delorie.com/archives/browse.cgi   search  
Mail Archives: djgpp/1999/07/20/05:15:33

Date: Tue, 20 Jul 1999 12:12:53 +0300 (IDT)
From: Eli Zaretskii <eliz AT is DOT elta DOT co DOT il>
X-Sender: eliz AT is
To: wanis AT my-deja DOT com
cc: djgpp AT delorie DOT com
Subject: Re: GPF due to _farpokel
In-Reply-To: <7mvl5g$17l$1@nnrp1.deja.com>
Message-ID: <Pine.SUN.3.91.990720121226.4115Q-100000@is>
MIME-Version: 1.0
Reply-To: djgpp AT delorie DOT com
X-Mailing-List: djgpp AT delorie DOT com
X-Unsubscribes-To: listserv AT delorie DOT com

On Mon, 19 Jul 1999 wanis AT my-deja DOT com wrote:

> I still have a few questions (mostly questions of curiosity) about
> memory allocation, descriptors, and whatnot in protected mode.  Are
> there any books/FAQs/web sites that provide a nice thorough introduction
> to the subject?

One place to look is on the Intel site, in their x86 manuals, under
"Protection".

> (One thing I'm curious to know:  how did my application
> gain the right to POKE the memory locations

Probably because it resolved to some address that was already mapped
into your address space.  It's also possible that the underlying DPMI
server didn't check the access rights well enough.  If you post the
descriptor parameters (base and limit) and the offset you used to
poke, a more intelligent reply can be given.

- Raw text -


  webmaster     delorie software   privacy  
  Copyright 2019   by DJ Delorie     Updated Jul 2019