通过修改内核源码修改系统调用,对一般的开发者来说太费时间,使用动态模块修改系统调用,省时省力,能够快速切换。

 

         先通过getSyscallTable(void)获得内存中的系统调用表的地址,然后就可以将自己的函数指针放在上面了。千万别忘了保存和恢复原来的系统调用指针!

 

 

 

看看源代码吧!!

 

 

Makefile:

obj-m := syscall.o
KERNELDIR := /lib/modules/$(shell uname -r)/build
PWD := $(shell pwd)

modules:
$(MAKE) -C $(KERNELDIR) M=$(PWD) modules

modules_install:
$(MAKE) -C $(KERNELDIR) M=$(PWD) modules_install

clean:
rm -rf *.o *~ core .depend .*.cmd *.ko *.mod.c .tmp_versions Module.symvers

 

 

 

syscall.c:

#ifndef __KERNEL__
# define __KERNEL__
#endif
                                                                                                              
#ifndef MODULE
# define MODULE
#endif
                                                                                                              
#include <linux/init.h>
#include <linux/kernel.h>
#include <linux/module.h>
#include <asm/uaccess.h>
#include <linux/moduleparam.h>
#include <linux/sched.h>
#include <asm/unistd.h>

#ifdef CONFIG_SMP
#define __SMP__
#endif

 

/*
     系统调用号的定义在 /usr/include/asm/unistd.h 文件中
     printk结果存在/proc/kmsg中。
     可以用cat /boot/System.map-`uname -r` |grep sys_call_table 查看table的地址
*/
#define __NR_testsyscall 39

unsigned long **sys_call_table;

struct idt_tag
{
    unsigned short offset_low,segment_select;
    unsigned char reserved,flags;
    unsigned short offset_high;
};

unsigned long *  savedcall;

static unsigned long getSyscallTable(void)
{
    unsigned char idtr[6],*shell,*sort;
    struct idt_tag *idt;
    unsigned long system_call,sct;
    unsigned short offset_low,offset_high;
    char *p;
    int i;
    __asm__("sidt %0":"=m"(idtr));
    idt = (struct idt_tag*)((*(unsigned long*)&idtr[2]) + 8 * 0x80);
    offset_low = idt->offset_low;
    offset_high = idt->offset_high;
    system_call = (offset_high)<<16 | offset_low;   
    shell = (char*)system_call;
    sort = "/xff/x14/x85";

    for(i = 0;i < 100-2;i++)
        if(shell [ i ] == sort[0] && shell[i+1] == sort[1] && shell[i+2] == sort[2])
            break;
    p = &shell [ i ] + 3;
    sct = *(unsigned long*)p;
    return sct;   
}


asmlinkage long testsyscall(char *buf)
{
 printk("hello world/n");
 char* b="hello world/n";
 if(copy_to_user(buf,b,strlen(b))!=strlen(b))
 {
  printk("复制失败/n");
       return -1;
 }
 printk("复制成功/n");
 return 0;
}

int init_module(void)
{
 sys_call_table = (unsigned long**)getSyscallTable();
 printk("***系统调用表的首地址为%p/n",sys_call_table);
 savedcall=sys_call_table[__NR_testsyscall];//保存原来的调用
 printk("原来的%d系统调用为: %p/n",__NR_testsyscall,savedcall);
 printk("目的系统调用为%p/n",(unsigned long*)testsyscall);
 sys_call_table[__NR_testsyscall]=(unsigned long*)testsyscall;
 printk("更改后的%d系统调用为: %p/n",__NR_testsyscall,sys_call_table[__NR_testsyscall]);
 printk("loaded success /n");
 
      return 0;
}
   
void cleanup_module(void)
{
 printk("恢复前的%d系统调用为: %p/n",__NR_testsyscall,sys_call_table[__NR_testsyscall]);
 sys_call_table[__NR_testsyscall]=savedcall;
 printk("恢复后的%d系统调用为: %p/n",__NR_testsyscall,sys_call_table[__NR_testsyscall]);
 printk("unloaded success/n");
}

MODULE_LICENSE("GPL");
MODULE_AUTHOR("QCH");

 

 

 

 

测试程序:

#include <linux/unistd.h>
#include <stdio.h>
#include <stdlib.h>

#define __NR_testsyscall 39

 int testsyscall(char *buf){
     return syscall(__NR_testsyscall,buf);
  }

int main()
{
 char buf[128];
 int i;
 for(i=0;i<128;i++)
 {
      buf[i]='/0';
 }
 long r=-10;
 r=testsyscall(buf);
 printf("%s/n",buf);
 
 
 return 0;
}

Logo

更多推荐