Re: Keeping track of called syscalls in real-time

2017-06-28 Thread W. Michael Petullo
> Whenever fopen("/etc/shadow", "r") is called, the tool would intercept > it, run the verify() procedure, and return back to the syscall, allowing > it to do it's job. This sounds like an LSM, possibly with a component which communicates with userspace, depending on how sophisticated "verify"

Re: Question about uprobes

2017-04-06 Thread W. Michael Petullo
>> I am writing some software that monitors a guest VM using virtual-machine >> introspection and "hijacks" system calls under certain conditions. For >> example, the program might inject an int3/breakpoint into the guest >> kernel at the entry point to sys_open. When the breakpoint is hit, the >>

Question about uprobes

2017-04-05 Thread W. Michael Petullo
I am writing some software that monitors a guest VM using virtual-machine introspection and "hijacks" system calls under certain conditions. For example, the program might inject an int3/breakpoint into the guest kernel at the entry point to sys_open. When the breakpoint is hit, the program might

Monitoring network system calls from outside VM

2016-12-06 Thread W. Michael Petullo
I am working on a system which will monitor the system calls serviced by an operating system running inside a VM. All of the software runs outside of the VM, and I wish to avoid modifying or installing software inside of the VM. Imagine an external monitor observing PID/syscall/syscall parameters

Identify tasks which mmap'ed file

2016-05-25 Thread W. Michael Petullo
Within the kernel and given a struct file *, is it possible to enumerate the tasks which have mmap/MAP_SHARED'ed the file? I have tried to use find_get_pages/rmap_walk on the file's f_mapping field, but this does not seem to work. I find the mapping's first page with find_get_pages, but rmap_walk

SimpleFlow: simple information-flow-based security module for Linux

2016-04-19 Thread W. Michael Petullo
Some colleagues and I have been working on SimpleFlow, a simple information-flow-based security module for Linux. Our goal is to investigate the feasibility of implementing such a security model on top of LSM and to produce a prototype which is useful for education and certain computer-security

Walk list of processes attached to a shared page

2016-02-18 Thread W. Michael Petullo
Is it possible to walk the processes already attached to a shared page in an implementation of security_shm_shmat()? I have a function: static int my_shm_shmat(struct shmid_kernel *shp, char __user *shmaddr, int shmflag) and I would like to find the