* Intercept system call trap on Xen,
@ 2011-06-07 16:39 Hui Kang
0 siblings, 0 replies; only message in thread
From: Hui Kang @ 2011-06-07 16:39 UTC (permalink / raw)
To: xen-devel@lists.xensource.com
[-- Attachment #1.1: Type: text/plain, Size: 846 bytes --]
Hi,
I have a question regarding intercepting the system call from a guest kernel on hypervisor. I am using xen-4.0.1 with a PV-guest.
To disable the fast system call which bypasses the hypervisor, I first comment out this lines in the file
Xen/arch/x86/traps.c
If (cur.vector == 0x80)
{
/* init_int80_direct_trap(curr); */
}
To verify this, when I boot the kernel, I add printk and see that init_int80_direct_trap is not executed.
Then in the function in the same file as above, do_guest_trap, I add a printk to trap the system call from guest kernel
Static void do_guest_trap…
{
If (trapnr == 0x80)
printk("System call from guest");
}
However, when I run some program in the guest kernel to issue some system call, the hypervisor does not print out the message. Can anyone help on this? Thanks.
- Hui
[-- Attachment #1.2: Type: text/html, Size: 2275 bytes --]
[-- Attachment #2: Type: text/plain, Size: 138 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2011-06-07 16:39 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2011-06-07 16:39 Intercept system call trap on Xen, Hui Kang
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).