alyssa changed the topic of #panfrost to: Panfrost - FLOSS Mali Midgard & Bifrost - Logs https://oftc.irclog.whitequark.org/panfrost - <macc24> i have been here before it was popular
atler is now known as Guest4806
atler has joined #panfrost
Guest4806 has quit [Ping timeout: 480 seconds]
mjh_ has joined #panfrost
macc24 has quit [Quit: WeeChat 3.0.1]
mjh_ has quit []
_whitelogger has joined #panfrost
_whitelogger has joined #panfrost
whitequark has joined #panfrost
_whitelogger has joined #panfrost
_whitelogger has joined #panfrost
_whitelogger has joined #panfrost
whitequark has left #panfrost [#panfrost]
ente has joined #panfrost
vstehle1 has joined #panfrost
alpernebbi has joined #panfrost
ente has left #panfrost [#panfrost]
Danct12 has quit [Remote host closed the connection]
Danct12 has joined #panfrost
alpernebbi has quit [Ping timeout: 480 seconds]
amonakov has joined #panfrost
macc24 has joined #panfrost
<macc24> now that i'm out of school.... i can procrastinate testing !10961
leah has joined #panfrost
<leah> is the OFTC chan official now?
<leah> because of the freenode stuff. just wondering
<macc24> leah: yea
<leah> ok
<leah> damn
<leah> now i'm logged on to 3 irc servers
<leah> debian is on oftc. i'll check them out
leah is now known as unoccupied
unoccupied is now known as leah
leah is now known as _4of7
_4of7 is now known as unoccupied
unoccupied is now known as leah
leah is now known as unoccupied
unoccupied is now known as _4of7
_4of7 is now known as leah
<leah> now can i pm an admin about something
<leah> oh wait, sorry wrong chan. this was meant for #oftc
_whitelogger has joined #panfrost
jernej_ has joined #panfrost
<cphealy> Do any of the ARM Mali GPUs support EXT_protected_textures or EGL_EXT_protected_content for secure video use cases?
jernej has quit [Ping timeout: 480 seconds]
<alyssa> cphealy: lolsecure
<alyssa> Bifrost lets the CPU lock down its MU
<alyssa> MMU
<alyssa> but the functionality is useless on its own, all of the interesting pieces would have to happen in trustzone
<cphealy> trustzone is specific too the CPU though, correct?
<cphealy> There would need to be a way to prevent the 3D GPU from writing a buffer with secure texture to a non-secure memory location.
<alyssa> yeah the GPU's MMU can be configured for that
<alyssa> but I don't condone that
<alyssa> ;)
jernej_ is now known as jernej
<alyssa> For, er, educational purposes the string to grep kbase for is 'protected_mode'
<cphealy> ha, thank you.
<cphealy> Yea, I want to avoid the philosophical side of digital rights management and stick to the technical side... ;-)
<alyssa> "rights"
<anarsoul> what prevents you from reading render target back later?
<cphealy> In the case of HW DRM on embedded systems, typically there is an OP-TEE (open trusted execution environment) which lives in the secure domain (trustzone) that prevents IP cores from being able to move data from secure memory to regular memory locations.
<cphealy> For example: if a display controller supported a writeback_connector, there would be code running in the OP-TEE that makes sure the display controller is not configured to use the writeback connector when secure content is being played.
<anarsoul> cphealy: you still may need to read render target on the GPU, i.e. for compositing
<cphealy> anarsoul: ack This is definitely where it gets interesting.
jolan has joined #panfrost
jernej has quit [Quit: Free ZNC ~ Powered by LunarBNC: https://LunarBNC.net]
jernej has joined #panfrost
karolherbst has quit [Remote host closed the connection]
karolherbst has joined #panfrost
xdarklight has joined #panfrost
<alyssa> I've spent much of today fixing register preloading on the current RA (cherrypicking some of what worked in March's RA experiment)
<alyssa> which means message preloading should be able to land Soon(TM)
<alyssa> which I'm excited about, since it's a fairly important optimization on v7
macc24 has quit [Quit: WeeChat 3.0.1]
jernej_ has joined #panfrost
jernej has quit [Ping timeout: 480 seconds]
<cyrozap> alyssa: Some DRM tech can also be used to enhance user privacy/security. For example, HDCP can be used to foil TEMPEST-style attacks on the HDMI link, and preventing reads from "secure" memory could be used for things like isolating applications from one another (e.g., so a malicious application with elevated privileges can't dump the screen and exfiltrate info). Not defending the creation of
<cyrozap> technologies designed to prevent users from accessing parts of their own hardware, just wanted to show that there are some good, freedom-respecting uses for it (when the user is able to control it).
<Dylanger[m]> > For example, HDCP can be used to foil TEMPEST-style
<Dylanger[m]> Within handhelds, TEMPEST is super hard to mitigate
<alyssa> fizzlepop berrytwist?