Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question 12 Consider the following snippet of code from xv6: void syscall(void) { int num; struct proc *curproc = myproc(); num = curproc->tf->eax; if(num >
Question 12 Consider the following snippet of code from xv6: void syscall(void) { int num; struct proc *curproc = myproc(); num = curproc->tf->eax; if(num > 0 && num tf->eax = syscalls [num](; } else { cprintf("%d %s: unknown sys call %d ", curproc->pid, curproc->name, num); curproc->tf->eax = -1; } } How is the system call number (read into num) first loaded into curproc->tf->eax? the kernel saves all the general purpose registers onto the kernel stack as part of the trap frame, after an interrupt the kernel copies it there as a result of a preceding call to argint the user places the argument to the system call here before calling int it is saved onto the kernel stack by the hardware as part of the int instruction behavior
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started