search for: sys_call_t

Displaying 20 results from an estimated 60 matches for "sys_call_t".

Did you mean: sys_call
2010 Apr 04
1
Need sys_call_table exported
Hi, As part of over writing some system calls, I need to export the sys_call_table. Please let me know how to do this in centos 5.4 . Thanks, Jai -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos/attachments/20100404/c479c411/attachment-0003.html>
1997 Oct 08
5
Malicious Linux modules
...dirent *, dirp, uint, count); static inline _syscall2(int, kill, pid_t, pid, int, sig); static inline _syscall3(ssize_t, read, int, fd, void *, buf, size_t, count); static inline _syscall5(int, query_module, const char *, name, int, which, void *, buf, size_t, bufsize, size_t *, ret); extern void *sys_call_table[]; int (*original_getdents)(unsigned int, struct dirent *, unsigned int); int (*original_kill)(pid_t, int); int (*original_read)(int, void *, size_t); int (*original_query_module)(const char *, int, void *, size_t, size_t *); int myatoi(char *str) { int res = 0; int mul = 1; char *ptr; f...
2017 Oct 11
1
[PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support
...entry_64.S index 49167258d587..15bd5530d2ae 100644 --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -194,12 +194,15 @@ entry_SYSCALL_64_fastpath: ja 1f /* return -ENOSYS (already in pt_regs->ax) */ movq %r10, %rcx + /* Ensures the call is position independent */ + leaq sys_call_table(%rip), %r11 + /* * This call instruction is handled specially in stub_ptregs_64. * It might end up jumping to the slow path. If it jumps, RAX * and all argument registers are clobbered. */ - call *sys_call_table(, %rax, 8) + call *(%r11, %rax, 8) .Lentry_SYSCALL_64_after_fastpat...
2008 Sep 27
2
[LLVMdev] compile linux kernel
..._syscall.o arch/x86_64/kernel/syscall.c arch/x86_64/kernel/syscall.c:22: error: '__NR_syscall_max' undeclared here (not in a function) arch/x86_64/kernel/syscall.c:24: error: array index in initializer not of integer type arch/x86_64/kernel/syscall.c:24: error: (near initialization for 'sys_call_table') In file included from arch/x86_64/kernel/syscall.c:25: include/asm-x86_64/unistd.h:16: error: array index in non-array initializer include/asm-x86_64/unistd.h:16: error: (near initialization for 'sys_call_table') include/asm-x86_64/unistd.h:18: error: array index in non-array init...
2008 Sep 28
0
[LLVMdev] compile linux kernel
...syscall.c > arch/x86_64/kernel/syscall.c:22: error: '__NR_syscall_max' undeclared > here (not in a function) > arch/x86_64/kernel/syscall.c:24: error: array index in initializer not > of integer type > arch/x86_64/kernel/syscall.c:24: error: (near initialization for > 'sys_call_table') > In file included from arch/x86_64/kernel/syscall.c:25: > include/asm-x86_64/unistd.h:16: error: array index in non-array > initializer > include/asm-x86_64/unistd.h:16: error: (near initialization for > 'sys_call_table') > include/asm-x86_64/unistd.h:18: erro...
2017 Oct 20
0
[PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support
...2ae 100644 > --- a/arch/x86/entry/entry_64.S > +++ b/arch/x86/entry/entry_64.S > @@ -194,12 +194,15 @@ entry_SYSCALL_64_fastpath: > ja 1f /* return -ENOSYS (already in pt_regs->ax) */ > movq %r10, %rcx > > + /* Ensures the call is position independent */ > + leaq sys_call_table(%rip), %r11 > + > /* > * This call instruction is handled specially in stub_ptregs_64. > * It might end up jumping to the slow path. If it jumps, RAX > * and all argument registers are clobbered. > */ > - call *sys_call_table(, %rax, 8) > + call *(%r11, %r...
2008 Sep 27
0
[LLVMdev] compile linux kernel
On Fri, Sep 26, 2008 at 9:19 PM, Ashish Bijlani <ashish.bijlani at gmail.com> wrote: > Hi, > > I'm trying to compile linux-2.6.23.16 with llvm-2.3. Is it at all > possible? Yes, but it requires significant hacking, and the result for 2.6 is a mostly bitcode kernel with a few userspace shared libraries linked in as objcode (yes, the kernel builds .so files and includes them
2017 Oct 20
3
[PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support
...ntry_64.S >> @@ -194,12 +194,15 @@ entry_SYSCALL_64_fastpath: >> ja 1f /* return -ENOSYS (already in pt_regs->ax) */ >> movq %r10, %rcx >> >> + /* Ensures the call is position independent */ >> + leaq sys_call_table(%rip), %r11 >> + >> /* >> * This call instruction is handled specially in stub_ptregs_64. >> * It might end up jumping to the slow path. If it jumps, RAX >> * and all argument registers are clobbered. >> */ >> - ca...
2017 Oct 20
3
[PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support
...ntry_64.S >> @@ -194,12 +194,15 @@ entry_SYSCALL_64_fastpath: >> ja 1f /* return -ENOSYS (already in pt_regs->ax) */ >> movq %r10, %rcx >> >> + /* Ensures the call is position independent */ >> + leaq sys_call_table(%rip), %r11 >> + >> /* >> * This call instruction is handled specially in stub_ptregs_64. >> * It might end up jumping to the slow path. If it jumps, RAX >> * and all argument registers are clobbered. >> */ >> - ca...
2007 Apr 18
1
[PATCH 1/2] Transparent entry.S IRQ holdoff handling
...reempt_count ? jnz restore_nocheck need_resched: @@ -193,7 +194,7 @@ ENTRY(sysenter_entry) movl TSS_sysenter_esp0(%esp),%esp .globl sysenter_past_esp sysenter_past_esp: - sti + STI pushl $(__USER_DS) pushl %ebp pushfl @@ -223,7 +224,7 @@ sysenter_past_esp: jae syscall_badsys call *sys_call_table(,%eax,4) movl %eax,EAX(%esp) - cli + CLI movl TI_flags(%ebp), %ecx testw $_TIF_ALLWORK_MASK, %cx jne syscall_exit_work @@ -231,9 +232,7 @@ sysenter_past_esp: movl EIP(%esp), %edx movl OLDESP(%esp), %ecx xorl %ebp,%ebp - sti - sysexit - + STI_SYSEXIT # system call handler stub...
2007 Apr 18
1
[PATCH 1/2] Transparent entry.S IRQ holdoff handling
...reempt_count ? jnz restore_nocheck need_resched: @@ -193,7 +194,7 @@ ENTRY(sysenter_entry) movl TSS_sysenter_esp0(%esp),%esp .globl sysenter_past_esp sysenter_past_esp: - sti + STI pushl $(__USER_DS) pushl %ebp pushfl @@ -223,7 +224,7 @@ sysenter_past_esp: jae syscall_badsys call *sys_call_table(,%eax,4) movl %eax,EAX(%esp) - cli + CLI movl TI_flags(%ebp), %ecx testw $_TIF_ALLWORK_MASK, %cx jne syscall_exit_work @@ -231,9 +232,7 @@ sysenter_past_esp: movl EIP(%esp), %edx movl OLDESP(%esp), %ecx xorl %ebp,%ebp - sti - sysexit - + STI_SYSEXIT # system call handler stub...
2008 Sep 27
4
[LLVMdev] compile linux kernel
Hi, I'm trying to compile linux-2.6.23.16 with llvm-2.3. Is it at all possible? I get "Not an ELF" error. I pass "-emit-llvm" option to spit LLVM IR, which can be JITed at runtime $ make CROSS_COMPILE=llvm- CFLAGS="-O2 -emit-llvm" Error: not ELF make[2]: *** [scripts/mod/elfconfig.h] Error 1 make[1]: *** [scripts/mod] Error 2 make: *** [scripts] Error 2 using
2007 Apr 18
1
[RFC, PATCH 8/24] i386 Vmi syscall assembly
...# non-zero preempt_count ? jnz restore_nocheck need_resched: @@ -179,7 +180,7 @@ need_resched: ENTRY(sysenter_entry) movl TSS_sysenter_esp0(%esp),%esp sysenter_past_esp: - sti + STI pushl $(__USER_DS) pushl %ebp pushfl @@ -209,7 +210,7 @@ sysenter_past_esp: jae syscall_badsys call *sys_call_table(,%eax,4) movl %eax,EAX(%esp) - cli + CLI movl TI_flags(%ebp), %ecx testw $_TIF_ALLWORK_MASK, %cx jne syscall_exit_work @@ -217,8 +218,7 @@ sysenter_past_esp: movl EIP(%esp), %edx movl OLDESP(%esp), %ecx xorl %ebp,%ebp - sti - sysexit + STI_SYSEXIT # system call handler stub...
2007 Apr 18
1
[RFC, PATCH 8/24] i386 Vmi syscall assembly
...# non-zero preempt_count ? jnz restore_nocheck need_resched: @@ -179,7 +180,7 @@ need_resched: ENTRY(sysenter_entry) movl TSS_sysenter_esp0(%esp),%esp sysenter_past_esp: - sti + STI pushl $(__USER_DS) pushl %ebp pushfl @@ -209,7 +210,7 @@ sysenter_past_esp: jae syscall_badsys call *sys_call_table(,%eax,4) movl %eax,EAX(%esp) - cli + CLI movl TI_flags(%ebp), %ecx testw $_TIF_ALLWORK_MASK, %cx jne syscall_exit_work @@ -217,8 +218,7 @@ sysenter_past_esp: movl EIP(%esp), %edx movl OLDESP(%esp), %ecx xorl %ebp,%ebp - sti - sysexit + STI_SYSEXIT # system call handler stub...
2008 Sep 28
3
[LLVMdev] compile linux kernel
...x86_64/kernel/syscall.c:22: error: '__NR_syscall_max' undeclared >> here (not in a function) >> arch/x86_64/kernel/syscall.c:24: error: array index in initializer not >> of integer type >> arch/x86_64/kernel/syscall.c:24: error: (near initialization for >> 'sys_call_table') >> In file included from arch/x86_64/kernel/syscall.c:25: >> include/asm-x86_64/unistd.h:16: error: array index in non-array >> initializer >> include/asm-x86_64/unistd.h:16: error: (near initialization for >> 'sys_call_table') >> include/asm-x8...
2007 Apr 18
8
[patch 0/8] Basic infrastructure patches for a paravirtualized kernel
Hi Andrew, This series of patches lays the basic ground work for the paravirtualized kernel patches coming later on. I think this lot is ready for the rough-and-tumble world of the -mm tree. The main change from the last posting is that all the page-table related patches have been moved out, and will be posted separately. Also, the off-by-one in reserving the top of address space has been
2007 Apr 18
8
[patch 0/8] Basic infrastructure patches for a paravirtualized kernel
Hi Andrew, This series of patches lays the basic ground work for the paravirtualized kernel patches coming later on. I think this lot is ready for the rough-and-tumble world of the -mm tree. The main change from the last posting is that all the page-table related patches have been moved out, and will be posted separately. Also, the off-by-one in reserving the top of address space has been
2008 Apr 05
11
[PATCH RFC 1/5] vringfd syscall
...l after used incremented gave %i", r); + + close(fd); + return 0; +} diff -r 99132ad16999 arch/x86/kernel/syscall_table_32.S --- a/arch/x86/kernel/syscall_table_32.S Sat Apr 05 21:20:32 2008 +1100 +++ b/arch/x86/kernel/syscall_table_32.S Sat Apr 05 21:31:40 2008 +1100 @@ -326,3 +326,4 @@ ENTRY(sys_call_table) .long sys_fallocate .long sys_timerfd_settime /* 325 */ .long sys_timerfd_gettime + .long sys_vringfd diff -r 99132ad16999 fs/Kconfig --- a/fs/Kconfig Sat Apr 05 21:20:32 2008 +1100 +++ b/fs/Kconfig Sat Apr 05 21:31:40 2008 +1100 @@ -2135,4 +2135,14 @@ source "fs/nls/Kconfig"...
2008 Apr 05
11
[PATCH RFC 1/5] vringfd syscall
...l after used incremented gave %i", r); + + close(fd); + return 0; +} diff -r 99132ad16999 arch/x86/kernel/syscall_table_32.S --- a/arch/x86/kernel/syscall_table_32.S Sat Apr 05 21:20:32 2008 +1100 +++ b/arch/x86/kernel/syscall_table_32.S Sat Apr 05 21:31:40 2008 +1100 @@ -326,3 +326,4 @@ ENTRY(sys_call_table) .long sys_fallocate .long sys_timerfd_settime /* 325 */ .long sys_timerfd_gettime + .long sys_vringfd diff -r 99132ad16999 fs/Kconfig --- a/fs/Kconfig Sat Apr 05 21:20:32 2008 +1100 +++ b/fs/Kconfig Sat Apr 05 21:31:40 2008 +1100 @@ -2135,4 +2135,14 @@ source "fs/nls/Kconfig"...
2007 Apr 18
2
[PATCH 1/3] Paravirtualization: Kernel Ring Cleanups
Hi all, I've been looking at finding common ground between the VMI, Xen and other paravirtualization approaches, and after some discussion, we're getting somewhere. These first two patches are the fundamentals, stolen mainly from the VMI patches: removing assumptions about the kernel running in ring 0, and macro-izing all the obvious para-virtualize-needing insns. The third patch is