[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Stop the execution of syscall in trap.c


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxx\"" <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Carlo Maiero <zesster@xxxxxxxxx>
  • Date: Wed, 13 Oct 2010 15:11:58 +0200
  • Delivery-date: Wed, 13 Oct 2010 06:13:00 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=MA6Qrb+0hExJTHQ2w40AcKjRf/5hYwpAj01ZR8AXEcB0t7RFNu6C3ujQu6ICjT9Sw3 Nno16naIR5qSkokfaYJgMCAfIeLHwYLrJ2UaSSz/3pQBQiyymFIVSrclFMwgi4Ms2zei dLiJhezyzYcIszO6Cxe2/KFpCPy5BCEEh7Vqk=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>


but after the interception I also want to stop some syscall from be executed by the hypervisor.

I intercept the call in the do_guest_trap in trap.c, and i control the (cpu_user_regs regs) regs->eax for the number, and if
the number is some unpermitted syscall as for example (128 for insmod or 129 for rmmod), i want to stop the execution of the syscall.

How can I stop the execution here?(it's possible to stop the execution here?)  or return an error code without a system crush? 
I've tried something but somethings just print the error code, and don't stop the syscall execution, and other things brings to panic.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.