Searched hist:1.1244 (Results 1 - 12 of 12) sorted by relevance

/src/sys/dev/pci/
H A Dpcidevs.h1.1244 Wed Jun 01 11:01:36 GMT 2016 pgoyette Regen
H A Dpcidevs_data.h1.1244 Mon Jun 27 00:01:03 GMT 2016 pgoyette Regen
H A Dpcidevs1.1244 Tue Dec 01 09:36:52 GMT 2015 msaitoh Add Intel 100 series chipset devices from "Table 2-1. PCH-H Device and
Revision ID Table, Intel 100 Series Chipset Family Platform Controller
Hub(PCI) Datasheet".
/src/doc/
H A D3RDPARTY1.1244 Thu Aug 13 11:30:17 GMT 2015 christos New tzcode
H A DCHANGES1.1244 Tue Jun 23 18:00:11 GMT 2009 tron Postfix was update to version 2.6.2.
1.1244 Tue Jun 23 18:00:11 GMT 2009 tron Postfix was update to version 2.6.2.
/src/sys/arch/i386/conf/
H A DGENERIC1.1244 Thu Dec 22 19:07:16 GMT 2022 jakllsch Add commented vio9p* to match amd64 GENERIC
/src/distrib/sets/lists/base/
H A Dmi1.1244 Mon May 18 21:19:34 GMT 2020 jmcneill Separate devicetree .dts -> .dtb building from kernel builds. They are now
part of a separate set, "dtb.tgz", and only built when MKDTB=yes. This
defaults to yes for earmv[67]* and aarch64, and no everywhere else.
/src/distrib/sets/lists/man/
H A Dmi1.1244 Sun Oct 31 11:52:52 GMT 2010 mbalmer Link Lua to the build and add the resulting files to the distribution sets.
Document the addition of Lua and the change we made to the default settings.
/src/distrib/sets/lists/tests/
H A Dmi1.1244 Thu Jan 19 23:26:14 GMT 2023 rillig tests/make: rename files that are not test cases
/src/share/mk/
H A Dbsd.own.mk1.1244 Sun Apr 25 14:32:20 GMT 2021 christos - since we are using regex already, shorten by merging arm and mips entries
- add a MACHINE_MIPS64 macro shorthand
- pass -m{soft,hard}-float to the assembler when we are passing it to the
compiler
/src/sys/conf/
H A Dfiles1.1244 Thu Nov 14 16:23:52 GMT 2019 maxv Add support for Kernel Memory Sanitizer (kMSan). It detects uninitialized
memory used by the kernel at run time, and just like kASan and kCSan, it
is an excellent feature. It has already detected 38 uninitialized variables
in the kernel during my testing, which I have since discreetly fixed.

We use two shadows:
- "shad", to track uninitialized memory with a bit granularity (1:1).
Each bit set to 1 in the shad corresponds to one uninitialized bit of
real kernel memory.
- "orig", to track the origin of the memory with a 4-byte granularity
(1:1). Each uint32_t cell in the orig indicates the origin of the
associated uint32_t of real kernel memory.

The memory consumption of these shadows is consequent, so at least 4GB of
RAM is recommended to run kMSan.

The compiler inserts calls to specific __msan_* functions on each memory
access, to manage both the shad and the orig and detect uninitialized
memory accesses that change the execution flow (like an "if" on an
uninitialized variable).

We mark as uninit several types of memory buffers (stack, pools, kmem,
malloc, uvm_km), and check each buffer passed to copyout, copyoutstr,
bwrite, if_transmit_lock and DMA operations, to detect uninitialized memory
that leaves the system. This allows us to detect kernel info leaks in a way
that is more efficient and also more user-friendly than KLEAK.

Contrary to kASan, kMSan requires comprehensive coverage, ie we cannot
tolerate having one non-instrumented function, because this could cause
false positives. kMSan cannot instrument ASM functions, so I converted
most of them to __asm__ inlines, which kMSan is able to instrument. Those
that remain receive special treatment.

Contrary to kASan again, kMSan uses a TLS, so we must context-switch this
TLS during interrupts. We use different contexts depending on the interrupt
level.

The orig tracks precisely the origin of a buffer. We use a special encoding
for the orig values, and pack together in each uint32_t cell of the orig:
- a code designating the type of memory (Stack, Pool, etc), and
- a compressed pointer, which points either (1) to a string containing
the name of the variable associated with the cell, or (2) to an area
in the kernel .text section which we resolve to a symbol name + offset.

This encoding allows us not to consume extra memory for associating
information with each cell, and produces a precise output, that can tell
for example the name of an uninitialized variable on the stack, the
function in which it was pushed on the stack, and the function where we
accessed this uninitialized variable.

kMSan is available with LLVM, but not with GCC.

The code is organized in a way that is similar to kASan and kCSan, so it
means that other architectures than amd64 can be supported.
/src/distrib/sets/lists/comp/
H A Dmi1.1244 Fri Apr 10 23:16:30 GMT 2009 christos add memrchr

Completed in 1277 milliseconds