TSOEnabler | Kernel extension that enables TSO
kandi X-RAY | TSOEnabler Summary
kandi X-RAY | TSOEnabler Summary
TSOEnabler is a C library. TSOEnabler has no bugs, it has no vulnerabilities and it has low support. You can download it from GitHub.
A kernel extension that enables total store ordering on Apple silicon, with semantics similar to x86_64's memory model. This is normally done by the kernel through modifications to a special register upon exit from the kernel for programs running under Rosetta 2; however, it is possible to enable this for arbitrary processes (on a per-thread basis, technically) as well by modifying the flag for this feature and letting the kernel enable it for us on. This extension is designed to work on the M1 (t8101) kernel, where it attempts to automatically detect certain offsets from the kernel image. If you are looking for the old code for the A12Z (t8020) kernel, it's available on the t8020 branch.
A kernel extension that enables total store ordering on Apple silicon, with semantics similar to x86_64's memory model. This is normally done by the kernel through modifications to a special register upon exit from the kernel for programs running under Rosetta 2; however, it is possible to enable this for arbitrary processes (on a per-thread basis, technically) as well by modifying the flag for this feature and letting the kernel enable it for us on. This extension is designed to work on the M1 (t8101) kernel, where it attempts to automatically detect certain offsets from the kernel image. If you are looking for the old code for the A12Z (t8020) kernel, it's available on the t8020 branch.
Support
Quality
Security
License
Reuse
Support
TSOEnabler has a low active ecosystem.
It has 145 star(s) with 6 fork(s). There are 6 watchers for this library.
It had no major release in the last 6 months.
There are 1 open issues and 4 have been closed. On average issues are closed in 64 days. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of TSOEnabler is current.
Quality
TSOEnabler has no bugs reported.
Security
TSOEnabler has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
License
TSOEnabler does not have a standard license declared.
Check the repository for any license declaration and review the terms closely.
Without a license, all rights are reserved, and you cannot use the library in your applications.
Reuse
TSOEnabler releases are not available. You will need to build from source code and install.
Installation instructions are available. Examples and code snippets are not available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of TSOEnabler
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of TSOEnabler
TSOEnabler Key Features
No Key Features are available at this moment for TSOEnabler.
TSOEnabler Examples and Code Snippets
No Code Snippets are available at this moment for TSOEnabler.
Community Discussions
No Community Discussions are available at this moment for TSOEnabler.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install TSOEnabler
Supposedly, you should be able to use this if you build and sign the kernel extension (disabling SIP if you aren't using a KEXT signing certificate) and drag it into /Library/Extensions. A dialog should come up to prompt you to enable the extension in the Security & Privacy preferences pane, you allow it from there and restart, and it will be installed. (If you're not seeing it, the permissions on the extension might be wrong: try a chown -R root:wheel.) In practice this can go wrong in many ways, and I have had luck by "resetting everything" and trying to install after doing the following:. (The last two steps work around bugs in macOS Big Sur beta). After that try installing the kernel extension again.
Reboot into recovery.
Open the Startup Disk application. Your boot security should already be lowered to allow KEXTs from untrusted developers, toggle the checkbox anyways.
Quit Startup Disk and open Terminal.
Remove the kernel extension from the Data volume (likely /Volumes/Data/Library/Extensions/TSOEnabler.kext).
Run kmutil trigger-panic-medic --volume-root /Volumes/<YourVolumeName> (again, likely /Volumes/Data).
Reboot into recovery.
Open the Startup Disk application. Your boot security should already be lowered to allow KEXTs from untrusted developers, toggle the checkbox anyways.
Quit Startup Disk and open Terminal.
Remove the kernel extension from the Data volume (likely /Volumes/Data/Library/Extensions/TSOEnabler.kext).
Run kmutil trigger-panic-medic --volume-root /Volumes/<YourVolumeName> (again, likely /Volumes/Data).
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page