Hi, hackers!
I wrote a small kernel module whch impliments some syscall.
Syscall takes a char * as a parameter.
Theoriticaly its posible to pass a bad pointer from userland.
What should I do in orde to check the pointer from userland?
I use copyout(9) to store data from kernel to userland but it doesn't seams to 
be enough - systems got panic if I pass a bad pounter.
I think I'm missing something important about kernel programming.

_______________________________________________
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to