Examining Process Page Tables

您所在的位置:网站首页 linux slob Examining Process Page Tables

Examining Process Page Tables

2023-04-15 10:56| 来源: 网络整理| 查看: 265

/proc/pid/pagemap. This file lets a userspace process find out which physical frame each virtual page is mapped to. It contains one 64-bit value for each virtual page, containing the following data (from fs/proc/task_mmu.c, above pagemap_read):

Bits 0-54 page frame number (PFN) if present

Bits 0-4 swap type if swapped

Bits 5-54 swap offset if swapped

Bit 55 pte is soft-dirty (see Documentation/admin-guide/mm/soft-dirty.rst)

Bit 56 page exclusively mapped (since 4.2)

Bit 57 pte is uffd-wp write-protected (since 5.13) (see Documentation/admin-guide/mm/userfaultfd.rst)

Bits 58-60 zero

Bit 61 page is file-page or shared-anon (since 3.5)

Bit 62 page swapped

Bit 63 page present

Since Linux 4.0 only users with the CAP_SYS_ADMIN capability can get PFNs. In 4.0 and 4.1 opens by unprivileged fail with -EPERM. Starting from 4.2 the PFN field is zeroed if the user does not have CAP_SYS_ADMIN. Reason: information about PFNs helps in exploiting Rowhammer vulnerability.

If the page is not present but in swap, then the PFN contains an encoding of the swap file number and the page’s offset into the swap. Unmapped pages return a null PFN. This allows determining precisely which pages are mapped (or in swap) and comparing mapped pages between processes.

Efficient users of this interface will use /proc/pid/maps to determine which areas of memory are actually mapped and llseek to skip over unmapped regions.

/proc/kpagecount. This file contains a 64-bit count of the number of times each page is mapped, indexed by PFN.



【本文地址】


今日新闻


推荐新闻


CopyRight 2018-2019 办公设备维修网 版权所有 豫ICP备15022753号-3