Safest way to read and write to a process address spaceLinux Kernel logical address space organisationFastest...
Do Reform Jews believe in a theistic God?
Are differences between uniformly distributed numbers uniformly distributed?
Do beef farmed pastures net remove carbon emissions?
Boss wants me to ignore a software API license prohibiting mass download
Beginner in need of a simple explanation of the difference between order of evaluation and precedence/associativity
Will using a resistor in series with a LED to control its voltage increase the total energy expenditure?
Why are Tucker and Malcolm not dead?
Installing Windows to flash BIOS, then reinstalling Ubuntu
Telephone number in spoken words
Modeling the uncertainty of the input parameters
How can I communicate my issues with a potential date's pushy behavior?
Is there any way to stop a user from creating executables and running them?
Are there any other rule mechanics that could grant Thieves' Cant?
Are employers legally allowed to pay employees in goods and services equal to or greater than the minimum wage?
Scam? Phone call from "Department of Social Security" asking me to call back
My cat is a houdini
Markov-chain sentence generator in Python
Chunk + Enumerate a list of digits
Is this n-speak?
How is являться different from есть and быть
What is a "soap"?
Can a bald person be a Nazir?
Dogfights in outer space
Do I have to cite common CS algorithms?
Safest way to read and write to a process address space
Linux Kernel logical address space organisationFastest and Safest way to increase Swap Space on Scientific LinuxCan swap space accomodate single process?How to calculate heap size of process from address space?Kernel address space and Kernel page tableWhat is the benefit of providing each process with an address space?Why does `dd` map 200M of virtual address space?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}
For learning purposes, I started studying ways of creating my own Cheat Engine for Linux. CE main feature which I aim reproducing is reading and writing to a process memory address space.
After some reading, I reached some options:
- Using
ptrace
- Read/write of
/proc/pid/mem
- Using
process_vm_readv
andprocess_vm_writev
The solutions 2 and 3 seem to be unsafe because could cause race conditions (not sure about the third). Solution one could cause anti-cheats to catch the CE since it sends a SIGSTOP
? The idea is really to reproduce software that could be used maliciously like CE, so not being caught easily is important.
process memory
add a comment |
For learning purposes, I started studying ways of creating my own Cheat Engine for Linux. CE main feature which I aim reproducing is reading and writing to a process memory address space.
After some reading, I reached some options:
- Using
ptrace
- Read/write of
/proc/pid/mem
- Using
process_vm_readv
andprocess_vm_writev
The solutions 2 and 3 seem to be unsafe because could cause race conditions (not sure about the third). Solution one could cause anti-cheats to catch the CE since it sends a SIGSTOP
? The idea is really to reproduce software that could be used maliciously like CE, so not being caught easily is important.
process memory
add a comment |
For learning purposes, I started studying ways of creating my own Cheat Engine for Linux. CE main feature which I aim reproducing is reading and writing to a process memory address space.
After some reading, I reached some options:
- Using
ptrace
- Read/write of
/proc/pid/mem
- Using
process_vm_readv
andprocess_vm_writev
The solutions 2 and 3 seem to be unsafe because could cause race conditions (not sure about the third). Solution one could cause anti-cheats to catch the CE since it sends a SIGSTOP
? The idea is really to reproduce software that could be used maliciously like CE, so not being caught easily is important.
process memory
For learning purposes, I started studying ways of creating my own Cheat Engine for Linux. CE main feature which I aim reproducing is reading and writing to a process memory address space.
After some reading, I reached some options:
- Using
ptrace
- Read/write of
/proc/pid/mem
- Using
process_vm_readv
andprocess_vm_writev
The solutions 2 and 3 seem to be unsafe because could cause race conditions (not sure about the third). Solution one could cause anti-cheats to catch the CE since it sends a SIGSTOP
? The idea is really to reproduce software that could be used maliciously like CE, so not being caught easily is important.
process memory
process memory
asked 16 hours ago
Vitor FalcãoVitor Falcão
1042 bronze badges
1042 bronze badges
add a comment |
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "106"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f535369%2fsafest-way-to-read-and-write-to-a-process-address-space%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f535369%2fsafest-way-to-read-and-write-to-a-process-address-space%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown