No more big 32-bit cores for RISC OS from 2022
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Clive Semmens (2335) 3276 posts |
If I was still using RiscPCs (which I’m not) it would be because IKHG doesn’t work on the Pi, and it was bloody useful. I don’t half miss the ability to make my own keyboard drivers in any powerful, flexible way – or indeed to continue to use the ones I made back in the day. |
Steve Pampling (1551) 8173 posts |
So, in theory, if the messaging method to communicate between them existed then a network stack operating in Aarch64 mode on one core and the rest of the OS on another core would work, but the user wouldn’t know about it. Or take another featured item common on other platforms, write or port the code to an Aarch64 compatible binary run it in the 64bit core(s). |
Rick Murray (539) 13855 posts |
Do you still have IKHG, your description, and a handler module that it created? I might understand what you’re saying better by looking at what you were doing back then. Though, note, my experience with Indian scripts is practically zero. |
Rick Murray (539) 13855 posts |
Oh, and didn’t InternationalKeyboard get in the way? That’s the one that hijacks all sorts of alt key combos isn’t it? Or did your driver simply replace it? |
Clive Semmens (2335) 3276 posts |
IKHG was International Keyboard Handler Generator – you could make as many different InternationalKeyboards as you liked, and switch between them to your heart’s content. |
Clive Semmens (2335) 3276 posts |
Steve: I really don’t know much about the details – just the bare fact that mode changes are private matters to cores. Rick: The main thing from my point of view was the ability to define what the keyboard generated for any combination of modifier keys (shift, alt, control) with any “character” key. |
Steve Pampling (1551) 8173 posts |
In theory1 changing the content of Internat.Intkey.layout.uk changes the effect of the keypress for the keys you edited, changing mappings in internat.intkey.inc.FNKEY (where FNKEY is specified when you run keygen / keyconvert -like the mappings when FNKey = FNLazarus2) The problems with Alt keys start deeper and I think part of the irritation comes up from the kernel and the way that Alt-“L” is treated differs greatly from Alt-“left arrow” So for some elements you could create a new keymap by running keygen with the right parameters and offering it a layout.clive but Alt-keys changes might mean scraping some of the BBC MOS cruft out of the lower levels. 1 In theory I might know what I’m talking about 2 FNLazarus is there in the source directory “inc” and remaps specific function keys like this snippet: |
Charlotte Benton (8631) 168 posts |
At least you wouldn’t need a separate heating element. |
Steve Fryatt (216) 2106 posts |
It doesn’t matter, if they lost interest mid-way through the introductory briefing. They’ve found something else to do, which doesn’t come with such boring rules or such a steep learning curve on so many fronts. The question of what happens next will never arise. If what they’re doing has the potential to be even vaguely useful1, you encourage it and then deal with the other questions at a later stage. Or they deal with them for you, because you’ve then split the barriers to entry down into stages which are each climbable on their own. 1 And realistically, even showing an interest in RISC OS is vaguely useful, given where we’re at for folk to do things. |
Gulli (1646) 42 posts |
Sorry, didn’t quite understand that correctly the first time around. I have no ideas to share now and wouldn’t even pretend to have any right to tell people what to look at. The point of my post was only to tell people what things looked like to me coming from the “outside” 8 years ago. I couldn’t see where people wanted to go and to me it felt like there was a lot of resistance to even discuss where to head, so I decided it wasn’t worth it. As a developer big part of my work has been refactoring legacy code to more modern toolchains and to better follow patterns and using helper tools like frameworks correctly. I’m no master developer but I could have been useful because I don’t mind the grinding work as long as I can see a point in it but I just never saw it in RISC OS. Would I join in RISC OS development now? No, that ship sailed those 8 years ago. That doesn’t mean I don’t want to tell people of my experience when I see the very thing that sent me packing repeated yet again. |
Paolo Fabio Zaino (28) 1882 posts |
@ Steve
Great idea! Can we put it to vote please? I am for B just because the world is missing that while every other major player is going for A. But B will have no money market, because put it in a production environment will pose issues, so B is potentially an “investors-less” option, unless an HW vendor seriously interested in making a MicroBit like device only for learning. IMHO C would be ideal world, but to achieve that a lot of thinking should be put into place to always make the right choices. |
Rick Murray (539) 13855 posts |
With regards to C, in the real world one shouldn’t sacrifice freedom for security (said better by Benjamin Franklin). I guess something similar ought to apply to operating systems – you can have freedom or you can have security, pick one. Personally, myself, I’d go for B. If I wanted security, I’d be using Paranoid Linux. Those sorts of things already exist. If I want something to play with, I don’t want to have to fight the OS every step of the way. That said, fixing the mess that is the RMA would not be a bad thing. ;-) |
Paolo Fabio Zaino (28) 1882 posts |
@ Theo
Same for me, quite a few actually: IoT, AI/ML, Modern Desktop. Then for the crazy ideas (which if people want to contest, please be my guest, but also be ready to be ignored!) Port to ThunderX3, why? because I want to and, even if it may be too much work and take me too much time and have to stop in the middle, for me it would still be worth the learning process. |
Rick Murray (539) 13855 posts |
Just out of interest – how many people here have read Andrew Tanenbaum’s book? |
Paolo Fabio Zaino (28) 1882 posts |
@ Rick
Which one? I have read multiple of his books back in the days, together with others (similar) from Stallings and others from Patterson (on the same line). On top of that I worked on different OS related projects from adding multi-task features to MS-DOS and FreeDOS, to embedded Linux Distro creation and now I work on Linux Distribution for high network performances and Cyber Security. it has been a long career, but I loved it so far :D |
Steve Pampling (1551) 8173 posts |
and when you’ve finished sliding down the road to option A… Would you care to join me by modifying it to C. 1 Plenty of ARM routines for encryption with very little code to them |
Paolo Fabio Zaino (28) 1882 posts |
@ Steve P. Bq. Would you care to join me by modifying it to C. I am happy to help with whatever I can, my available time is the weekend, but I am sure I can work some task out in that amount of time. I know it’s almost nothing, but that’s all I have :( |
Charlotte Benton (8631) 168 posts |
I think the A (fun, hackable, and “pure”) and B (modern, secure, and “pragmatic”) sides are fundamentally incompatible 1, and that a compromise will inevitably be the worst of both worlds. The only realistic way forwards is the F-word, in the hope that the two “sides” would mutually cooperate once their relationship was less adversarial. (Once again, a fantasy supply of labour is being assumed.) 1 “That’s a clever trick you’re using there… We’ll make sure to block it in the next security update.” |
David Feugey (2125) 2709 posts |
Yep, we have a roadmap. It’s more evolution than revolution, but common things are always like that.
Yep
And all efforts to rewrite RISC OS components in C are little stones on the 64bit road.
Correct. But as the GCCSDK team could not like some needed changes, perhaps it would be possible to base the new toolchain on a fork ‘as closed as possible to the original’ of GCCSDK? The same way we have our own version of Perl.
I still you use for fun and serious things. |
David Feugey (2125) 2709 posts |
Interesting. As RISC OS is not a server OS, easy things can be done for correct security. 1/ Protection from external attacks
2/ Protection from internal attacks
To protect an OS is not so complex :) |
Rick Murray (539) 13855 posts |
Fixing some brokenness does not equate to “security”, it just means things are a little less broken. ;-)
The problem with signed apps is that it requires some sort of oversight to provide the signing and raises the bar for all third party apps (that would need to be signed to satisfy the OS).
Which could put people off rolling their own?
Smiley face noted, however I don’t imagine it would be too difficult to sneak in a key logger that sends compressed recordings of keypresses to some sort of server. The reason it isn’t done is because nobody around here is that much of an asshole, not because it can’t be done.
I see we have different ideas regarding what the word “security” means. The RMA for example, is a place where important system level code and data reside, all intermingled with extension code and data, all freely writeable from any BASIC program.
That’s because the likes of Apple and Google don’t want people to have full control over their devices (granted, in 99.9% of cases that would probably end in disaster). |
Steve Pampling (1551) 8173 posts |
Who said compromise? I’ll answer that for you – you did. I suggested a twin stream where the “open” version didn’t run the encrypt/decrypt and therefore couldn’t read the disc area of the secure version, but the secure version would be able to read both. In some respects it’s
Totally lost me on that one, unless you mean Fork as in “Fork Off”
In the secure side yes. On the open boot, why? |
Steve Pampling (1551) 8173 posts |
Seemed like a useful point for a thought exercise. |
Steve Pampling (1551) 8173 posts |
There is no single item to work on to fix everything, working with option C the developer can do initial test work on the open OS boot and move over to the secure later. How to make sure dodgy applications don’t appear on the secure side?
And the problem with current applications is that they usually need a filetype allocation which someone has to administer. This is just an extension of that. If (big IF) the environment has a clear path for development, of the OS and applications, then developers are more likely to feel they can do something.
So that drops into the workstream after the initial dual boot secure/nosecure work.
There is no must on the order. Keep arguing, I’m not a tender soul so all the objections do is make me think of possible ways that the objection can be countered. If I can’t think of one offhand, I’m pretty sure someone else will. |
Steve Pampling (1551) 8173 posts |
Not that people should assume that the simple encryption is the final item, unless it happens to be using a fairly solid encryption and even then there’s future development to deal with future hackers. |
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19