First page Back Continue Last page Overview Graphics
New system call interception mechanisms
Convert system calls into signals
- signal handler executes UML system call
- requires mode switch
- Naturally done by disabling signal in handler
Add notion of privileged/unprivileged contexts
- Unprivileged context can't enter kernel
- Privileged context controls kernel access of unprivileged context
One possibility is to convert system calls into signals. The signal handler would run on the UML kernel stack, and would execute the system call. When entering the kernel, a mode switch turning off system call tracing is required. This could be done fairly naturally by the default behavior of a signal being blocked while its handler is running.
Another possibility is to add the notion of an unprivileged context. A process would have a privileged context, and possibly an unprivileged context. A process running in its unprivileged context would not be able to enter the kernel. Instead, any attempt to do so would cause it to switch to its privileged context, which would examine the unprivileged state and decide whether to allow it to proceed. In this scheme, the UML kernel would be the privileged context, and its userspace would run in unprivileged context.