[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v3 6/7] tcg: implement JIT for iOS and Apple Silicon
From: |
Stefan Hajnoczi |
Subject: |
Re: [PATCH v3 6/7] tcg: implement JIT for iOS and Apple Silicon |
Date: |
Thu, 29 Oct 2020 08:13:04 +0000 |
On Wed, Oct 28, 2020 at 06:04:56PM -0700, Joelle van Dyne wrote:
> Will fix the typo in the commit message.
>
> Re: "reverse engineered functions", Apple does not provide any
> documentation on their extensions to ARM architecture. APRR is one
> such proprietary feature that is controlled by MRS/MSR writes to an
> undocumented system register. We reverse engineered the functionality
> by tracing how libsystem_pthread.dylib works and replicating the
> MRS/MSR calls.
>
> More details: https://siguza.github.io/APRR/
>
> Legally, I don't think this is any different from reverse engineering
> some hardware interface to write a Linux driver but IANAL.
Thanks, I have taken the discussion off-list where we can get advice
regarding this case.
Stefan
signature.asc
Description: PGP signature
[PATCH v3 7/7] block: check availablity for preadv/pwritev on mac, Joelle van Dyne, 2020/10/27
Re: [PATCH v3 0/7] iOS and Apple Silicon host support, Stefan Hajnoczi, 2020/10/28