On 2016-10-06 11:51, Leopold Palomo-Avellaneda wrote:
> Hi,
> 
> lasts weeks I have been in a trouble with Xenomai and RTnet. Finally it was 
> solved disabling some parameters in kernel (nosmap) Thanks again Jan.
> 
> That parameter is an interesting feature of the Intel processors [1,2], that 
> IMHO affects all the RTnet code and I hope that nothing more of Xenomai.
> 
> It seems that fix it is could be easy, but it must be done (a boring task ;-) 
> In the middle, I would propose that some note could be added to the FAQ, or 
> "Troubleshooting a dual kernel configuration" page. Something like this in 
> the 
> "Common kernel configuration issues":
> 
> CONFIG_X86_SMAP
> 
> On modern Intel processors with SMAP-enabled systems, kernel is not allowed 
> to 
> access to userspace memory, it must be done in a special way. So, until all 
> Xenomai code was updated, specially RTnet, if you find crashes with " unable 
> to 
> handle kernel paging request at " disable this feature neither in kernel 
> configuration or in boot with nosmap.
> 

Send your proposal as patch for the included documentation or even the
kernel Kconfig tests.

Jan

> 
> Best regards,
> 
> Leopold
> 
> [1] https://en.wikipedia.org/wiki/Supervisor_Mode_Access_Prevention
> [2] https://lwn.net/Articles/517475/
> 


-- 
Siemens AG, Corporate Technology, CT RDA ITP SES-DE
Corporate Competence Center Embedded Linux

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: OpenPGP digital signature
URL: 
<http://xenomai.org/pipermail/xenomai/attachments/20161006/c7742df4/attachment.sig>
_______________________________________________
Xenomai mailing list
Xenomai@xenomai.org
https://xenomai.org/mailman/listinfo/xenomai

Reply via email to