Re: Kernel stack for a process

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> No, you could not crash the kernel this way. Your
> userland program would be the one traversing the symlinks,
> in -user space-. Each call into the kernel would
> traverse one link, sure, but that's certainly not
> going to be a problem for the kernel.
> 

plz have a look at: 
http://lwn.net/Articles/2995/

I think user process can still do it.


> I also suspect (though I do not know this for certain)
> that the kernel is smart enough to detect kernel-stack
> overflow and kill the offending process. It would be
> trivial: just keep a read-only PTE at the end of the
> kernel stack, and if anything tries to write
> there, take a page fault, notice that it's adjacent
> to the task stack, and kill the process.

http://van-dijk.net/linuxkernel/200206/1235.html
By reading that, i think it wont ! ( i may be wrong here )
I donno abt latest kernels.

ive not yet found the light :(

-nagaraj


--
Kernelnewbies: Help each other learn about the Linux kernel.
Archive:       http://mail.nl.linux.org/kernelnewbies/
FAQ:           http://kernelnewbies.org/faq/


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux