GSOC 2014 - Introduction from Yangmin Zhu

Philippe Ombredanne pombredanne at nexb.com
Fri Mar 7 10:46:11 UTC 2014


On Fri, Mar 7, 2014 at 10:43 AM, yangmin zhu <zym0017d at gmail.com> wrote:
> Hi,
>
>             My name is Yangmin Zhu. I’m from china and now a 2nd year master
> student of University of Chinese Academy of Sciences. After few days
> investigating the projects available in Google Summer of Code 2014, I find
> strace which I used a lot in my undergraduate graduation design. I wish to
> participate GSoC 2014 of the strace project.
>
> I ever implemented a small tool to intercept(by using LD_PRELOAD method) a
> program’s syscall (read()/write()/dup() and etc.) and pass it to a remote
> host(yes, another server program is running at that remote host and
> listening on a port specified by the user). By using this tool, user can
> cheat a program and let it read/write a remote file transparently without
> modifying the program itself. In order to find how does the binary program
> make the syscall, I searched and find strace. It’s a great tool and helped
> me a lot in analyzing these target program’s syscall.
>
>             I’m good at C, system programming and familiar with the linux
> syscall. For now, I had subscribed the mailing list, checked the idea list
> and started to explore the codebase to get familiar with the existing code.
> I am interested about the “Advanced and improved absolute paths decoding”.
> Before submitting my final proposal I think it’s important to communicate
> with the developers/mentors and I will try my best to demonstrate my
> capability.
>
>
>
> Thanks,
>
> Yangmin Zhu

Hi Zhu and welcome to strace!
Thank you for you interest.
You might want to look at the post I just made to the list for
additional details.
Note that this is a potentially big feature and probably enough work
to be broken down in more than one student project.
Cordially
-- 
Philippe Ombredanne




More information about the Strace-devel mailing list