home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.arch
- Path: sparky!uunet!munnari.oz.au!uniwa!cujo!cc.curtin.edu.au!zrepachol
- From: zrepachol@cc.curtin.edu.au (Paul Repacholi)
- Subject: Re: PALcode instructions vs TRAP instructions
- Message-ID: <1992Aug18.004501.1@cc.curtin.edu.au>
- Lines: 19
- Sender: news@cujo.curtin.edu.au (News Manager)
- Organization: Curtin University of Technology
- References: <1992Aug10.211215.25582@nntpd.lkg.dec.com> <1992Aug12.094231.1767@uklirb.informatik.uni-kl.de> <1992Aug12.092211.58077@cc.usu.edu> <34303@cbmvax.commodore.com>
- Date: Mon, 17 Aug 1992 15:45:01 GMT
-
- In article <34303@cbmvax.commodore.com>, jesup@cbmvax.commodore.com (Randell Jesup) writes:
- >
- > This would seem to be dangerous, because of wild pointers. Just
- > because the OS doesn't know about the memory doesn't mean that there won't
- > be a write to those locations. I do hope that PALcode fetches are checked
- > for illegal accesses.
- >
-
- If you are worried about wild pointers at this level, it's 'fat owl' time
- any way.
-
- What would set up the checks for the PAL code? Note that on a EV-4 the initial
- PALcode executes with NO acess to memory till it sets up the secondary
- cache control registers, BIU control ect. The only thing you can do at this
- level of do-do is dump as much info as possible in a safe place, and quit
- before you make things worse.
-
- ~Paul
-
-