Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 03 Sep 2000 16:07:14 -0700
From:      Pavlin Ivanov Radoslavov <pavlin@catarina.usc.edu>
To:        Andrzej Bialecki <abial@webgiro.com>
Cc:        awr <awr@plan9.hert.org>, Pavlin Ivanov Radoslavov <pavlin@catarina.usc.edu>, freebsd-hackers@FreeBSD.ORG, sef@FreeBSD.ORG
Subject:   Re: Q: System call interception 
Message-ID:  <200009032307.QAA34204@rumi.usc.edu>
In-Reply-To: Your message of "Sun, 03 Sep 2000 19:56:42 %2B0200." <Pine.BSF.4.20.0009031954320.93881-100000@mx.webgiro.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
> > 
> > Intercepting syscalls is very easy.  In my mind, what you should do is
> > write a KLD that creates a syscall that mimicks the actions of what

Thanks for the detailed info and the pointers.
However, I forgot to mention that the solution I need should not
require modifications to the system, and should not require root
privilege.

Pavlin


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200009032307.QAA34204>