有没有办法在RHEL5 Linux上禁用ptrace系统调用?

有没有可以禁用RHEL5上的ptrace系统调用?

这是一个阻止系统调用ptrace的程序:

#define PROG_MSG "pt_fix.c -- disable linux ptrace system call" #define VERSION "0.50" /* Author: Chuck Ebbert Adapted from: Phrack Inc., Volume 0x0b, Issue 0x3a, Phile #0x07 Directions: Run this program as root on an x86 machine. It will disable the ptrace system call, thus fixing the Linux 'ptrace flaw'. (It will also break strace, debugging tools and User Mode Linux.) WARNING: Your computer may crash or do other strange things if you run this program as root. No warranty. Tested on: PPro Uni XT-PIC 2.2.19 pgcc-1.1.3 (sig #2) PPro SMP IO-APIC 2.5.66 gcc-2.96-110 (#1) PPro SMP IO_APIC 2.4.20aa1 gcc-2.96-110 (#1) PII Uni IO-APIC 2.5.66 gcc-2.96-110 (#1) K7 Uni APIC 2.4.20aa1 gcc-2.96-110 (#1) */ #include <stdio.h> #include <fcntl.h> #include <sys/types.h> struct { unsigned short limit; unsigned int base; } __attribute__ ((packed)) idtr; struct { unsigned short off1; unsigned short sel; unsigned char none,flags; unsigned short off2; } __attribute__ ((packed)) desc; /* read from kmem */ static int rkm(int fd, int offset, void *buf, int size) { if (lseek(fd, offset, 0) != offset) return 0; if (read(fd, buf, size) != size) return 0; return size; } /* write to kmem */ static int wkm(int fd, int offset, void *buf, int size) { if (lseek(fd, offset, 0) != offset) return 0; if (write(fd, buf, size) != size) return 0; return size; } void perr(char *err) { /* exit with err msg */ perror(err), exit(1); } /* read/write wrapper with err handling */ #define xkm(f, p1, p2, p3, p4, msg) ({ \ int _p4 = (p4); if ((f)((p1), (p2), (p3), _p4) != _p4) perr(msg); }) #define IRQ_VECTOR 80 /* syscall interrupt */ #define CALLNR 26 /* ptrace syscall */ /* valid old code signatures */ /* 1 */ unsigned char v1code[1] = { 0x55 /* push ebp */ }; /* 2 */ unsigned char v2code[4] = { 0x83,0xec,0x10 /* sub esp,10 */, 0x55 /* push ebp */ }; /* new code for syscall */ unsigned char ncode[4] = { 0x31,0xc0 /* xor eax,eax */, 0x48 /* dec eax */, 0xc3 /* ret */ }; unsigned char ocode[16]; /* buffer for old ptrace code */ unsigned char sc_asm[100]; /* holds first 100 bytes of IRQ handler code */ main() { unsigned sys_call_off, sct, fn; int kmem, i, found = 0; unsigned char *p; printf(PROG_MSG ", version " VERSION "\n"); asm("sidt %0" : "=m" (idtr)); printf("idt is at %08x\n", idtr.base); kmem = open("/dev/kmem", O_RDWR); if (kmem < 0) perr("open kmem"); /* read-in desc for int vector */ xkm(rkm, kmem, idtr.base+8*0x80, &desc, sizeof(desc), "rkm desc"); sys_call_off = (desc.off2 << 16) | desc.off1; printf("idt entry %d: flags=%02hhx sel=%04x off=%08x\n", IRQ_VECTOR, desc.flags, desc.sel, sys_call_off); /* we have syscall routine address now, look for syscall table dispatch (indirect call) */ xkm(rkm, kmem, sys_call_off, sc_asm, sizeof(sc_asm), "rkm sc_asm"); p = (char *)memmem(sc_asm, sizeof(sc_asm), "\xff\x14\x85", 3); sct = *(unsigned *)(p + 3); /* will fault if p is bad */ printf("sys_call_table is at %08x\n", sct); xkm(rkm, kmem, sct+4*CALLNR, &fn, sizeof(fn), "rkm fn"); printf("entry %d points to %08x\n", CALLNR, fn); xkm(rkm, kmem, fn, ocode, sizeof(ocode), "rkm ocode"); printf("code:"); for (i = 0; i < sizeof(ocode); i++) printf(" %02hhx", ocode[i]); printf("\n"); if (!memcmp(ocode, v1code, sizeof(v1code))) found = 1; if (!memcmp(ocode, v2code, sizeof(v2code))) found = 2; if (!found) { printf(!memcmp(ocode, ncode, sizeof(ncode)) ? "Already installed.\n" : "Code mismatch, aborting.\n"); exit(1); } printf("Valid entry code signature #%d found.\n", found); xkm(wkm, kmem, fn, ncode, sizeof(ncode), "wkm ncode"); printf("Kernel patch succeeded.\n" "NOTE: patch will only work until next reboot.\n"); close(kmem); exit(0); } 

但我发现在有用的程序存档,并没有检查可用性。

pt_fix.c看起来很深奥的魔力。 这并不是说它不会工作。

http://people.baicom.com/~agramajo/misc/no-ptrace.c是一个看起来合理的内核模块&#x3002;

我不知道它是否适用于RHEL5,但是lcaphttp://linux.die.net/man/8/lcap )可以使它变得简单: lcap CAP_SYS_PTRACE

我还没有使用这些工具。