Date: Thu, 29 May 2014 00:13:03 +0200 From: Oliver Pinter <oliver.pntr@gmail.com> To: soc-status@freebsd.org Subject: [intel smap, kpatch] weekly report #1 Message-ID: <CAPjTQNH1eD4UBZSd2MmLFc71aAF7V5HB4F0K8fKWNNeY_0SgQg@mail.gmail.com>
next in thread | raw e-mail | index | archive | help
Hi all! I'm working on Intel SMAP technology in first half of GSoC. At first week I investigated in SMAP technology and relevant FreeBSD codes, whats changed since my Bsc thesis. I implemented a vulnerable kernel module and PoC to test allowed and not allowed memory access scenario. Created my wiki page, svn repo, and git repo. svn: http://svnweb.freebsd.org/socsvn/soc2014/op/ git: https://github.com/opntr/opBSD (branches: op/gsoc2014/{master,smap,kpatch} ) wiki: https://wiki.freebsd.org/SummerOfCode2014/IntelSMAPandKernelPatching test-cases: http://svnweb.freebsd.org/socsvn/soc2014/op/tests/smap-tester/ Good days, Oliver
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPjTQNH1eD4UBZSd2MmLFc71aAF7V5HB4F0K8fKWNNeY_0SgQg>