conley%ukans.csnet@csnet-relay.arpa (Dennis Conley) (12/09/85)
Hi. I'm tasked with moving a Vector General 3400 from a pdp 11/55 running V7 to our 780 running BSD 4.2. This machine uses dma to access a user-generated display list in memory, and has a history of rude behavior ( i.e. write operations to memory locations belonging to other users, the kernel, etc ). It seems that the move is a forgone conclusion, and I must attempt to minimize any potential damage to other devices/processes that it will try to cause via the unibus adapter on the vax. My queston is, to what extent is 'protection' from such illegal access possible via the UBA ( or other ) hardware or from the kernel? I've yet to grok in fullness just how the hardware and the kernel deal with this topic, if at all. Thanks much, direct replies would be appreciated. Dennis R. Conley Computer Science Dept. University of Kansas conley%ukans.csnet
mike@BRL.ARPA (Mike Muuss) (12/10/85)
BRL operates three Vector General 3300 displays on VAX 4.2BSD machines; I can send people copies of the driver and/or display manager routines we have developed. Best, -Mike Muuss (301)-278-6678 AV 283-6678 FTS 939-6678 ArpaNet: Mike @ BRL UUCP: ...!{decvax,cbosgd}!brl-bmd!mike Postal: Mike Muuss Leader, Advanced Computer Systems Team Computer Science and Mathematics Branch Systems Engineering and Concepts Analysis Division U.S. Army Ballistic Research Laboratory Attn: AMXBR-SECAD (Muuss) APG, MD 21005