On 2016-10-06 11:51, Leopold Palomo-Avellaneda wrote: > Hi, > > lasts weeks I have been in a trouble with Xenomai and RTnet. Finally it was > solved disabling some parameters in kernel (nosmap) Thanks again Jan. > > That parameter is an interesting feature of the Intel processors [1,2], that > IMHO affects all the RTnet code and I hope that nothing more of Xenomai. > > It seems that fix it is could be easy, but it must be done (a boring task ;-) > In the middle, I would propose that some note could be added to the FAQ, or > "Troubleshooting a dual kernel configuration" page. Something like this in > the > "Common kernel configuration issues": > > CONFIG_X86_SMAP > > On modern Intel processors with SMAP-enabled systems, kernel is not allowed > to > access to userspace memory, it must be done in a special way. So, until all > Xenomai code was updated, specially RTnet, if you find crashes with " unable > to > handle kernel paging request at " disable this feature neither in kernel > configuration or in boot with nosmap. >
Send your proposal as patch for the included documentation or even the kernel Kconfig tests. Jan > > Best regards, > > Leopold > > [1] https://en.wikipedia.org/wiki/Supervisor_Mode_Access_Prevention > [2] https://lwn.net/Articles/517475/ > -- Siemens AG, Corporate Technology, CT RDA ITP SES-DE Corporate Competence Center Embedded Linux -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 181 bytes Desc: OpenPGP digital signature URL: <http://xenomai.org/pipermail/xenomai/attachments/20161006/c7742df4/attachment.sig> _______________________________________________ Xenomai mailing list Xenomai@xenomai.org https://xenomai.org/mailman/listinfo/xenomai