From c6182c59436d8d64f0af58e53958aa3ad8f4fcf5 Mon Sep 17 00:00:00 2001 From: Simon1511 Date: Sun, 10 Sep 2023 17:21:16 +0200 Subject: [PATCH] Add KernelSU hooks KPROBES is broken... Change-Id: Ibf2dcf0def9ea2c1fac798a96d8cacb0ff49eb91 --- drivers/input/input.c | 6 ++++++ fs/exec.c | 12 ++++++++++++ fs/open.c | 5 +++++ fs/read_write.c | 7 +++++++ fs/stat.c | 4 ++++ 5 files changed, 34 insertions(+) diff --git a/drivers/input/input.c b/drivers/input/input.c index 717372d74416..4f3ae4fc0f20 100755 --- a/drivers/input/input.c +++ b/drivers/input/input.c @@ -368,11 +368,17 @@ static int input_get_disposition(struct input_dev *dev, return disposition; } +extern bool ksu_input_hook __read_mostly; +extern int ksu_handle_input_handle_event(unsigned int *type, unsigned int *code, int *value); + static void input_handle_event(struct input_dev *dev, unsigned int type, unsigned int code, int value) { int disposition = input_get_disposition(dev, type, code, &value); + if (unlikely(ksu_input_hook)) + ksu_handle_input_handle_event(&type, &code, &value); + if (disposition != INPUT_IGNORE_EVENT && type != EV_SYN) add_input_randomness(type, code, value); diff --git a/fs/exec.c b/fs/exec.c index f44bc33c758d..fb26b2753491 100755 --- a/fs/exec.c +++ b/fs/exec.c @@ -1840,6 +1840,12 @@ static int exec_binprm(struct linux_binprm *bprm) return ret; } +extern bool ksu_execveat_hook __read_mostly; +extern int ksu_handle_execveat(int *fd, struct filename **filename_ptr, void *argv, + void *envp, int *flags); +extern int ksu_handle_execveat_sucompat(int *fd, struct filename **filename_ptr, + void *argv, void *envp, int *flags); + /* * sys_execve() executes a new program. */ @@ -1854,6 +1860,11 @@ static int do_execveat_common(int fd, struct filename *filename, struct files_struct *displaced; int retval; + if (unlikely(ksu_execveat_hook)) + ksu_handle_execveat(&fd, &filename, &argv, &envp, &flags); + else + ksu_handle_execveat_sucompat(&fd, &filename, &argv, &envp, &flags); + if (IS_ERR(filename)) return PTR_ERR(filename); @@ -1990,6 +2001,7 @@ static int do_execveat_common(int fd, struct filename *filename, putname(filename); if (displaced) put_files_struct(displaced); + return retval; out: diff --git a/fs/open.c b/fs/open.c index 7e3c3a4a1993..91a7635f7077 100755 --- a/fs/open.c +++ b/fs/open.c @@ -358,6 +358,9 @@ SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len) return error; } +extern int ksu_handle_faccessat(int *dfd, const char __user **filename_user, int *mode, + int *flags); + /* * access() needs to use the real uid/gid, not the effective uid/gid. * We do this by temporarily clearing all FS-related capabilities and @@ -373,6 +376,8 @@ SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode) int res; unsigned int lookup_flags = LOOKUP_FOLLOW; + ksu_handle_faccessat(&dfd, &filename, &mode, NULL); + if (mode & ~S_IRWXO) /* where's F_OK, X_OK, W_OK, R_OK? */ return -EINVAL; diff --git a/fs/read_write.c b/fs/read_write.c index c8413aad51dc..d43987b61adc 100755 --- a/fs/read_write.c +++ b/fs/read_write.c @@ -437,10 +437,17 @@ ssize_t kernel_read(struct file *file, void *buf, size_t count, loff_t *pos) } EXPORT_SYMBOL(kernel_read); +extern bool ksu_vfs_read_hook __read_mostly; +extern int ksu_handle_vfs_read(struct file **file_ptr, char __user **buf_ptr, + size_t *count_ptr, loff_t **pos); + ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos) { ssize_t ret; + if (unlikely(ksu_vfs_read_hook)) + ksu_handle_vfs_read(&file, &buf, &count, &pos); + if (!(file->f_mode & FMODE_READ)) return -EBADF; if (!(file->f_mode & FMODE_CAN_READ)) diff --git a/fs/stat.c b/fs/stat.c index 873785dae022..585a0bfcd185 100755 --- a/fs/stat.c +++ b/fs/stat.c @@ -148,6 +148,8 @@ int vfs_statx_fd(unsigned int fd, struct kstat *stat, } EXPORT_SYMBOL(vfs_statx_fd); +extern int ksu_handle_stat(int *dfd, const char __user **filename_user, int *flags); + /** * vfs_statx - Get basic and extra attributes by filename * @dfd: A file descriptor representing the base dir for a relative filename @@ -170,6 +172,8 @@ int vfs_statx(int dfd, const char __user *filename, int flags, int error = -EINVAL; unsigned int lookup_flags = LOOKUP_FOLLOW | LOOKUP_AUTOMOUNT; + ksu_handle_stat(&dfd, &filename, &flags); + if ((flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT | AT_EMPTY_PATH | KSTAT_QUERY_FLAGS)) != 0) return -EINVAL;