Date: Sun, 24 Mar 2002 17:35:16 -0500 From: Jake Burkholder <jake@locore.ca> To: Andrew Griffiths <nullptr@tasmail.com> Cc: security@FreeBSD.ORG Subject: Re: page fault. Message-ID: <20020324173516.V90182@locore.ca> In-Reply-To: <200203242143.g2OLh4523143@franklin.nt.tas.gov.au>; from nullptr@tasmail.com on Mon, Mar 25, 2002 at 08:43:05AM %2B1100 References: <200203242143.g2OLh4523143@franklin.nt.tas.gov.au>
next in thread | previous in thread | raw e-mail | index | archive | help
Apparently, On Mon, Mar 25, 2002 at 08:43:05AM +1100, Andrew Griffiths said words to the effect of; > Hello, > > While testing some code to show the stack ranges on systems, I noticed that freebsd wouldn't segfault when it accessed memory below esp, or the stack bottom. > > Not sure whether its a problem, but I think its worth noting. You mean numerically higher addresses than %esp? Like this? int main(void) { volatile int *v; int a; for (v = &a;; v++) printf("%p: %#x\n", v, *v); } I depends how far you go. A bunch of stuff is copied out to the top of the stack by the kernel so you have some slush to work through. In either direction you'll eventually get a segfault (sigbus in the above case because you run into kernel address space). > > Andrew Griffiths > > -- > www.tasmail.com > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020324173516.V90182>