On Thu, Oct 20, 2016 at 9:19 AM, Andrew Cooper
wrote:
> On 20/10/16 15:15, Wei Liu wrote:
>> On Thu, Oct 20, 2016 at 06:44:26AM -0700, Kyle Huey wrote:
>>> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
>>> execution debugger, would like to trap and emulate the CPUID ins
On 20/10/16 15:15, Wei Liu wrote:
> On Thu, Oct 20, 2016 at 06:44:26AM -0700, Kyle Huey wrote:
>> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
>> execution debugger, would like to trap and emulate the CPUID instruction.
>> This would allow us to a) mask away certain har
On Thu, Oct 20, 2016 at 06:44:26AM -0700, Kyle Huey wrote:
> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
> execution debugger, would like to trap and emulate the CPUID instruction.
> This would allow us to a) mask away certain hardware features that rr does
> not suppo
rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-
execution debugger, would like to trap and emulate the CPUID instruction.
This would allow us to a) mask away certain hardware features that rr does
not support (e.g. RDRAND) and b) enable trace portability across machines
by