Custom kernel syscall module & data validation

Kentucky Mandeloid Mo. ky at df.ru
Fri Jul 2 09:50:44 PDT 2004


Hi, hackers!
I wrote a small kernel module whch impliments some syscall.
Syscall takes a char * as a parameter.
Theoriticaly its posible to pass a bad pointer from userland.
What should I do in orde to check the pointer from userland?
I use copyout(9) to store data from kernel to userland but it doesn't seams to 
be enough - systems got panic if I pass a bad pounter.
I think I'm missing something important about kernel programming.



More information about the freebsd-hackers mailing list