Posts
4430
Following
316
Followers
471
Linux kernel hacker and maintainer etc.

OpenPGP: 3AB05486C7752FE1
@arj OK, cool, just giving evidence that there's no bottleneck to add more support, only four relatively simple steps :-)
0
0
1

@arj ARM support can be added but not in the scope of my patch set. The priority is to implement it so that arch support can be gradually added.

Post this work ARM support could be added by:

  1. Implement alloc_execmem().
  2. Implement free_execmem().
  3. Edit appropriate arch Makefile.
  4. Set HAVE_ALLOC_EXECMEM in appropriate Kconfig.
1
0
0

Jarkko Sakkinen

1
1
1
@merri must be true if you say so but i have zero interest in politics.
0
0
0

Jarkko Sakkinen

Does anyone provide static and pre-compiled #busybox binaries for #riscv? For #x86 busybox.org provides this but other than that I have no idea.
1
0
0

Jarkko Sakkinen

I guess the software version of Moore's law is that software gets exponentially worse as hardware gets exponentially better. For instance, word processors do mostly the same tasks as in 1993 but do not run with 386 and 4 megabytes of RAM :-)
1
3
1
@viznut @neauoire it is also style adopted by various plugin systems like audio plugins (VST, AU etc.) where you need immediate mode GUI that is driven by the plugin callbacks (most of operating system UI framework are incompatible how plugins behave).
0
0
0

Jarkko Sakkinen

Not my expertise area at all but I was just thinking how would you measure relative round-trip time of syscalls on let's say between x86 and RISC-V. i.e. when you have your measurements how would you normalize the results for meaningful comparison.
0
0
0
I tried to switch back to mutt couple of times but aerc some tricks under its sleeve that have kept me using it.
0
0
0

Jarkko Sakkinen

After about two'ish years of use I've reached the point with #aerc #email client that I do not pro-actively hate it :-)

The withdrawal symptons of #mutt are over...
1
0
0

Jarkko Sakkinen

Edited 1 year ago

@jon_giraffe or if you want to go crazy:

$ alias rustup-init="curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s --"
$ rustup-init --help
rustup-init 1.27.0 (b02c9c2b4 2024-03-08)

The installer for rustup

Usage: rustup-init[EXE] [OPTIONS]

Options:
  -v, --verbose
          Enable verbose output
  -q, --quiet
          Disable progress output
  -y
          Disable confirmation prompt.
      --default-host <default-host>
          Choose a default host triple
      --default-toolchain <default-toolchain>
          Choose a default toolchain to install. Use 'none' to not install any toolchains at all
      --profile <profile>
          [default: default] [possible values: minimal, default, complete]
  -c, --component <components>...
          Component name to also install
  -t, --target <targets>...
          Target name to also install
      --no-update-default-toolchain
          Don't update any existing default toolchain after install
      --no-modify-path
          Don't configure the PATH environment variable
  -h, --help
          Print help
  -V, --version
          Print version

Execution of a remote payload but should be fairly secure as it is verified with rust-lang.org CA (thanks to TLS 1.2).

0
0
0

@jon_giraffe for more options:

curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | bash -s -- --help
1
0
1

Jarkko Sakkinen

#Rust installation instructions go like:

curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh

But what you actually want to do most of the time, is probably:

curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | bash -s -- --no-modify-path

#rustlang

1
0
2

@orsinium So I did look into it a bit and if I got the right understanding it has its own backing storage thing.

So my thought are that:

  • A more stream-lined interface for OpenPGP keys would be more than welcome.
  • That said it should be able to fully connect to the existing GnuPG infrastructure because of compatibility sake. It would be tedious to switch whole “ecosystem” just for a better command-line tool.
  • As long as the tool takes care of the shenanigans it does not matter how complicated the storage format is.

I.e. if I have a fresh GNOME desktop it already has gpg-agent ongoing with zero configuration (thanks to systemd). So by all practical means the backend side is sort of almost defacto standard.

0
0
0
@orsinium Right one other thing is that any tool must by practical means be compatible with gpg-agent. I'm voting for better interface but because of incompatibility issues it actually would be better off if it could persist to the gnupg's backing storage. This for compatibility with session managers, gpg-agent and all sorts of GUI applications dealing with OpenPGP keys.
1
0
0

Jarkko Sakkinen

Edited 1 year ago
It's my old #kprobes fix but scaled down to only riscv: https://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git/commit/?h=kprobes-v2&id=751d26b0addddf0470f6a9383e7da4b3d23b8b4e

Note that I've not even compile-tested this yet, i.e. due to changes still.

Yes, something like kprobes_alloc perhaps could make sense but I see the scope of patch sane: it does a necessary evolutionary step towards more logical separation.
1
0
1

Jarkko Sakkinen

making my first arch/riscv patch ever :-) nothing flashy but you have to start from something in everything… #linux #kernel #riscv

1
0
4
Show older