hi,

while looking at PROTECTED build,
i noticed that it was trivial for userspace code to bypass the
protection and access kernel memory.
eg. by passing kernel pointer to system calls.
and it seems that it isn't the only way for userspace to trick the kernel.

are these by design? eg. not a problem for what nuttx is intended for.
or bug/overlook/todo/nice-to-have?

background: i'm familiar with "full-sized" operating systems like bsd.
but i'm new to nuttx.

Reply via email to