ron@brl-sem.ARPA (Ron Natalie <ron>) (11/18/86)
Look, if you were to go as far and actually do what I said in my REPEAT BY, you will see that what I say is true. I don't care what your simplistic test shows, just add a "char * p_foo" to your proc structure and recompile your kernel. That's what I did to verify the test. Operating system behaviour is not always as obvious as you will believe. And if you want to start waving credentials, I've been hacking kernels since 1978, which predates system V by a few years. -Ron
ron@brl-sem.ARPA (Ron Natalie <ron>) (11/18/86)
Part of the problem here seems to be a recurrent error I made in my description. The problem involves eight byte boundries which in VAX nomenclature are QUADWORDS. (On real machines words are 32 not 16 bits). In article <200@ci-dandelion.UUCP>, dgg@ci-dandelion.UUCP (Dave Grubbs) writes: > > Description: > > Changing the length of the proc structure so that it is not > > double word aligned anymore will cause the system to crash ^^^^^ QUAD > > 2. If you do, pad it out to the next double word. QUAD The compilers do not pad out to quadwords, only two double words. -Ron