That is possible so I am sure that someout out there could be diligent enought to make it happen. There are several chicken'n' egg problems in doing it as you describe.But stub call into the real and complex implementation and then the kernel stack will contain many return address point, the hack can command kernel write what he want into this region and modify some return address point to that region, then the kernel will jump to the code eventually.
- Re: userspace/kernel isolation question Nathan Hartman
- Re: userspace/kernel isolation question Sebastien Lorquet
- Re: userspace/kernel isolation question Miguel Ángel Herranz
- Re: userspace/kernel isolation question Gregory Nutt
- Re: userspace/kernel isolation question Miguel Ángel Herranz
- Re: userspace/kernel isolation question Gregory Nutt
- Re: userspace/kernel isolation question Gregory Nutt
- Re: userspace/kernel isolation question Xiang Xiao
- Re: userspace/kernel isolation question Gregory Nutt
- Re: userspace/kernel isolation question Xiang Xiao
- Re: userspace/kernel isolation question Gregory Nutt