RE: Ke: Running Untrusted Code in a Restricted Process

From: pavel-velo@bug.cw.cz
Date: Wed Jan 01 1997 - 15:35:09 EST


Hi!

>> > Anyway here is the idea. I added a new task flag PF_RESTRICTED. This bit
>> > is set by setting yourself to the PER_RESTRICTED personality like so:
>> >
>> This can already be done with the current ptrace functionality. Ptrace
>> can intercept system calls made by the traced process (strace uses this)
>> and can modify or deny them.
>>
>
>Can anyone point me to some ptrace() documentation? I've looked at the
>source to strace and several other programs. I can see how to print out
>and trace system calls, but I don't see how to change the return value.
>The manpage for PTRACE_SYSCALL looks like this:

Modify EAX. Take a look at http://subterfugue.org -- it can manipulate syscalls just fine.
>
> PTRACE_SYSCALL, PTRACE_CONT
> Restart after signal.
>
>So assuming I have a process tracing a child process, how to I change the
>return value of system calls made in the child process?
>
>Thanks,
>-Jesse
>
>
>-
>To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
>the body of a message to majordomo@vger.rutgers.edu
>Please read the FAQ at http://www.tux.org/lkml/
>
>

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Thu Jun 15 2000 - 21:00:31 EST