Date: Sat, 21 Dec 2002 09:45:54 -0800 From: Terry Lambert <tlambert2@mindspring.com> To: Pawel Jakub Dawidek <nick@garage.freebsd.pl> Cc: freebsd-hackers@freebsd.org Subject: Re: Syscall number. Message-ID: <3E04A8D2.C6CDBF6A@mindspring.com> References: <20021220184337.GD11475@garage.freebsd.pl> <20021221032233.GG11475@garage.freebsd.pl>
next in thread | previous in thread | raw e-mail | index | archive | help
Pawel Jakub Dawidek wrote: > On Fri, Dec 20, 2002 at 07:43:37PM +0100, Pawel Jakub Dawidek wrote: > +> Simple example (from kld module): > +> > +> sysent[SYS_chmod].sy_call = myfunction; > +> sysent[SYS_open].sy_call = myfunction; > +> sysent[SYS_execve].sy_call = myfunction; [ ... ] > Ok, I've found solution (ripped from trap.c, ehh). This is actually a bad way to do things. There is a system call loadable module type, and you should use that instead of directly accessing the system call entry table and stomping on values without asserting appropriate locks. -- Terry To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3E04A8D2.C6CDBF6A>