On Thu, 30 Mar 2000, Yannick GUICHARD wrote:
> I'm working on a X86 Intel environnment .
>
> When you insert a module in the Kernel , can the
> kernel or a user application access to the
> code and data area of this inserted module ?
Inserted module becomes part of the kernel. So kernel can access all, user
application can exchange data only through system calls or shared memory.
> Is it possible to protect the data area and code
> area of a module inserted in the Kernel ?
Not against the kernel. But the kernel does not have any reason to write over
your module. Your biggest enemy is your code itself :-)
> Can a mechanism ,with the pages protection, do
> this ?
If you implement it yourself, why not?
There is some work going on in RTAI - LXRT to run hard real time processes in
user space with memory protection.
--
Tomek
--
To unsubscribe from this list, send a message to [EMAIL PROTECTED]
with the command "unsubscribe linux-embedded" in the message body.
For more information, see <http://waste.org/mail/linux-embedded>.