Re: Adding checkpointing API to Linux kernel

Michael Meissner (meissner@cygnus.com)
Mon, 18 Jan 1999 19:18:26 -0500


On Mon, Jan 18, 1999 at 04:57:41PM -0600, Andy Glew wrote:
> > (2) Binary editing allows you to intercept (a) statically linked binaries
> > (as long as you have symbol table information)
>
> BTW, binary editing allows you to intercept system calls for statically
> linked programs even if you don't have the symbol tables: use code analysis
> to actually find the instructions used to enter the kernel (trap, etc.), and
> intercept those, since the kernel API is pretty well known.

And if you are not careful (and/or too successful), you then get sued by
Rational/Purify for patent infringement (before it got gobbled up, Pure was
active in trying to enforce this patent, dunno if things are now changed with
Rational at the helm).

-- 
Michael Meissner, Cygnus Solutions (Massachusetts office)
4th floor, 955 Massachusetts Avenue, Cambridge, MA 02139, USA
meissner@cygnus.com,	617-354-5416 (office),	617-354-7161 (fax)

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/