I have noticed that it IS possible to read/write from/to some app memory (Which I'm in context of) while in kernel mode but it is NOT possible to execute user space code.
I guess that it has something to do with the kernel code segment (The limit & Granularity). Is there a way to execute user-space addresses? I know that it breaks the Linux security model etc, I just wonder from my own curiosity if it is possible to trick the Linux Kernel and make it execute user-space code.