Re: Binary only module overview

From: Greg KH (gregat_private)
Date: Tue Sep 25 2001 - 07:45:19 PDT

  • Next message: richard offer: "Determing the difference between path_walk and chdir ?"

    On Mon, Sep 24, 2001 at 06:09:28PM -0700, Seth Arnold wrote:
    > On Mon, Sep 24, 2001 at 05:16:20PM -0700, Greg KH wrote:
    > 
    > Straying offtopic here...
    > 
    > grep permission /proc/ksyms # and make note of the address
    > open("/dev/kmem");
    > llseek(/* address from above */);
    > write(/* new permission code */);
    > 
    > Of course, if one's permission code is longer than the original
    > permission code, one must make the 'new permission code' a simple jump
    > to the location of the real new permission code -- which can be found at
    > module load time.
    > 
    > Repeat for all kernel symbols exported through /proc/ksyms.
    > 
    > Right? And this is perfectly legal under the GPL, because it is
    > exploiting the user interfaces of syscalls (and I'm hoping /proc/ and
    > sysctl are included in the GPL-exempt list :) .
    
    Binary patching of a GPL binary is still infringing (think linking and
    the interfaces your new code is now using.)  Talk to an IP lawyer for
    more info on that.
    
    But this is getting OT :)
    
    greg k-h
    
    _______________________________________________
    linux-security-module mailing list
    linux-security-moduleat_private
    http://mail.wirex.com/mailman/listinfo/linux-security-module
    



    This archive was generated by hypermail 2b30 : Tue Sep 25 2001 - 07:50:39 PDT