Skip to content

Commit

Permalink
syscall: rename module name to syscall_steal
Browse files Browse the repository at this point in the history
In Debian, the name syscall conflicts with this patch:
in debian kernel source tree:
debian/patches/features/x86/x86-make-x32-syscall-support-conditional.patch
mailing list url:
https://lore.kernel.org/lkml/[email protected]/T/#u
which introduces a parameter named syscall.x32. So change our name.
  • Loading branch information
keytouch committed Dec 22, 2023
1 parent 3490cd7 commit a60e84a
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion examples/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ obj-m += print_string.o
obj-m += kbleds.o
obj-m += sched.o
obj-m += chardev2.o
obj-m += syscall.o
obj-m += syscall_steal.o
obj-m += intrpt.o
obj-m += cryptosha256.o
obj-m += cryptosk.o
Expand Down
10 changes: 5 additions & 5 deletions examples/syscall.c → examples/syscall_steal.c
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
/*
* syscall.c
* syscall_steal.c
*
* System call "stealing" sample.
*
Expand Down Expand Up @@ -206,7 +206,7 @@ static void disable_write_protection(void)
__write_cr0(cr0);
}

static int __init syscall_start(void)
static int __init syscall_steal_start(void)
{
if (!(sys_call_table = acquire_sys_call_table()))
return -1;
Expand All @@ -226,7 +226,7 @@ static int __init syscall_start(void)
return 0;
}

static void __exit syscall_end(void)
static void __exit syscall_steal_end(void)
{
if (!sys_call_table)
return;
Expand All @@ -246,7 +246,7 @@ static void __exit syscall_end(void)
msleep(2000);
}

module_init(syscall_start);
module_exit(syscall_end);
module_init(syscall_steal_start);
module_exit(syscall_steal_end);

MODULE_LICENSE("GPL");
2 changes: 1 addition & 1 deletion lkmpg.tex
Original file line number Diff line number Diff line change
Expand Up @@ -1491,7 +1491,7 @@ \section{System Calls}
ffffffff82000280 R x32_sys_call_table
ffffffff820013a0 R sys_call_table
ffffffff820023e0 R ia32_sys_call_table
$ sudo insmod syscall.ko sym=0xffffffff820013a0
$ sudo insmod syscall_steal.ko sym=0xffffffff820013a0
\end{verbatim}

Using the address from \verb|/boot/System.map|, be careful about \verb|KASLR| (Kernel Address Space Layout Randomization).
Expand Down

0 comments on commit a60e84a

Please sign in to comment.