Forgot your password?
typodupeerror

Comment: Re:ARM64 is a mess (Score 1) 160

by yupa (#41827627) Attached to: ARM Announces 64-Bit Cortex-A50 Architecture

> In the end, the few uses of conditional execution

That why x86 introduced cmov for doing conditional mov ?

> and the ability to move anything to the PC without using a branch or return style instruction was probably so limited, there was no point.

Well most of time gcc use pop instruction for returning of a function
push {r4, r5, r6, lr}
[...]
pop {r4, r5, r6, pc}

Comment: arm vs x86 (Score 1) 167

by yupa (#37133392) Attached to: ARM Is a Promising Platform But Needs To Learn From the PC

First arm only does the cpu, everything that it is around it (timer, interrupt controller, memory controller, uart ,...) can be anything.

And there is no easy way to discover them (like pci bus, acpi, ...). That what device tree want to do.
But that won't really solve the code size. Embedded company want to reduce cost and often design simple soc block (gpio, uart, ...), and this make the number of driver very big.
Also there no standard interface like ehci, ahci, ...
Even the same vendor can change the controller across the chip generation.

So I think it will be very difficult to unify things. What the advantage of arm for soc maker. There are free to do what they want.

Comment: android broken security update (Score 1) 242

by yupa (#35358580) Attached to: Google Pulls 21 Malware Apps From Android Market

The update is managed by gsm carrier/phone maker and lot's of phone don't get any update.

That's a broken model.

With apple the device is close, but all devices get new update.

All version of android will got some local exploit bugs (from kernel, app running as root, ...).
This means people can create valid application (without any specific perm), that can :
- run exploit and become root
- destroy your phone (erase bootloader)
- steal your information (spy your location, your call)
- make your phone a spam relay, ...

Comment: Re:What's the point? (Score 1) 222

by yupa (#34290834) Attached to: ARM Readies Cores For 64-Bit Computing
Yes but linux kernel need a direct ram mapping. And kernel mapping is 1G.
That's why highmem exist http://linux-mm.org/HighMemory .

However, many people insist on using more than 1GB of physical memory on such a 32 bit system. This makes it necessary for the Linux kernel to jump through some interesting hoops... Basically the system uses the following tactics: * Memory above the physical address of 896MB are temporarily mapped into kernel virtual memory whenever the kernel needs to access that memory. * Data which the kernel frequently needs to access is allocated in the lower 896MB of memory (ZONE_NORMAL) and can be immediately accessed by the kernel (see Temporary mapping). * Data which the kernel only needs to access occasionally, including page cache, process memory and page tables, are preferentially allocated from ZONE_HIGHMEM. * The system can have additional physical memory zones to deal with devices that can only perform DMA to a limited amount of physical memory, ZONE_DMA and ZONE_DMA32. * Allocations and pageout pressure on the various memory zones need to be balanced (see Memory Balancing).

Cortex A15 uses 40-bit physical addressing is really useless : it is x86 PAE

Comment: Re:Apple's security (Score 1) 315

by yupa (#33524682) Attached to: IOS 4.1 Jailbroken Already
It's mathematically impossible to make a device completely safe from someone who has complete physical control over it. You can encrypt this and that all you like, but it's literally only a matter of time before someone applies enough computing power and breaks said rights-management. Boot loaders can be heavily obfuscated against reverse engineering, but since the device has to actually boot and work at some point, there's a key to the proverbial lock in that haystack somewhere. I hope I'm making sense, coffee hasn't kicked in yet. You are wrong. First encryption is not used, it is digital signature (rsa). Second to be safe the first signature check should be done on the CPU ROM using internal RAM (no MITM). In this case if the signature algorithm is mathematically safe, you're device is broken if : - if somebody publish private key - if there bug in the ROM There can be others bugs/holes in upper layer of software (bootloader, kernel, ...), they can be patched by an update.

"Well, social relevance is a schtick, like mysteries, social relevance, science fiction..." -- Art Spiegelman

Working...