Subject: Re: Variable limit in kernel syscalls
To: Espen Jorde <email@example.com>
From: Bill Sommerfeld <firstname.lastname@example.org>
Date: 10/18/2000 15:18:43
It's hard to debug code sight-unseen -- any number of errors in your
code could cause this..
If you haven't done kernel programming before, you should be aware
that the per-process kernel stack is typically very small (you didn't
specify what platform, but it's typically only a VM page or two; you
need to get out of the habit of declaring char buf on the
stack). If you use too much stack space, you may overwrite the stack
of another thread or other kernel memory, leading to undefined (and
usually bad) behavior.