In case a function name matches the structure of a Xen hypercall, match it, and treat it as a kernel syscall. Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx> --- check_user_data2.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/check_user_data2.c b/check_user_data2.c index 2455e62..a556bb8 100644 --- a/check_user_data2.c +++ b/check_user_data2.c @@ -1000,6 +1000,10 @@ static void match_syscall_definition(struct symbol *sym) if (name && strncmp(name, "compat_sys_", 11) == 0) is_syscall = 1; + // is it a Xen hypercall? + if (name && strncmp(name, "do_", 3) == 0 && ends_with(name,"_op")) + is_syscall = 1; + if (!is_syscall) return; -- 2.7.4 Amazon Development Center Germany GmbH Berlin - Dresden - Aachen main office: Krausenstr. 38, 10117 Berlin Geschaeftsfuehrer: Dr. Ralf Herbrich, Christian Schlaeger Ust-ID: DE289237879 Eingetragen am Amtsgericht Charlottenburg HRB 149173 B