On Thu, 30 Mar 2000, Yannick GUICHARD wrote:

> I'm working on a X86 Intel environnment .
> 
> When you insert a module in the Kernel , can the
> kernel or a user application access to the
> code and data area of this inserted module ?

Inserted module becomes part of the kernel. So kernel can access all, user
application can exchange data only through system calls or shared memory.
 
> Is it possible to protect the data area and code
> area of a module inserted in the Kernel ?

Not against the kernel. But the kernel does not have any reason to write over
your module. Your biggest enemy is your code itself :-)

> Can a mechanism ,with the pages protection, do
> this ?

If you implement it yourself, why not? 

There is some work going on in RTAI - LXRT to run hard real time processes in
user space with memory protection.

--
Tomek


--
To unsubscribe from this list, send a message to [EMAIL PROTECTED]
with the command "unsubscribe linux-embedded" in the message body.
For more information, see <http://waste.org/mail/linux-embedded>.

Reply via email to