On Tue, Jun 16, 2009 at 12:07 PM, Sandu Popa
Marius<[email protected]> wrote:
>
> On Tue, Jun 16, 2009 at 12:02 PM, Vishal Thanki <[email protected]>
> wrote:
>>
>> In case where you want to intercept these calls, you can write a shared
>> library by having your implementation of these calls (i.e.
>> read/write/mount). And then, set the path of this library in LD_PRELOAD
>> environment. Any application running under this environment variable set,
>> will invoke your implementation instead of calling system call.
>>
>> Regards,
>> Vishal
>>
>
> The LD_PRELOAD method has a few drawbacks: security issues, statically
> linked programs. I am looking for another solution.
> Marius

You can analyze LSM, it seems to be a good solution. ([1]).

thanks,
Daniel.

[1] http://www.usenix.org/event/sec02/full_papers/wright/wright.pdf

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to [email protected]
Please read the FAQ at http://kernelnewbies.org/FAQ

Reply via email to