Self modifying code always segmentation faults on Linux

前端 未结 3 904
忘了有多久
忘了有多久 2020-12-01 10:17

i found an article about self modifying code and tried to do some examples, but i get always segmentation faults. As fas as i can understand, there is a violation in memory

相关标签:
3条回答
  • 2020-12-01 10:18

    Modern CPUs have a feature called DEP which prevents execution of code on the stack. Previously, this was possible; now, it is not. The binary is loaded into read-only memory by default.

    With that out of the way, you can use the mprotect system call to mark your binary's location in memory as executable - SO LONG AS YOUR CODE IS NOT DEP-PROTECTED. So don't try to put code and the stack and then jump into it.

    0 讨论(0)
  • 2020-12-01 10:20

    You can also disable write-protection for the entire program by passing the switch -N to the linker. If you are invoking the linker from gcc, pass Wl,-N. If you invoke ld directly, pass -N.

    0 讨论(0)
  • 2020-12-01 10:29

    You should to change memory access permissions in runtime.

    #include <sys/mman.h>
    
    void *addr  = get_address_of_instruction_pointer();
    int  length = 4096;   /* size of a page */
    
    if (mprotect(addr, length, PROT_READ | PROT_WRITE | PROT_EXEC) == 0) {
        /* current code page is now writable and code from it is allowed for execution */
    }
    
    0 讨论(0)
提交回复
热议问题