开发者

Execute code in process's stack, on recent Linux

I want to use ptrace to write a piece of binary code in a running proc开发者_运维百科ess's stack. However, this causes segmentation fault (signal 11).

I can make sure the %eip register stores the pointer to the first instruction that I want to execute in the stack. I guess there is some mechanism that linux protects the stack data to be executable.

So, does anyone know how to disable such protection for stack. Specifically, I'm trying Fedora 15.

Thanks a lot!


After reading all replies, I tried execstack, which really makes code in stack executable. Thank you all!


This is probably due to the NX bit on modern processors. You may be able to disable this for your program using execstack.

http://advosys.ca/viewpoints/2009/07/disabling-the-nx-bit-for-specific-apps/

http://linux.die.net/man/8/execstack


As already mentioned it is due to the NX bit. But it is possible. I know for sure that gcc uses it itself for trampolines (which are a workaround to make e.g. function pointers of nested functions). I dont looked at the detailes, but I would recommend a look at the gcc code. Search in the sources for the architecture specific macro TARGET_ASM_TRAMPOLINE_TEMPLATE, there you should see how they do it.

EDIT: A quick google for that macro, gave me the hint: mprotect is used to change the permissions of the memory page. Also be carefull when you generate date and execute it - you maybe have in addition to flush the instruction cache.

0

上一篇:

下一篇:

精彩评论

暂无评论...
验证码 换一张
取 消

最新问答

问答排行榜