From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by dpdk.org (Postfix, from userid 33) id 2598E1B19A; Wed, 5 Dec 2018 06:43:23 +0100 (CET) From: bugzilla@dpdk.org To: dev@dpdk.org Date: Wed, 05 Dec 2018 05:43:23 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: DPDK X-Bugzilla-Component: doc X-Bugzilla-Version: 18.11 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: vipin.varghese@intel.com X-Bugzilla-Status: CONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: dev@dpdk.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter target_milestone Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://bugs.dpdk.org/ Auto-Submitted: auto-generated X-Auto-Response-Suppress: All MIME-Version: 1.0 Subject: [dpdk-dev] [Bug 118] conflicting information for 'Running DPDK Applications Without Root Privileges' X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Dec 2018 05:43:23 -0000 https://bugs.dpdk.org/show_bug.cgi?id=3D118 Bug ID: 118 Summary: conflicting information for 'Running DPDK Applications Without Root Privileges' Product: DPDK Version: 18.11 Hardware: All OS: All Status: CONFIRMED Severity: normal Priority: Normal Component: doc Assignee: dev@dpdk.org Reporter: vipin.varghese@intel.com Target Milestone: --- link 1: http://doc.dpdk.org/guides/freebsd_gsg/build_sample_apps.html?highlight=3Dw= ithout%20root statement: 'with a number of small permission adjustments, it is possible to run these applications as a user other than =E2=80=9Croot=E2=80=9D. ' link 2: http://doc.dpdk.org/guides/linux_gsg/enable_func.html?highlight=3Dwithout%2= 0root statement: since version 4.0, the kernel does not allow unprivileged proces= ses to read the physical address information from the pagemaps file, making it impossible for those processes to use HW devices which require physical addresses Can we either have 1 link for this or update both place with kernel 4.0 iss= ue. --=20 You are receiving this mail because: You are the assignee for the bug.=