home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!spool.mu.edu!agate!darkstar.UCSC.EDU!cats.ucsc.edu!davids
- From: davids@cats.ucsc.edu (Dave Schreiber)
- Newsgroups: comp.sys.amiga.programmer
- Subject: Re: physical memory protection with MMU
- Date: 22 Nov 1992 05:15:15 GMT
- Organization: University of California; Santa Cruz
- Lines: 25
- Message-ID: <1en513INNguv@darkstar.UCSC.EDU>
- References: <paulk.28d4@terapin.com> <1eccinINNbv2@darkstar.UCSC.EDU> <1992Nov21.183408.23912@newshub.ccs.yorku.ca>
- NNTP-Posting-Host: si.ucsc.edu
-
-
- In article <1992Nov21.183408.23912@newshub.ccs.yorku.ca> wlanders@nexus.yorku.ca (W L Anderson) writes:
- >Since in a protected memory environment, you are going to have to
- >keep track of what memory is allocated by which process, and the
- >problem seems to be with memory that is being used to pass to
- >other tasks is not always allocated as MEMF_PUBLIC, why not put a
- >hook into the EXEC message passing code so that when a task is
- >about to pass a message, you check to see if it's MEMF_PUBLIC.
- >If it isn't, make it MEMF_PUBLIC.
-
- The drawback is that the message could contain a pointer to some other
- chunk of memory that isn't declared MEMF_PUBLIC. While Exec could make
- the message's memory MEMF_PUBLIC if needed, since it doesn't enforce a
- particular structure upon messages, it wouldn't know that the message
- contained a pointer and thus couldn't change the type of the second
- memory block. The process that received the message would then crash
- when it tried to access that memory.
-
- >Tom Hayko
- >wlanders@nexus.yorku.ca
-
-
-
- --
- Dave Schreiber "Look. Don't touch." davids@cats.ucsc.edu (until 6/20/93)
-