1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
|
//#define STP_RELAYFS
#define STP_NUM_STRINGS 1
#define STP_STRING_SIZE 8192
#include "runtime.h"
#define VALUE_TYPE INT64
#define KEY1_TYPE INT64
#include "map-gen.c"
#define VALUE_TYPE STRING
#define KEY1_TYPE INT64
#include "map-gen.c"
#include "map.c"
#include "copy.c"
#include "probes.c"
MODULE_DESCRIPTION("SystemTap probe: shellsnoop");
MODULE_AUTHOR("Martin Hunt <hunt@redhat.com>");
MAP pids, arglist ;
void _stp_copy_argv_from_user (MAP list, char __user *__user *argv)
{
char str[128];
char __user *vstr;
int len, i = 0;
if (argv)
argv++;
while (argv != NULL) {
if (get_user (vstr, argv))
break;
if (vstr == NULL)
break;
len = _stp_strncpy_from_user(str, vstr, 128);
str[len] = 0;
_stp_map_set_is (list, i++, str);
argv++;
}
}
int inst_do_execve (char * filename, char __user *__user *argv, char __user *__user *envp, struct pt_regs * regs)
{
struct map_node *ptr;
/* watch shells only */
/* FIXME: detect more shells, like csh, tcsh, zsh */
if (!strcmp(current->comm,"bash") || !strcmp(current->comm,"sh") || !strcmp(current->comm, "zsh")
|| !strcmp(current->comm, "tcsh") || !strcmp(current->comm, "pdksh"))
{
_stp_printf ("%d\t%d\t%d\t%s ", current->uid, current->pid, current->parent->pid, filename);
_stp_map_set_ii (pids, current->pid, 1);
_stp_map_clear (arglist);
_stp_copy_argv_from_user (arglist, argv);
foreach (arglist, ptr)
_stp_printf ("%s ", _stp_get_str(ptr));
_stp_print("\n");
_stp_print_flush();
}
jprobe_return();
return 0;
}
struct file * inst_filp_open (const char * filename, int flags, int mode)
{
if (_stp_map_get_ii (pids, current->pid)) {
_stp_printf ("%d\t%d\t%s\tO %s\n", current->pid, current->parent->pid, current->comm, filename);
_stp_print_flush();
}
jprobe_return();
return 0;
}
asmlinkage ssize_t inst_sys_read (unsigned int fd, char __user * buf, size_t count)
{
if (_stp_map_get_ii (pids, current->pid)) {
_stp_printf ("%d\t%d\t%s\tR %d\n", current->pid, current->parent->pid, current->comm, fd);
_stp_print_flush();
}
jprobe_return();
return 0;
}
asmlinkage ssize_t inst_sys_write (unsigned int fd, const char __user * buf, size_t count)
{
if (_stp_map_get_ii (pids, current->pid)) {
String str = _stp_string_init (0);
_stp_string_from_user(str, buf, count);
_stp_printf ("%d\t%d\t%s\tW %s", current->pid, current->parent->pid,
current->comm, _stp_string_ptr(str));
_stp_print_flush();
}
jprobe_return();
return 0;
}
static struct jprobe stp_probes[] = {
{
.kp.addr = (kprobe_opcode_t *)"do_execve",
.entry = (kprobe_opcode_t *) inst_do_execve
},
{
.kp.addr = (kprobe_opcode_t *)"filp_open",
.entry = (kprobe_opcode_t *) inst_filp_open
},
{
.kp.addr = (kprobe_opcode_t *)"sys_read",
.entry = (kprobe_opcode_t *) inst_sys_read
},
{
.kp.addr = (kprobe_opcode_t *)"sys_write",
.entry = (kprobe_opcode_t *) inst_sys_write
},
};
#define MAX_STP_ROUTINE (sizeof(stp_probes)/sizeof(struct jprobe))
int probe_start(void)
{
int ret;
/* now initialize any data or variables */
pids = _stp_map_new_ii(10000);
arglist = _stp_map_new_is (10);
/* now we are ready to enable the probes */
ret = _stp_register_jprobes (stp_probes, MAX_STP_ROUTINE);
if (ret < 0) {
_stp_map_del (pids);
_stp_map_del (arglist);
return ret;
}
_stp_printf("instrumentation is enabled... %s\n", __this_module.name);
_stp_print_flush();
return ret;
}
void probe_exit (void)
{
_stp_unregister_jprobes (stp_probes, MAX_STP_ROUTINE);
_stp_map_del (pids);
_stp_map_del (arglist);
_stp_printf("\nDropped %d packets\n", atomic_read(&_stp_transport_failures));
_stp_print_flush();
}
|