[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] How to know hypercall entry and exit addresses?


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: Nbp <nbp0204@xxxxxxxxx>
  • Date: Thu, 16 Oct 2008 05:15:57 -0400
  • Delivery-date: Thu, 16 Oct 2008 02:16:23 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type; b=AXbN+LjjDCpMcdVMysTm6alL1fVqtbwRmfZFM8vq5cDFlt5a1h99I2ydVhiCYKnXUV YqgJ2adaBwQFrdYU0wpsw+RZgBnJfTodNczkydM+c5SnXC2ilumbjX5Oc4e+675KmxPY UT0I5+inh16Ikur82Ou3bhact49V/3DINvWdQ=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

Hi,

I want to get the virtual addresses of the hypercall entry and exit.
To know system call addresses, I know there is a file System.map in /boot.
By looking up the file we can get many kernel symbols addresses.
I am wondering if there is a similar file in Xen.
Or is there other ways so that I can determine the virtual addresses of hypercalls.
Any information is appreciated. Thanks in advance.

Regards,
- Tommy
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.