Displaying 2 results from an estimated 2 matches for "callp".
Did you mean:
call
2004 Sep 17
1
Fwd: FreeBSD kernel buffer overflow
...l() is responsible for loading arguments from a syscall and copying
>them in a kspace
>pointer in order to accessing them. The code to do that is the following:
>
>void
>syscall(frame)
> struct trapframe frame;
>{
> caddr_t params;
> struct sysent *callp;
> struct thread *td = curthread;
> struct proc *p = td->td_proc;
> register_t orig_tf_eflags;
> u_int sticks;
> int error;
> int narg;
> int args[8];
> u_int code;
>
>
> ...
>
>
>...
2013 Jun 06
1
Reproducable Infiniband panic
...d out>
#14 0xffffffff805c5d0e in sys_sys_exit (td=<value optimized out>,
uap=<value optimized out>)
at /usr/home/julian/src/freebsd/sys/kern/kern_exit.c:122
No locals.
#15 0xffffffff808a6b56 in amd64_syscall (td=0xfffffe000b0af000,
traced=0) at subr_syscall.c:135
sa = {code = 1, callp = 0xffffffff80d31330, args = {0, 0, 10, 0, 0, 0,
133124, -547294200768}, narg = 1}
error = 0
ksi = {ksi_link = {tqe_next = 0x0, tqe_prev = 0x0}, ksi_info =
{si_signo = 2, si_errno = 0, si_code = 65542, si_pid = 0, si_uid = 0,
si_status = 0, si_addr = 0x0, si_value = {sival_int = 0, sival_ptr...