I'm trying to hijack a system call with loadable kernel module in Linux Kernel v4.19.8.
I could find the virtual address of sys_call_table from /boot/System.map-4.19.8. However, when I tries to access to it, dmesg gives me the message below:
BUG : unable to handle kernel paging request at [address of sys_call_table] So, here's my question.
- Is it even possible to hijack system call with loadable kernel module in Linux Kernel v4.19.8?
- If it is possible, how can I do it?
Thank you in advance.