No subject

Oliver Pinter oliver.pntr at gmail.com
Sat Jun 1 23:46:16 UTC 2013


Hi All!

As subpart of my thesis, I implemented Intel SMAP[1] support for FreeBSD.
The current stable version of patch (attached) have compile time
option to enable SMAP.*

A feature complete dynamic version is expected by the end of the
month, which patched the kernel on boot time, when the feautre
presented in CPU.

[1] http://lwn.net/Articles/517475/

patches: https://github.com/opntr/freebsd-patches-2013-tavasz
smap-test: https://github.com/opntr/freebsd-smap-tester

smap_disabled.gif:
Running smap-test without SMAP support: illegal user-space memory
address read/write from kernel-space.

smap_{read,write}.gif:
Running smap-test with SMAP: the kernel must paniced, due an illegal
read from user-space memory address.

* when you applied this patch and enabled the SMAP in kernel and your
CPU does not have SMAP support, the kernel _must_ paniced.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-added-SMAP-support-for-FreeBSD-against-r250423.patch
Type: text/x-patch
Size: 19079 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-arch/attachments/20130602/ed6178ea/attachment.bin>


More information about the freebsd-arch mailing list