New ask Hacker News story: Ask HN: Are there any undocumented ISA extensions used in Linux systems?
Ask HN: Are there any undocumented ISA extensions used in Linux systems?
2 by ladyanita22 | 1 comments on Hacker News.
If someone were to build a Linux system with proprietary, private (undocumented) ISA extensions, how would they do it given Linux is open source? Are there any examples of this being done? Would it be possible at all? I got inspiration from this (https://ift.tt/98bANr1) and I wondered if someone has done it before on a Linux-based system. I understand a userspace library could be created to access those instructions from userspace, but how would then they be implemented in the kernel? Through a proprietary kernel module built using a custom compiler? Or is that not needed at all and the library could just run on the processor taking advantage of the proprietary extensions?
2 by ladyanita22 | 1 comments on Hacker News.
If someone were to build a Linux system with proprietary, private (undocumented) ISA extensions, how would they do it given Linux is open source? Are there any examples of this being done? Would it be possible at all? I got inspiration from this (https://ift.tt/98bANr1) and I wondered if someone has done it before on a Linux-based system. I understand a userspace library could be created to access those instructions from userspace, but how would then they be implemented in the kernel? Through a proprietary kernel module built using a custom compiler? Or is that not needed at all and the library could just run on the processor taking advantage of the proprietary extensions?
Comments
Post a Comment