Vulnerability Development mailing list archives
Re: Replacing Kernel Functions via a LKM
From: pjetly () CS TAMU EDU (Prateek Jetly)
Date: Fri, 28 Apr 2000 00:09:36 -0500
check out the description of replacing system calls in the Linux Kernel Module Programmers Guide http://www.linuxmall.com/LDP/LDP/lkmpg/node20.html The possible motivation is also described there. -prateek
-----Original Message----- From: VULN-DEV List [mailto:VULN-DEV () securityfocus com]On Behalf Of Granquist, Lamont Sent: Thursday, April 27, 2000 7:15 PM To: VULN-DEV () securityfocus com Subject: Replacing Kernel Functions via a LKM Is there a way to intercept calls to a given function in the kernel via a LKM? Specifically I'd like to intercept proc_root_lookup() in in fs/proc/root.c and replace it with my own procedure. (motivation for doing so is left as an excersize to the reader)
Current thread:
- Re: Blind Remote Buffer Overflow, (continued)
- Re: Blind Remote Buffer Overflow Marc (Apr 28)
- Re: Blind Remote Buffer Overflow Ralph The Wonder Llama (Apr 28)
- Re: Blind Remote Buffer Overflow Matthew R. Potter (Apr 28)
- Re: Blind Remote Buffer Overflow Sebastian (Apr 29)
- Re: Blind Remote Buffer Overflow Mark L. Jackson (Apr 29)
- Re: Blind Remote Buffer Overflow Arturo Busleiman (Apr 30)
- Re: Blind Remote Buffer Overflow Arturo Busleiman (Apr 30)
- Replacing Kernel Functions via a LKM Granquist, Lamont (Apr 27)
- Re: Replacing Kernel Functions via a LKM Dragos Ruiu (Apr 27)
- Re: Replacing Kernel Functions via a LKM Dragos Ruiu (Apr 28)
- Re: Replacing Kernel Functions via a LKM Prateek Jetly (Apr 27)
- Re: No-Exec Stack Smashing 101 Michael H. Warfield (Apr 26)
- Re: No-Exec Stack Smashing 101 Crispin Cowan (Apr 26)
- Re: No-Exec Stack Smashing 101 Taneli Huuskonen (Apr 26)
- Re: No-Exec Stack Smashing 101 Michael H. Warfield (Apr 20)