subtitle
01
14
14
bee bee
ebpf学习笔记 CHECKrun.sh init#!/bin/sh[ -d /dev ] || mkdir -m 0755 /dev[ -d /sys ] || mkdir /sys[ -d /proc ] || mkdir /proc[
2025-01-14 q1ming
14
CVE-2020-27194 CVE-2020-27194
环境搭建versionLinux-5.8.14 configCONFIG_DEBUG_INFO #调试符号CONFIG_USER_NS=y #支持新的namespaceCONFIG_BPF_UNPRIV_DEFAULT_OFF=n #
2025-01-14 q1ming
14
CVE-2021-3490 CVE-2021-3490
环境搭建 defconfig menuconfig设置slab: CONFIG_BPF_SYSCALL=yCONFIG_BPFILTER=yCONFIG_NET_CLS_BPF=yCONFIG_NET_ACT_BPF=yCONFIG_BP
2025-01-14 q1ming
14
d3ebpf1 d3ebpf1
CHECKboot 可能没有开kpti; init build 开好梯子,vim里复制完整路径? 解压: tar -xvzf linux-hwe-5.11_5.11.0.orig.tar.gz patch: cd linux-5.11gi
2025-01-14 q1ming
14
eBPF-verifier源码分析 eBPF-verifier源码分析
bpf_check在bpf_check函数中,会按照顺序依次做如下check: check_subprogs先看check_subprogs: static int check_subprogs(struct bpf_verifier_e
2025-01-14 q1ming
14
eebpf eebpf
CHECKrun.shinitversion 逆向分析diffdiff -r ./buildroot-2020.08-rc3/output/build/linux-5.4.58/arch/x86/net/bpf_jit_comp.c bui
2025-01-14 q1ming
14
n1ctf_heap_master n1ctf_heap_master
CHECKrun 保护全开 init 存在cg隔离: version 动态调试ffffffff82cc6aa0 d cpu_root_vulnerabilities_groupffffffff83c91e20 d cpu_root_vul
2025-01-14 q1ming
14
qwb-qroute qwb-qroute
CHECK 逆向分析handlerstruct StringSlice *ptr_Router_handleCommand(struct Router *r, struct StringSlice s) { struct St
2025-01-14 q1ming
14
eBPF与sk_buff eBPF与sk_buff
sk_buff func#0 @00: R1=ctx(id=0,off=0,imm=0) R10=fp00: (bf) r7 = r11: R1=ctx(id=
2025-01-14 q1ming
2 / 2