[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] intercept SYSCALL


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: OK <olga.krivchikova@xxxxxxxxx>
  • Date: Mon, 29 Jun 2009 17:29:23 +0400
  • Delivery-date: Mon, 29 Jun 2009 06:29:53 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=so6KapVfWYNrwGOXMr8k+sKl/C2T8Q3XTlZ6BY2Xdv2l9cDTvCKo2T/0PRaOZ/970L URZ7Xj7Dp0maHKHvoY34V7OUhjkt5wJoDsgXv9mfw2Ue4Jb1+y2/BL0hLwm3VwkY1ymO 71iMt4G0MGlHs7uEeYMCpP0Gkk3XoS2KsftXY=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

Hi, everybody!
 
I'm looking for a way to intercept SYSCALL of HVM-guest using the Xen (i.e. when a user-mode application makes a system call, I want to intercept it before the HVM-guest kernel gets it). I have 64-bit Xen, 64-bit HVM-guest Windows Vista and Intel-VT processor.

Is it possible? Can someone point me in the right direction?

Thank you,
Olga

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.