lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 22 Dec 2011 22:29:22 +0530 From: Gaurav Saxena <grvsaxena419@...il.com> To: richard -rw- weinberger <richard.weinberger@...il.com> Cc: linux-kernel@...r.kernel.org Subject: Re: Intercepting system calls Hello Richard, Thank you very much for your reply. On Thu, Dec 22, 2011 at 10:12 PM, richard -rw- weinberger <richard.weinberger@...il.com> wrote: > On Thu, Dec 22, 2011 at 5:07 PM, Gaurav Saxena <grvsaxena419@...il.com> wrote: >> Hello all, >> >> I am writing an application for which I need to intercept some >> filesystem system calls eg. unlink. I need unlink to call my code >> before deleting abc so that I could probably prevent unlink . I would >> like to implement this in a kernel module instead of modifying kernel >> code itself. I would like to intercept system calls by replacing >> system calls but I have not been able to find any method of doing that >> in linux > 3.0. Please suggest some method of doing that. >> > > Intercepting system calls is very bad, don't do it. Oh. I will not do it then, could you suggest me something so that I could prevent unlink on some file say using kernel support. I want to save file on unlink how could I do that without kernel support, or how could I do that using a kernel module. > > -- > Thanks, > //richard -- Thanks and Regards , Gaurav -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists