Yannick GUICHARD wrote:
>
> Hi everybody,
>
> I'm working on a X86 Intel environnment .
>
> When you insert a module in the Kernel , can the
> kernel or a user application access to the
> code and data area of this inserted module ?
>
> Is it possible to protect the data area and code
> area of a module inserted in the Kernel ?
> (In this case, nothing will destroy these areas
> ....)
If you are writing in the kernel then:
- You have a separate machine just for testing with no important files.
- You should be motivated enough to test your code for memory problems
so that you don't need memory protection in the kernel.
The coding standard is higher for kernel source than for user source.
If you feel that you do not have the time for proper testing then only
write for user space and you will be protected. This higher standard
allows kernel source to run faster than user source.
>
> Can a mechanism ,with the pages protection, do
> this ?
A mechanism already exists. His name is Linus Torvalds. If your kernel
code does not keep its memory accesses to its own space, then your
kernel code will be rejected for the next kernel release. If you find
bugs in other kernel code then report them.
>
> Thanks in advance for any information.
--
To unsubscribe from this list, send a message to [EMAIL PROTECTED]
with the command "unsubscribe linux-embedded" in the message body.
For more information, see <http://waste.org/mail/linux-embedded>.