|
|
System Calls
Apparently, the Intel architecture provides different ways of accomplishing what operating systems need in order to move between protected, or privileged, levels and modes.
Another way to effect movement between privilege levels is through a software interrupt (the usual mechanism discussed in textbooks), or trap instruction. The Intel architecture also provides this in the form of the INT instruction. Linux implementations use this instruction to effect system calls rather than call gates, apparently. ReferencesCall gates versus the INT instruction in Linux
Other system call mechanisms.
A reference showing how call gates could be used to exploit a flaw in a previous Linux kernel, even though Linux used the system call for its purposes. A final reference for this short presentation has this quote in it and a quick review of call gates: The Intel i386 architecture supports a complex and confusing protection and segmentation model relying on rings, segment selectors, segment descriptors, gates, descriptor tables and the like. http://www.linuxsecurity.com/content/view/102959/107/
|
|
|