Displaying 3 results from an estimated 3 matches for "switch_to_kernel".
2008 Mar 11
3
Is it possible to make hypercall from user application directly?
Hi,
I implemented my own Hypercall in xen.
Now I wish my application under dom0 could talk to Xen via my hypercall.
Currently, I make a stub in dom0''s kernel, which works as a proxy to forward
the request. So, my application first makes a system call to dom0, which
then makes hypercall to xen.
Is this design necessary? May I call hypercalls from user application under
dom0 directly?
2012 Feb 16
0
question about syscall interception
...and PV Linux guest are all 64-bit
(1) If a guest app uses "syscall" instruction to launch a system call to
the guest kernel, is that behavior intercepted by Xen by default? If yes,
could someone please point me to the related code in Xen for this
interception? (anything to do with "switch_to_kernel in
xen/arch/x86/x86_64/entry.S"?) If no, then how could I intercept that
instruction in this case?
(2) If a guest app uses "int 0x80" to launch a system call, then is it true
that after "init_int80_direct_trap," the int 0x80 is no longer intercepted
by Xen, and the app can...
2007 Aug 08
2
[PATCH] x86-64: syscall/sysenter support for 32-bit apps
...entry.S
===================================================================
--- 2007-08-08.orig/xen/arch/x86/x86_64/entry.S 2007-07-04 12:13:16.000000000 +0200
+++ 2007-08-08/xen/arch/x86/x86_64/entry.S 2007-08-08 11:37:08.000000000 +0200
@@ -26,15 +26,19 @@
ALIGN
/* %rbx: struct vcpu */
switch_to_kernel:
- leaq VCPU_trap_bounce(%rbx),%rdx
+ cmpw $FLAT_USER_CS32,UREGS_cs(%rsp)
movq VCPU_syscall_addr(%rbx),%rax
+ leaq VCPU_trap_bounce(%rbx),%rdx
+ cmoveq VCPU_syscall32_addr(%rbx),%rax
+ btl $_VGCF_syscall_disables_events,VCPU_guest_context_flags(%rbx...