As for now, we can run as root, and get around the problem :-D

 / Lars

2012/8/30 John Kasunich <[email protected]>:
>
>
> On Thu, Aug 30, 2012, at 08:48 AM, andy pugh wrote:
>> On 30 August 2012 05:16, Jon Elson <[email protected]> wrote:
>>
>> > There are methods to access hardware from user mode, but it requires
>> > super-user
>> > privileges set on that executable.  The RT system or rtapi may take care
>> > of that
>> > for you,
>>
>> I think rtapi already includes rtapi_inb() and rtapi_outb() which
>> presumably (hopefully?) could be abstracted.
>> A lot of the drivers don't actually use them, but could presumably be
>> made to.
>
> rtapi_inb() and rtapi_outb() alone won't be able to do the job.  It
> looks like some separate preparatory work needs to be done, such as
> requesting access to the ports.  That is a one-time thing that needs
> to be done as part of component initialization, rather than at each
> port access.  So another function would be needed to wrap that.  It
> could be a do-nothing function for kernel module based code, and do
> whatever is actually needed for rt-preempt based code.
> --
>   John Kasunich
>   [email protected]
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Emc-developers mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/emc-developers

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Emc-developers mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/emc-developers

Reply via email to