Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 21 Oct 2015 18:54:38 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-bugs@FreeBSD.org
Subject:   [Bug 203941] arm64 IMPLEMENT ME: dtrace_toxic_ranges
Message-ID:  <bug-203941-8-8EjBhFLp7m@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-203941-8@https.bugs.freebsd.org/bugzilla/>
References:  <bug-203941-8@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=203941

--- Comment #1 from Ed Maste <emaste@freebsd.org> ---
And for quick reference:

/*
 * DTrace Toxic Ranges
 *
 * DTrace supports safe loads from probe context; if the address turns out to  
 * be invalid, a bit will be set by the kernel indicating that DTrace
 * encountered a memory error, and DTrace will propagate the error to the user 
 * accordingly.  However, there may exist some regions of memory in which an   
 * arbitrary load can change system state, and from which it is impossible to  
 * recover from such a load after it has been attempted.  Examples of this may 
 * include memory in which programmable I/O registers are mapped (for which a  
 * read may have some implications for the device) or (in the specific case of 
 * UltraSPARC-I and -II) the virtual address hole.  The platform is required   
 * to make DTrace aware of these toxic ranges; DTrace will then check that     
 * target addresses are not in a toxic range before attempting to issue a      
 * safe load.
 */

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-203941-8-8EjBhFLp7m>