Date: Wed, 17 Sep 2008 11:30:16 -0700 From: Julian Elischer <julian@elischer.org> To: "Andrew N. Below" <defan@zenon.net> Cc: freebsd-hackers@freebsd.org Subject: Re: amd64, COMPAT_IA32 & syscall diverts Message-ID: <48D14CB8.5080002@elischer.org> In-Reply-To: <064901c918e2$803df770$970da8c0@jam.zenon.net> References: <046601c918cc$786cc8c0$970da8c0@jam.zenon.net> <48D123DD.2030701@elischer.org> <064901c918e2$803df770$970da8c0@jam.zenon.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Andrew N. Below wrote: >> Andrew N. Below wrote: >>> Hi all. >>> >>> We have loadable kernel module with >>> several syscall intercepting functions >>> (e.g., sysent[SYS___sysctl].sy_call). >>> Earlier, this module was built and used >>> on i386 platform, now we have to run it >>> on amd64. For some reasons we have to >>> enable COMPAT_IA32 option in kernel. >>> >>> Our syscall wrapper sucessfully receiving >>> syscalls from amd64 binaries, but we have >>> nothing from old i386 binaries. >>> >>> Seems like these calls are made bypassing >>> our kernel module. >> x86 binaries use a separate syscall table, so you need to patch >> both tables. > > Where can I find something about that table? the compat stuff is in /sys/compat/ia32/ So I would start there and follow the logic. > > Nothing interesting in sysent.h/syscall.h... > > -- > Andrew > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?48D14CB8.5080002>