Re: [CHECKER] 4 security holes in 2.4.4-ac8

Jeff Garzik (jgarzik@mandrakesoft.com)
Tue, 29 May 2001 19:33:42 -0400


Dawson Engler wrote:
>
> > > (Also, are there other functions called
> > > directly from user space that don't have the sys_* prefix?)
> >
> > Almost certainly, arch/i386/mm/fault.c:do_page_fault is one of
> > many examples.
>
> Is there any way to automatically find these? E.g., is any routine
> with "asmlinkage" callable from user space?

Checking the syscall table in each port is the only authoritative way
AFAIK.

And, if we start doing "magic page" type entry points, or if special
traps exist on other arches, then those would have to be
special-cased...

-- 
Jeff Garzik      | Disbelief, that's why you fail.
Building 1024    |
MandrakeSoft     |
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/