-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
1171 lines (801 loc) · 47.1 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE html>
<html lang="zh-CN">
<head>
<!-- hexo-inject:begin --><!-- hexo-inject:end --><meta charset="utf-8" />
<meta name="description" content="Boom? PWN ! ! !" />
<meta
name="viewport"
content="width=device-width, initial-scale=1, maximum-scale=1"
/>
<title> 北极落小雪</title>
<meta name="generator" content="hexo-theme-ayer">
<link rel="shortcut icon" href="/favicon.ico" />
<link rel="stylesheet" href="/dist/main.css">
<link rel="stylesheet" href="/css/fonts/remixicon.css">
<link rel="stylesheet" href="/css/custom.css">
<script src="https://cdn.staticfile.org/pace/1.2.4/pace.min.js"></script>
<link
rel="stylesheet"
href="https://cdn.jsdelivr.net/npm/@sweetalert2/[email protected]/bulma.min.css"
/>
<script src="https://cdn.jsdelivr.net/npm/[email protected]/dist/sweetalert2.min.js"></script>
<!-- mermaid -->
<style>
.swal2-styled.swal2-confirm {
font-size: 1.6rem;
}
</style>
<style>.github-emoji { position: relative; display: inline-block; width: 1.2em; min-height: 1.2em; overflow: hidden; vertical-align: top; color: transparent; } .github-emoji > span { position: relative; z-index: 10; } .github-emoji img, .github-emoji .fancybox { margin: 0 !important; padding: 0 !important; border: none !important; outline: none !important; text-decoration: none !important; user-select: none !important; cursor: auto !important; } .github-emoji img { height: 1.2em !important; width: 1.2em !important; position: absolute !important; left: 50% !important; top: 50% !important; transform: translate(-50%, -50%) !important; user-select: none !important; cursor: auto !important; } .github-emoji-fallback { color: inherit; } .github-emoji-fallback img { opacity: 0 !important; }</style><!-- hexo-inject:begin --><!-- hexo-inject:end -->
<link rel="stylesheet" href="/css/prism-tomorrow.css" type="text/css"></head>
</html>
</html>
<body>
<!-- hexo-inject:begin --><!-- hexo-inject:end --><div id="app">
<main class="content on">
<section class="cover">
<div class="cover-frame">
<div class="bg-box">
<img src="/images/0.jpg" alt="image frame" />
</div>
<div class="cover-inner text-center text-white">
<h1><a href="/">北极落小雪</a></h1>
<div id="subtitle-box">
<span id="subtitle"></span>
</div>
<div>
</div>
</div>
</div>
<div class="cover-learn-more">
<a href="javascript:void(0)" class="anchor"><i class="ri-arrow-down-line"></i></a>
</div>
</section>
<script src="https://cdn.staticfile.org/typed.js/2.0.12/typed.min.js"></script>
<!-- Subtitle -->
<script>
try {
var typed = new Typed("#subtitle", {
strings: ['遗憾的话,总会有的...', '翰青HanQi-blogs', 'Polaris_Snowfall...'],
startDelay: 0,
typeSpeed: 200,
loop: true,
backSpeed: 100,
showCursor: true
});
} catch (err) {
console.log(err)
}
</script>
<div id="main">
<section class="outer">
<article class="articles">
<article
id="post-Dig into Netfilter (5)"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Dig%20into%20Netfilter%20(5)/"
>Dig into Netfilter (五) —— CVE-2022-32250</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Dig%20into%20Netfilter%20(5)/" class="article-date">
<time datetime="2024-12-13T16:00:00.000Z" itemprop="datePublished">2024-12-14</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Pwn/">Pwn</a> / <a class="article-category-link" href="/categories/Pwn/Kernel/">Kernel</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<h3 id="CVE-2022-32250"><a href="#CVE-2022-32250" class="headerlink" title="CVE-2022-32250"></a>CVE-2022-32250</h3><h4 id="漏洞分析"><a href="#漏洞分析" class="headerlink" title="漏洞分析"></a>漏洞分析</h4><h5 id="完整的表达式析构过程-nft-set-binding"><a href="#完整的表达式析构过程-nft-set-binding" class="headerlink" title="完整的表达式析构过程 / nft_set_binding"></a>完整的表达式析构过程 / nft_set_binding</h5><p>一些规则可以与集合绑定, 但其实真正绑定的是表达式和集合, 这类表达式有nft_lookup, nft_dynset, nft_objref.</p>
<p>代表这一关系的结构是nft_set_binding. </p>
<figure class="highlight c"><table><tbody><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment">/**</span></span><br><span class="line"><span class="comment"> * struct nft_set_binding - nf_tables set binding</span></span><br><span class="line"><span class="comment"> *</span></span><br><span class="line"><span class="comment"> * @list: set bindings list node</span></span><br><span class="line"><span class="comment"> * @chain: chain containing the rule bound to the set</span></span><br><span class="line"><span class="comment"> * @flags: set action flags</span></span><br><span class="line"><span class="comment"> *</span></span><br><span class="line"><span class="comment"> * A set binding contains all information necessary for validation</span></span><br><span class="line"><span class="comment"> * of new elements added to a bound set.</span></span><br><span class="line"><span class="comment"> */</span></span><br><span class="line"><span class="class"><span class="keyword">struct</span> <span class="title">nft_set_binding</span> {</span></span><br><span class="line"> <span class="class"><span class="keyword">struct</span> <span class="title">list_head</span> <span class="title">list</span>;</span></span><br><span class="line"> <span class="type">const</span> <span class="class"><span class="keyword">struct</span> <span class="title">nft_chain</span> *<span class="title">chain</span>;</span></span><br><span class="line"> u32 flags;</span><br><span class="line">};</span><br></pre></td></tr></tbody></table></figure>
<a class="article-more-link" href="/2024/Dig%20into%20Netfilter%20(5)/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Kernel/" rel="tag">Kernel</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Netfilter/" rel="tag">Netfilter</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Pwn/" rel="tag">Pwn</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Dig into Netfilter (4)"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Dig%20into%20Netfilter%20(4)/"
>Dig into Netfilter (四) —— CVE-2022-34918</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Dig%20into%20Netfilter%20(4)/" class="article-date">
<time datetime="2024-12-09T16:00:00.000Z" itemprop="datePublished">2024-12-10</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Pwn/">Pwn</a> / <a class="article-category-link" href="/categories/Pwn/Kernel/">Kernel</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<h3 id="CVE-2022-34918"><a href="#CVE-2022-34918" class="headerlink" title="CVE-2022-34918"></a>CVE-2022-34918</h3><h4 id="漏洞分析"><a href="#漏洞分析" class="headerlink" title="漏洞分析"></a>漏洞分析</h4><p>在nft_set_elem_init函数中, 有几处使用memcpy的地方让人眼前一亮.<br>众所周知审溢出就是审读写时使用的大小是否小于等于分配内存时使用的大小.</p>
<p>但这几处分配空间使用的是tmpl->len, 而写入的长度是(set->klen + set->klen + set->dlen) (对应属性都存在的情况下), 这促使我们向上回溯看看这些值之间是否存在上述小于等于的关系.</p>
<figure class="highlight c"><table><tbody><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br><span class="line">28</span><br><span class="line">29</span><br><span class="line">30</span><br><span class="line">31</span><br></pre></td><td class="code"><pre><span class="line"><span class="type">void</span> *<span class="title function_">nft_set_elem_init</span><span class="params">(<span class="type">const</span> <span class="keyword">struct</span> nft_set *<span class="built_in">set</span>,</span></span><br><span class="line"><span class="params"> <span class="type">const</span> <span class="keyword">struct</span> nft_set_ext_tmpl *tmpl,</span></span><br><span class="line"><span class="params"> <span class="type">const</span> u32 *key, <span class="type">const</span> u32 *key_end,</span></span><br><span class="line"><span class="params"> <span class="type">const</span> u32 *data, u64 timeout, u64 expiration, <span class="type">gfp_t</span> gfp)</span></span><br><span class="line">{</span><br><span class="line"> <span class="class"><span class="keyword">struct</span> <span class="title">nft_set_ext</span> *<span class="title">ext</span>;</span></span><br><span class="line"> <span class="type">void</span> *elem;</span><br><span class="line"></span><br><span class="line"> elem = kzalloc(<span class="built_in">set</span>->ops->elemsize + tmpl->len, gfp);</span><br><span class="line"> <span class="keyword">if</span> (elem == <span class="literal">NULL</span>)</span><br><span class="line"> <span class="keyword">return</span> <span class="literal">NULL</span>;</span><br><span class="line"></span><br><span class="line"> ext = nft_set_elem_ext(<span class="built_in">set</span>, elem);</span><br><span class="line"> nft_set_ext_init(ext, tmpl);</span><br><span class="line"></span><br><span class="line"> <span class="keyword">if</span> (nft_set_ext_exists(ext, NFT_SET_EXT_KEY))</span><br><span class="line"> <span class="built_in">memcpy</span>(nft_set_ext_key(ext), key, <span class="built_in">set</span>->klen);</span><br><span class="line"> <span class="keyword">if</span> (nft_set_ext_exists(ext, NFT_SET_EXT_KEY_END))</span><br><span class="line"> <span class="built_in">memcpy</span>(nft_set_ext_key_end(ext), key_end, <span class="built_in">set</span>->klen);</span><br><span class="line"> <span class="keyword">if</span> (nft_set_ext_exists(ext, NFT_SET_EXT_DATA))</span><br><span class="line"> <span class="built_in">memcpy</span>(nft_set_ext_data(ext), data, <span class="built_in">set</span>->dlen);</span><br><span class="line"> <span class="keyword">if</span> (nft_set_ext_exists(ext, NFT_SET_EXT_EXPIRATION)) {</span><br><span class="line"> *nft_set_ext_expiration(ext) = get_jiffies_64() + expiration;</span><br><span class="line"> <span class="keyword">if</span> (expiration == <span class="number">0</span>)</span><br><span class="line"> *nft_set_ext_expiration(ext) += timeout;</span><br><span class="line"> }</span><br><span class="line"> <span class="keyword">if</span> (nft_set_ext_exists(ext, NFT_SET_EXT_TIMEOUT))</span><br><span class="line"> *nft_set_ext_timeout(ext) = timeout;</span><br><span class="line"></span><br><span class="line"> <span class="keyword">return</span> elem;</span><br><span class="line">}</span><br></pre></td></tr></tbody></table></figure>
<a class="article-more-link" href="/2024/Dig%20into%20Netfilter%20(4)/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Kernel/" rel="tag">Kernel</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Netfilter/" rel="tag">Netfilter</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Pwn/" rel="tag">Pwn</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Dig into Netfilter (3)"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Dig%20into%20Netfilter%20(3)/"
>Dig into Netfilter (三) —— CVE-2022-1972 / CVE-2022-2078</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Dig%20into%20Netfilter%20(3)/" class="article-date">
<time datetime="2024-12-05T16:00:00.000Z" itemprop="datePublished">2024-12-06</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Pwn/">Pwn</a> / <a class="article-category-link" href="/categories/Pwn/Kernel/">Kernel</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<h3 id="新增集合"><a href="#新增集合" class="headerlink" title="新增集合"></a>新增集合</h3><p>在nf_tables中, 还有一个set的概念. 虽然nf_tables没有使用iptables的match-action的概念, 但作为filter就少不了match的过程. set充当一个数据库, 而nft_lookup等指令用来在数据库中进行查找.</p>
<p>比如想要拦截192.168.1.4, 192.168.1.5等ip的包, 则可以通过如下方式创建命名集合(当然就有匿名集合)blackhole, 并向其中添加ip, 之后的rule即可直接使用这个set.</p>
<figure class="highlight plaintext"><table><tbody><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br></pre></td><td class="code"><pre><span class="line">nft add set filter blackhole { type ipv4_addr\;}</span><br><span class="line">nft add element filter blackhole { 192.168.1.4, 192.168.1.5 }</span><br><span class="line">nft add rule ip input ip saddr @blackhole drop</span><br></pre></td></tr></tbody></table></figure>
<a class="article-more-link" href="/2024/Dig%20into%20Netfilter%20(3)/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Kernel/" rel="tag">Kernel</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Netfilter/" rel="tag">Netfilter</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Pwn/" rel="tag">Pwn</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Dig into Netfilter (2)"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Dig%20into%20Netfilter%20(2)/"
>Dig into Netfilter (二) —— CVE-2022-1015 / CVE-2022-1016</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Dig%20into%20Netfilter%20(2)/" class="article-date">
<time datetime="2024-12-01T16:00:00.000Z" itemprop="datePublished">2024-12-02</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Pwn/">Pwn</a> / <a class="article-category-link" href="/categories/Pwn/Kernel/">Kernel</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<h3 id="CVE-2022-1016"><a href="#CVE-2022-1016" class="headerlink" title="CVE-2022-1016"></a>CVE-2022-1016</h3><p> 源码版本为v5.17-rc7.</p>
<p>非常明显且诡异地存在了8年的一个漏洞: 状态机的regs没有初始化.攻击者可以通过该漏洞泄露内核基址.<br>作者的评价:</p>
<blockquote>
<p>I have no idea how this survived for eight and a half years, because to me it stuck out like a sore thumb.</p>
</blockquote>
<figure class="highlight c"><table><tbody><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br></pre></td><td class="code"><pre><span class="line"><span class="type">unsigned</span> <span class="type">int</span></span><br><span class="line"><span class="title function_">nft_do_chain</span><span class="params">(<span class="keyword">struct</span> nft_pktinfo *pkt, <span class="type">void</span> *priv)</span></span><br><span class="line">{</span><br><span class="line"> <span class="type">const</span> <span class="class"><span class="keyword">struct</span> <span class="title">nft_chain</span> *<span class="title">chain</span> =</span> priv, *basechain = chain;</span><br><span class="line"> <span class="type">const</span> <span class="class"><span class="keyword">struct</span> <span class="title">nft_rule_dp</span> *<span class="title">rule</span>, *<span class="title">last_rule</span>;</span></span><br><span class="line"> <span class="type">const</span> <span class="class"><span class="keyword">struct</span> <span class="title">net</span> *<span class="title">net</span> =</span> nft_net(pkt);</span><br><span class="line"> <span class="type">const</span> <span class="class"><span class="keyword">struct</span> <span class="title">nft_expr</span> *<span class="title">expr</span>, *<span class="title">last</span>;</span></span><br><span class="line"> <span class="class"><span class="keyword">struct</span> <span class="title">nft_regs</span> <span class="title">regs</span>;</span></span><br><span class="line"> <span class="type">unsigned</span> <span class="type">int</span> stackptr = <span class="number">0</span>;</span><br><span class="line"> <span class="class"><span class="keyword">struct</span> <span class="title">nft_jumpstack</span> <span class="title">jumpstack</span>[<span class="title">NFT_JUMP_STACK_SIZE</span>];</span></span><br><span class="line"> <span class="type">bool</span> genbit = READ_ONCE(net->nft.gencursor);</span><br><span class="line"> <span class="class"><span class="keyword">struct</span> <span class="title">nft_rule_blob</span> *<span class="title">blob</span>;</span></span><br><span class="line"> <span class="class"><span class="keyword">struct</span> <span class="title">nft_traceinfo</span> <span class="title">info</span>;</span></span><br><span class="line"></span><br></pre></td></tr></tbody></table></figure>
<a class="article-more-link" href="/2024/Dig%20into%20Netfilter%20(2)/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Kernel/" rel="tag">Kernel</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Netfilter/" rel="tag">Netfilter</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Pwn/" rel="tag">Pwn</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Dig into Netfilter (1)"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Dig%20into%20Netfilter%20(1)/"
>Dig into Netfilter (一) —— nf_tables核心概念</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Dig%20into%20Netfilter%20(1)/" class="article-date">
<time datetime="2024-11-27T16:00:00.000Z" itemprop="datePublished">2024-11-28</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Pwn/">Pwn</a> / <a class="article-category-link" href="/categories/Pwn/Kernel/">Kernel</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<p>xtables? iptables? nf_tables !</p>
<h2 id="nf-tables核心概念"><a href="#nf-tables核心概念" class="headerlink" title="nf_tables核心概念"></a>nf_tables核心概念</h2><p> 源码版本为v5.8或v5.11</p>
<h3 id="概述"><a href="#概述" class="headerlink" title="概述"></a>概述</h3><p>根据作用及协议族, 在netfilter中分成不同的table., 每个table只能看到自己所属协议族的包.<br>每个table在其有的每一个hook点上有一条chain. 用户也可以添加自定义的chain, 但由于没有对应的hook点, 只能从内置的chain的rule中跳转到(其实从自定义的chain跳转到也行, 前提是前者能被触发). 实际上之前内置chain的说法并不准确, 不同于iptables, nft并不存在预定义的chain, 需要创建nft_base_chain并将其注册到hook点上.<br>多条rule可能在同一个hook点触发, 即属于同一条chain.<br>处理一条rule的过程实际是对rule中包含的expr求值(eval).</p>
<a class="article-more-link" href="/2024/Dig%20into%20Netfilter%20(1)/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Kernel/" rel="tag">Kernel</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Netfilter/" rel="tag">Netfilter</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Pwn/" rel="tag">Pwn</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Linux - KSM -- ARM64 v5.0"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Linux%20-%20KSM%20--%20ARM64%20v5.0/"
>Linux内核 KSM机制 -- ARM64 v5.0</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Linux%20-%20KSM%20--%20ARM64%20v5.0/" class="article-date">
<time datetime="2024-10-31T16:00:00.000Z" itemprop="datePublished">2024-11-01</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/">Linux内核</a> / <a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/%E5%86%85%E5%AD%98%E7%AE%A1%E7%90%86/">内存管理</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<p>(<del>看源码看得最难受的一集</del>)</p>
<h2 id="Question"><a href="#Question" class="headerlink" title="Question"></a>Question</h2><ul>
<li>KSM机制的流程?</li>
<li>如何理解KSM机制中的数据结构?</li>
</ul>
<h2 id="KSM概述"><a href="#KSM概述" class="headerlink" title="KSM概述"></a>KSM概述</h2><blockquote>
<p>KSM指Kernel SamePage Merging,即内核同页合并,用于合<br>并内容相同的页面。KSM的出现是为了优化虚拟化中产生的冗余页面,<br>因为虚拟化的实际应用中在同一台主机上会有许多相同的操作系统和<br>应用程序,许多内存页面的内容可能是相同的,所以它们可以合并,<br>从而释放内存供其他应用程序使用。</p>
<p>KSM允许合并同一个进程或不同进程之间内容相同的匿名页面,这<br>对应用程序来说是不可见的。把这些相同的页面合并成一个只读的页<br>面,从而释放出多余的物理页面,当应用程序需要改变页面内容时,<br>会发生写时复制。</p>
</blockquote>
<a class="article-more-link" href="/2024/Linux%20-%20KSM%20--%20ARM64%20v5.0/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Linux/" rel="tag">Linux</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Memory-Management/" rel="tag">Memory_Management</a></li></ul>
</footer>
</div>
</article>
<article
id="post-linux kernel lab -- Notes"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/linux%20kernel%20lab%20--%20Notes/"
>Linux kernel Lab学习笔记</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/linux%20kernel%20lab%20--%20Notes/" class="article-date">
<time datetime="2024-10-23T16:00:00.000Z" itemprop="datePublished">2024-10-24</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/">Linux内核</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<p>只是做lab时的记录, 笔者并不认为文中的代码部分有什么阅读的价值</p>
<a class="article-more-link" href="/2024/linux%20kernel%20lab%20--%20Notes/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Linux/" rel="tag">Linux</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Linux - memory compact -- ARM64 v5.0"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Linux%20-%20memory%20compact%20--%20ARM64%20v5.0/"
>Linux内核 内存规整 -- ARM64 v5.0</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Linux%20-%20memory%20compact%20--%20ARM64%20v5.0/" class="article-date">
<time datetime="2024-09-28T16:00:00.000Z" itemprop="datePublished">2024-09-29</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/">Linux内核</a> / <a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/%E5%86%85%E5%AD%98%E7%AE%A1%E7%90%86/">内存管理</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<h2 id="Question"><a href="#Question" class="headerlink" title="Question"></a>Question</h2><ol>
<li>内存规整的目的?</li>
<li>内存规整和页面迁移的区别?</li>
<li>为什么将页面划分不同的迁移类型?</li>
<li>页面规整的流程?</li></ol>
<a class="article-more-link" href="/2024/Linux%20-%20memory%20compact%20--%20ARM64%20v5.0/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Linux/" rel="tag">Linux</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Memory-Management/" rel="tag">Memory_Management</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Linux - memory reclaim -- ARM64 v5.0"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Linux%20-%20memory%20reclaim%20--%20ARM64%20v5.0/"
>Linux内核 页面回收 -- ARM64 v5.0</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Linux%20-%20memory%20reclaim%20--%20ARM64%20v5.0/" class="article-date">
<time datetime="2024-09-26T16:00:00.000Z" itemprop="datePublished">2024-09-27</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/">Linux内核</a> / <a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/%E5%86%85%E5%AD%98%E7%AE%A1%E7%90%86/">内存管理</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<p>文中引文均来自文末参考文章.</p>
<h2 id="Question"><a href="#Question" class="headerlink" title="Question"></a>Question</h2><ol>
<li>PG_ACTIVE,PG_REFERENCE的作用和区别?.</li>
<li>LRU+二次机会的实现?</li>
</ol>
<a class="article-more-link" href="/2024/Linux%20-%20memory%20reclaim%20--%20ARM64%20v5.0/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Linux/" rel="tag">Linux</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Memory-Management/" rel="tag">Memory_Management</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Linux - BuddySystem -- ARM64 v5.0"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Linux%20-%20%20BuddySystem%20--%20ARM64%20v5.0/"
>Linux内核 BuddySystem -- ARM64 v5.0</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Linux%20-%20%20BuddySystem%20--%20ARM64%20v5.0/" class="article-date">
<time datetime="2024-09-17T16:00:00.000Z" itemprop="datePublished">2024-09-18</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/">Linux内核</a> / <a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/%E5%86%85%E5%AD%98%E7%AE%A1%E7%90%86/">内存管理</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<p>ps: 在BuddySystem中所说的”page”指的是order-n的pages.</p>
<h2 id="Question"><a href="#Question" class="headerlink" title="Question"></a>Question</h2><ol>
<li>物理内存是什么时候交给BuddySystem中管理的, 哪些物理内存会由BuddySystem管理?</li>
<li>BuddySystem如何完成一次分配? 由理想情况到恶劣情况?</li>
<li>BuddySystem如何完成一次释放?</li>
</ol>
<a class="article-more-link" href="/2024/Linux%20-%20%20BuddySystem%20--%20ARM64%20v5.0/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Linux/" rel="tag">Linux</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Memory-Management/" rel="tag">Memory_Management</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Linux - physical memory initialization -- ARM64 v5.0"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Linux%20-%20physical%20memory%20initialization%20--%20ARM64%20v5.0/"
>Linux内核 物理内存初始化过程 -- ARM64 v5.0</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Linux%20-%20physical%20memory%20initialization%20--%20ARM64%20v5.0/" class="article-date">
<time datetime="2024-09-15T16:00:00.000Z" itemprop="datePublished">2024-09-16</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/">Linux内核</a> / <a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/%E5%86%85%E5%AD%98%E7%AE%A1%E7%90%86/">内存管理</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<h1 id="Question"><a href="#Question" class="headerlink" title="Question"></a>Question</h1><ol>
<li>内核如何获取物理内存相关信息?</li>
<li>sparse模型中,mem_section, page的关系是怎么建立的? pfn_to_page和page_to_pfn的实现?</li>
<li>node, zone, page的关系是怎么建立的?</li>
</ol>
<p><img src="https://obsidian-1314737433.cos.ap-beijing.myqcloud.com/20240915154202.png"></p>
<a class="article-more-link" href="/2024/Linux%20-%20physical%20memory%20initialization%20--%20ARM64%20v5.0/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Linux/" rel="tag">Linux</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Memory-Management/" rel="tag">Memory_Management</a></li></ul>
</footer>
</div>
</article>
<article
id="post-Linux - pagetable mapping establishment -- ARM64 v5.0"
class="article article-type-post"
itemscope
itemprop="blogPost"
data-scroll-reveal
>
<div class="article-inner">
<header class="article-header">
<h2 itemprop="name">
<a class="article-title" href="/2024/Linux%20-%20pagetable%20mapping%20establishment%20--%20ARM64%20v5.0/"
>Linux内核 页表映射建立过程 -- ARM64 v5.0</a>
</h2>
</header>
<div class="article-meta">
<a href="/2024/Linux%20-%20pagetable%20mapping%20establishment%20--%20ARM64%20v5.0/" class="article-date">
<time datetime="2024-09-04T16:00:00.000Z" itemprop="datePublished">2024-09-05</time>
</a>
<div class="article-category">
<a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/">Linux内核</a> / <a class="article-category-link" href="/categories/Linux%E5%86%85%E6%A0%B8/%E5%86%85%E5%AD%98%E7%AE%A1%E7%90%86/">内存管理</a>
</div>
</div>
<div class="article-entry" itemprop="articleBody">
<p>以Linux v5.0分析.</p>
<p>注意参数或变量中的pgd,pud指的是表项, 为表示区分, 在分析过程中使用大写表示表, 小写表示表项.(如PGD表示全局页目录表.pgd表示全局目录表中的表项)<br><img src="https://obsidian-1314737433.cos.ap-beijing.myqcloud.com/20240901191657.png"></p>
<h2 id="Question"><a href="#Question" class="headerlink" title="Question"></a>Question</h2><ol>
<li>内核如何适应MMU开启前后的访存机制差异?</li>
<li>MMU开启之后, 虚拟地址到物理地址的映射是什么样的?</li>
</ol>
<a class="article-more-link" href="/2024/Linux%20-%20pagetable%20mapping%20establishment%20--%20ARM64%20v5.0/"
>阅读更多...</a
>
<!-- reward -->
</div>
<!-- copyright -->
<footer class="article-footer">
<ul class="article-tag-list" itemprop="keywords"><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Linux/" rel="tag">Linux</a></li><li class="article-tag-list-item"><a class="article-tag-list-link" href="/tags/Memory-Management/" rel="tag">Memory_Management</a></li></ul>
</footer>
</div>
</article>
</article>
<nav class="page-nav">
<span class="page-number current">1</span><a class="page-number" href="/page/2/">2</a><a class="page-number" href="/page/3/">3</a><span class="space">…</span><a class="page-number" href="/page/6/">6</a><a class="extend next" rel="next" href="/page/2/">下一页</a>
</nav>
</section>
</div>
<footer class="footer">
<div class="outer">
<ul>
<li>
Copyrights ©
2022-2024
<i class="ri-heart-fill heart_icon"></i> 翰青HanQi
</li>
</ul>
<ul>
<li>
</li>
</ul>
<ul>
<li>
</li>
</ul>
<ul>
</ul>
<ul>
</ul>
<ul>
<li>
<!-- cnzz统计 -->
<script type="text/javascript" src='https://s9.cnzz.com/z_stat.php?id=1278069914&web_id=1278069914'></script>
</li>
</ul>
</div>
</footer>
</main>
<div class="float_btns">
<div class="totop" id="totop">
<i class="ri-arrow-up-line"></i>
</div>
<div class="todark" id="todark">
<i class="ri-moon-line"></i>
</div>
</div>
<aside class="sidebar on">
<button class="navbar-toggle"></button>
<nav class="navbar">
<div class="logo">
<a href="/"><img src="/images/ayer-side.svg" alt="北极落小雪"></a>
</div>
<ul class="nav nav-main">
<li class="nav-item">
<a class="nav-item-link" href="/">主页</a>
</li>
<li class="nav-item">
<a class="nav-item-link" href="/archives">归档</a>
</li>
<li class="nav-item">
<a class="nav-item-link" href="/categories">分类</a>
</li>
<li class="nav-item">
<a class="nav-item-link" href="/tags">标签</a>
</li>
<li class="nav-item">
<a class="nav-item-link" href="/2022/About">关于</a>
</li>
</ul>
</nav>
<nav class="navbar navbar-bottom">
<ul class="nav">
<li class="nav-item">
<a class="nav-item-link nav-item-search" title="搜索">
<i class="ri-search-line"></i>
</a>
</li>
</ul>
</nav>
<div class="search-form-wrap">
<div class="local-search local-search-plugin">
<input type="search" id="local-search-input" class="local-search-input" placeholder="Search...">
<div id="local-search-result" class="local-search-result"></div>
</div>
</div>
</aside>
<div id="mask"></div>
<!-- #reward -->
<div id="reward">
<span class="close"><i class="ri-close-line"></i></span>
<p class="reward-p"><i class="ri-cup-line"></i>请我喝杯咖啡吧~</p>
<div class="reward-box">
<div class="reward-item">
<img class="reward-img" src="/images/alipay.jpg">
<span class="reward-type">支付宝</span>
</div>
<div class="reward-item">
<img class="reward-img" src="/images/wechat.jpg">
<span class="reward-type">微信</span>
</div>
</div>
</div>
<script src="/js/jquery-3.6.0.min.js"></script>
<script src="/js/lazyload.min.js"></script>
<!-- Tocbot -->
<script src="https://cdn.staticfile.org/jquery-modal/0.9.2/jquery.modal.min.js"></script>
<link
rel="stylesheet"
href="https://cdn.staticfile.org/jquery-modal/0.9.2/jquery.modal.min.css"
/>
<script src="https://cdn.staticfile.org/justifiedGallery/3.8.1/js/jquery.justifiedGallery.min.js"></script>
<script src="/dist/main.js"></script>
<!-- ImageViewer -->
<!-- Root element of PhotoSwipe. Must have class pswp. -->
<div class="pswp" tabindex="-1" role="dialog" aria-hidden="true">
<!-- Background of PhotoSwipe.
It's a separate element as animating opacity is faster than rgba(). -->
<div class="pswp__bg"></div>
<!-- Slides wrapper with overflow:hidden. -->
<div class="pswp__scroll-wrap">
<!-- Container that holds slides.
PhotoSwipe keeps only 3 of them in the DOM to save memory.
Don't modify these 3 pswp__item elements, data is added later on. -->
<div class="pswp__container">
<div class="pswp__item"></div>
<div class="pswp__item"></div>
<div class="pswp__item"></div>
</div>
<!-- Default (PhotoSwipeUI_Default) interface on top of sliding area. Can be changed. -->
<div class="pswp__ui pswp__ui--hidden">
<div class="pswp__top-bar">
<!-- Controls are self-explanatory. Order can be changed. -->