Displaying 1 result from an estimated 1 matches for "arch_vpuc".
Did you mean:
arch_vcpui
2012 Feb 16
0
question about syscall interception
...ses "int 0x80" to launch a system call, then is it true
that after "init_int80_direct_trap," the int 0x80 is no longer intercepted
by Xen, and the app can trap directly into the guest kernel? My
understanding is that "init_int80_direct_trap" initializes vcpu''s
arch_vpuc.int80_bounce. Could someone please briefly explain how things
work after this struct is properly setup? How could I intercept system
calls launched in this way in Xen?
Thanks.
X
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xen...