gpt4 book ai didi

linux-kernel - 在 ARM 中禁用内存页的写保护

转载 作者:行者123 更新时间:2023-12-03 15:00:42 25 4
gpt4 key购买 nike

我研究了在 linux 上禁用内核文本写保护的主题,我只能找到 x86 linux 的解决方案,即临时清除 cr0 寄存器的第 16 位,写入内存,然后设置第 16 位cr0 再次注册。但是,这不适用于 ARMv6 及更高版本。此页面中的一个示例:Linux Kernel: System call hooking example .

cr0 寄存器不存在于 ARM 体系结构中,并且链接中的答案中陈述的一些函数,如lookup_address、change_page_attr 等也不存在于 ARM 中。我尝试了 ARM 中存在的解决方案,比如 set_memory_rw(它没有改变任何东西,写入内核文本仍然会导致 oops)、mem_text_write_kernel_word(写入内核文本仍然会导致 oops)等。

oops 日志示例(为演示而格式化):

<3>[  239.987689] RKP -> Inst bf3e0098 out of cpu_v7_set_pte_ext range\
from c01159c4 to c0115a1c
<1>[ 239.988079] Unable to handle kernel paging request at virtual\
address c01c1d50
<1>[ 239.988123] pgd = ea8e4000
<1>[ 239.988280] [c01c1d50] *pgd=0da00011
<0>[ 239.988377] Internal error: Oops: 80f [#1] PREEMPT SMP ARM
<4>[ 239.988416] Modules linked in: my_mod(O+) wlan(PO) mhi(O)
<4>[ 239.988469] CPU: 0 PID: 5443 Comm: insmod \
Tainted: P W O 3.10.0-2413392 #1
<4>[ 239.988521] task: e4af4ec0 ti: da95a000 task.ti: da95a000
<4>[ 239.988565] PC is at my_mod_init+0x98/0x1000 [my_mod]
<4>[ 239.988605] LR is at my_mod_init+0x8c/0x1000 [my_mod]

[snip]

<4>[ 239.994032] [<bf3e0098>] (my_mod_init+0x98/0x1000 [my_mod]) from\
[<c010065c>] (do_one_initcall+0xcc/0x180)
<4>[ 239.994107] [<c010065c>] (do_one_initcall+0xcc/0x180) from\
[<c01c524c>] (load_module+0x1c98/0x1fc0)
<4>[ 239.994174] [<c01c524c>] (load_module+0x1c98/0x1fc0) from\
[<c01c5670>] (SyS_init_module+0xfc/0x11c)
<4>[ 239.994240] [<c01c5670>] (SyS_init_module+0xfc/0x11c) from\
[<c0106328>] (__sys_trace_return+0x0/0x18)
<0>[ 239.994303] Code: ebffebdc e59f202c e1a00004 e59f3028 (e5832d50)
<4>[ 239.994580] ---[ end trace dec6997083161644 ]---
<0>[ 239.994618] Kernel panic - not syncing: Fatal exception

即使尝试注册 kprobe 也会导致内核 oops:
<3>[  184.769314] RKP -> Inst c0abe2a0 out of cpu_v7_set_pte_ext\
range from c01159c4 to c0115a1c
<1>[ 184.769369] Unable to handle kernel paging request at\
virtual address c0170ce4
<1>[ 184.769416] pgd = dc828000
<1>[ 184.769439] [c0170ce4] *pgd=0da00011
<0>[ 184.769535] Internal error: Oops: 80f [#1] PREEMPT SMP ARM
<4>[ 184.769572] Modules linked in: kp_mod(O+) wlan(PO) mhi(O)
<4>[ 184.769620] CPU: 0 PID: 5835 Comm: insmod \
Tainted: P W O 3.10.0-2413392 #1
<4>[ 184.769665] task: ea0cf8c0 ti: de9a0000 task.ti: de9a0000
<4>[ 184.769706] PC is at __patch_text+0x24/0x3c
<4>[ 184.769734] LR is at __patch_text+0x1c/0x3c

[snip]

<4>[ 184.776127] [<c0abe2a0>] (__patch_text+0x24/0x3c) from\
[<c0abf000>] (arm_kprobe+0x24/0x34)
<4>[ 184.776188] [<c0abf000>] (arm_kprobe+0x24/0x34) from\
[<c0ac03d8>] (register_kprobe+0x4f0/0x58c)
<4>[ 184.776256] [<c0ac03d8>] (register_kprobe+0x4f0/0x58c) from\
[<bf3e0010>] (kprobe_init+0x10/0x1000 [kp_mod])
<4>[ 184.776325] [<bf3e0010>] (kprobe_init+0x10/0x1000 [kp_mod]) from\
[<c010065c>] (do_one_initcall+0xcc/0x180)
<4>[ 184.776391] [<c010065c>] (do_one_initcall+0xcc/0x180) from\
[<c01c524c>] (load_module+0x1c98/0x1fc0)
<4>[ 184.776450] [<c01c524c>] (load_module+0x1c98/0x1fc0) from\
[<c01c5670>] (SyS_init_module+0xfc/0x11c)
<4>[ 184.776508] [<c01c5670>] (SyS_init_module+0xfc/0x11c) from\
[<c0106328>] (__sys_trace_return+0x0/0x18)
<0>[ 184.776563] Code: e1a00004 ebd9561f e1a01004 e1a00004 (e4815004)
<4>[ 184.776608] ---[ end trace dec6997083161644 ]---
<0>[ 184.776642] Kernel panic - not syncing: Fatal exception

有这方面经验的人可以对这个问题有所了解吗?

最佳答案

在 Hook sys_call_table 之前调用 set_kernel_text_rw()
linux内核中set_kernel_text_rw()函数的路径
拱\臂\毫米\init.c

关于linux-kernel - 在 ARM 中禁用内存页的写保护,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/31648126/

25 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com