Displaying 20 results from an estimated 60 matches for "sys_call_table".
2010 Apr 04
1
Need sys_call_table exported
Hi,
As part of over writing some system calls, I need to export the
sys_call_table. Please let me know how to do this in centos 5.4 .
Thanks,
Jai
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.centos.org/pipermail/centos/attachments/20100404/c479c411/attachment-0003.html>
1997 Oct 08
5
Malicious Linux modules
...dirent *, dirp, uint, count);
static inline _syscall2(int, kill, pid_t, pid, int, sig);
static inline _syscall3(ssize_t, read, int, fd, void *, buf, size_t, count);
static inline _syscall5(int, query_module, const char *, name, int, which, void *, buf, size_t, bufsize, size_t *, ret);
extern void *sys_call_table[];
int (*original_getdents)(unsigned int, struct dirent *, unsigned int);
int (*original_kill)(pid_t, int);
int (*original_read)(int, void *, size_t);
int (*original_query_module)(const char *, int, void *, size_t, size_t *);
int myatoi(char *str)
{
int res = 0;
int mul = 1;
char *ptr;
for(p...
2017 Oct 11
1
[PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support
...entry_64.S
index 49167258d587..15bd5530d2ae 100644
--- a/arch/x86/entry/entry_64.S
+++ b/arch/x86/entry/entry_64.S
@@ -194,12 +194,15 @@ entry_SYSCALL_64_fastpath:
ja 1f /* return -ENOSYS (already in pt_regs->ax) */
movq %r10, %rcx
+ /* Ensures the call is position independent */
+ leaq sys_call_table(%rip), %r11
+
/*
* This call instruction is handled specially in stub_ptregs_64.
* It might end up jumping to the slow path. If it jumps, RAX
* and all argument registers are clobbered.
*/
- call *sys_call_table(, %rax, 8)
+ call *(%r11, %rax, 8)
.Lentry_SYSCALL_64_after_fastpath_ca...
2008 Sep 27
2
[LLVMdev] compile linux kernel
..._syscall.o arch/x86_64/kernel/syscall.c
arch/x86_64/kernel/syscall.c:22: error: '__NR_syscall_max' undeclared
here (not in a function)
arch/x86_64/kernel/syscall.c:24: error: array index in initializer not
of integer type
arch/x86_64/kernel/syscall.c:24: error: (near initialization for
'sys_call_table')
In file included from arch/x86_64/kernel/syscall.c:25:
include/asm-x86_64/unistd.h:16: error: array index in non-array initializer
include/asm-x86_64/unistd.h:16: error: (near initialization for
'sys_call_table')
include/asm-x86_64/unistd.h:18: error: array index in non-array initiali...
2008 Sep 28
0
[LLVMdev] compile linux kernel
...syscall.c
> arch/x86_64/kernel/syscall.c:22: error: '__NR_syscall_max' undeclared
> here (not in a function)
> arch/x86_64/kernel/syscall.c:24: error: array index in initializer not
> of integer type
> arch/x86_64/kernel/syscall.c:24: error: (near initialization for
> 'sys_call_table')
> In file included from arch/x86_64/kernel/syscall.c:25:
> include/asm-x86_64/unistd.h:16: error: array index in non-array
> initializer
> include/asm-x86_64/unistd.h:16: error: (near initialization for
> 'sys_call_table')
> include/asm-x86_64/unistd.h:18: error: a...
2017 Oct 20
0
[PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support
...2ae 100644
> --- a/arch/x86/entry/entry_64.S
> +++ b/arch/x86/entry/entry_64.S
> @@ -194,12 +194,15 @@ entry_SYSCALL_64_fastpath:
> ja 1f /* return -ENOSYS (already in pt_regs->ax) */
> movq %r10, %rcx
>
> + /* Ensures the call is position independent */
> + leaq sys_call_table(%rip), %r11
> +
> /*
> * This call instruction is handled specially in stub_ptregs_64.
> * It might end up jumping to the slow path. If it jumps, RAX
> * and all argument registers are clobbered.
> */
> - call *sys_call_table(, %rax, 8)
> + call *(%r11, %rax,...
2008 Sep 27
0
[LLVMdev] compile linux kernel
On Fri, Sep 26, 2008 at 9:19 PM, Ashish Bijlani
<ashish.bijlani at gmail.com> wrote:
> Hi,
>
> I'm trying to compile linux-2.6.23.16 with llvm-2.3. Is it at all
> possible?
Yes, but it requires significant hacking, and the result for 2.6 is a
mostly bitcode kernel with a few userspace shared libraries linked in
as objcode (yes, the kernel builds .so files and includes them
2017 Oct 20
3
[PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support
...ntry_64.S
>> @@ -194,12 +194,15 @@ entry_SYSCALL_64_fastpath:
>> ja 1f /* return -ENOSYS (already in pt_regs->ax) */
>> movq %r10, %rcx
>>
>> + /* Ensures the call is position independent */
>> + leaq sys_call_table(%rip), %r11
>> +
>> /*
>> * This call instruction is handled specially in stub_ptregs_64.
>> * It might end up jumping to the slow path. If it jumps, RAX
>> * and all argument registers are clobbered.
>> */
>> - call...
2017 Oct 20
3
[PATCH v1 06/27] x86/entry/64: Adapt assembly for PIE support
...ntry_64.S
>> @@ -194,12 +194,15 @@ entry_SYSCALL_64_fastpath:
>> ja 1f /* return -ENOSYS (already in pt_regs->ax) */
>> movq %r10, %rcx
>>
>> + /* Ensures the call is position independent */
>> + leaq sys_call_table(%rip), %r11
>> +
>> /*
>> * This call instruction is handled specially in stub_ptregs_64.
>> * It might end up jumping to the slow path. If it jumps, RAX
>> * and all argument registers are clobbered.
>> */
>> - call...
2007 Apr 18
1
[PATCH 1/2] Transparent entry.S IRQ holdoff handling
...reempt_count ?
jnz restore_nocheck
need_resched:
@@ -193,7 +194,7 @@ ENTRY(sysenter_entry)
movl TSS_sysenter_esp0(%esp),%esp
.globl sysenter_past_esp
sysenter_past_esp:
- sti
+ STI
pushl $(__USER_DS)
pushl %ebp
pushfl
@@ -223,7 +224,7 @@ sysenter_past_esp:
jae syscall_badsys
call *sys_call_table(,%eax,4)
movl %eax,EAX(%esp)
- cli
+ CLI
movl TI_flags(%ebp), %ecx
testw $_TIF_ALLWORK_MASK, %cx
jne syscall_exit_work
@@ -231,9 +232,7 @@ sysenter_past_esp:
movl EIP(%esp), %edx
movl OLDESP(%esp), %ecx
xorl %ebp,%ebp
- sti
- sysexit
-
+ STI_SYSEXIT
# system call handler stub
ENT...
2007 Apr 18
1
[PATCH 1/2] Transparent entry.S IRQ holdoff handling
...reempt_count ?
jnz restore_nocheck
need_resched:
@@ -193,7 +194,7 @@ ENTRY(sysenter_entry)
movl TSS_sysenter_esp0(%esp),%esp
.globl sysenter_past_esp
sysenter_past_esp:
- sti
+ STI
pushl $(__USER_DS)
pushl %ebp
pushfl
@@ -223,7 +224,7 @@ sysenter_past_esp:
jae syscall_badsys
call *sys_call_table(,%eax,4)
movl %eax,EAX(%esp)
- cli
+ CLI
movl TI_flags(%ebp), %ecx
testw $_TIF_ALLWORK_MASK, %cx
jne syscall_exit_work
@@ -231,9 +232,7 @@ sysenter_past_esp:
movl EIP(%esp), %edx
movl OLDESP(%esp), %ecx
xorl %ebp,%ebp
- sti
- sysexit
-
+ STI_SYSEXIT
# system call handler stub
ENT...
2008 Sep 27
4
[LLVMdev] compile linux kernel
Hi,
I'm trying to compile linux-2.6.23.16 with llvm-2.3. Is it at all
possible? I get "Not an ELF" error. I pass "-emit-llvm" option to spit
LLVM IR, which can be JITed at runtime
$ make CROSS_COMPILE=llvm- CFLAGS="-O2 -emit-llvm"
Error: not ELF
make[2]: *** [scripts/mod/elfconfig.h] Error 1
make[1]: *** [scripts/mod] Error 2
make: *** [scripts] Error 2
using
2007 Apr 18
1
[RFC, PATCH 8/24] i386 Vmi syscall assembly
...# non-zero preempt_count ?
jnz restore_nocheck
need_resched:
@@ -179,7 +180,7 @@ need_resched:
ENTRY(sysenter_entry)
movl TSS_sysenter_esp0(%esp),%esp
sysenter_past_esp:
- sti
+ STI
pushl $(__USER_DS)
pushl %ebp
pushfl
@@ -209,7 +210,7 @@ sysenter_past_esp:
jae syscall_badsys
call *sys_call_table(,%eax,4)
movl %eax,EAX(%esp)
- cli
+ CLI
movl TI_flags(%ebp), %ecx
testw $_TIF_ALLWORK_MASK, %cx
jne syscall_exit_work
@@ -217,8 +218,7 @@ sysenter_past_esp:
movl EIP(%esp), %edx
movl OLDESP(%esp), %ecx
xorl %ebp,%ebp
- sti
- sysexit
+ STI_SYSEXIT
# system call handler stub
@@ -...
2007 Apr 18
1
[RFC, PATCH 8/24] i386 Vmi syscall assembly
...# non-zero preempt_count ?
jnz restore_nocheck
need_resched:
@@ -179,7 +180,7 @@ need_resched:
ENTRY(sysenter_entry)
movl TSS_sysenter_esp0(%esp),%esp
sysenter_past_esp:
- sti
+ STI
pushl $(__USER_DS)
pushl %ebp
pushfl
@@ -209,7 +210,7 @@ sysenter_past_esp:
jae syscall_badsys
call *sys_call_table(,%eax,4)
movl %eax,EAX(%esp)
- cli
+ CLI
movl TI_flags(%ebp), %ecx
testw $_TIF_ALLWORK_MASK, %cx
jne syscall_exit_work
@@ -217,8 +218,7 @@ sysenter_past_esp:
movl EIP(%esp), %edx
movl OLDESP(%esp), %ecx
xorl %ebp,%ebp
- sti
- sysexit
+ STI_SYSEXIT
# system call handler stub
@@ -...
2008 Sep 28
3
[LLVMdev] compile linux kernel
...x86_64/kernel/syscall.c:22: error: '__NR_syscall_max' undeclared
>> here (not in a function)
>> arch/x86_64/kernel/syscall.c:24: error: array index in initializer not
>> of integer type
>> arch/x86_64/kernel/syscall.c:24: error: (near initialization for
>> 'sys_call_table')
>> In file included from arch/x86_64/kernel/syscall.c:25:
>> include/asm-x86_64/unistd.h:16: error: array index in non-array
>> initializer
>> include/asm-x86_64/unistd.h:16: error: (near initialization for
>> 'sys_call_table')
>> include/asm-x86_64...
2007 Apr 18
8
[patch 0/8] Basic infrastructure patches for a paravirtualized kernel
Hi Andrew,
This series of patches lays the basic ground work for the
paravirtualized kernel patches coming later on. I think this lot is
ready for the rough-and-tumble world of the -mm tree.
The main change from the last posting is that all the page-table
related patches have been moved out, and will be posted separately.
Also, the off-by-one in reserving the top of address space has been
2007 Apr 18
8
[patch 0/8] Basic infrastructure patches for a paravirtualized kernel
Hi Andrew,
This series of patches lays the basic ground work for the
paravirtualized kernel patches coming later on. I think this lot is
ready for the rough-and-tumble world of the -mm tree.
The main change from the last posting is that all the page-table
related patches have been moved out, and will be posted separately.
Also, the off-by-one in reserving the top of address space has been
2008 Apr 05
11
[PATCH RFC 1/5] vringfd syscall
...l after used incremented gave %i", r);
+
+ close(fd);
+ return 0;
+}
diff -r 99132ad16999 arch/x86/kernel/syscall_table_32.S
--- a/arch/x86/kernel/syscall_table_32.S Sat Apr 05 21:20:32 2008 +1100
+++ b/arch/x86/kernel/syscall_table_32.S Sat Apr 05 21:31:40 2008 +1100
@@ -326,3 +326,4 @@ ENTRY(sys_call_table)
.long sys_fallocate
.long sys_timerfd_settime /* 325 */
.long sys_timerfd_gettime
+ .long sys_vringfd
diff -r 99132ad16999 fs/Kconfig
--- a/fs/Kconfig Sat Apr 05 21:20:32 2008 +1100
+++ b/fs/Kconfig Sat Apr 05 21:31:40 2008 +1100
@@ -2135,4 +2135,14 @@ source "fs/nls/Kconfig"
sour...
2008 Apr 05
11
[PATCH RFC 1/5] vringfd syscall
...l after used incremented gave %i", r);
+
+ close(fd);
+ return 0;
+}
diff -r 99132ad16999 arch/x86/kernel/syscall_table_32.S
--- a/arch/x86/kernel/syscall_table_32.S Sat Apr 05 21:20:32 2008 +1100
+++ b/arch/x86/kernel/syscall_table_32.S Sat Apr 05 21:31:40 2008 +1100
@@ -326,3 +326,4 @@ ENTRY(sys_call_table)
.long sys_fallocate
.long sys_timerfd_settime /* 325 */
.long sys_timerfd_gettime
+ .long sys_vringfd
diff -r 99132ad16999 fs/Kconfig
--- a/fs/Kconfig Sat Apr 05 21:20:32 2008 +1100
+++ b/fs/Kconfig Sat Apr 05 21:31:40 2008 +1100
@@ -2135,4 +2135,14 @@ source "fs/nls/Kconfig"
sour...
2007 Apr 18
2
[PATCH 1/3] Paravirtualization: Kernel Ring Cleanups
Hi all,
I've been looking at finding common ground between the VMI, Xen and
other paravirtualization approaches, and after some discussion, we're
getting somewhere.
These first two patches are the fundamentals, stolen mainly from the
VMI patches: removing assumptions about the kernel running in ring 0,
and macro-izing all the obvious para-virtualize-needing insns. The
third patch is