7

我正在寻找一种有效的方法来访问(用于读取和写入操作)我的 ptraced 子进程的内存空间。正在访问的块的大小可能从几个字节到几兆字节不等,因此使用 ptrace 调用一次只读取一个单词PTRACE_PEEKDATAPTRACE_POKEDATA在每次调用时切换上下文似乎是对资源的毫无意义的浪费。不过,我能找到的唯一一种替代解决方案是/proc/<pid>/mem文件,但它早已被设为只读。

有没有其他(相对简单的)方法来完成这项工作?理想的解决方案是以某种方式与其父进程共享我的子进程的地址空间,然后使用简单的 memcpy 调用在两个方向上复制我需要的数据,但我不知道如何做以及从哪里开始。

有任何想法吗?

4

6 回答 6

4

clone()如果这是 Linux(标签表明它是),您可以通过使用CLONE_VM标志与父级共享整个子级地址空间。由于两个进程共享相同的 VM 空间,所有修改将在两者之间立即可见,基本上为零开销。

这确实意味着你不能exec()在孩子身上; 因为它将替换两个进程的虚拟机空间。

于 2009-08-10T22:00:58.087 回答
1

您是否可以控制子进程及其源代码?如果是这样,您可以考虑使用Shared memory

于 2009-08-09T23:14:02.783 回答
1

考虑将一些调试函数注入 ptraced 进程并通过 ptrace_setregs 调用它。类似于 gdb 如何运行 ptraced 进程的任何功能的方式。

您也可以尝试通过 LD_PRELOAD 将一些代码注入进程。你甚至可以尝试在没有 ptrace 的情况下使用信号进行工作。

upd1:Gdb 注入或“劣质函数调用”相当复杂。请参阅文件 gdb-6.6.50.20070809›gdb›infcall.c 中的函数 call_function_by_hand:http: //sources.debian.net/src/gdb/7.6.2-1/gdb/infcall.c ?hl=462#L462

/* All this stuff with a dummy frame may seem unnecessarily complicated
   (why not just save registers in GDB?).  The purpose of pushing a dummy
   frame which looks just like a real frame is so that if you call a
   function and then hit a breakpoint (get a signal, etc), "backtrace"
   will look right.  Whether the backtrace needs to actually show the
   stack at the time the inferior function was called is debatable, but
   it certainly needs to not display garbage.  So if you are contemplating
   making dummy frames be different from normal frames, consider that.  */

/* Perform a function call in the inferior.
   ARGS is a vector of values of arguments (NARGS of them).
   FUNCTION is a value, the function to be called.
   Returns a value representing what the function returned.
   May fail to return, if a breakpoint or signal is hit
   during the execution of the function.

   ARGS is modified to contain coerced values.  */

struct value *
call_function_by_hand (struct value *function, int nargs, struct value **args)
{
...
  frame = get_current_frame ();
  gdbarch = get_frame_arch (frame);

  if (!gdbarch_push_dummy_call_p (gdbarch))
    error (_("This target does not support function calls."));

  /* A cleanup for the inferior status.
     This is only needed while we're preparing the inferior function call.  */
  inf_status = save_infcall_control_state ();
  inf_status_cleanup
    = make_cleanup_restore_infcall_control_state (inf_status);

  /* Save the caller's registers and other state associated with the
     inferior itself so that they can be restored once the
     callee returns.  To allow nested calls the registers are (further
     down) pushed onto a dummy frame stack.  Include a cleanup (which
     is tossed once the regcache has been pushed).  */
  caller_state = save_infcall_suspend_state ();
  make_cleanup_restore_infcall_suspend_state (caller_state);
...
    sp = push_dummy_code (gdbarch, sp, funaddr, args, nargs,
                  target_values_type, &real_pc, &bp_addr,
                  get_current_regcache ());
... pass args ...
  /* Create the dummy stack frame.  Pass in the call dummy address as,
     presumably, the ABI code knows where, in the call dummy, the
     return address should be pointed.  */
  sp = gdbarch_push_dummy_call (gdbarch, function, get_current_regcache (),
                bp_addr, nargs, args,
                sp, struct_return, struct_addr);
...
  /* Everything's ready, push all the info needed to restore the
     caller (and identify the dummy-frame) onto the dummy-frame
     stack.  */
  dummy_frame_push (caller_state, &dummy_id);
... 
    /* Run the inferior until it stops.  */

    e = run_inferior_call (tp, real_pc);
  }
于 2010-02-07T05:43:21.957 回答
0

clone 或 mmap 是您正在寻找的。在两个进程之间映射一个临时文件,并使用该内存空间来回传递数据。

于 2010-03-26T21:50:55.737 回答
0

对于阅读,最好的办法是解析/proc/<pid>/maps文件以获取感兴趣的内存区域的虚拟地址。

然后,您可以通过在感兴趣的区域上打开并使用大缓冲区/proc/<pid>/mem执行调用来阅读这些内容。read()

对于写作,我还没有找到一种简单的方法来编写整个块,我相信这与子进程的锁定和稳定性有关,通过调用ptrace()可以保证这一点,但直接访问另一个进程的内存则不能。我通常会编写一个包装器ptrace(PTRACE_POKEDATA, ...)来镜像 Windows' WriteProcessMemory().

于 2010-02-14T05:31:16.480 回答
0

如果您控制子进程,也许您可​​以添加一个调试接口,允许您写入相关内存?

于 2009-09-26T08:09:46.897 回答