Hijack a weak syscall

NISHANTHA j.l.madushan at gmail.com
Fri Sep 18 01:25:17 EDT 2015


Hi,
I'm trying to implement kexec as a module. When I do "cat /proc/kallsyms |
grep kexec" it gives a out output like this

c01b3478 W compat_sys_kexec_load
c01b3478 W sys_kexec_load

my sys_call_table page is not write protected. So I did

*syscall_table[__NR_kexec_load] = (void *)my_kexec;

but when I run kexec, It still says "kexec_load function not implimented"

When if dig more, The W above means it's a weak symbol. Can I hijack those
or, will I have to find another way?
Thank you
-madushan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20150918/bcfc0704/attachment.html 


More information about the Kernelnewbies mailing list