You can access the code also from the below link. https://gist.github.com/4634681
On Fri, Jan 25, 2013 at 6:58 PM, Paul Davies C <[email protected]>wrote: > Hi, > [1] is the module I wrote for intercepting the system call fork(). I > have taken the conventional way of hooking the system call. Firstly I found > out the address of the sys_call_table from the System.map. Then I used it > in the module to substitute for the original fork() with my own version of > fork.My version does nothing more than printing a message and returning the > original fork(). It didn't gave any errors when loaded to kernel using the > insmod. However it seems that the module had no affect on the > sys_call_table[] since the fork() is working perfectly after the insertion > of module and it does not show me the message it was supposed to print. Can > someone figure out the problem? I am using 3.2.0-4-686 version of kernel. > [1] http://pastebin.com/aWN3jdQU > > -- > *Regards,* > *Paul Davies C* > vivafoss.blogspot.com > -- *Regards,* *Paul Davies C* vivafoss.blogspot.com
_______________________________________________ Kernelnewbies mailing list [email protected] http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
