Re: Kernel stack corruption

Alan Cox (alan@lxorguk.ukuu.org.uk)
Thu, 4 Feb 1999 18:48:26 +0000 (GMT)


> the same happens with KIP5_IOCSETSBTCODE functions.
> Only calls like KIP5_IOCSETSBTSIZE where READ and WRITE flags are not set
> returns without problems.
>
> Can anyone tell me why this happens?

Either you trashed the stack by a buffer overrun or by trying to put too
much on the kernel stack. You really shouldnt be putting blocks bigger than
a couple of K on the stack

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/