nhmk/examples
Hao.Dong 950408472e
Add a hook on syscall using Kprobes under x86 (#260)
For x86 architecture, the system call table cannot be used to invoke
a system call after commit 1e3ad78 since v6.9. This commit has been
backported to long term stable kernels, like v5.15.154+, v6.1.85+,
v6.6.26+ and v6.8.5+[1]. In this case, thanks to Kprobes, a hook can be
used instead on the system call entry to intercept the system call.

[1] https://stackoverflow.com/a/78607015

Co-authored-by: Hao Dong <hao.dong.work@outlook.com>
2024-07-05 07:40:53 +08:00
..
2024-04-21 01:12:33 +08:00
2023-10-08 17:14:09 +08:00
2022-02-21 00:53:29 +08:00
2024-04-16 02:38:07 +08:00
2024-02-01 15:09:23 +08:00
2024-04-16 06:19:52 +08:00
2024-04-21 01:09:28 +08:00
2023-03-24 11:36:33 +08:00
2023-10-08 17:14:09 +08:00
2023-10-07 16:32:26 +02:00
2021-08-08 01:24:59 +08:00
2024-04-16 06:24:06 +08:00
2021-09-04 17:53:29 +08:00
2022-04-19 01:54:24 +08:00
2022-04-19 01:54:24 +08:00