-
Notifications
You must be signed in to change notification settings - Fork 0
reid-harrison/print-sys-call
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Print Reverse System Call CS3210: Operating Systems Phil Oliver Reid Harrison Begin by extracting the archive, placing the printcall folder and the Makefile in the base directory of the linux kernel. The syscall_table_32.S file belongs in linux-2.6.24.6/arch/x86/kernel/syscall_table_32.S while unistd_64.h goes in the directory /linux2.6.24.6/include/asm-x86 The module for the print call should be in /linux2.6.24.6/printcall. The system call can be modified through printcall.c Next the kernel needs to be built: In /linux2.6.24.6 run sudo make Then the modules need to be compiled: sudo make modules Then the modules must be installed: sudo make modules_install Finally, the kernel must be installed: sudo make install Add an entry to the grub config so we can choose to boot into our new kernel: title CS3210 DIS HACK (2.6.24.6) root (hd0,0) kernel /vmlinuz-2.6.24.6-myProj ro initrd /initrd-2.6.24.6-myProj.img Now, reboot the kernel: sudo reboot When the kernel is back up, use vncviewer to select the kernel. The one we're using is titled "DIS HACK" Next, proceed to the printtest directory from the archive. Make... And run the executable by typing: ./printtest"SOME PHRASE" Where SOME PHRASE can be any string that does not contain special characters. The input's reverse will be printed.
About
A simple Linux system call that prints an input string in reverse.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published