gpt4 book ai didi

c - 共享库注入(inject): _dl_relocate_object segfaults

转载 作者:IT王子 更新时间:2023-10-29 00:47:45 41 4
gpt4 key购买 nike

我最近在 Linux 中尝试共享库注入(inject),并决定编写自己的程序来执行此操作(而不是使用 GDB 来注入(inject)库)。

我的程序使用 pthread 用汇编代码覆盖加载程序程序 (0x40000-0x400025) 的前 0x25 个字节,为文件名分配空间并调用 dlopen。完成所有这些后,它会恢复程序状态并从中分离。

程序集如下:

global inject_library
global nullsub

section .data
section .text

inject_library:
; rdi -> Pointer to malloc()
; rsi -> Pointer to free()
; rdx -> Pointer to dlopen()
; rcx -> Size of the path to the .so to load

; Create a new stack frame
push rbp

; Save rbx because we're using it as scratch space
push rbx
; Save addresses of free & dlopen on the stack
push rsi
push rdx

; Move the pointer to malloc into rbx
mov rbx, rdi
; Move the size of the path as the first argument to malloc
mov rdi, rcx
; Call malloc(so_path_size)
call rbx
; Stop so that we can see what's happening from the injector process
int 0x3

; Move the pointer to dlopen into rbx
pop rbx
; Move the malloc'd space (now containing the path) to rdi for the first argument
mov rdi, rax
; Push rax because it'll be overwritten
push rax
; Second argument to dlopen (RTLD_NOW)
mov rsi, 0x2
; Call dlopen(path_to_library, RTLD_NOW)
call rbx
; Pass control to the injector
int 0x3

; Finally, begin free-ing the malloc'd area
pop rdi
; Get the address of free into rbx
pop rbx
; Call free(path_to_library)
call rbx

; Restore rbx
pop rbx

; Destory the stack frame
pop rbp

; We're done
int 0x3
retn

nullsub:
retn

还有一个 C 程序调用这个汇编例程并使用 pthread 来处理这些断点。

此设置适用于如下所示的小型单线程程序。

#include <stdio.h>
#include <sys/types.h>
#include <unistd.h>

int main(int argc, char* argv) {
pid_t my_pid = getpid();
printf("PID: %ld\n", my_pid);
getchar();
return 0;
}

我使用了一个简单的共享库,它只是在其构造函数中执行 puts("Hi");。如上所述,到这里为止的一切都完美无缺。

但是,当我尝试将同一个库注入(inject)到更大的(外部闭源程序)时,我遇到了段错误。

这是回溯:

#0  0x00007f6a7985d64d in _dl_relocate_object (scope=0x21fbc08, reloc_mode=reloc_mode@entry=0, consider_profiling=consider_profiling@entry=0)
at dl-reloc.c:259
#1 0x00007f6a79865723 in dl_open_worker (a=a@entry=0x7fff82d7cbf8) at dl-open.c:424
#2 0x00007f6a793cf5d4 in __GI__dl_catch_error (objname=objname@entry=0x7fff82d7cbe8, errstring=errstring@entry=0x7fff82d7cbf0,
mallocedp=mallocedp@entry=0x7fff82d7cbe7, operate=operate@entry=0x7f6a798654c0 <dl_open_worker>, args=args@entry=0x7fff82d7cbf8)
at dl-error-skeleton.c:198
#3 0x00007f6a79865069 in _dl_open (file=0x21fb830 "/home/umang/code/insertion/test_library.so", mode=-2147483646, caller_dlopen=0x40001a, nsid=-2,
argc=<optimized out>, argv=<optimized out>, env=0x7fff82d7cfe8) at dl-open.c:649
#4 0x00007f6a7964ef96 in dlopen_doit (a=a@entry=0x7fff82d7ce08) at dlopen.c:66
#5 0x00007f6a793cf5d4 in __GI__dl_catch_error (objname=objname@entry=0x7f6a798510f0 <last_result+16>,
errstring=errstring@entry=0x7f6a798510f8 <last_result+24>, mallocedp=mallocedp@entry=0x7f6a798510e8 <last_result+8>,
operate=operate@entry=0x7f6a7964ef40 <dlopen_doit>, args=args@entry=0x7fff82d7ce08) at dl-error-skeleton.c:198
#6 0x00007f6a7964f665 in _dlerror_run (operate=operate@entry=0x7f6a7964ef40 <dlopen_doit>, args=args@entry=0x7fff82d7ce08) at dlerror.c:163
#7 0x00007f6a7964f021 in __dlopen (file=<optimized out>, mode=<optimized out>) at dlopen.c:87
#8 0x000000000040001a in ?? ()
#9 0x00000000021fb830 in ?? ()
#10 0x00007f6a79326a90 in ?? () at malloc.c:3071 from /lib64/libc.so.6
#11 0x00007f6a796488a0 in ?? () from /lib64/libc.so.6
#12 0x0000000000000d68 in ?? ()
#13 0x00007f6a7931e938 in _IO_new_file_underflow (fp=0x7f6a7964efe0 <__dlopen>) at fileops.c:600
#14 0x00007f6a7931fa72 in __GI__IO_default_uflow (fp=0x7f6a796488a0 <_IO_2_1_stdin_>) at genops.c:404
#15 0x00007f6a7931a20d in getchar () at getchar.c:37
#16 0x00000000004005d7 in main ()

这个回溯告诉我在 dlopen 调用中出现了(可怕的)错误。具体来说,错误在于 glibc dl-reloc.c:259

这是有问题的 glibc 代码。

254          l->l_lookup_cache.value = _lr; }))                   \
255 : l)
256
257 #include "dynamic-link.h"
258
259 ELF_DYNAMIC_RELOCATE (l, lazy, consider_profiling, skip_ifunc);
260
261 #ifndef PROF
262 if (__glibc_unlikely (consider_profiling)
263 && l->l_info[DT_PLTRELSZ] != NULL)

ELF_DYNAMIC_RELOCATE 是在dynamic-link.h 中定义的一个宏,如下-

/* This can't just be an inline function because GCC is too dumb
to inline functions containing inlines themselves. */
# define ELF_DYNAMIC_RELOCATE(map, lazy, consider_profile, skip_ifunc) \
do { \
int edr_lazy = elf_machine_runtime_setup ((map), (lazy), \
(consider_profile)); \
ELF_DYNAMIC_DO_REL ((map), edr_lazy, skip_ifunc); \
ELF_DYNAMIC_DO_RELA ((map), edr_lazy, skip_ifunc); \
} while (0)

#endif

elf_machine_runtime_setup 返回正常,所以我假设问题在于 ELF_DYNAMIC_DO_REL。这是source对于提到的宏。这里的问题是被调用的方法是内联的,所以 GDB 只显示宏名而不显示底层源代码。

在 GDB 中使用 ni,我在 elf_machine_runtime_setup 返回后看到以下内容:

ELF_DYNAMIC_RELOCATE (l, lazy, consider_profiling, skip_ifunc);
ELF_DYNAMIC_RELOCATE (l, lazy, consider_profiling, skip_ifunc);
ELF_DYNAMIC_RELOCATE (l, lazy, consider_profiling, skip_ifunc);

单步执行汇编,段错误发生在以下指令之后:movaps %xmm0,-0x70(%rbp)

info local 没有太大帮助:

(gdb) info local
ranges = {{start = 140072440991568, size = 0, nrelative = 0, lazy = 670467104}, {start = 0, size = 140072438891376, nrelative = 140072441065920,
lazy = 672664367}}
textrels = 0x0
errstring = 0x0
lazy = <optimized out>
skip_ifunc = 0

有趣的是,当我使用 GDB 注入(inject)共享库时(使用我在网上某处找到的这段代码),库加载完美。

sudo gdb -n -q -batch \
-ex "attach $pid" \
-ex "set \$dlopen = (void*(*)(char*, int)) dlopen" \
-ex "call \$dlopen(\"$(pwd)/libexample.so\", 1)" \
-ex "detach" \
-ex "quit"
)"

提前致谢!

最佳答案

经过几天的抓耳挠腮之后,我决定用谷歌搜索“MOVAPS 段错误”。

MOVAPS 是一条 SIMD 指令(在这里,它用于快速清零四字)。这是 some more info差不多。

仔细观察,我注意到以下段落:

When the source or destination operand is a memory operand, the operand must be aligned on a 16-byte boundary or a general-protection exception (#GP) is generated.

嗯。所以我读取了违规地址的值。

(gdb) print $rbp - 0x70
$2 = (void *) 0x7ffecd32e838

那里。地址未与 16 字节边界对齐,因此发生段错误。

解决这个问题很容易。

; Create a new stack frame
push rbp
sub rsp, 0x8
; Do stuff
; Fix the stack pointer
add rsp, 0x8
; Destroy stack frame, return, etc.

我仍然怀疑这是否是正确的方法,但它确实有效。

哦,GDB 一直都是正确的 - 它确保堆栈对齐。

关于c - 共享库注入(inject): _dl_relocate_object segfaults,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/44613592/

41 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com