Re: Q: Making sure nobody hooks the same function/syscall

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2002-03-14 at 01:43, Seth Arnold wrote:
> On Thu, Mar 14, 2002 at 01:19:20AM +0100, petter wahlman wrote:
> >> [syscall hijacking]
> > Yes, I know, but sadly there is no way to prevent using such a hack in
> > my case (I am developing a filesystem independent on-access AV driver),
> > so any suggestions to the previously mentioned problems are grately
> > apreciated.
> 
> Document that someone loading your module should ensure that no other
> modules which perform syscall hijacking are loaded.
> 

...or worse, will be loaded.
Sadly i can't expect users of my driver to understand such issues.


> I suppose you could also hijack the create_module(2), init_module(2),
> remove_module(2) syscalls to prevent anyone else from modifying the
> table after your module is loaded, and pray that any previous modules
> disable loading further modules if they also modify the syscall table.

I do not see how I can prevent someone from hooking a syscall with this
approach - exept for disallowing loading of modules, wich is a little
bit drastic ;).
I suppose a nice feature would be a run-time
UNEXPORT_SYMBOL(sys_call_table).



> 
> Hey! That is two suggestions: 

Yes, and they were much appreciated :)

> Document and Pray.
> 
> :)
> 
> -- 
> http://sardonix.org/


--
Kernelnewbies: Help each other learn about the Linux kernel.
Archive:       http://mail.nl.linux.org/kernelnewbies/
FAQ:           http://kernelnewbies.org/faq/


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux