Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pointer Validation #230

Open
dthain opened this issue Dec 20, 2018 · 0 comments
Open

Pointer Validation #230

dthain opened this issue Dec 20, 2018 · 0 comments

Comments

@dthain
Copy link
Owner

dthain commented Dec 20, 2018

Whenever the user program passes the kernel a pointer to a memory location, the kernel must be extra careful before accessing that pointer. If the user passes an invalid pointer, it could easily cause the kernel to crash. Even worse, it could induce the kernel to make arbitrary writes within kernel space.

Note the dummy implementation of is_valid_pointer in syscall_handler.c. Test valid pointers by ensuring that they fall within the bounds of the current heap and stack limits, so that the kernel can be assured that accessing them is safe from the kernel's perspective.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants