File tree Expand file tree Collapse file tree 1 file changed +7
-7
lines changed
testcases/kernel/security/kallsyms Expand file tree Collapse file tree 1 file changed +7
-7
lines changed Original file line number Diff line number Diff line change 6
6
/*\
7
7
* [Description]
8
8
*
9
- * Utilize kernel's symbol table for unauthorized address access.
9
+ * Utilize kernel's symbol table for unauthorized address access.
10
10
*
11
- * Access the system symbols with root permission to test whether it's
12
- * possible to read and write the memory addresses of kernel-space
13
- * from user-space. This helps in identifying potential vulnerabilities
14
- * where user-space processes can inappropriately access kernel memory.
11
+ * Access the system symbols with root permission to test whether it's
12
+ * possible to read and write the memory addresses of kernel-space
13
+ * from user-space. This helps in identifying potential vulnerabilities
14
+ * where user-space processes can inappropriately access kernel memory.
15
15
*
16
16
* Steps:
17
+ *
17
18
* 1. Start a process that reads all symbols and their addresses from
18
- * ' /proc/kallsyms' and stores them in a linked list.
19
+ * /proc/kallsyms and stores them in a linked list.
19
20
*
20
21
* 2. Attempt to write to each kernel address found in the linked list.
21
22
* The expectation is that each attempt will fail with a SIGSEGV
30
31
*
31
32
* 5. Observe and log the behavior and any system responses to these
32
33
* unauthorized access attempts.
33
- *
34
34
*/
35
35
36
36
#include <stdio.h>
You can’t perform that action at this time.
0 commit comments