@danluu Well, it might be simpler to "knock" with a sequence of "add" operands. PMUs are the proof you can track this without overhead.
-
-
-
@shipilev Oh, good point. I mentioned using debug logic, but of course the publicly exposed perf counters give you lots of stuff already! - 3 more replies
New conversation -
-
-
@danluu There's a lot of room for backdoors on x86 wrt "ignored" inst prefixes. Probably microcodable, but can't coerce a JIT to generate. -
@_rsc Yeah, I thought about mentioning that (should have, probably), but didn't since it would be hard to microcode patch in without - 1 more reply
New conversation -
-
-
@SuperWinona I didn't! Thanks for the pointer! I'll read it and (probably) add a link to it in the post after I've read it.
End of conversation
New conversation -
-
@danluu I am aware of at least one backdoor to an older CPU -
@TheKanter@danluu What's that one older CPU backdoor you're aware of? Can you tell us? - 17 more replies
New conversation -
-
-
@danluu mine look like this (see https://github.com/Groundworkstech/submicron …)pic.twitter.com/apnozXNNCK
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@danluu SMM trigger on IO r/w is used to emulate legacy KBD i/f for USB. Could easily trigger SMM off undocumented, unused io/mem addrsThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.