Re: Detecting illegal memory access

From: linux-os (Dick Johnson)
Date: Tue Apr 11 2006 - 07:36:15 EST



On Tue, 11 Apr 2006, Jan Engelhardt wrote:

> Hello,
>
>
> I am looking for a way to check from userspace if a given address can be
> dereferenced. One way would be to examine /proc/self/maps if there is
> something mapped and 'r' at the address, but this seems a little time
> consuming. Is there another way? Kernelspace does have it I think, as
> access_ok().
>
>
> Jan Engelhardt
> --

A user program can trap EFAULT. However, you need to use siglongjmp()
to get back into your program and continue, plus you need to do very
careful coding to mask and unmask the appropriate signals though it
all. Since protection is on a per-page basis, one could make a program
that attempts to R/W from virtual page 0 on up, recoding success or
failure for each page.

Cheers,
Dick Johnson
Penguin : Linux version 2.6.15.4 on an i686 machine (5589.42 BogoMips).
Warning : 98.36% of all statistics are fiction, book release in April.
_


****************************************************************
The information transmitted in this message is confidential and may be privileged. Any review, retransmission, dissemination, or other use of this information by persons or entities other than the intended recipient is prohibited. If you are not the intended recipient, please notify Analogic Corporation immediately - by replying to this message or by sending an email to DeliveryErrors@xxxxxxxxxxxx - and destroy all copies of this information, including any attachments, without reading or disclosing them.

Thank you.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/