Age | Commit message (Collapse) | Author |
|
When validating memory addresses coming from userspace, we currently
only check if it is within range of the program stack or data. However,
data may also be allocated in the heap which involves addresses stored
in the memory map ledger. In order for user programs to be able to pass
references to that kind of memory to syscalls, we must be able to check the
addresses against ledger entries as well.
Signed-off-by: Ian Moffett <ian@osmora.org>
|
|
Was supposed to happen on Jan 1, sorry! Happy late new year!
Signed-off-by: Ian Moffett <ian@osmora.org>
|
|
Signed-off-by: Ian Moffett <ian@osmora.org>
|
|
Add copyin() and copyout() for copying from userspace to kernel space
and vice versa.
Signed-off-by: Ian Moffett <ian@osmora.org>
|
|
Signed-off-by: Ian Moffett <ian@osmora.org>
|
|
Signed-off-by: Ian Moffett <ian@osmora.org>
|
|
This commit adds two new functions, copyin() and copyout() for kernel to
userspace access and vice versa. These functions ensure the userspace address
being accessed actually belongs to the process running by performing address range
checks, thereby preventing bad addresses being passed to syscalls.
Signed-off-by: Ian Moffett <ian@osmora.org>
|