Date: Mon, 29 Sep 2003 18:56:13 +0300 From: Peter Pentchev <roam@ringlet.net> To: Pawel Jakub Dawidek <nick@garage.freebsd.pl> Cc: earthman <earthman@inbox.ru> Subject: Re: user malloc from kernel Message-ID: <20030929155613.GB551@straylight.oblivion.bg> In-Reply-To: <20030929154741.GB520@garage.freebsd.pl> References: <16244.53594.942762.784390@canoe.dclg.ca> <20030927115306.R34638@woozle.rinet.ru> <3F759589.9070700@mindspring.com> <811112091.20030929172247@inbox.ru> <20030929154741.GB520@garage.freebsd.pl>
next in thread | previous in thread | raw e-mail | index | archive | help
--rS8CxjVDS/+yyDmU Content-Type: text/plain; charset=windows-1251 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Sep 29, 2003 at 05:47:41PM +0200, Pawel Jakub Dawidek wrote: > On Mon, Sep 29, 2003 at 05:22:47PM +0300, earthman wrote: > +> how to allocate some memory chunk > +> in user space memory from kernel code? > +> how to do it correctly? >=20 > Here you got sample kernel module which do this: >=20 > http://garage.freebsd.pl/usmalloc.tgz > http://garage.freebsd.pl/usmalloc.README Errrr... but won't this interfere *badly* with userland programs which attempt to allocate memory after making the syscall in question? I mean, won't the application's memory manager attempt to allocate the next chunk of memory right over the region that you have stolen with this brk(2) invocation? Thus, when the application tries to write into its newly-allocated memory, it will overwrite the data that the kernel has placed there, and any attempt to access the kernel's data later will fail in wonderfully unpredictable ways :) G'luck, Peter --=20 Peter Pentchev roam@ringlet.net roam@sbnd.net roam@FreeBSD.org PGP key: http://people.FreeBSD.org/~roam/roam.key.asc Key fingerprint FDBA FD79 C26F 3C51 C95E DF9E ED18 B68D 1619 4553 No language can express every thought unambiguously, least of all this one. --rS8CxjVDS/+yyDmU Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (FreeBSD) iD8DBQE/eFYd7Ri2jRYZRVMRApIGAKCPKZ14wKikyHlUiogxyO3fmJ7vIgCgpuhO huiKdRC5rGXNtxTwkpwiBqI= =1m0S -----END PGP SIGNATURE----- --rS8CxjVDS/+yyDmU--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030929155613.GB551>