Work has been carried out in address space protection mechanisms in Linux
in our lab here at Stony Brook. Perhaps it might be of relevance to your
question. For more details please see :

         http://www.ecsl.cs.sunysb.edu/extension.html

regards,
- Kartik

-----------------------------------------------------------------
Kartik Gopalan                       Ph(res) : (516)-216-2389
[EMAIL PROTECTED]                 Ph(off) : (516)-632-8436
-----------------------------------------------------------------


On Fri, 30 Apr 1999, Pierre Cloutier wrote:

> 
> 
> Hi:
> 
> Is it thinkable to use the MMU memory protection capability in the kernel?
> Assume a debugged application still needs to run a 
>  "user written" task that may have bugs in it. Would it be possible to use
> the MMU to protect the rest of the kernel against a "mad" pointer?
> Has anyone done anything with the MMU?
> 
> Some folks here say it is impossible to go commercial with RTLinux without
> memory protection. I know from experience there will always be bugs.
> Murphy will see to that. What do I tell my folks?
> 
> 
> _______________________________________________________
> 
> Pierre Cloutier  
> Tel: (450)-659-9186
> Fax: (450)-659-0014
> POSEIDON CONTROLS INC
> _______________________________________________________
> 
> --- [rtl] ---
> To unsubscribe:
> echo "unsubscribe rtl" | mail [EMAIL PROTECTED] OR
> echo "unsubscribe rtl <Your_email>" | mail [EMAIL PROTECTED]
> ----
> For more information on Real-Time Linux see:
> http://www.rtlinux.org/~rtlinux/
> 


--- [rtl] ---
To unsubscribe:
echo "unsubscribe rtl" | mail [EMAIL PROTECTED] OR
echo "unsubscribe rtl <Your_email>" | mail [EMAIL PROTECTED]
----
For more information on Real-Time Linux see:
http://www.rtlinux.org/~rtlinux/

Reply via email to