On Fri, 2008-04-25 at 00:54 +0800, Peter Teoh wrote:

> this violate the first principle mentioned above.....the current CPU
> may be processing in kernel mode, but another CPU may be processing in
> userspace mode, same process, and as all the userspace memory are
> visible to him, he can view the kernel's data.   


yes! and vice versa - this other thread can also write to the shared
stack - changing this hypothetical shared user/kernel stack while the
kernel is using it on a different thread certainly has very direct
security implications...


T       kernel code                                       userspace code
-- --------------------------------------              -----------------------
1  int access_check;
2   
3  access_check = security_check(foobar);
4                                                         access_check = 1;
5  if (access_check != 0)
6     do_something_scary();


I think its pretty clear that you can't share the userspace stack
effectively. As for having 1 in kernel space for every userspace stack,
instead of some kind of sharing there certainly seem to be advantages to
1:1 but it isn't the only approach.

-Patrick
--
www.ducksong.com





--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to [EMAIL PROTECTED]
Please read the FAQ at http://kernelnewbies.org/FAQ

Reply via email to