问题
I'm writing a program that spawns child processes. For security reasons, I want to limit what these processes can do. I know of security measures from outside the program such as chroot
or ulimit
, but I want to do something more than that. I want to limit the system calls done by the child process (for example preventing calls to open()
, fork()
and such things). Is there any way to do that? Optimally, the blocked system calls should return with an error but if that's not possible, then killing the process is also good.
I guess it can be done wuth ptrace()
but from the man page I don't really understand how to use it for this purpose.
回答1:
If you want to do it the ptrace
way, you have some options (and some are really simple). First of all, I recommend you to follow the tutorial explained here. With it you can learn how to know what system calls are being called, and also the basic ptrace
knowledge (don't worry, it's a very short tutorial). The options (that I know) you have are the following:
- The easiest one would be to kill the child, that is this exact code here.
- Secondly you could make the child fail, just by changing the registers with
PTRACE_SETREGS
, putting wrong values in them, and you can also change the return value of the system call if you want (again, withPTRACE_SETREGS
). - Finally you could skip the system call. But for that you should know the address after the system call call, make the intruction register point there and set it (again, with
PTRACE_SETREGS
).
回答2:
It sounds like SECCOMP_FILTER, added in kernel version 3.5, is what you're after. The libseccomp library provides an easy-to-use API for this functionality.
By the way, chroot()
and setrlimit()
are both system calls that can be called within your program - you'd probably want to use one or both of these in addition to seccomp filtering.
来源:https://stackoverflow.com/questions/13343058/preventing-processes-to-execute-certain-system-calls