flat assembler
Message board for the users of flat assembler.
Index
> Main > Super-secret debug capabilities of AMD processors ! |
Author |
|
killasmurf86 16 Nov 2010, 18:11
You probably, have read already this by now, but here I go:
http://www.woodmann.com/collaborative/knowledge/index.php/Super-secret_debug_capabilities_of_AMD_processors_! Sounds interesting Last edited by killasmurf86 on 16 Nov 2010, 18:23; edited 2 times in total |
|||
16 Nov 2010, 18:11 |
|
mindcooler 16 Nov 2010, 18:33
Useful for what?
|
|||
16 Nov 2010, 18:33 |
|
vid 16 Nov 2010, 23:52
Moved to main, fixed link, and removed link-related posts. Not sure what mindcooler's post was about, so I left it here
|
|||
16 Nov 2010, 23:52 |
|
Czerno 20 Nov 2010, 10:38
Hello! I'm delighted my little findings aroused some interest...
As this is not strictly speaking FASM related, I wouldn't have posted here; since others have though, let me throw a call for action to this fine community... Help needed ! If you own a CPU from AMD and know how to use a kernel-mode debugger - even Debug will do if you know what you're doing, preferably the FreeDOS version - please check and report availability of the "secret" MSRs and expanded debugging functions. I want results correlated with AMD processor generation (all I have is an old K7). Newer processors may not need a "password", do check that too. Verify : - Instruction execution breakpoints with address mask - I/O port access BPs with address mask and data mask, and reversing the condition (break on NON-match). - Memory data BPs on write, resp. read/write, with address and or data masking : this is problematic at the moment. Does it actually work, does it depend on processor generation/revision ? Everything has to be combined with the settings of the Control register (MSR C001_1024). Check my writing at Woodman's collaborative library (URL was provided by killasmurf86 at the beginning of this thread), but heed the warning that it is not up to date and has errors in it... We also want this tested in 64 bit mode ( my proc doesn't have AMD64). Revelation time is over, ;now is time for (tedious) combinatorial testing If Tomasz doesn't care, this thread could hold reports of reults. In addition/alternatively, you may email me with your findings. What is already known to be working is nice, ripping that apart altogether will be fun, and open fantastic opportunities. Cheers, -- Czernobyl |
|||
20 Nov 2010, 10:38 |
|
< Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2024, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.