Subject: Re: Assumptions
To: Robert Black <r.black@ic.ac.uk>
From: Charles M. Hannum <mycroft@MIT.EDU>
List: current-users
Date: 06/11/1996 06:39:49
Robert Black <r.black@ic.ac.uk> writes:
>
> I take it that it is safe to assume that interrupt code which is interrupting
> the kernel never, under any circumstances, reads or writes userland memory or
> does anything else which could potentially cause a fault.
That's not really true. There are two cases where user-level memory
is accessed from an interrupt handler:
1) to modify a profiling counter
2) to modify some I/O buffer
In both cases, the buffer is wired ahead of time so that a fault
shouldn't occur. (In the case of profiling counters, however, the
memory may have been unmapped, so there's a special mechanism for
handling faults.)