www. O S N E W S .com
News Features Interviews
BlogContact Editorials

Sandboxing in Fuchsia
By Thom Holwerda on 2017-06-16 22:53:15

On Fuchsia, a newly created process has nothing. A newly created process cannot access any kernel objects, cannot allocate memory, and cannot even execute code. Of course, such a process isn't very useful, which is why we typically create processes with some initial resources and capabilities.

Most commonly, a process starts executing some code with an initial stack, some command line arguments, environment variables, a set of initial handles. One of the most important initial handles is the PA_VMAR_ROOT, which the process can use to map additional memory into its address space.

Not the most detailed description just yet, but Fuchsia seems to be getting fleshed out more and more.

8  Comments - Printer friendly - Related stories
Recent related stories
- Tock: a secure embedded operating system - 2017-11-08
- An open letter to Intel - 2017-11-07
- PC-MOS released under GPL - 2017-10-21
- ChrysaLisp: an assembler/C-Script/Lisp 64bit OS - 2017-10-14
- Control the operating system, control the future - 2017-10-05
- More related articles
 

Tell a friend
Your full name:
Your email address:
Your friend's email:
Anti-spam measure:
5+2=

News Features Interviews
BlogContact Editorials


WAP site - RSS feed
© OSNews LLC 1997-2007. All Rights Reserved.
The readers' comments are owned and a responsibility of whoever posted them.
Prefer the desktop version of OSNews?