int v3_syscall_handler (struct guest_info * core, uint8_t vector, void * priv_data) {
uint_t syscall_nr = (uint_t) core->vm_regs.rax;
- int err = 0, ret = 0;
+ int err = 0;
struct v3_syscall_hook * hook = syscall_hooks[syscall_nr];
if (list_empty(&(injects->code_inject_list))) {
return 0;
} else {
+ int ret;
inject = (struct v3_code_inject_info*) list_first_entry(
&(injects->code_inject_list),
static struct v3_extension_impl syscall_impl = {
.name = "syscall_intercept",
- .init = init_syscall_hijack,
- .deinit = deinit_syscall_hijack,
+ .vm_init = init_syscall_hijack,
+ .vm_deinit = deinit_syscall_hijack,
.core_init = init_syscall_hijack_core,
.core_deinit = NULL,
.on_entry = NULL,