be nice if this was more generally supported, rather than
patching the kernel locally.
I'd be interested to know if anyone has had a similar idea, or potentially
there is a method to achieve this in Nuttx which I have overlooked.
--
*Kind regards,*
*Stuart Ianna*
*Firmware Engineer*
--
*MoTe
into these and see if this approach meets your need.
>
>
>
--
*Kind regards,*
*Stuart Ianna*
*Firmware Engineer*
--
*MoTeC Pty Ltd*
121 Merrindale Drive
Croydon South 3136
Victoria Australia
*T: *61 3 9761 5050
*W: *www.motec.com.au <https://www.motec.com.au/>
--
<htt
om any hostile code.
>
> The fix is relatively simple (if the description of the issue is
> correct). In all places where kernel-only accessible memory is mapped by
> the MMU, the protection bits must be set so that user space access is
> prohibited. This might have side effects on a
t; Ken
> > > > > >
> > > > > > On 7/18/24 12:14 PM, Alan C. Assis wrote:
> > > > > > > Hi Everyone,
> > > > > > >
> > > > > > > We are creating a testing farm for NuttX to be integrated on
> our
> > > CI.
> >