Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 29 May 2014 00:13:03 +0200
From:      Oliver Pinter <oliver.pntr@gmail.com>
To:        soc-status@freebsd.org
Subject:   [intel smap, kpatch] weekly report #1
Message-ID:  <CAPjTQNH1eD4UBZSd2MmLFc71aAF7V5HB4F0K8fKWNNeY_0SgQg@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
Hi all!

I'm working on Intel SMAP technology in first half of GSoC.
At first week I investigated in SMAP technology and relevant FreeBSD
codes, whats changed since my Bsc thesis.

I implemented a vulnerable kernel module and PoC to test allowed and
not allowed memory access scenario. Created my wiki page, svn repo,
and git repo.

svn: http://svnweb.freebsd.org/socsvn/soc2014/op/
git: https://github.com/opntr/opBSD (branches:
op/gsoc2014/{master,smap,kpatch} )
wiki: https://wiki.freebsd.org/SummerOfCode2014/IntelSMAPandKernelPatching
test-cases: http://svnweb.freebsd.org/socsvn/soc2014/op/tests/smap-tester/

Good days,
Oliver



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPjTQNH1eD4UBZSd2MmLFc71aAF7V5HB4F0K8fKWNNeY_0SgQg>