You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 30, 2021. It is now read-only.
It's kind of lame some syscalls cannot be patched ends up handling by the tracer (regardless early syscalls before LD_PRELOAD), it forces us to write two different versions of the same logic, hence it would be necessary to force syscall to be trapped by the tracee instead. This can be done by:
install another RET_TRAP seccomp filter in LD_PRELOAD;
replace syscall instruction with predefined reserved x86 instructions, and handle it in tracee's signal handler
Both methods can trap the syscalls we cannot handle at this moment, even they wouldn't be as fast as patched syscalls, they wouldn't be any slower than handle syscalls in tracer either.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
It's kind of lame some syscalls cannot be patched ends up handling by the tracer (regardless early syscalls before LD_PRELOAD), it forces us to write two different versions of the same logic, hence it would be necessary to force syscall to be trapped by the tracee instead. This can be done by:
RET_TRAP
seccomp filter inLD_PRELOAD
;syscall
instruction with predefined reserved x86 instructions, and handle it in tracee's signal handlerBoth methods can trap the syscalls we cannot handle at this moment, even they wouldn't be as fast as patched syscalls, they wouldn't be any slower than handle syscalls in tracer either.
The text was updated successfully, but these errors were encountered: