How the Linux kernel breaks into the process address space and modifies the process memory

How the Linux kernel breaks into the process address space and modifies the process memory

Isolation of process address spaces is a notable feature of modern operating systems. This is also a distinctive feature that distinguishes it from "ancient" operating systems.

Process address space isolation means that process P1 cannot access the memory of process P2 in an arbitrary manner unless the memory is declared shared.

This is very easy to understand. Let me give you an example.

We know that in primitive savage society, there is no concept of family. All resources are shared within the tribe, and all savages can interact with any other savages in any way and at any time. This is the case with operating systems like DOS, where the memory address space is not isolated. Processes can freely access the memory of other processes.

Later, with the emergence of the concept of family, family resources were isolated and people could no longer break into other people's homes. People could no longer enter other people's homes and take other people's things in a casual manner unless the owner allowed it. After the operating system entered the modern mode, the process also had a concept similar to that of a family.

But the concept of family is virtual, people just abide by the agreement and not destroy other people's families. The house acts as a physical infrastructure that protects the family. In an operating system, the home is analogous to the virtual address space, and the house is the page table.

Neighbors can't break into your house, but the police can, and so can government officials with reasonable grounds. The so-called privileged management agencies can enter ordinary people's houses and touch the family's belongings as long as they have sufficient reasons. For an operating system, this is what the kernel can do, and the kernel can access the address space of any process.

Of course, the kernel will not break into people's homes without reason, just like the police will not break into other people's homes without reason.

However, you can have the kernel do this intentionally, to do something rogue.

Let's try it out and look at a program first:

//test.c
// gcc test.c -o test
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <sys/mman.h>

int main()
{
  char* addr = mmap(NULL, 1024, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
  strcpy(addr, "Zhejiang wenzhou pixie shi");

  printf("addr: %lu pid:%d\n", addr, getpid());

  printf("before:%s \n", addr);

 getchar();

  printf("after:%s\n", addr);

  return 0;
}

The output of this program is very simple. Both before and after will output "Zhejiang wenzhou pixie shi". But we want to change this sentence. What should we do? Obviously, if the test process does not modify it itself, there is nothing we can do... But we can force the kernel to modify it, just like breaking into a private house.

Next I write a kernel module:

//test.c
// make -C /lib/modules/`uname -r`/build SUBDIRS=`pwd` modules
#include <linux/mm.h>
#include <linux/sched.h>
#include <linux/module.h>

static int pid = 1;
module_param(pid, int, 0644);

static unsigned long addr = 0;
module_param(addr, long, 0644);

// Finding the page table of a process based on its virtual address is equivalent to finding the address of the family's house and then breaking in!
static pte_t* get_pte(struct task_struct *task, unsigned long address)
{
 pgd_t* pgd;
 pud_t* pud;
 pmd_t* pmd;
 pte_t* pte;
 struct mm_struct *mm = task->mm;

 pgd = pgd_offset(mm, address);
 if(pgd_none(*pgd) || pgd_bad(*pgd))
 return NULL;

 pud = pud_offset(pgd, address);
 if(pud_none(*pud) || pud_bad(*pud))
 return NULL;

 pmd = pmd_offset(pud, address);
 if(pmd_none(*pmd) || pmd_bad(*pmd))
 return NULL;

 pte = pte_offset_kernel(pmd, address);
 if (pte_none(*pte))
 return NULL;

 return pte;
}

static int test_init(void)
{
 struct task_struct *task;
 pte_t* pte;
 struct page* page;

 // Find this family task = pid_task(find_pid_ns(pid, &init_pid_ns), PIDTYPE_PID);
 // Find out where this family lives if(!(pte = get_pte(task, addr)))
 return -1;

 page = pte_page(*pte);
 // Break in by force addr = page_address(page);
 //sdajgdoiewhgikwnsviwgvwgvw
 strcpy(addr, (char *)"rain flooding water will not get fat!");
 // After the work is done, leave, hiding your achievements and fame return 0;
}

static void test_exit(void)
{
}

module_init(test_init);
module_exit(test_exit);
MODULE_LICENSE("GPL");

Come on, let's try it:

[root@10 page_replace]# ./test
addr: 140338535763968 pid:9912
before:Zhejiang wenzhou pixie shi

At this point, we load the kernel module test.ko

[root@10 test]# insmod test.ko pid=9912 addr=140338535763968
[root@10 test]#

Press Enter in the test process:

[root@10 page_replace]# ./test
addr: 140338535763968 pid:9912
before:Zhejiang wenzhou pixie shi

after:rain flooding water will not get fat!
[root@10 page_replace]#

Apparently, "your leather shoes get wet in Wenzhou, Zhejiang" has been changed to "you won't get fat if it rains and gets soaked."

Look carefully at the get_pte function of the kernel module above. To write this function correctly, you must have a certain understanding of the MMU of the machine where the process you want to ravage is located, such as whether it is a 32-bit system or a 64-bit system, and whether it is a 3-level page table, a 4-level page table, or a 5-level page table? this…

The fun of Linux lies in the fact that you can do it yourself or have someone else do it for you. For example, the physical page indicated by the page table entry of the virtual address of a process can be obtained directly.

Is there such an API? Yes, don't forget that everything is a file. In the proc file system, there is such a file:

/proc/$pid/pagemap

Reading this file, we get the page table entry of the process virtual address. The following figure is taken from the kernel Doc:

Documentation/vm/pagemap.txt

Virtual address space is per process, while physical address space is shared by all processes. In other words, physical addresses are global.

Now, according to the explanation of Documentation/vm/pagemap.txt, write a program to get the global physical address of any virtual address of any process:

// getphys.c
// gcc getphys -o getphys
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>

int main(int argc, char **argv)
{
 int fd;
 int pid;
 unsigned long pte;
 unsigned long addr;
 unsigned long phy_addr;
 char procbuf[64] = {0};

 pid = atoi(argv[1]);
 addr = atol(argv[2]);

 sprintf(procbuf, "/proc/%d/pagemap", pid);

 fd = open(procbuf, O_RDONLY);
 size_t offset = (addr/4096) * sizeof(unsigned long);
 lseek(fd, offset, SEEK_SET);

 read(fd, &pte, sizeof(unsigned long));

 phy_addr = (pte & ((((unsigned long)1) << 55) - 1))*4096 + addr%4096;
 printf("phy addr:%lu\n", phy_addr);

 return 0;
}

Then, we modify the kernel module:

#include <linux/module.h>

static unsigned long addr = 0;
module_param(addr, long, 0644);

static int test_init(void)
{
 strcpy(phys_to_virt(addr), (char *)"rain flooding water will not get fat!");
 return 0;
}

static void test_exit(void)
{
}

module_init(test_init);
module_exit(test_exit);

MODULE_LICENSE("GPL");

Run test first, then use the output of test as the input of getphys, and then use the output of getphys as the input of the kernel module test.ko, and you're done. Do you remember? Isn't this the style of piping multiple programs?

Enter a physical address and change it, that's it. The operation of obtaining the page table through the virtual address has been replaced by reading and parsing the pagemap file in user mode.

The above is the full content of this article. I hope it will be helpful for everyone’s study. I also hope that everyone will support 123WORDPRESS.COM.

You may also be interested in:
  • Checking with Valgrind under Linux (to prevent memory leaks)
  • Detailed explanation of how to run jmeter under Linux system and optimize local memory
  • How to expand Linux swap memory
  • Python3 monitors the CPU, hard disk, memory usage and the opening status of each port of Windows and Linux systems. Detailed code examples
  • How to Monitor Linux Memory Usage Using Bash Script
  • Linux system to view CPU, machine model, memory and other information
  • Methods for optimizing Oracle database with large memory pages in Linux
  • Detailed explanation of Linux kernel memory management architecture
  • Use C program to output memory usage information of a process under Linux system
  • Solve the problem of memory exhaustion caused by too many php-fpm processes under Linux
  • Python monitors Linux memory and writes to MongoDB (recommended)
  • Detailed explanation of Linux memory descriptor mm_struct example
  • Detailed explanation of Linux shared memory implementation mechanism
  • How to Check Memory Usage in Linux

<<:  Vue implements online preview of PDF files (using pdf.js/iframe/embed)

>>:  MySQL multi-master and one-slave data backup method tutorial

Recommend

Example of how to install nginx to a specified directory

Due to company requirements, two nginx servers in...

A brief discussion on mobile terminal adaptation

Preface The writing of front-end code can never e...

Solution to CSS flex-basis text overflow problem

The insignificant flex-basis has caused a lot of ...

Detailed installation and configuration tutorial of MySQL 5.7 under Win10

1. Unzip MySQL 5.7 2. Create a new configuration ...

How to use VirtualBox to simulate a Linux cluster

1. Set up HOST on the host Macbook The previous d...

How to Communicate with Other Users on the Linux Command Line

It's easy to send messages to other users in ...

How to install php7 + nginx environment under centos6.6

This article describes how to install php7 + ngin...

Detailed explanation of how to quickly build a blog website using Docker

Table of contents 1. Preparation 2. Deployment Pr...

Analysis and solution of flex layout collapse caused by Chrome 73

Phenomenon There are several nested flex structur...

How to add Lua module to Nginx

Install lua wget http://luajit.org/download/LuaJI...

Detailed explanation of fs module and Path module methods in Node.js

Overview: The filesystem module is a simple wrapp...