Date: Sun, 03 Sep 2000 16:07:14 -0700 From: Pavlin Ivanov Radoslavov <pavlin@catarina.usc.edu> To: Andrzej Bialecki <abial@webgiro.com> Cc: awr <awr@plan9.hert.org>, Pavlin Ivanov Radoslavov <pavlin@catarina.usc.edu>, freebsd-hackers@FreeBSD.ORG, sef@FreeBSD.ORG Subject: Re: Q: System call interception Message-ID: <200009032307.QAA34204@rumi.usc.edu> In-Reply-To: Your message of "Sun, 03 Sep 2000 19:56:42 %2B0200." <Pine.BSF.4.20.0009031954320.93881-100000@mx.webgiro.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> > > > Intercepting syscalls is very easy. In my mind, what you should do is > > write a KLD that creates a syscall that mimicks the actions of what Thanks for the detailed info and the pointers. However, I forgot to mention that the solution I need should not require modifications to the system, and should not require root privilege. Pavlin To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200009032307.QAA34204>