Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756106Ab2HNLgA (ORCPT ); Tue, 14 Aug 2012 07:36:00 -0400 Received: from mail-gg0-f174.google.com ([209.85.161.174]:32809 "EHLO mail-gg0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755815Ab2HNLf7 (ORCPT ); Tue, 14 Aug 2012 07:35:59 -0400 MIME-Version: 1.0 In-Reply-To: References: Date: Tue, 14 Aug 2012 13:35:58 +0200 Message-ID: Subject: Re: How to hack syscall-table, in kernel 2.6+ ? From: richard -rw- weinberger To: Ajay Garg Cc: linux-kernel@vger.kernel.org Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 679 Lines: 17 On Tue, Aug 14, 2012 at 1:31 PM, Ajay Garg wrote: > So, now as a developer, if I wish to hack into the syscall-table, and > change the syscall-function-pointers to my custom-function-pointers > (mainly for the reason of adding/preventing access to certain files, > via Kernel-Loadable-Modules), what is the recommended way? It has been unexported to stop exactly such crap. Not do it. -- Thanks, //richard -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/