[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Dazuko-devel] Re: Syscall hooks for Linux 2.6
From: |
John Ogness |
Subject: |
[Dazuko-devel] Re: Syscall hooks for Linux 2.6 |
Date: |
Tue, 19 Sep 2006 11:31:14 +0200 |
User-agent: |
Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20060503 Debian/1.7.8-1sarge6 |
Kevin Kofler wrote:
> I just looked at the 2.3.1-pre3 code and xp_sys_unhook has this:
> #ifdef SYSCALL_TABLE_READONLY
> /* protect the syscall table */
> change_page_attr(virt_to_page(sys_call_table), 1, PAGE_KERNEL);
> global_flush_tlb();
> #endif
> This should be PAGE_KERNEL_RO (as this code is supposed to turn the write
> protection on the syscall table back on). xp_sys_hook has the correct code:
> #ifdef SYSCALL_TABLE_READONLY
> /* protect the syscall table */
> change_page_attr(virt_to_page(sys_call_table), 1, PAGE_KERNEL_RO);
> global_flush_tlb();
> #endif
You're right! Thanks. I have made the change in CVS. It will be included in
the 2.3.1 official release.
> Oh, and what's the rationale for requiring --sct-readonly to be given
> explicitly? Forgetting it will completely lock up the system. I know there is
> a warning, but is there some reason the information in System.map cannot be
> trusted?
On several distributions (Gentoo, SUSE), the information in System.map lies.
Unfortunately there is no way to poll the running kernel to investigate the
truth at runtime.
John Ogness
--
Dazuko Maintainer
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [Dazuko-devel] Re: Syscall hooks for Linux 2.6,
John Ogness <=