Displaying 2 results from an estimated 2 matches for "int80_bounc".
Did you mean:
int80_bounce
2012 Feb 16
0
question about syscall interception
...int 0x80" to launch a system call, then is it true
that after "init_int80_direct_trap," the int 0x80 is no longer intercepted
by Xen, and the app can trap directly into the guest kernel? My
understanding is that "init_int80_direct_trap" initializes vcpu''s
arch_vpuc.int80_bounce. Could someone please briefly explain how things
work after this struct is properly setup? How could I intercept system
calls launched in this way in Xen?
Thanks.
X
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/x...
2007 Aug 08
2
[PATCH] x86-64: syscall/sysenter support for 32-bit apps
...==========================================
--- 2007-08-08.orig/xen/include/asm-x86/domain.h 2007-08-07 15:00:27.000000000 +0200
+++ 2007-08-08/xen/include/asm-x86/domain.h 2007-08-08 11:37:08.000000000 +0200
@@ -285,6 +285,16 @@ struct arch_vcpu
#endif
#ifdef CONFIG_X86_64
struct trap_bounce int80_bounce;
+ unsigned long syscall32_callback_eip;
+ unsigned long sysenter_callback_eip;
+ unsigned long sysexit_eip;
+ unsigned short syscall32_callback_cs;
+ unsigned short sysenter_callback_cs;
+ unsigned short sysexit_cs;
+ bool_t syscall32_di...