials: lore.kernel.org/linux-mm/202...
LWN article: lwn.net/Articles/101...

24.10.2025 14:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Sheaves support has been merged into SLUB.

Opt-in for now, but planned to replace the per-CPU partial slab layer for all caches in the future.

Gonna have to revise the slab shaping strategies once this happens.

24.10.2025 14:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
raw-gadget/workshop at master Β· xairy/raw-gadget USB Raw Gadget β€” a low-level interface for the Linux USB Gadget subsystem - xairy/raw-gadget

Delivered a workshop at BalcCon this weekend on emulating/sniffing/MitM'ing USB devices with Raw Gadget and a Raspberry Pi.

All materials are public, so can go through the workshop on your own if you're interested.

github.com/xairy/raw-ga...

23.09.2025 14:54 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
docs: update USB documentation Β· google/syzkaller@e2beed9

Updated syzkaller documentation on USB fuzzing to explain how to handle certain tricky cases (e.g. driver quirks applied based on Vendor/Product IDs).

github.com/google/syzka...

23.09.2025 13:56 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

I also suspect that the CVE-2025-38494/5 fix is what actually fixes CVE-2024-50302.

Assuming the used chain was portable enough to also cover devices with CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y, replacing kmalloc with kzalloc possibly did nothing.

bsky.app/profile/andr...

11.09.2025 15:38 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

"Wrote" is a strong word for this, I just cleaned up the reproducer from this syzbot report:

syzkaller.appspot.com/bug?extid=fb...

The report has been public on the dashboard for over 2 months now. And there's plenty of other USB bugs that are still not fixed.

11.09.2025 15:38 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image Post image

Wrote a trigger for CVE-2025-38494/5 (an integer underflow in the HID subsystem) that leaks 64 KB of OOB memory over USB.

Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels).

github.com/xairy/kernel...

11.09.2025 15:38 πŸ‘ 23 πŸ” 4 πŸ’¬ 1 πŸ“Œ 3
Preview
readme: new links Β· xairy/usb-hacking@4661f45

Updated the collection of USB hacking links.

github.com/xairy/usb-ha...

08.09.2025 20:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
raw-gadget/workshop at master Β· xairy/raw-gadget USB Raw Gadget β€” a low-level interface for the Linux USB Gadget subsystem - xairy/raw-gadget

Whoever is coming to BalCCon: I will be teaching a workshop Attacking USB with Raw Gadget (covering basics of USB emulation and sniffing).

If you wish to attend, you must bring Raspberry Pi 5 along with a few other things, see the workshop description.

github.com/xairy/raw-ga...

07.09.2025 23:27 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
July/August updates Β· xairy/linux-kernel-exploitation@3dbd2d4

Updates for the Linux kernel exploitation collection πŸ˜‹

github.com/xairy/linux-...

04.09.2025 16:46 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Linux Kernel netfilter: ipset: Missing Range Check LPE - SSD Secure Disclosure Affected Versions Vendor Response Linux kernel release the patch (https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35f56c554eb1b56b77b3cf197a6b00922d49033d) Background The...

Linux Kernel netfilter: ipset: Missing Range Check LPE

ssd-disclosure.com/linux-kernel...

13.08.2025 01:53 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Announcing #Pwn2Own Ireland for 2025! We return to the Emerald Isle with our new partner #Meta & a $1,000,000 WhatsApp bounty. Plus new USB vectors on phones & more. Read the details https://www.zerodayinitiative.com/blog/2025/7/30/pwn2own-returns-to-ireland-with-a-one-million-dollar-whatsapp-target

31.07.2025 19:10 πŸ‘ 6 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0
Preview
πŸ“² Debugging the Pixel 8 kernel via KGDB Instructions for getting kernel log, building custom kernel, and enabling KGDB on Pixel 8

Documented instructions for setting up KGDB on Pixel 8.

Including getting kernel log over UART via USB-Cereal, building/flashing custom kernel, breaking into KGDB via /proc/sysrq-trigger or by sending SysRq-G over serial, dealing with watchdogs, etc.

xairy.io/articles/pix...

28.07.2025 20:20 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 1