Re: Running Untrusted Code in a Restricted Process

From: Mike Coleman (mcoleman2@kc.rr.com)
Date: Tue Jun 13 2000 - 15:22:38 EST


jesse hammons <jhammons@bigteam.org> writes:
> Can anyone point me to some ptrace() documentation? I've looked at the
> source to strace and several other programs. I can see how to print out
> and trace system calls, but I don't see how to change the return value.
> The manpage for PTRACE_SYSCALL looks like this:
>
> PTRACE_SYSCALL, PTRACE_CONT
> Restart after signal.

There's a lot more detail in the revised man page I created while trying to
learn ptrace. Get a newer version of the manpages.

You may also be interested in SUBTERFUGUE (see subterfugue.org), which is a
ptrace-based framework, written in Python (with some C). It's more like Janus
than Medusa or user-mode Linux, as it's fairly lightweight (code-wise) and
just relies on ptrace. It can be used for more general syscall rewriting, not
just sandboxes.

(I haven't done much with it in the last couple of months, but I hope to have
a new release out sometime soon.)

--Mike

-- 
Any sufficiently adverse technology is indistinguishable from Microsoft.

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Thu Jun 15 2000 - 21:00:31 EST