Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1030622AbVJ1SYU (ORCPT ); Fri, 28 Oct 2005 14:24:20 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1030568AbVJ1SYU (ORCPT ); Fri, 28 Oct 2005 14:24:20 -0400 Received: from rwcrmhc14.comcast.net ([216.148.227.89]:15038 "EHLO rwcrmhc12.comcast.net") by vger.kernel.org with ESMTP id S1030622AbVJ1SYT (ORCPT ); Fri, 28 Oct 2005 14:24:19 -0400 Date: Fri, 28 Oct 2005 13:24:17 -0500 From: Lee To: linux-kernel@vger.kernel.org Subject: Serial Port Sniffing Message-ID: <20051028132417.6d3dc843@localhost> Reply-To: linuxtwidler@gmail.com X-Mailer: Sylpheed-Claws 1.0.4a (GTK+ 1.2.10; i686-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 711 Lines: 20 Hi, Does anyone have any experience with sniffing data from a serial port w/o the device attached to the serial port or the application having knowledge of this ? I had found an old kernel module (for 2.2.0, i think) called 'maxty' which would does this. Is there something equivalent for the 2.6.x kernels ? Or is there a better way to go about doing this? -- Lee linuxtwidler@gmail.com 13:22:49 up 2 days, 16:50, 2 users, load average: 0.21, 0.07, 0.10 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/