Subject: Re: Variable limit in kernel syscalls
To: Espen Jorde <>
From: Bill Sommerfeld <>
List: tech-kern
Date: 10/18/2000 15:18:43
It's hard to debug code sight-unseen -- any number of errors in your
code could cause this..

If you haven't done kernel programming before, you should be aware
that the per-process kernel stack is typically very small (you didn't
specify what platform, but it's typically only a VM page or two; you
need to get out of the habit of declaring char buf[4096] on the
stack).  If you use too much stack space, you may overwrite the stack
of another thread or other kernel memory, leading to undefined (and
usually bad) behavior.

					- Bill