From: Adam H. <ad...@do...> - 2001-10-13 22:10:11
|
On Sat, 13 Oct 2001, Jeff Dike wrote: > a mechanism for intercepting and nullifying Linux system calls - this doesn't > need to be an official system call interception facility. If the OS just faults > the process when a Linux system call happens, that's just as good (and better > from a performance standpoint). Currently, UML has a tracing thread, that uses ptrace to intercept all syscalls. Could it not be possible to rewrite the memory, so instead of calling int 80, it calls some other interrupt, which is then mapped directly into UML's kernel space? Of course, I'm not sure if linux allows for arbitrary interrupt vectors to be modified. Another problem with this is that there are a limited number of interrupt vectors on i386, at least, which means that the special vector would have to be continously updated. ----BEGIN GEEK CODE BLOCK---- Version: 3.12 GCS d- s: a-- c+++ UL++++ P+ L++++ !E W+ M o+ K- W--- !O M- !V PS-- PE++ Y+ PGP++ t* 5++ X+ tv b+ D++ G e h*! !r z? -----END GEEK CODE BLOCK----- ----BEGIN PGP INFO---- Adam Heath <do...@de...> Finger Print | KeyID 67 01 42 93 CA 37 FB 1E 63 C9 80 1D 08 CF 84 0A | DE656B05 PGP AD46 C888 F587 F8A3 A6DA 3261 8A2C 7DC2 8BD4 A489 | 8BD4A489 GPG -----END PGP INFO----- |