Hi all. It is well known that the syscall-table had stopped being exported from version 2.6 onwards.
So, now as a developer, if I wish to hack into the syscall-table, and change the syscall-function-pointers to my custom-function-pointers (mainly for the reason of adding/preventing access to certain files, via Kernel-Loadable-Modules), what is the recommended way? I have already tried extracting the address of the "sys_call_table" from "System.Map"; however, I am still not able to replace the function-pointers with mine. Trying to do gives me page-faults, apparently meaning that the syscall-table memory area is read-only. I will be grateful, if someone could point me to the recommended way of doing this. Thanks and Regards, Ajay -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/