Posts
4983
Following
329
Followers
494
Linux kernel hacker and maintainer etc.

OpenPGP: 3AB05486C7752FE1

Jarkko Sakkinen

en #politiikka'a hirveästi seuraile, mutta onhan tämä täysin todellisuudesta iralllaan olevaa paskaa, kun pikemminkin tänne pitäisi houkutella ihmisiä töihin. enpä taida seurailla jatkossakaan, koska masennus iski heti. https://www.hs.fi/paakirjoitukset/art-2000009944529.html
0
1
2

Jarkko Sakkinen

Edited 2 years ago

If I had to guess it is #CSR configuration in a way or another (equivalent to #MSR’s in #x86). You actually learn #CPU architectures only through painful experiences like this, at least according to my past experience :-) Fingers crossed…

0
0
0

Jarkko Sakkinen

Edited 2 years ago
I got my Genesys 2 FPGA alive with an old version, and can now conclude that either OpenSBI or SM is causing the misbehavior. It is super stressing when you don't even know whether you can get something theoretically to work, and I was in that limbo for few weeks. What a relief although work is not done yet! Was not sure whether the flashed CVA6 had something wrong.
1
0
1

Jarkko Sakkinen

Edited 2 years ago
@billyjoebowers I actually tend to put these ShaperBox as the only mixing plugin when I first construct track in order not to be overwhelmed by choices. It has pretty much those features except AI :-) ShaperBox is more like AL plugin for me, i.e. Artificial Limitation, i.e. if I don't get something to the ballpark what it has then the sound must be wrong...
0
0
0

Jarkko Sakkinen

Edited 2 years ago
I'm trying to get #Keystone #SM ongoing with #CVA6 but stuck with SM's trap handler giving me illegal instruction. I wonder how interpret these values for #mideleg and #medeleg: https://github.com/keystone-enclave/keystone/issues/374#issuecomment-1777032123 #riscv #opensbi
1
0
0

Jarkko Sakkinen

I wish I had one of those #UDOO #BOLT boards so I could test #TPM and trusted keys better with #AMD #hardware. #linux #kernel
0
0
0

Jarkko Sakkinen

#pikvm is great :-)
0
0
1
@conor @gregkh Thanks for the clarification. I'm pretty early stages on learning how whole RISC-V ecosystem works :-)
0
0
1
@gregkh @conor Stable firmware extension to be exact. It works on a standard RISC-V CPU with MMU. It even works on my VisionFive 2 RISC-V board: https://github.com/keystone-enclave/keystone/issues/339. It is more like in the area of TrustZone than big cloud things like SGX or SEV-SNP, providing tools to implement secure boot and stuff like that. Thus, I see worth of doing this on side up because I really believe that it is a piece that RISC-V needs something like this to be successful. I'll move forward in upstreaming if it becomes official part of OpenSBI firmware.
1
0
0

Here at the Inkscape Project, we're excited about our upcoming milestone... we're turning 20 in November! 🎉

Watch for an opportunity to learn more about some of our contributors later in November.

For now, we're hoping to collect your best wishes and what you've achieved through using for sharing with our contributors and the community (open until Oct 31):

https://office.inkscape.org/nextcloud/index.php/apps/forms/s/cc5Jy4FwbkbkWqweGCkAQRTp

0
4
1

Free Software Foundation

Protect developer freedom. Abolish software patents. Learn why software patents are unjust by checking out the new design of our initiative. https://u.fsf.org/3f-

0
1
1
@gregkh @conor OK, fair enough. Project was basing on v5.19 so it was easiest to start with that. I've tried it recently with the recent kernels and it works just fine. Since it is not nearly as complicated as e.g. SGX is, I just maintain my tree up until Keystone is a stable extension.
1
0
0

Jarkko Sakkinen

debugging issue with #SBI. i’m a newbie on this so just found out that you can inject traces with sbi_printf(). not sure but i guess you also have to have CONFIG_HVC_RISCV_SBI=y set in #kernel? #linux #riscv #sbi

0
0
0
@neil for me a misbehaving raspberry is an asset for kernel qa :-) 3B+ with broken trustzone, can put your own workloads there
0
0
1
@conor ... and thus it is a non-issue for me if this cannot go to e.g. staging. The priority is to get the Keystone project use a kernel patch instead of OOT driver. While at it, it really does not hurt to ask from @gregkh if this can be picked to staging but not a thing thah I'm go to do today or tomorrow. Still because this works on standard hardware, it *does* make sense for Linux *at some point* (and open source firmware extension).

Seems much less difficult exercise than the one I had with Intel SGX in the past...
1
0
0
@conor Generally for any TEE using it as a module has zero real world applications.
1
0
0

Jarkko Sakkinen

Edited 2 years ago
@conor I would like to also point out that Keystone driver is better to be a subsystem in vmlinux because it offers broader scope of applications than e.g. SGX or SEV-SNP, i.e. kernel could run payloads there and thus other subsystems could find use for it. For instance, we could possibly have backend for trusted keys and stuff like that. But for now either my korg tree or staging at most are the most appropriate...
1
0
0
@conor yeah, I mean for staging afaik the main requirement is that there is someone keeping the driver up to date but otherwise it is not that conservative. so feels like a good location at this point.
1
0
0
@conor yeah, the honest truth is that I just place it somewhere :-) i think the appropriate place if anywhere in the mainline would drivers/staging for the moment.
1
0
0
Show older