Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 21 Oct 2002 16:27:09 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 21 Oct 2002 16:27:09 -0400 Received: from videira.terra.com.br ([200.176.3.5]:28810 "EHLO videira.terra.com.br") by vger.kernel.org with ESMTP id ; Mon, 21 Oct 2002 16:27:08 -0400 Subject: Re: System call wrapping From: Lucio Maciel To: Rik van Riel Cc: LKML In-Reply-To: References: Content-Type: text/plain Content-Transfer-Encoding: 7bit X-Mailer: Ximian Evolution 1.0.7 Date: 21 Oct 2002 17:33:14 -0300 Message-Id: <1035232394.21145.8.camel@walker> Mime-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 873 Lines: 30 On Mon, 2002-10-21 at 17:14, Rik van Riel wrote: > > Maybe you could use the Linux Security Module hooks for > open() and exec() to pass a request to your virus scan > software ? > > Note that this kernel module needs to be GPL, due to the > fact that it's a derived work of the kernel itself. This > only applies to the kernel module that asks the virus > scanner to check the files for virusses, not necessarily > the virus scanner itself. > > Rik > -- Hello... Where can i find some information or documentation about this ???? thanks -- ::: Lucio F. Maciel ::: abslucio@terra.com.br ::: icq 93065464 ::: Absoluta.net - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/