On Wed, Oct 28, 2020 at 06:04:56PM -0700, Joelle van Dyne wrote: > Will fix the typo in the commit message. > > Re: "reverse engineered functions", Apple does not provide any > documentation on their extensions to ARM architecture. APRR is one > such proprietary feature that is controlled by MRS/MSR writes to an > undocumented system register. We reverse engineered the functionality > by tracing how libsystem_pthread.dylib works and replicating the > MRS/MSR calls. > > More details: https://siguza.github.io/APRR/ > > Legally, I don't think this is any different from reverse engineering > some hardware interface to write a Linux driver but IANAL.
Thanks, I have taken the discussion off-list where we can get advice regarding this case. Stefan
signature.asc
Description: PGP signature