ChanServ changed the topic of #asahi-alt to: Asahi Linux: porting Linux to Apple Silicon macs | User-contributed/unofficial distribution ports | Logs: https://alx.sh/l/asahi-alt
brolin has joined #asahi-alt
brolin has quit [Ping timeout: 480 seconds]
Mary has quit [Quit: The Lounge - https://thelounge.chat]
Mary has joined #asahi-alt
tobhe has quit [Remote host closed the connection]
zzywysm has quit [Ping timeout: 480 seconds]
ChaosPrincess has quit [Quit: WeeChat 3.8]
ChaosPrincess has joined #asahi-alt
nsklaus has joined #asahi-alt
hightower2 has quit [Ping timeout: 480 seconds]
hightower2 has joined #asahi-alt
hightower2 has quit [Ping timeout: 480 seconds]
hightower2 has joined #asahi-alt
brolin has joined #asahi-alt
hightower2 has quit [Read error: Connection reset by peer]
possiblemeatball has joined #asahi-alt
possiblemeatball has quit [Quit: Quit]
possiblemeatball has joined #asahi-alt
Deroy2112 has joined #asahi-alt
Deroy2112 has quit [Remote host closed the connection]
possiblemeatball has quit [Quit: Quit]
brolin has quit [Ping timeout: 480 seconds]
brolin has joined #asahi-alt
brolin has quit [Ping timeout: 480 seconds]
whyirc has joined #asahi-alt
<whyirc> Hello everyone
<whyirc> I'm writing this from my new m1 MacBook pro
<j`ey> you said it was going to take months!
<whyirc> And I can't decide on a distro to use(
<whyirc> Yup
<whyirc> I decided to just travel to a large city
<whyirc> To not wait so much time
<j`ey> nice!
<whyirc> The final question - does gentoo on Asahi support security features of arm/apple silicon (memory tagging for example)
<ChaosPrincess> Not the memory mapping ones
<whyirc> AFAIK linux kernel has support for MTE and shadow stack
<j`ey> whyirc: that's a generic arm64 feature, so yes it should work
<whyirc> I know that m1 has a MTE, but can't find a reliable source about shadow stack
<whyirc> Is there anybody who tried to compile kernel with MTE/shadow stack before?
<j`ey> the shadow stack support in the kernel is software based
<whyirc> Sad
<j`ey> the asahi linux kernel builds with mte
<whyirc> I know very little about arm hardware security features, can somebody share some good resource to learn more about it?
<j`ey> but not with CONFIG_SHADOW_CALL_STACK
whyirc has quit [Remote host closed the connection]
<mps> isn't shadow stack added to 6.3 kernel for arm64?
<mps> oh, it was earlier
brolin has joined #asahi-alt
brolin has quit [Ping timeout: 480 seconds]
brolin has joined #asahi-alt
possiblemeatball has joined #asahi-alt
SalimTer- has joined #asahi-alt
salimterryli has quit [Ping timeout: 480 seconds]
<chadmed> i have it enabled in my config i think
<mps> I didn't enabled it thinking it could have performance impact
<chadmed> if it does its negligible
<mps> I wonder why modern CPUs doesn't have separate hardware data and return stacks
<ChaosPrincess> backwards compat mostly
<ChaosPrincess> and on arm at least, you can totally do that if you are willing to break backwards compat and burn an extra register for a stack pointer
<ChaosPrincess> sorta can do that on x86, but the calling sequence becomes stupid
<mps> for long I don't work in 'bare metal' field so I never tried this, though was tempted. Maybe I will when I retire (and *if*) on riscv
<ChaosPrincess> and i guess itanium sorta did that, but not quite
<sven> iirc clang or gcc has (had?) a shadow stack feature as well
<sven> ah, maybe I should read more that the last backlog lines :D
<mps> clang have it iirc, not sure for gcc
Leo3418 has quit [synthon.oftc.net reflection.oftc.net]
Leo3418 has joined #asahi-alt
nsklaus has quit [Ping timeout: 480 seconds]