Re: Running Untrusted Code in a Restricted Process

jesse hammons (jhammons@bigteam.org)
Fri, 9 Jun 2000 18:33:14 -0400 (EDT)


On Fri, 9 Jun 2000, Brian Gerst wrote:

> This can already be done with the current ptrace functionality. Ptrace
> can intercept system calls made by the traced process (strace uses this)
> and can modify or deny them.

Ah, now I understand. The current functionality is in kernel 2.3 of
course, not my old 2.2.12 kernel. Thanks for the info.

The old version of the tracing code (at least in i386) didn't allow for
syscall_trace to reject system calls.

Thanks,
-Jesse

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/