Displaying 1 result from an estimated 1 matches for "int0x80_syscall".
Did you mean:
xint0x80_syscall
2004 Sep 17
1
Fwd: FreeBSD kernel buffer overflow
...>
>
>A buffer overflow has been found in i386/i386/trap.c syscall() function
>of FreeBSD official
>source tree.
>In order to rule syscalls mechanism, the 'particular' interrupt 128 (0x80)
>is provided in the
>IDT vector. To serve this interrupt, i386/i386/exception.s int0x80_syscall()
>function is
>done and, in the end, it calls syscall().
>syscall() is responsible for loading arguments from a syscall and copying
>them in a kspace
>pointer in order to accessing them. The code to do that is the following:
>
>void
>syscall(frame)
> struct trapf...