Quoting Nathan Lynch ([email protected]):
> 
> > +   parent_tid_ptr = (int *)kca.parent_tid_ptr;
> > +   child_tid_ptr =  (int *)kca.child_tid_ptr;
> > +
> > +   stack_size = (unsigned long)kca.child_stack_size;
> > +   child_stack = (unsigned long)kca.child_stack_base;
> > +   if (child_stack)
> > +           child_stack += stack_size;
> 
> Should this calculation not be of the form:
> child_stack = arch_dependent_alignment(child_stack + stack_size - 1)
> ?
> 
> Is overflow a concern?
> 
> Same questions apply to the x86 version.

Hmm...  if the stack isn't valid, the task will just segfault, so
it's not dangerous for the kernel, right?  Note that for instance
arch/s390/kernel/process.c:SYS_clone() doesn't check the validity
of the new stack pointer passed in either.

-serge
_______________________________________________
Containers mailing list
[email protected]
https://lists.linux-foundation.org/mailman/listinfo/containers

_______________________________________________
Devel mailing list
[email protected]
https://openvz.org/mailman/listinfo/devel

Reply via email to