You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The issue is because we enable the "CopyDataWithPf" in config.json as debug. The feature will do the user/kernel memory copy based on page fault. When there is invalid address in user request, as the page fault has no good way to pass the error message to the caller api. The system will crash. The feature could get a little better performance than disable this. So I will disable this feature by default. And will create a PR after more test.
this simple user program could panic the kernel
log:
This is because the syscall handler
SysClockGetTime
(among many others) copies to user buffer without sanity check.In this case I'm passing a null ptr. This causes a pagefault in kernel.
Actually, any illegal user pointer will cause a kernel panic. Because the
Memcpy
is called upon the user pointer in kernel space.The text was updated successfully, but these errors were encountered: