Subject: pmap(9) tweak
To: None <tech-kern@netbsd.org>
From: Jason R Thorpe <thorpej@wasabisystems.com>
List: tech-kern
Date: 08/09/2002 15:59:25
--OaZoDhBhXzo6bW1J
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
I'd like to specify that exec mappings are not allowed to be entered
via pmap_kenter_pa() (at least, not by machine-independent code). I'm
pretty sure no MI code does this as it stands.
Attached is text for the pmap(9) manual page. Comments?
--
-- Jason R. Thorpe <thorpej@wasabisystems.com>
--OaZoDhBhXzo6bW1J
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename="pmap.9-diff"
Index: pmap.9
===================================================================
RCS file: /cvsroot/sharesrc/share/man/man9/pmap.9,v
retrieving revision 1.14
diff -c -r1.14 pmap.9
*** pmap.9 2002/04/01 17:30:02 1.14
--- pmap.9 2002/08/09 22:58:05
***************
*** 288,295 ****
(for example, the kernel memory allocator), or to enter mappings for
physical addresses which are not managed by the virtual memory system.
.Dq Unmanaged
! mappings may only be entered into the kernel's virtual address space.
! This constraint is placed on the callers of the
.Fn pmap_kenter_pa
and
.Fn pmap_kremove
--- 288,298 ----
(for example, the kernel memory allocator), or to enter mappings for
physical addresses which are not managed by the virtual memory system.
.Dq Unmanaged
! mappings may only be entered into the kernel's virtual address space. In
! addition, no mappings should be entered by machine-independent code with
! executable permission should be entered via
! .Fn pmap_kenter_pa .
! These constraints are placed on the callers of the
.Fn pmap_kenter_pa
and
.Fn pmap_kremove
--OaZoDhBhXzo6bW1J--