Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread richard -rw- weinberger
On Tue, Aug 14, 2012 at 6:13 PM, Ajay Garg wrote: > So, the use-case I am trying to solve, is that only a particular > process should be able to read a group of files, and no one else (i.e. > no-other-user/ no-other-process/no-other-anything). The only exception > is the "root" user, and any user

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread Ajay Garg
Thanks Richard, Felipe, Alan. First of all, let me tell you that I am highly previleged talking to some of the most distinguished hackers in the world. Alan, I truly admire you :) So, the use-case I am trying to solve, is that only a particular process should be able to read a group of files,

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread Alan Cox
> I have already tried extracting the address of the "sys_call_table" > from "System.Map"; however, I am still not able to replace the > function-pointers with mine. Correct. > Trying to do gives me page-faults, apparently meaning that the > syscall-table memory area is read-only. Correct. The

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread Felipe Balbi
On Tue, Aug 14, 2012 at 05:01:56PM +0530, Ajay Garg wrote: > Hi all. > > It is well known that the syscall-table had stopped being exported > from version 2.6 onwards. > > So, now as a developer, if I wish to hack into the syscall-table, and > change the syscall-function-pointers to my

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread richard -rw- weinberger
On Tue, Aug 14, 2012 at 1:31 PM, Ajay Garg wrote: > So, now as a developer, if I wish to hack into the syscall-table, and > change the syscall-function-pointers to my custom-function-pointers > (mainly for the reason of adding/preventing access to certain files, > via Kernel-Loadable-Modules),

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread richard -rw- weinberger
On Tue, Aug 14, 2012 at 1:31 PM, Ajay Garg ajaygargn...@gmail.com wrote: So, now as a developer, if I wish to hack into the syscall-table, and change the syscall-function-pointers to my custom-function-pointers (mainly for the reason of adding/preventing access to certain files, via

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread Felipe Balbi
On Tue, Aug 14, 2012 at 05:01:56PM +0530, Ajay Garg wrote: Hi all. It is well known that the syscall-table had stopped being exported from version 2.6 onwards. So, now as a developer, if I wish to hack into the syscall-table, and change the syscall-function-pointers to my

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread Alan Cox
I have already tried extracting the address of the sys_call_table from System.Map; however, I am still not able to replace the function-pointers with mine. Correct. Trying to do gives me page-faults, apparently meaning that the syscall-table memory area is read-only. Correct. The kernel

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread Ajay Garg
Thanks Richard, Felipe, Alan. First of all, let me tell you that I am highly previleged talking to some of the most distinguished hackers in the world. Alan, I truly admire you :) So, the use-case I am trying to solve, is that only a particular process should be able to read a group of files,

Re: How to hack syscall-table, in kernel 2.6+ ?

2012-08-14 Thread richard -rw- weinberger
On Tue, Aug 14, 2012 at 6:13 PM, Ajay Garg ajaygargn...@gmail.com wrote: So, the use-case I am trying to solve, is that only a particular process should be able to read a group of files, and no one else (i.e. no-other-user/ no-other-process/no-other-anything). The only exception is the root