#define STP_NETLINK_ONLY #define STP_NUM_STRINGS 1 #include "runtime.h" #define NEED_INT64_VALS #define NEED_STRING_VALS #define KEY1_TYPE INT64 #include "map-keys.c" #include "map.c" #include "list.c" #include "copy.c" #include "probes.c" MODULE_DESCRIPTION("SystemTap probe: shellsnoop"); MODULE_AUTHOR("Martin Hunt "); MAP pids, arglist ; int inst_do_execve (char * filename, char __user *__user *argv, char __user *__user *envp, struct pt_regs * regs) { struct map_node *ptr; /* watch shells only */ /* FIXME: detect more shells, like csh, tcsh, zsh */ if (!strcmp(current->comm,"bash") || !strcmp(current->comm,"sh") || !strcmp(current->comm, "zsh") || !strcmp(current->comm, "tcsh") || !strcmp(current->comm, "pdksh")) { _stp_printf ("%d\t%d\t%d\t%s ", current->uid, current->pid, current->parent->pid, filename); _stp_map_key_int64 (pids, current->pid); _stp_map_set_int64 (pids, 1); _stp_list_clear (arglist); _stp_copy_argv_from_user (arglist, argv); foreach (arglist, ptr) _stp_printf ("%s ", _stp_get_str(ptr)); _stp_print("\n"); _stp_print_flush(); } jprobe_return(); return 0; } struct file * inst_filp_open (const char * filename, int flags, int mode) { _stp_map_key_int64 (pids, current->pid); if (_stp_map_get_int64 (pids)) _stp_printf ("%d\t%d\t%s\tO %s\n", current->pid, current->parent->pid, current->comm, filename); _stp_print_flush(); jprobe_return(); return 0; } asmlinkage ssize_t inst_sys_read (unsigned int fd, char __user * buf, size_t count) { _stp_map_key_int64 (pids, current->pid); if (_stp_map_get_int64 (pids)) _stp_printf ("%d\t%d\t%s\tR %d\n", current->pid, current->parent->pid, current->comm, fd); _stp_print_flush(); jprobe_return(); return 0; } asmlinkage ssize_t inst_sys_write (unsigned int fd, const char __user * buf, size_t count) { _stp_map_key_int64 (pids, current->pid); if (_stp_map_get_int64 (pids)) { String str = _stp_string_init (0); _stp_string_from_user(str, buf, count); _stp_printf ("%d\t%d\t%s\tW %s", current->pid, current->parent->pid, current->comm, _stp_string_ptr(str)); _stp_print_flush(); } jprobe_return(); return 0; } static struct jprobe stp_probes[] = { { .kp.addr = (kprobe_opcode_t *)"do_execve", .entry = (kprobe_opcode_t *) inst_do_execve }, { .kp.addr = (kprobe_opcode_t *)"filp_open", .entry = (kprobe_opcode_t *) inst_filp_open }, { .kp.addr = (kprobe_opcode_t *)"sys_read", .entry = (kprobe_opcode_t *) inst_sys_read }, { .kp.addr = (kprobe_opcode_t *)"sys_write", .entry = (kprobe_opcode_t *) inst_sys_write }, }; #define MAX_STP_ROUTINE (sizeof(stp_probes)/sizeof(struct jprobe)) static int pid; module_param(pid, int, 0); MODULE_PARM_DESC(pid, "daemon pid"); int init_module(void) { int ret; if (!pid) { printk("init_module: Can't start without daemon pid\n"); return -1; } if (_stp_transport_open(n_subbufs, subbuf_size, pid) < 0) { printk("init_module: Couldn't open transport\n"); return -1; } pids = _stp_map_new_int64 (10000, INT64); arglist = _stp_list_new (10, STRING); ret = _stp_register_jprobes (stp_probes, MAX_STP_ROUTINE); printk("instrumentation is enabled... %s\n", __this_module.name); return ret; } static void probe_exit (void) { _stp_unregister_jprobes (stp_probes, MAX_STP_ROUTINE); _stp_map_del (pids); _stp_printf("dropped %d packets\n", atomic_read(&_stp_transport_failures)); _stp_print_flush(); } void cleanup_module(void) { _stp_transport_close(); } MODULE_LICENSE("GPL");