Subject: user address space protection in the kernel
To: None <tech-kern@netbsd.org>
From: Rahul Kulkarni <rahul.kulkarni@gmail.com>
List: tech-kern
Date: 04/07/2006 22:08:22
A fundamental question:

Does the kernel have write acess to user land address space and can it
corrupt user land addresses (process user text/stack/data)?

Is the total physical memory BAT mapped in the kernel or is it the
first 256MB?.

How can this behaviour be controlled in the UVM/BAT registers i.e to
provide process user address space protection in the kernel ?


thanks in advance.