Intel® ISA Extensions
Use hardware-based isolation and memory encryption to provide more code protection in your solutions.
Announcements
Intel Customer Support will be observing the Martin Luther King holiday on Monday, Jan. 17, and will return on Tues. Jan. 18.
For the latest information on Intel’s response to the Log4j/Log4Shell vulnerability, please see Intel-SA-00646

identifying whether running under SDE

Beulich__Jan
Beginner
298 Views

In the context of issues like "KeyLocker insns with ZF output look to only ever set it" requiring workarounds in the to-be-emulated binary it would be helpful is there was a reliable (i.e. maintained going forward) was to identify that the binary is running under SDE, ideally including the SDE version. Is there some means for this, perhaps a custom CPUID leaf (e.g. in the hypervisor range)?

0 Kudos
1 Reply
AdyT_Intel
Moderator
287 Views

We are trying to hide Pin/SDE presence from the running application, but there are still ways to detect it. For example, in Linux you can see SDE/Pin in /proc/self/maps or in the environment variables.

Providing a custom CPUID leaf information is a good idea, we will look into it.

Reply