[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] question about syscall interception
Hello everyone, I have a few questions about syscall interception in Xen. Thanks for any advice/suggestion. Setting: CPU, Xen and PV Linux guest are all 64-bit (1) If a guest app uses "syscall" instruction to launch a system call to the guest kernel, is that behavior intercepted by Xen by default? If yes, could someone please point me to the related code in Xen for this interception? (anything to do with "switch_to_kernel in xen/arch/x86/x86_64/entry.S"?) If no, then how could I intercept that instruction in this case?
(2) If a guest app uses "int 0x80" to launch a system call, then is it true that after "init_int80_direct_trap," the int 0x80 is no longer intercepted by Xen, and the app can trap directly into the guest kernel? My understanding is that "init_int80_direct_trap" initializes vcpu's arch_vpuc.int80_bounce. Could someone please briefly explain how things work after this struct is properly setup? How could I intercept system calls launched in this way in Xen?
Thanks. X
_______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |