On Thu, 3 May 2001, Pavel Machek wrote:
> That means that for fooling closed-source statically-linked binary,
> you now need to patch kernel. That's regression; subterfugue.org could
> do this with normal user rights in 2.4.0.
This is particularly pretty, but something that might work:
1. a "deceiver" process creates a shared memory page, populates shared
page with appropriate magic (perhaps copying from its own magic page?)
2. have subterfuge unmap the magic page for the fooled process, and map in
the shared page in its place (assumes subterfuge can insert system
calls, instead of just modifying them)
3. deceiver periodically updates magic page
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Mon May 07 2001 - 21:00:18 EST