Re: System call hooking in 2.6 kernel..

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



<a30307f8eb480ed848ac45415e29d784@xxxxxxxxxxxxxxxxx>
<20081110120734.GC18624@traven>
<0356de9a68c6213f17b303d3f7d7300d@xxxxxxxxxxxxxxxxx> <804dabb00811100626r1624e8b4hbc4480e15d52686a@xxxxxxxxxxxxxx>
Message-ID: <546ff371fa823c1a02f026098b17b6c6@xxxxxxxxxxxxxxxxx>
X-Sender: lech@xxxxxxxxxxxxxxxx
Received: from chello089079223139.chello.pl [89.79.223.139] with HTTP/1.1
	(POST); Mon, 10 Nov 2008 22:24:14 +0100
User-Agent: RoundCube Webmail/0.1
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit


> there is only 4 debug registers available, whereas kprobe allow
> limitless (almost????) numbers of probe points.

Well yes - but if you want to trace syscalls you can just set the trap for
the call gate.

--
Regards,
Lech


--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux