-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
syscalls blacklist #16
Comments
Hmmm. Not sure about those one. Some of them doesn't sound familiar, while others are must-have in Procmon (fork and execve, e.g.). Currently I'm downloading a few Ubuntu images (with old kernels) to test procmon on them. I'll attach the output of that command when I have some of the VBox running :) |
@alexandernst IIRC VirtualBox had problems with |
@milabs Hi! I was looking at this bug. How are those syscalls replaced? Why are they different? How do they work? And most importantly, how do I hijack them? |
@alexandernst See how the I'll suggest that we can:
What do you think, master? |
Hmmm... not really sure, I feel kind of lost in this issue, but maybe it would be better if we patch the But then... if we do that, we'd need to call the original stub from inside our stub, which is not how other syscalls are hooked (note that in current implementation, fake syscalls are called after the original syscall). How would you do it? Or said with other words, what's your best choise and what pros/cons does it has? |
I'm pasting here a fragment of a talk I had with another guy about his a few weeks (months?) ago.
|
@milabs Hi! Long time without activity here :) How is life going? I'm not really sure how or why is this working. In fact, I have no idea at all! Do you? :) |
@alexandernst He used |
@milabs Ah, indeed! I completely missed it. Nope, we don't want that, hehehe. Let's see if I can get some free time in the next few weeks so I can finish this bug and release 0.1 :) |
@alexandernst good luck ;) |
@milabs I think that sys_execve intercept is working @ 64 bit kernel.. at least I got it working on 3.18. Need details? |
@igorastds Hmm, that's weird... It shouldn't work. Can you pastebin the function you used to hijack sys_execve? |
@alexandernst @igorastds Well, need to remember that things... ) |
Link of interest: https://github.com/kfiros/execmon |
It's impossible to hook several system calls by just replacing correspinding
sys_call_table
values. So, we need to blacklist that numbers which can be found by the command:My
x86_64
system shows the result:x86_32
?The text was updated successfully, but these errors were encountered: