SYSTEM AND METHOD OF VETTING DATA
Systems and methods for vetting data include receiving a notification at a second processor that a first processor has written first output data to an output data buffer in an output device. A hardware-implemented buffer access flag controls a permission for the first processor to write data to the...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
29.09.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Systems and methods for vetting data include receiving a notification at a second processor that a first processor has written first output data to an output data buffer in an output device. A hardware-implemented buffer access flag controls a permission for the first processor to write data to the output data buffer. The second processor sets the hardware-implemented buffer access flag to a first setting that prevents the first processor from writing additional output data to the output data buffer while the first output data in the output data buffer is being inspected. The second processor has a read-write permission to the hardware-implemented buffer access flag. The first processor has a read-only permission to the hardware-implemented buffer access flag. |
---|---|
Bibliography: | Application Number: US20100748645 |