Deutsch   English   Français   Italiano  
<ve2qpn$24hio$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Terje Mathisen <terje.mathisen@tmsw.no>
Newsgroups: comp.arch
Subject: Re: Interrupts in OoO
Date: Tue, 8 Oct 2024 10:33:59 +0200
Organization: A noiseless patient Spider
Lines: 57
Message-ID: <ve2qpn$24hio$1@dont-email.me>
References: <2024Oct3.160055@mips.complang.tuwien.ac.at>
 <vdmrk6$3rksr$1@dont-email.me> <LyELO.69485$2nv5.62232@fx39.iad>
 <TdWLO.282116$FzW1.158190@fx14.iad>
 <963a276fd8d43e4212477cefae7f6e46@www.novabbs.org>
 <8IcMO.249144$v8v2.147178@fx18.iad>
 <2024Oct5.195712@mips.complang.tuwien.ac.at> <ve153q$1ptp0$1@dont-email.me>
 <EbXMO.127330$WtV9.94103@fx10.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: quoted-printable
Injection-Date: Tue, 08 Oct 2024 10:33:59 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="1480f50a5c50f604dcb651e7be375dab";
	logging-data="2246232"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1950gmyUgmt44aNp1MvpB3zn9hmpqjGFxcU2BMOg9wd4Q=="
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Firefox/91.0 SeaMonkey/2.53.19
Cancel-Lock: sha1:o/f9KzbMbqZAH1Bp2leqZPzbQyM=
In-Reply-To: <EbXMO.127330$WtV9.94103@fx10.iad>
Bytes: 3372

Scott Lurndal wrote:
> Brett <ggtgp@yahoo.com> writes:
>> Anton Ertl <anton@mips.complang.tuwien.ac.at> wrote:
>=20
>>
>> Your hardware guys are not interested because they know what you want =
is
>> not useful. ICE probes could give you more info, but that tech is high=
ly
>> secret and dangerous for users to get
>=20
> There are close to a dozen 3rd-party devices that will attach to
> the JTAG port and provide extremely low-level hardware state, including=

> individual flops and rams by reading the scan chains.  For AArch64,
> all the interesting state is directly documented in the ARMv8 ARM
> in the context of a JTAG-like implementation.
>=20
> Hardly "highly secret".
>=20
> Scan chains are clearly proprietary design data.
>=20
>=20
>> , and is fused off for your
>> protection.
>=20
> An option at manufacturing time, or later when the chip is integrated
> into a platform, the platform vendor has the choice of fusing out the
> JTAG/ICE port, which would make sense for a device that needs to be
> highly secure (a firewall or crypto appliance, for example).
>=20
>> You don=E2=80=99t need such data, and would not understand such info i=
f
>> you had it.
>=20
> Perhaps you might not undertstand it.  Likely most others here have dir=
ect
> experience with scan chains, IDEs (or more likely VCS) et cetera.
>=20
I had a (quite expensive) ICE for my 386 computer, by the time the=20
Pentium rolled out, large parts of that functionality had turned into=20
the EMON counters, and so available to everyone who had signed an Intel N=
DA.

Byte July 1994 is where I documented my reverse engineering of those=20
counters, it is (by far!) the most cited paper/article I have ever=20
written. :-)

This showed Intel the error of their ways, and all subsequent cpus have=20
documented those counters.

Terje

--=20
- <Terje.Mathisen at tmsw.no>
"almost all programming can be viewed as an exercise in caching"