123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299 |
- /*
- * syscall-steal.c
- *
- * System call "stealing" sample.
- *
- * Disables page protection at a processor level by changing the 16th bit
- * in the cr0 register (could be Intel specific).
- */
- #include <linux/delay.h>
- #include <linux/kernel.h>
- #include <linux/module.h>
- #include <linux/moduleparam.h> /* which will have params */
- #include <linux/unistd.h> /* The list of system calls */
- #include <linux/cred.h> /* For current_uid() */
- #include <linux/uidgid.h> /* For __kuid_val() */
- #include <linux/version.h>
- /* For the current (process) structure, we need this to know who the
- * current user is.
- */
- #include <linux/sched.h>
- #include <linux/uaccess.h>
- /* The way we access "sys_call_table" varies as kernel internal changes.
- * - Prior to v5.4 : manual symbol lookup
- * - v5.5 to v5.6 : use kallsyms_lookup_name()
- * - v5.7+ : Kprobes or specific kernel module parameter
- */
- /* The in-kernel calls to the ksys_close() syscall were removed in Linux v5.11+.
- */
- #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 7, 0))
- #if defined(CONFIG_KPROBES)
- #define HAVE_KPROBES 1
- #if defined(CONFIG_X86_64)
- /* If you have tried to use the syscall table to intercept syscalls and it
- * doesn't work, you can try to use Kprobes to intercept syscalls.
- * Set USE_KPROBES_PRE_HANDLER_BEFORE_SYSCALL to 1 to register a pre-handler
- * before the syscall.
- */
- #define USE_KPROBES_PRE_HANDLER_BEFORE_SYSCALL 0
- #endif
- #include <linux/kprobes.h>
- #else
- #define HAVE_PARAM 1
- #include <linux/kallsyms.h> /* For sprint_symbol */
- /* The address of the sys_call_table, which can be obtained with looking up
- * "/boot/System.map" or "/proc/kallsyms". When the kernel version is v5.7+,
- * without CONFIG_KPROBES, you can input the parameter or the module will look
- * up all the memory.
- */
- static unsigned long sym = 0;
- module_param(sym, ulong, 0644);
- #endif /* CONFIG_KPROBES */
- #else
- #if LINUX_VERSION_CODE <= KERNEL_VERSION(5, 4, 0)
- #define HAVE_KSYS_CLOSE 1
- #include <linux/syscalls.h> /* For ksys_close() */
- #else
- #include <linux/kallsyms.h> /* For kallsyms_lookup_name */
- #endif
- #endif /* Version >= v5.7 */
- /* UID we want to spy on - will be filled from the command line. */
- static uid_t uid = -1;
- module_param(uid, int, 0644);
- #if USE_KPROBES_PRE_HANDLER_BEFORE_SYSCALL
- /* syscall_sym is the symbol name of the syscall to spy on. The default is
- * "__x64_sys_openat", which can be changed by the module parameter. You can
- * look up the symbol name of a syscall in /proc/kallsyms.
- */
- static char *syscall_sym = "__x64_sys_openat";
- module_param(syscall_sym, charp, 0644);
- static int sys_call_kprobe_pre_handler(struct kprobe *p, struct pt_regs *regs)
- {
- if (__kuid_val(current_uid()) != uid) {
- return 0;
- }
- pr_info("%s called by %d\n", syscall_sym, uid);
- return 0;
- }
- static struct kprobe syscall_kprobe = {
- .symbol_name = "__x64_sys_openat",
- .pre_handler = sys_call_kprobe_pre_handler,
- };
- #else
- static unsigned long **sys_call_table_stolen;
- /* A pointer to the original system call. The reason we keep this, rather
- * than call the original function (sys_openat), is because somebody else
- * might have replaced the system call before us. Note that this is not
- * 100% safe, because if another module replaced sys_openat before us,
- * then when we are inserted, we will call the function in that module -
- * and it might be removed before we are.
- *
- * Another reason for this is that we can not get sys_openat.
- * It is a static variable, so it is not exported.
- */
- #ifdef CONFIG_ARCH_HAS_SYSCALL_WRAPPER
- static asmlinkage long (*original_call)(const struct pt_regs *);
- #else
- static asmlinkage long (*original_call)(int, const char __user *, int, umode_t);
- #endif
- /* The function we will replace sys_openat (the function called when you
- * call the open system call) with. To find the exact prototype, with
- * the number and type of arguments, we find the original function first
- * (it is at fs/open.c).
- *
- * In theory, this means that we are tied to the current version of the
- * kernel. In practice, the system calls almost never change (it would
- * wreck havoc and require programs to be recompiled, since the system
- * calls are the interface between the kernel and the processes).
- */
- #ifdef CONFIG_ARCH_HAS_SYSCALL_WRAPPER
- static asmlinkage long our_sys_openat(const struct pt_regs *regs)
- #else
- static asmlinkage long our_sys_openat(int dfd, const char __user *filename,
- int flags, umode_t mode)
- #endif
- {
- int i = 0;
- char ch;
- if (__kuid_val(current_uid()) != uid)
- goto orig_call;
- /* Report the file, if relevant */
- pr_info("Opened file by %d: ", uid);
- do {
- #ifdef CONFIG_ARCH_HAS_SYSCALL_WRAPPER
- get_user(ch, (char __user *)regs->si + i);
- #else
- get_user(ch, (char __user *)filename + i);
- #endif
- i++;
- pr_info("%c", ch);
- } while (ch != 0);
- pr_info("\n");
- orig_call:
- /* Call the original sys_openat - otherwise, we lose the ability to
- * open files.
- */
- #ifdef CONFIG_ARCH_HAS_SYSCALL_WRAPPER
- return original_call(regs);
- #else
- return original_call(dfd, filename, flags, mode);
- #endif
- }
- static unsigned long **acquire_sys_call_table(void)
- {
- #ifdef HAVE_KSYS_CLOSE
- unsigned long int offset = PAGE_OFFSET;
- unsigned long **sct;
- while (offset < ULLONG_MAX) {
- sct = (unsigned long **)offset;
- if (sct[__NR_close] == (unsigned long *)ksys_close)
- return sct;
- offset += sizeof(void *);
- }
- return NULL;
- #endif
- #ifdef HAVE_PARAM
- const char sct_name[15] = "sys_call_table";
- char symbol[40] = { 0 };
- if (sym == 0) {
- pr_alert("For Linux v5.7+, Kprobes is the preferable way to get "
- "symbol.\n");
- pr_info("If Kprobes is absent, you have to specify the address of "
- "sys_call_table symbol\n");
- pr_info("by /boot/System.map or /proc/kallsyms, which contains all the "
- "symbol addresses, into sym parameter.\n");
- return NULL;
- }
- sprint_symbol(symbol, sym);
- if (!strncmp(sct_name, symbol, sizeof(sct_name) - 1))
- return (unsigned long **)sym;
- return NULL;
- #endif
- #ifdef HAVE_KPROBES
- unsigned long (*kallsyms_lookup_name)(const char *name);
- struct kprobe kp = {
- .symbol_name = "kallsyms_lookup_name",
- };
- if (register_kprobe(&kp) < 0)
- return NULL;
- kallsyms_lookup_name = (unsigned long (*)(const char *name))kp.addr;
- unregister_kprobe(&kp);
- #endif
- return (unsigned long **)kallsyms_lookup_name("sys_call_table");
- }
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 3, 0)
- static inline void __write_cr0(unsigned long cr0)
- {
- asm volatile("mov %0,%%cr0" : "+r"(cr0) : : "memory");
- }
- #else
- #define __write_cr0 write_cr0
- #endif
- static void enable_write_protection(void)
- {
- unsigned long cr0 = read_cr0();
- set_bit(16, &cr0);
- __write_cr0(cr0);
- }
- static void disable_write_protection(void)
- {
- unsigned long cr0 = read_cr0();
- clear_bit(16, &cr0);
- __write_cr0(cr0);
- }
- #endif
- static int __init syscall_steal_start(void)
- {
- #if USE_KPROBES_PRE_HANDLER_BEFORE_SYSCALL
- int err;
- /* use symbol name from the module parameter */
- syscall_kprobe.symbol_name = syscall_sym;
- err = register_kprobe(&syscall_kprobe);
- if (err) {
- pr_err("register_kprobe() on %s failed: %d\n", syscall_sym, err);
- pr_err("Please check the symbol name from 'syscall_sym' parameter.\n");
- return err;
- }
- #else
- if (!(sys_call_table_stolen = acquire_sys_call_table()))
- return -1;
- disable_write_protection();
- /* keep track of the original open function */
- original_call = (void *)sys_call_table_stolen[__NR_openat];
- /* use our openat function instead */
- sys_call_table_stolen[__NR_openat] = (unsigned long *)our_sys_openat;
- enable_write_protection();
- #endif
- pr_info("Spying on UID:%d\n", uid);
- return 0;
- }
- static void __exit syscall_steal_end(void)
- {
- #if USE_KPROBES_PRE_HANDLER_BEFORE_SYSCALL
- unregister_kprobe(&syscall_kprobe);
- #else
- if (!sys_call_table_stolen)
- return;
- /* Return the system call back to normal */
- if (sys_call_table_stolen[__NR_openat] != (unsigned long *)our_sys_openat) {
- pr_alert("Somebody else also played with the ");
- pr_alert("open system call\n");
- pr_alert("The system may be left in ");
- pr_alert("an unstable state.\n");
- }
- disable_write_protection();
- sys_call_table_stolen[__NR_openat] = (unsigned long *)original_call;
- enable_write_protection();
- #endif
- msleep(2000);
- }
- module_init(syscall_steal_start);
- module_exit(syscall_steal_end);
- MODULE_LICENSE("GPL");
|