Date: Fri, 6 Jun 2014 17:14:41 +0200 From: Oliver Pinter <oliver.pntr@gmail.com> To: soc-status@freebsd.org Cc: gavin@freebsd.org Subject: [intel smap, kpatch] weekly report #2 Message-ID: <CAPjTQNF8BgC5LZDJuv4i72u9vajwE0GYciW08_xjKLnbAj%2Bftw@mail.gmail.com>
next in thread | raw e-mail | index | archive | help
Hi all! Previous week I started to work on SMAP for amd64 and i386. For amd64 many parts are in good state. The codes currently are only compile tested, at next week I create a VM, and create run-time tests. For i386 started the work on yesterday. All of my status can be found on my wiki page. What's done, but not tested in this week: * {amd64,i386} trap handler * amd64 initialization * {amd64,i386} identification * {amd64,i386} exceptions * amd64 pmap changes * amd64 support.S changes * amd64 ia32 compat exceptions * i386 ddb extension At next week I plan to finish all of amd64 things, and most of i386 things, and begin to test; start to design a proper way to create kpatch and/or ifunc like things. svn: http://svnweb.freebsd.org/socsvn/soc2014/op/ git: https://github.com/opntr/opBSD (branches: op/gsoc2014/{master,smap,kpatch} ) wiki: https://wiki.freebsd.org/SummerOfCode2014/IntelSMAPandKernelPatching On 5/29/14, Oliver Pinter <oliver.pntr@gmail.com> wrote: > Hi all! > > I'm working on Intel SMAP technology in first half of GSoC. > At first week I investigated in SMAP technology and relevant FreeBSD > codes, whats changed since my Bsc thesis. > > I implemented a vulnerable kernel module and PoC to test allowed and > not allowed memory access scenario. Created my wiki page, svn repo, > and git repo. > > svn: http://svnweb.freebsd.org/socsvn/soc2014/op/ > git: https://github.com/opntr/opBSD (branches: > op/gsoc2014/{master,smap,kpatch} ) > wiki: https://wiki.freebsd.org/SummerOfCode2014/IntelSMAPandKernelPatching > test-cases: http://svnweb.freebsd.org/socsvn/soc2014/op/tests/smap-tester/ > > Good days, > Oliver >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPjTQNF8BgC5LZDJuv4i72u9vajwE0GYciW08_xjKLnbAj%2Bftw>