{"id":1680,"date":"2020-02-02T22:42:24","date_gmt":"2020-02-02T14:42:24","guid":{"rendered":"https:\/\/blog.dynox.cn\/?p=1680"},"modified":"2023-08-10T23:27:57","modified_gmt":"2023-08-10T15:27:57","slug":"linux%e5%86%85%e6%a0%b8%e7%9b%91%e6%8e%a7","status":"publish","type":"post","link":"https:\/\/blog.dynox.cn\/?p=1680","title":{"rendered":"Linux\u5185\u6838\u76d1\u63a7"},"content":{"rendered":"<div class=\"gruber-markdown\"><p>\u672c\u6587\u5c06\u7b80\u5355\u7f57\u5217Linux\u76d1\u63a7\u7684\u5b9e\u73b0\u65b9\u5f0f\uff0c\u5b89\u5168\u53ca\u5ba1\u8ba1\u8f6f\u4ef6\u7684\u524d\u63d0\u5c31\u662f\u80fd\u5728\u5173\u952e\u70b9\u4e0a\u63a5\u7ba1\u7cfb\u7edf\u7684\u6267\u884c\u6d41\u7a0b\uff0c\u800c\u5173\u952e\u70b9\u7684\u63a5\u7ba1\u5fc5\u987b\u4f9d\u8d56Linux\u5185\u6838\u7684\u76d1\u63a7\u80fd\u529b\uff1a<\/p>\n<h1>1 LSM HOOK<\/h1>\n<p>Linux\u5185\u6838\u4e2d\u4e3a\u53d1\u5b9e\u73b0\u5176\u5b89\u5168\u673a\u5236\uff0c\u5df2\u7ecf\u9884\u7559\u4e86LSM HOOK\u57cb\u70b9\uff0c\u4ee54.4.131\u7684\u5185\u6838\u4e3a\u4f8b\uff0c\u7cfb\u7edf\u5171\u63d0\u4f9b\u4e86\u591a\u8fbe198\u4e2a\u76d1\u63a7\u70b9\u56de\u8c03\uff0c4.4.131\u662f\u5f53\u524d\u9e92\u9e9f\u64cd\u4f5c\u64cd\u4f5c\u7cfb\u7edf\u7684\u5185\u6838\u7248\u672c\uff0c\u800c\u8f83\u65b0\u76845.4.2\u5185\u6838\u5df2\u7ecf\u652f\u6301\u591a\u8fbe216\u76d1\u63a7\u56de\u8c03\uff1a<\/p>\n<table>\n<thead>\n<tr>\n<th><strong>\u7c7b\u522b<\/strong><\/th>\n<th><strong>\u94a9\u5b50\u51fd\u6570\u4e2a\u6570<\/strong><\/th>\n<th><strong>\u529f\u80fd<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>ptrace<\/td>\n<td>2<\/td>\n<td>Ptrace\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u80fd\u529b\u673a\u5236<\/td>\n<td>3<\/td>\n<td>Capabilities\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u78c1\u76d8\u914d\u989d<\/td>\n<td>2<\/td>\n<td>\u914d\u76d8\u914d\u989d\u7ba1\u7406\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u8d85\u7ea7\u5757<\/td>\n<td>13<\/td>\n<td>mount\/umount\/\u6587\u4ef6\u7cfb\u7edf\/\u8d85\u7ea7\u5757\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>dentry<\/td>\n<td>2<\/td>\n<td>dentry\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u6587\u4ef6\u8def\u5f84<\/td>\n<td>11<\/td>\n<td>\u6587\u4ef6\u540d\/\u8def\u5f84\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>inode<\/td>\n<td>27<\/td>\n<td>inode\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>file<\/td>\n<td>13<\/td>\n<td>file\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u7a0b\u5e8f\u52a0\u8f7d<\/td>\n<td>5<\/td>\n<td>\u8fd0\u884c\u7a0b\u5e8f\u65f6\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u8fdb\u7a0b<\/td>\n<td>27<\/td>\n<td>\u8fdb\u7a0b\/\u8fdb\u7a0b\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>IPC<\/td>\n<td>21<\/td>\n<td>IPC\u6d88\u606f\/\u5171\u4eab\u5185\u5b58\/\u4fe1\u53f7\u91cf\u7b49\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>proc\u6587\u4ef6\u7cfb\u7edf<\/td>\n<td>2<\/td>\n<td>proc\u6587\u4ef6\u7cfb\u7edf\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u7cfb\u7edf\u8bbe\u7f6e<\/td>\n<td>2<\/td>\n<td>\u65e5\u5fd7\uff0c\u65f6\u95f4\u7b49\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u5185\u5b58\u7ba1\u7406<\/td>\n<td>1<\/td>\n<td>\u5185\u5b58\u7ba1\u7406\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u5b89\u5168\u5c5e\u6027<\/td>\n<td>7<\/td>\n<td>\u5bf9\u5b89\u5168\u76f8\u5173\u6570\u636e\u7ed3\u6784\u7684\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u7f51\u7edc<\/td>\n<td>37<\/td>\n<td>\u7f51\u7edc\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>XFRM<\/td>\n<td>11<\/td>\n<td>XFRM\u67b6\u6784\u60f3\u8981\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u5bc6\u94a5<\/td>\n<td>4<\/td>\n<td>\u5bc6\u94a5\u7ba1\u7406\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>\u5ba1\u8ba1<\/td>\n<td>4<\/td>\n<td>\u5185\u6838\u5ba1\u8ba1\u76f8\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td>Android Binder<\/td>\n<td>4<\/td>\n<td>Android Binder\u67b6\u6784\u6709\u5173\u64cd\u4f5c\u7684\u6743\u9650\u68c0\u67e5<\/td>\n<\/tr>\n<tr>\n<td><strong>\u603b\u8ba1<\/strong><\/td>\n<td><strong>198<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u5176\u4e2d\u6211\u4eec\u6700\u5173\u5fc3\u7684\u662f\u8fdb\u7a0b\u3001\u7a0b\u5e8f\u52a0\u8f7d\u3001\u5185\u5b58\u53ca\u6587\u4ef6\u76f8\u5173\u7684\u76d1\u63a7\u56de\u8c03\uff0c\u4ece\u6570\u91cf\u53ca\u529f\u80fd\u4e0a\u5df2\u8db3\u591f\u5f3a\u5927\uff0c\u4f46\u5177\u4f53\u80fd\u5426\u6ee1\u8db3\u6211\u4eec\u7684\u9700\u6c42\uff0c\u8fd8\u8981\u5728\u5b9e\u73b0\u8fc7\u7a0b\u4e2d\u8fdb\u884c\u5206\u6790\u548c\u9a8c\u8bc1\u3002\u6bd4\u5982\u4ee5\u8fdb\u7a0b\u521b\u5efa\u4e3a\u4f8b\uff0cLinux\u5185\u6838\u7684\u8fdb\u7a0b\u521b\u5efa\u662f\u901a\u8fc7sys_clone\uff08sys_fork\/sys_vfork\uff09\u53casys_execve\u5b9e\u73b0\u7684\uff0c\u4f46LSM\u7684\u76d1\u63a7\u70b9\u4e3a\u4e86\u907f\u514d\u591a\u5165\u53e3\u7684\u95ee\u9898\uff0c\u653e\u5728\u4e86task_alloc\u8fd9\u4e2a\u70b9\u4e0a\uff1a\u8c03\u7528\u6808\u5982\u4e0b\u6240\u793a\uff1a<\/p>\n<pre><code class=\"prettyprint\" class=\"language-c\">backtrace\n#0  security_task_alloc (task=0xffff923cad2f8000, clone_flags=4001536) at security\/security.c:1472\n#1  0xffffffffa0a88ff4 in copy_process (clone_flags=4001536, stack_start=&lt;optimized out&gt;, stack_size=&lt;optimized out&gt;, child_tidptr=&lt;optimized out&gt;, pid=0x0, trace=&lt;optimized out&gt;, tls=&lt;optimized out&gt;, node=-1) at kernel\/fork.c:1746\n#2  0xffffffffa0a8a59f in copy_process (node=&lt;optimized out&gt;, tls=&lt;optimized out&gt;, trace=&lt;optimized out&gt;, pid=&lt;optimized out&gt;, child_tidptr=&lt;optimized out&gt;, stack_size=&lt;optimized out&gt;, stack_start=&lt;optimized out&gt;, clone_flags=&lt;optimized out&gt;) at kernel\/fork.c:1574\n#3  _do_fork (clone_flags=4001536, stack_start=&lt;optimized out&gt;, stack_size=&lt;optimized out&gt;, parent_tidptr=&lt;optimized out&gt;, child_tidptr=&lt;optimized out&gt;, tls=&lt;optimized out&gt;) at kernel\/fork.c:2056\n#4  0xffffffffa0a8a969 in SYSC_clone (tls=&lt;optimized out&gt;, child_tidptr=&lt;optimized out&gt;, parent_tidptr=&lt;optimized out&gt;, newsp=&lt;optimized out&gt;, clone_flags=&lt;optimized out&gt;) at kernel\/fork.c:2166\n#5  SyS_clone (clone_flags=&lt;optimized out&gt;, newsp=&lt;optimized out&gt;, parent_tidptr=&lt;optimized out&gt;, child_tidptr=&lt;optimized out&gt;, tls=&lt;optimized out&gt;) at kernel\/fork.c:2160\n#6  0xffffffffa0a03ae3 in do_syscall_64 (regs=0xffff923cad2f8000) at arch\/x86\/entry\/common.c:287\n#7  0xffffffffa1400081 in entry_SYSCALL_64 () at arch\/x86\/entry\/entry_64.S:237\n#8  0x00007ffc00600600 in ?? ()\n#9  0x000056066c0ceec0 in ?? ()\n#10 0x0000000000000000 in ?? ()<\/code><\/pre>\n<p>\u5728\u8fdb\u7a0b\u521b\u5efa\u8fd9\u4e2a\u70b9\u4e0a\u6211\u4eec\u9700\u8981\u53d6\u5230\u54ea\u4e9b\u4fe1\u606f\uff1a\u4e3b\u8fdb\u7a0b\u3001\u5b50\u8fdb\u7a0b\u3001\u8c03\u7528\u6808\u53ca\u76f8\u5e94\u7684\u7b26\u53f7\u4fe1\u606f\u7b49\u7b49\uff0c\u4f46security_task_alloc\u8fd9\u4e2a\u70b9\u4e0d\u80fd\u6ee1\u8db3\u6211\u4eec\u7684\u9700\u6c42\uff0c\u4f46\u518d\u5229\u7528\u7a0b\u5e8f\u52a0\u8f7d\uff08BPRM\uff09\u7684\u76f8\u5173\u56de\u8c03\u6211\u4eec\u5373\u53ef\u5c06\u6240\u6709\u7684\u4fe1\u606f\u4e32\u8054\u8d77\u6765\uff0c\u6709\u4e86\u8fd9\u4e2a\u4fe1\u606f\u6211\u4eec\u5c31\u80fd\u591f\u505a\u8fdb\u8be6\u7ec6\u7684\u68c0\u6d4b\u4e0e\u5224\u5b9a\uff0c\u4ee5\u4e0a\u5c31\u662f\u6211\u4eec\u89e3\u51b3\u95ee\u9898\u7684\u4e3b\u8981\u601d\u8def\u3002<\/p>\n<h1>2 Syscall_Table HOOK<\/h1>\n<p>\u8fd9\u79cd\u65b9\u5f0f\u5c31\u7c7b\u4f3c\u4e8e SSDT HOOK\uff0c\u4f46Linux\u5185\u6838\u5e76\u6ca1\u6709\u7c7b\u4f3c\u4e8eWindows\u5185\u6838\u7684PatchGuard \uff08KPP\uff09\u7684\u9632\u62a4\u673a\u5236\uff0c\u76ee\u524d\u5929\u64ce\u56fd\u4ea7\u5316\u5c31\u662f\u4f7f\u7528\u7684\u6b64\u6280\u672f\uff0c\u4f46\u5728PKS\u7cfb\u7edf\u4e0a\uff0c\u53ef\u4fe1\u8ba1\u7b97\u4ee5\u53ca\u6f9c\u8d77\u5b89\u5168\u5185\u5b58\u5bf9syscall table\u4ee5\u53ca\u5185\u6838\u955c\u50cf\u90fd\u662f\u6709\u5b89\u5168\u5ea6\u91cf\u4ee5\u53ca\u5185\u5b58\u9632\u6539\u4fdd\u62a4\u3002\u53e6\u5916\u4e3a\u4e86\u89e3\u51b3Meltdown\uff0cLinux\u5185\u6838\u5f15\u5165\u7684KPTI\u4ee5\u53caARM64\u7cfb\u7edf\u4e0a\u5f15\u5165\u7684Syscall Table Wrapper \uff084.19\u4e4b\u540e\uff09\u90fd\u7ed9Syscall Table HOOK\u5e26\u6765\u6311\u6218<\/p>\n<p>\u9700\u8981\u6ce8\u610f\u7684\u4e8b\uff0cLinux\u5185\u6838\u4e2d\u4f1a\u5b58\u5b58\u591a\u4e2asyscall table\uff0c\u6bd4\u5982X64\u4e3a\u4e86\u652f\u630132\u4f4d\u7684x86\u7a0b\u5e8f\u4f1a\u4fdd\u755932\u4f4d\u79fb\u7a0b\u5e8f\u7684syscall table\uff0c\u53e6\u5916Linux\u8fd8\u6709\u4e00\u9879\u7279\u6b8a\u7684syscall tabke\u4e13\u4e3aX64_32\u7a0b\u5e8f\u4f7f\u7528\uff0cX64_32\u7c7b\u522b\u7a0b\u5e8f\u5185\u90e8\u76f4\u63a5\u4f7f\u7528\u7684\u662f64\u4f4d\u7684syscall id<\/p>\n<h1>3 \u4ee3\u7801Inline HOOK<\/h1>\n<p>\u4ee3\u7801Inline hook\u505a\u4e3a\u9488\u5bf9Syscall Table hook\u7684\u5ef6\u4f38\uff0c\u4f46\u540c\u6837\u4ea6\u9762\u4e34\u53ef\u4fe1\u5ea6\u91cf\u53ca\u5185\u5b58\u4fdd\u62a4\u7684\u6311\u6218<\/p>\n<h1>4 ftrace &amp; kprobe\u673a\u5236<\/h1>\n<p>Linux\u5185\u6838\u4e3a\u4e86\u63d0\u5347\u5728\u7ebf\u89e3\u51b3\u95ee\u9898\u7684\u6548\u7387\uff0c\u5b9e\u73b0\u4e86\u52a8\u6001\u63d2\u6869\u673a\u5236\uff0c\u53ef\u4ee5\u5728\u5185\u6838\u201d\u4efb\u610f\u51fd\u6570\u201c\u70b9\u8fdb\u884c\u63d2\u6869\uff0c\u7528\u4ee5\u8f93\u51fa\u53c2\u6570\u53ca\u51fd\u6570\u53d8\u91cf\uff0c\u751a\u81f3\u6539\u53d8\u51fd\u6570\u6267\u884c\u6d41\u7a0b\u3002\u5f53\u7136\u8fd9\u79cd\u6280\u672f\u4e3b\u8981\u662f\u7528\u4e8e\u6392\u9519\u5e94\u6025\uff0c\u5982\u679c\u7528\u4e8e\u751f\u4ea7\u73af\u5883\u8fd8\u9700\u8981\u66f4\u591a\u7684\u6280\u672f\u9a8c\u8bc1\u3002\u8fd9\u79cd\u6280\u672f\u7684\u660e\u663e\u9650\u5236\u662f\u9488\u5bf9\u540c\u4e00\u4e2a\u51fd\u6570\u53ea\u80fd\u8fdb\u884c\u4e00\u4e2a\u63d2\u6869\uff0c\u5e76\u4e14\u63d2\u6869\u884c\u4e3a\u662f\u80fd\u591f\u88ab\u53ef\u4fe1\u8ba1\u7b97\u53d1\u73b0\u7684\uff0c\u4ea6\u53ef\u88ab\u963b\u6b62\u3002<\/p>\n<h1>5 \u4e2d\u65ad\u5411\u91cfHOOK<\/h1>\n<p>X86\u4f53\u7cfb\u4e0b\u5e94\u7528\u5c42\u901a\u8fc7syscall\u6216sysenter\u5207\u6362\u81f3\u5185\u6838\u6a21\u5f0f\uff0cARM\u4f53\u7cfb\u4e0b\u901a\u8fc7SVC\u6216SWI\u53ef\u4ee5\u5207\u6362\u81f3\u5185\u6838\uff0c\u5207\u6362\u6a21\u5f0f\u7684\u6307\u4ee4\u6700\u7ec8\u662f\u901a\u8fc7\u81ea\u9677\u9631\uff08Trap\uff09\u89e6\u4f7fCPU\u8fdb\u884c\u6a21\u5f0f\u5207\u6362\uff0c\u5e76\u81ea\u52a8\u6267\u884c\u4e8b\u5148\u6307\u5b9a\u4f4d\u7f6e\u5904\u7684\u4ee3\u7801\u3002\u6211\u4eec\u53ef\u4ee5\u901a\u8fc7\u63a5\u7ba1\u4e2d\u65ad\u5411\u91cf\u7684\u65b9\u5f0f\u5b9e\u73b0Syscall\u7684HOOK\uff0c\u4f46\u662f\u6b64\u65b9\u5f0f\u4f1a\u6709\u4ee5\u4e0b\u96be\u70b9\uff1a<\/p>\n<ol>\n<li>\u5165\u53e3\u7247\u8981\u5904\u7406\u76f8\u5f53\u591a\u7684\u521d\u59cb\u5316\u5de5\u4f5c\uff0c\u53ea\u80fd\u7528\u6c47\u7f16\u7ea7\u6307\u4ee4\u5b9e\u73b0<\/li>\n<li>\u9488\u5bf9\u5f00\u542fKPTI\u7684\u5185\u6838\uff0c\u8981\u4fdd\u8bc1\u5165\u53e3\u4ee3\u7801\u5728Shadow\u5185\u6838\u7a7a\u95f4<\/li>\n<\/ol>\n<h1>6 GhostHOOK<\/h1>\n<p>\u4f9d\u8d56\u4e8e\u786c\u4ef6PMU\u7684HOOK\u5b9e\u73b0\u65b9\u5f0f\uff0cIntel\u53caAMD\u5728\u5404\u81ea\u7684CPU\u4e0a\u5747\u5b9e\u73b0\u4e86\u7c7b\u4f3c\u7684\u673a\u5236\uff0cARM\u67b6\u6784\u4e0a\u7684CP15\u534f\u5904\u7406\u5668\u4ea6\u5b9e\u73b0\u4e86\u7c7b\u4f3c\u7684\u529f\u80fd\uff0c\u4f46\u76f8\u5bf9Intel\u7684PMU\u5728\u529f\u80fd\u4e0a\u8981\u5f31\u4e00\u4e9b\uff0c\u4f46\u5747\u53ef\u4ee5\u8fbe\u6210\u7c7b\u4f3c\u7684HOOK\u6548\u679c\u3002<\/p>\n<p>\u5f53\u7136\u901a\u8fc7\u9ad8\u7cbe\u5ea6\u65f6\u95f4\u4e2d\u65ad\u4ea6\u53ef\u8fbe\u6210\u540c\u6837\u6548\u679c<\/p>\n<h1>7 \u5185\u6838hot patch<\/h1>\n<p>ARM64\u5e73\u53f0\u53ef\u5229\u7528 aarch64_insn_patch_text \u8fdb\u884c\u51fd\u6570\u5c42\u7684hook\u3002<\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>\u672c\u6587\u5c06\u7b80\u5355\u7f57\u5217Linux\u76d1\u63a7\u7684\u5b9e\u73b0\u65b9\u5f0f\uff0c\u5b89\u5168\u53ca\u5ba1\u8ba1\u8f6f\u4ef6\u7684\u524d\u63d0\u5c31\u662f\u80fd\u5728\u5173\u952e\u70b9\u4e0a\u63a5\u7ba1\u7cfb\u7edf\u7684\u6267\u884c\u6d41\u7a0b\uff0c\u800c\u5173\u952e\u70b9\u7684\u63a5\u7ba1 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[9],"tags":[612,510,618,394],"views":706,"_links":{"self":[{"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=\/wp\/v2\/posts\/1680"}],"collection":[{"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1680"}],"version-history":[{"count":2,"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=\/wp\/v2\/posts\/1680\/revisions"}],"predecessor-version":[{"id":1727,"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=\/wp\/v2\/posts\/1680\/revisions\/1727"}],"wp:attachment":[{"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.dynox.cn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}