On Tue, Jun 16, 2009 at 12:07 PM, Sandu Popa Marius<sandupopamarius@xxxxxxxxx> wrote: > > On Tue, Jun 16, 2009 at 12:02 PM, Vishal Thanki <vishalthanki@xxxxxxxxx> > wrote: >> >> In case where you want to intercept these calls, you can write a shared >> library by having your implementation of these calls (i.e. >> read/write/mount). And then, set the path of this library in LD_PRELOAD >> environment. Any application running under this environment variable set, >> will invoke your implementation instead of calling system call. >> >> Regards, >> Vishal >> > > The LD_PRELOAD method has a few drawbacks: security issues, statically > linked programs. I am looking for another solution. > Marius You can analyze LSM, it seems to be a good solution. ([1]). thanks, Daniel. [1] http://www.usenix.org/event/sec02/full_papers/wright/wright.pdf -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx Please read the FAQ at http://kernelnewbies.org/FAQ