linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Getting the way a SIGSEGV append when catching a SIGSEGV from within
@ 2017-03-27 14:45 none
  2017-03-27 15:30 ` Richard Weinberger
  0 siblings, 1 reply; 4+ messages in thread
From: none @ 2017-03-27 14:45 UTC (permalink / raw)
  To: Linux Kernel, linux-x86_64

Hello,

There’s three way to perform an invalid memory access :

The attempt to execute/jump at an invalid address.
The attempt to read at an invalid address.
The attempt to write at an invalid address.

Determining the execute case with rt_sigaction is easy : the last value 
of eip match the value of the address which caused the segfault.

But how to know if the SIGSEGV occurred by a read or by a write attempt 
? In the same time shouldn’t that information belong in the mmu ?

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2017-03-27 19:21 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-03-27 14:45 Getting the way a SIGSEGV append when catching a SIGSEGV from within none
2017-03-27 15:30 ` Richard Weinberger
2017-03-27 18:55   ` none
2017-03-27 19:20     ` Richard Weinberger

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).