linuxppc-dev.lists.ozlabs.org archive mirror
 help / color / mirror / Atom feed
* Question about process/kernel address space
@ 2004-04-22  6:43 Stefan Nickl
  2004-04-22  8:57 ` Sylvain Munaut
  0 siblings, 1 reply; 2+ messages in thread
From: Stefan Nickl @ 2004-04-22  6:43 UTC (permalink / raw)
  To: linuxppc-embedded


Hi,

in some elderly code for a VME-supporting 824x-board from
our company I found the following line in ppc_md.setup_io_mappings():

io_block_mapping(0x80000000, 0x80000000, 0x10000000, _PAGE_IO);

This is obviously meant to map a window of VME IO memory into
virtual address space. What puzzles me is that the mapping is
located below PAGE_OFFSET (0xc0000000), which, from my general
understanding, is bad :(

But since apparently nobody had a problem with this for years,
(and ranges above PAGE_OFFSET are tight) I'd like to know what
the actual implications are.
Ok, should a process ever access this range, it would fail
(since the BATs go first and allow only supervisor access(?)),
but a user process ever using such a high address seems highly unlikely.

What I worry more is that it might introduce some security
holes or stability problems, any thoughts?

Thanks,

--
Stefan Nickl
Kontron Modular Computers


** Sent via the linuxppc-embedded mail list. See http://lists.linuxppc.org/

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2004-04-22  8:57 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-04-22  6:43 Question about process/kernel address space Stefan Nickl
2004-04-22  8:57 ` Sylvain Munaut

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).