TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

What Every Hacker Should Know About TLB Invalidation [pdf]

94 点作者 abhi9u5 个月前

3 条评论

egberts15 个月前
Within QEMU amd64&#x2F;x86 emulation (not KVM) mode, the IMUL opcode still fails its IMUL opcode emulation after an XOR opcode (also within the same TLB cached page) modified its neighbor IMUL operand(s).<p>TLB got double-invalidated yet some say never invalidated. The crux is a glitch within a singlr entire TLB invalidation operation thereby negating XOR opcode&#x27;s ability to self-modify the neighboring IMUL operand. (Double ROT13, anyone?). I assert double-invalidation because within the same TLB invalidation stroke, XOR operation got performed ... twice, as opposed to retrieving and restoring original IMUL operand value after such invalidation thereby negating XOR computed result EITHER WAY.<p>A failure of self-modifying code within QEMU amd64&#x2F;x86 emulation mode could be a useful test to determine if one is under QEMU emulation mode, of course if the page allows read-write-execute as often found in JavaScript, Java, Python and Dalvik (Android) bytecode memory regions.<p>Fabrice Bellard, author of QEMU, acknowledged the basic of above but failed amd64&#x2F;x86 IMUL&#x2F;XOR self-modify premise in emulation (not KVM) mode of QEMU.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;unicorn-engine&#x2F;unicorn&#x2F;issues&#x2F;364">https:&#x2F;&#x2F;github.com&#x2F;unicorn-engine&#x2F;unicorn&#x2F;issues&#x2F;364</a>
评论 #42727246 未加载
nonrandomstring5 个月前
Elaborate memory management (paging) systems need caching of lookups for high performance. But they can go wrong. The post was made in a security&#x2F;safety context but did I miss something, because it didn&#x27;t seems to make clear what the dangers are?
评论 #42725136 未加载
评论 #42725804 未加载
评论 #42735385 未加载
评论 #42724584 未加载
评论 #42724666 未加载
评论 #42725014 未加载
loeg5 个月前
I&#x27;d be interested to see this written for reading (as opposed to presenting). Inferring the speaker&#x27;s meaning from raw slides is a little challenging. I&#x27;ve had to interact with the minutiae of the x86 TLB in a past life, but happily have forgotten most of that.