summaryrefslogtreecommitdiff
path: root/sys/dev/systrace.h
AgeCommit message (Collapse)Author
2004-11-07add a new message: inject. this allows the tracer to to inject buffers intomarius eriksen
the stackgap. this in turn allows for argument replacement with indirection. for example replacing an entire envp or struct pollfd. ok provos@ millert@
2004-07-07fix an issue when scripts are exec'd under systrace wheremarius eriksen
the argv[0] would be normalized, and hence break scripts that depend on how they were called. this fixes an issue in the ports builds. ok provos@ deraadt@; lots of testing during hackathon sturm@ naddy@
2004-06-23a few fixes to systracemarius eriksen
- add an exec message so that whenever a set-uid/gid process exec's a new image which we may control, the exec does not go by unnoticed. - take special care to check for P_SUGIDEXEC as well as P_SUGID, corresponding to the same changes that were made in the ptrace code a while ago ok niels@, sturm@; thanks to naddy for testing
2003-10-08originally from cb@netbsd.org, adapted by provosNikolay Sturm
itojun@ ok fix a race condition between path resolution in userland and the subsequent namei(): inform the kernel portion of valid filenames and then disallow symlink lookups for those filenames by means of a hook in namei(). with suggestions from provos@ also, add (currently unused) seqnr field to struct systrace_replace, from provos@
2003-06-16- limited number of processes per systraceJun-ichiro itojun Hagino
- escape fixes for special characters markus, sturm ok. from provos
2003-03-28fake off the SYSTR_CLONE through a normally numbered other ioctl; as of ↵Michael Shalayeff
previous rename; after discussion w/ niels
2002-12-04rename the clone ioctl to avoid clashing w/ the sockio; provos@ okMichael Shalayeff
2002-10-25add id tags.Federico G. Schwindt
2002-10-16support for privilege elevation.Jun-ichiro itojun Hagino
with privilege elevation no suid or sgid binaries are necessary any longer. Applications can be executed completely unprivileged. Systrace raises the privileges for a single system call depending on the configured policy. Idea from discussions with Perry Metzger, Dug Song and Marcus Watts. from provos
2002-10-09new message to track uid/gid changesJun-ichiro itojun Hagino
from provos
2002-07-24better uid/gid tracking; okay deraadt@Niels Provos
2002-07-22add seqnr to message from kernel, userland needs to quote correct seqnr.Niels Provos
avoids problems where tsleep has been interrupted by a signal.
2002-06-21system call argument rewriting framework via stackgap; okay art@Niels Provos
2002-06-16forgot copyright, pointed out by christos@netbsdNiels Provos
2002-06-10new ioctl that reports the current emulation a process uses; needed forNiels Provos
attaching to a running process
2002-06-02explicit padding; okay deraadt@Niels Provos
2002-05-19make fsystrace available in systrace.h; keep some more stats.Niels Provos
2002-05-16systrace facility, used to enforce and generate policies for system callsNiels Provos
okay deraadt@