Intercepting a system call

Paul Davies C pauldaviesc at gmail.com
Fri Jan 25 08:28:29 EST 2013


Hi,
  [1] is the module I wrote for intercepting the system call fork(). I have
taken the conventional way of hooking the system call. Firstly I found out
the address of the sys_call_table from the System.map. Then I used it in
the module to substitute for the original fork() with my own version of
fork.My version does nothing more than printing a message and returning the
original fork(). It didn't  gave any errors when loaded to kernel using the
insmod.  However it seems that the module had no affect on the
sys_call_table[] since the fork() is working perfectly after the insertion
of module and it does not show me the message it was supposed to print. Can
someone figure out the problem? I am using 3.2.0-4-686 version of kernel.
[1]  http://pastebin.com/aWN3jdQU

-- 
*Regards,*
*Paul Davies C*
vivafoss.blogspot.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20130125/09ac0740/attachment.html 


More information about the Kernelnewbies mailing list