No subject
Oliver Pinter
oliver.pntr at gmail.com
Sat Jun 1 23:46:16 UTC 2013
Hi All!
As subpart of my thesis, I implemented Intel SMAP[1] support for FreeBSD.
The current stable version of patch (attached) have compile time
option to enable SMAP.*
A feature complete dynamic version is expected by the end of the
month, which patched the kernel on boot time, when the feautre
presented in CPU.
[1] http://lwn.net/Articles/517475/
patches: https://github.com/opntr/freebsd-patches-2013-tavasz
smap-test: https://github.com/opntr/freebsd-smap-tester
smap_disabled.gif:
Running smap-test without SMAP support: illegal user-space memory
address read/write from kernel-space.
smap_{read,write}.gif:
Running smap-test with SMAP: the kernel must paniced, due an illegal
read from user-space memory address.
* when you applied this patch and enabled the SMAP in kernel and your
CPU does not have SMAP support, the kernel _must_ paniced.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-added-SMAP-support-for-FreeBSD-against-r250423.patch
Type: text/x-patch
Size: 19079 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-arch/attachments/20130602/ed6178ea/attachment.bin>
More information about the freebsd-arch
mailing list