[cgl_discussion] Live patching project announcement
ikebe.takashi at lab.ntt.co.jp
Wed Jun 9 18:26:59 PDT 2004
Yes, that is correct, and current release does not have any function
to prevent to be abused syscall from.
We are developing new version internaly and new version's systemcall
is only available by root.
Daniel McNeil wrote:
> On Tue, 2004-06-08 at 04:38, Takashi Ikebe wrote:
>>NTT announces "pannus" open source project.
>>The pannus project provides "AVL.15.0 Live patching" GPL implementation.
>>First version of implementation is available on the web.
>>Live patching is on-memory patching which does not need to
>>restart/reload process and essential function on NEP's system.
>>URL is below.
> Very interesting. I took a look and want to make sure I understand
> The kernel patch allows the pannus command to stop a process, load
> a dynamic shared library containing a patch on behalf of the stopped
> process, and then patch the process' original function to jump to
> the new patched function, and then continue the process. The process
> starts running new code without ever knowing it has been patched.
> Is this right?
> What prevents the new syscalls from being abused?
> Is there anything to prevent anyone being able to stop and/or patch
> any running process?
NTT Network Service Systems Laboratories
9-11, Midori-Cho 3-Chome Musashino-Shi,
Tokyo 180-8585 Japan
Tel : +81 422 59 4246, Fax : +81 422 60 4012
e-mail : ikebe.takashi at lab.ntt.co.jp
More information about the cgl_discussion