mirror of
https://github.com/sysprog21/lkmpg.git
synced 2024-11-29 12:16:41 +08:00
9289bfe59c
Sparse[1] is a semantic parser, capable of finding out the potential problems of Linux kernel code. This patch fixed the warnings. [1] https://www.kernel.org/doc/html/latest/dev-tools/sparse.html
230 lines
6.3 KiB
C
230 lines
6.3 KiB
C
/*
|
|
* syscall.c
|
|
*
|
|
* System call "stealing" sample.
|
|
*
|
|
* Disables page protection at a processor level by changing the 16th bit
|
|
* in the cr0 register (could be Intel specific).
|
|
*
|
|
* Based on example by Peter Jay Salzman and
|
|
* https://bbs.archlinux.org/viewtopic.php?id=139406
|
|
*/
|
|
|
|
#include <linux/delay.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/module.h>
|
|
#include <linux/moduleparam.h> /* which will have params */
|
|
#include <linux/unistd.h> /* The list of system calls */
|
|
#include <linux/version.h>
|
|
|
|
/* For the current (process) structure, we need this to know who the
|
|
* current user is.
|
|
*/
|
|
#include <linux/sched.h>
|
|
#include <linux/uaccess.h>
|
|
|
|
/* The way we access "sys_call_table" varies as kernel internal changes.
|
|
* - ver <= 5.4 : manual symbol lookup
|
|
* - 5.4 < ver < 5.7 : kallsyms_lookup_name
|
|
* - 5.7 <= ver : Kprobes or specific kernel module parameter
|
|
*/
|
|
|
|
/* The in-kernel calls to the ksys_close() syscall were removed in Linux v5.11+.
|
|
*/
|
|
#if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 7, 0))
|
|
|
|
#if LINUX_VERSION_CODE <= KERNEL_VERSION(5, 4, 0)
|
|
#define HAVE_KSYS_CLOSE 1
|
|
#include <linux/syscalls.h> /* For ksys_close() */
|
|
#else
|
|
#include <linux/kallsyms.h> /* For kallsyms_lookup_name */
|
|
#endif
|
|
|
|
#else
|
|
|
|
#if defined(CONFIG_KPROBES)
|
|
#define HAVE_KPROBES 1
|
|
#include <linux/kprobes.h>
|
|
#else
|
|
#define HAVE_PARAM 1
|
|
#include <linux/kallsyms.h> /* For sprint_symbol */
|
|
/* The address of the sys_call_table, which can be obtained with looking up
|
|
* "/boot/System.map" or "/proc/kallsyms". When the kernel version is v5.7+,
|
|
* without CONFIG_KPROBES, you can input the parameter or the module will look
|
|
* up all the memory.
|
|
*/
|
|
static unsigned long sym = 0;
|
|
module_param(sym, ulong, 0644);
|
|
#endif /* CONFIG_KPROBES */
|
|
|
|
#endif /* Version < v5.7 */
|
|
|
|
static unsigned long **sys_call_table;
|
|
|
|
/* UID we want to spy on - will be filled from the command line. */
|
|
static int uid;
|
|
module_param(uid, int, 0644);
|
|
|
|
/* A pointer to the original system call. The reason we keep this, rather
|
|
* than call the original function (sys_open), is because somebody else
|
|
* might have replaced the system call before us. Note that this is not
|
|
* 100% safe, because if another module replaced sys_open before us,
|
|
* then when we are inserted, we will call the function in that module -
|
|
* and it might be removed before we are.
|
|
*
|
|
* Another reason for this is that we can not get sys_open.
|
|
* It is a static variable, so it is not exported.
|
|
*/
|
|
static asmlinkage int (*original_call)(const char *, int, int);
|
|
|
|
/* The function we will replace sys_open (the function called when you
|
|
* call the open system call) with. To find the exact prototype, with
|
|
* the number and type of arguments, we find the original function first
|
|
* (it is at fs/open.c).
|
|
*
|
|
* In theory, this means that we are tied to the current version of the
|
|
* kernel. In practice, the system calls almost never change (it would
|
|
* wreck havoc and require programs to be recompiled, since the system
|
|
* calls are the interface between the kernel and the processes).
|
|
*/
|
|
static asmlinkage int our_sys_open(const char *filename, int flags, int mode)
|
|
{
|
|
int i = 0;
|
|
char ch;
|
|
|
|
/* Report the file, if relevant */
|
|
pr_info("Opened file by %d: ", uid);
|
|
do {
|
|
get_user(ch, (char __user *)filename + i);
|
|
i++;
|
|
pr_info("%c", ch);
|
|
} while (ch != 0);
|
|
pr_info("\n");
|
|
|
|
/* Call the original sys_open - otherwise, we lose the ability to
|
|
* open files.
|
|
*/
|
|
return original_call(filename, flags, mode);
|
|
}
|
|
|
|
static unsigned long **aquire_sys_call_table(void)
|
|
{
|
|
#ifdef HAVE_KSYS_CLOSE
|
|
unsigned long int offset = PAGE_OFFSET;
|
|
unsigned long **sct;
|
|
|
|
while (offset < ULLONG_MAX) {
|
|
sct = (unsigned long **)offset;
|
|
|
|
if (sct[__NR_close] == (unsigned long *)ksys_close)
|
|
return sct;
|
|
|
|
offset += sizeof(void *);
|
|
}
|
|
|
|
return NULL;
|
|
#endif
|
|
|
|
#ifdef HAVE_PARAM
|
|
const char sct_name[15] = "sys_call_table";
|
|
char symbol[40] = { 0 };
|
|
|
|
if (sym == 0) {
|
|
pr_alert("For Linux v5.7+, Kprobes is the preferable way to get "
|
|
"symbol.\n");
|
|
pr_info("If Kprobes is absent, you have to specify the address of "
|
|
"sys_call_table symbol\n");
|
|
pr_info("by /boot/System.map or /proc/kallsyms, which contains all the "
|
|
"symbol addresses, into sym parameter.\n");
|
|
return NULL;
|
|
}
|
|
sprint_symbol(symbol, sym);
|
|
if (!strncmp(sct_name, symbol, sizeof(sct_name) - 1))
|
|
return (unsigned long **)sym;
|
|
|
|
return NULL;
|
|
#endif
|
|
|
|
#ifdef HAVE_KPROBES
|
|
unsigned long (*kallsyms_lookup_name)(const char *name);
|
|
struct kprobe kp = {
|
|
.symbol_name = "kallsyms_lookup_name",
|
|
};
|
|
|
|
if (register_kprobe(&kp) < 0)
|
|
return NULL;
|
|
kallsyms_lookup_name = (unsigned long (*)(const char *name))kp.addr;
|
|
unregister_kprobe(&kp);
|
|
#endif
|
|
|
|
return (unsigned long **)kallsyms_lookup_name("sys_call_table");
|
|
}
|
|
|
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 3, 0)
|
|
static inline void __write_cr0(unsigned long cr0)
|
|
{
|
|
asm volatile("mov %0,%%cr0" : "+r"(cr0) : : "memory");
|
|
}
|
|
#else
|
|
#define __write_cr0 write_cr0
|
|
#endif
|
|
|
|
static void enable_write_protection(void)
|
|
{
|
|
unsigned long cr0 = read_cr0();
|
|
set_bit(16, &cr0);
|
|
__write_cr0(cr0);
|
|
}
|
|
|
|
static void disable_write_protection(void)
|
|
{
|
|
unsigned long cr0 = read_cr0();
|
|
clear_bit(16, &cr0);
|
|
__write_cr0(cr0);
|
|
}
|
|
|
|
static int __init syscall_start(void)
|
|
{
|
|
if (!(sys_call_table = aquire_sys_call_table()))
|
|
return -1;
|
|
|
|
disable_write_protection();
|
|
|
|
/* keep track of the original open function */
|
|
original_call = (void *)sys_call_table[__NR_open];
|
|
|
|
/* use our open function instead */
|
|
sys_call_table[__NR_open] = (unsigned long *)our_sys_open;
|
|
|
|
enable_write_protection();
|
|
|
|
pr_info("Spying on UID:%d\n", uid);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void __exit syscall_end(void)
|
|
{
|
|
if (!sys_call_table)
|
|
return;
|
|
|
|
/* Return the system call back to normal */
|
|
if (sys_call_table[__NR_open] != (unsigned long *)our_sys_open) {
|
|
pr_alert("Somebody else also played with the ");
|
|
pr_alert("open system call\n");
|
|
pr_alert("The system may be left in ");
|
|
pr_alert("an unstable state.\n");
|
|
}
|
|
|
|
disable_write_protection();
|
|
sys_call_table[__NR_open] = (unsigned long *)original_call;
|
|
enable_write_protection();
|
|
|
|
msleep(2000);
|
|
}
|
|
|
|
module_init(syscall_start);
|
|
module_exit(syscall_end);
|
|
|
|
MODULE_LICENSE("GPL");
|