Changeset 96 for trunk/src


Ignore:
Timestamp:
Mar 16, 2007, 10:08:08 PM (18 years ago)
Author:
rainer
Message:

Fix for ticket #54 (samhain_hide module does not work under kernel 2.6.20).

Location:
trunk/src
Files:
6 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/CuTest.c

    r17 r96  
    6262        str->size = STRING_MAX;
    6363        str->buffer = (char*) malloc(sizeof(char) * str->size);
    64         str->buffer[0] = '\0';
     64        if (str->buffer)
     65          str->buffer[0] = '\0';
     66        else
     67          {
     68            perror("CuStringInit");
     69            _exit (EXIT_FAILURE);
     70          }
    6571}
    6672
     
    7177        str->size = STRING_MAX;
    7278        str->buffer = (char*) malloc(sizeof(char) * str->size);
    73         str->buffer[0] = '\0';
     79        if (str->buffer)
     80          str->buffer[0] = '\0';
     81        else
     82          {
     83            perror("CuStringNew");
     84            _exit (EXIT_FAILURE);
     85          }
    7486        return str;
    7587}
  • trunk/src/cutest_sh_tiger0.c

    r19 r96  
    1717
    1818  skey = (sh_key_t *) malloc (sizeof(sh_key_t));
    19   if (skey == NULL)
     19  if (skey != NULL)
     20    {
     21      skey->mlock_failed = SL_FALSE;
     22      skey->rngI         = BAD;
     23      /* properly initialized later
     24       */
     25      skey->rng0[0] = 0x03; skey->rng0[1] = 0x09; skey->rng0[2] = 0x17;
     26      skey->rng1[0] = 0x03; skey->rng1[1] = 0x09; skey->rng1[2] = 0x17;
     27      skey->rng2[0] = 0x03; skey->rng2[1] = 0x09; skey->rng2[2] = 0x17;
     28     
     29      for (i = 0; i < KEY_BYT; ++i)
     30        skey->poolv[i] = '\0';
     31     
     32      skey->poolc        = 0;
     33     
     34      skey->ErrFlag[0]   = ErrFlag[0];
     35      ErrFlag[0]         = 0;
     36      skey->ErrFlag[1]   = ErrFlag[1];
     37      ErrFlag[1]         = 0;
     38     
     39      dez = &(TcpFlag[POS_TF-1][0]);
     40      for (i = 0; i < PW_LEN; ++i)
     41        {
     42          skey->pw[i] = (char) (*dez);
     43          (*dez)      = '\0';
     44          ++dez;
     45        }
     46     
     47      skey->sh_sockpass[0]  = '\0';
     48      skey->sigkey_old[0]   = '\0';
     49      skey->sigkey_new[0]   = '\0';
     50      skey->mailkey_old[0]  = '\0';
     51      skey->mailkey_new[0]  = '\0';
     52      skey->crypt[0]        = '\0';
     53      skey->session[0]      = '\0';
     54      skey->vernam[0]       = '\0';
     55    }
     56  else
    2057    {
    2158      perror(_("sh_init"));
    2259      _exit (EXIT_FAILURE);
    2360    }
    24 
    25   skey->mlock_failed = SL_FALSE;
    26   skey->rngI         = BAD;
    27   /* properly initialized later
    28    */
    29   skey->rng0[0] = 0x03; skey->rng0[1] = 0x09; skey->rng0[2] = 0x17;
    30   skey->rng1[0] = 0x03; skey->rng1[1] = 0x09; skey->rng1[2] = 0x17;
    31   skey->rng2[0] = 0x03; skey->rng2[1] = 0x09; skey->rng2[2] = 0x17;
    32 
    33   for (i = 0; i < KEY_BYT; ++i)
    34     skey->poolv[i] = '\0';
    35 
    36   skey->poolc        = 0;
    37 
    38   skey->ErrFlag[0]   = ErrFlag[0];
    39   ErrFlag[0]         = 0;
    40   skey->ErrFlag[1]   = ErrFlag[1];
    41   ErrFlag[1]         = 0;
    42 
    43   dez = &(TcpFlag[POS_TF-1][0]);
    44   for (i = 0; i < PW_LEN; ++i)
    45     {
    46        skey->pw[i] = (char) (*dez);
    47       (*dez)      = '\0';
    48       ++dez;
    49     }
    50 
    51   skey->sh_sockpass[0]  = '\0';
    52   skey->sigkey_old[0]   = '\0';
    53   skey->sigkey_new[0]   = '\0';
    54   skey->mailkey_old[0]  = '\0';
    55   skey->mailkey_new[0]  = '\0';
    56   skey->crypt[0]        = '\0';
    57   skey->session[0]      = '\0';
    58   skey->vernam[0]       = '\0';
    5961
    6062}
  • trunk/src/kern_head.c

    r92 r96  
    753753      fprintf(stderr, "\n");
    754754      fprintf(stderr, "NOTE:  kern_head: must run as 'root' ");
    755       fprintf(stderr, "(need to read from /dev/kmem)\n");
     755      fprintf(stderr, "(need to read from kernel)\n");
    756756      fprintf(stderr, "       If you get this message, then proceed ");
    757757      fprintf(stderr, "as follows:\n");
  • trunk/src/samhain.c

    r92 r96  
    545545   */
    546546  skey = (sh_key_t *) malloc (sizeof(sh_key_t));
    547   if (skey == NULL)
     547  if (skey != NULL)
     548    {
     549
     550      skey->mlock_failed = SL_FALSE;
     551      skey->rngI         = BAD;
     552      /* properly initialized later
     553       */
     554      skey->rng0[0] = 0x03; skey->rng0[1] = 0x09; skey->rng0[2] = 0x17;
     555      skey->rng1[0] = 0x03; skey->rng1[1] = 0x09; skey->rng1[2] = 0x17;
     556      skey->rng2[0] = 0x03; skey->rng2[1] = 0x09; skey->rng2[2] = 0x17;
     557     
     558      for (i = 0; i < KEY_BYT; ++i)
     559        skey->poolv[i] = '\0';
     560     
     561      skey->poolc        = 0;
     562     
     563      skey->ErrFlag[0]   = ErrFlag[0];
     564      ErrFlag[0]         = 0;
     565      skey->ErrFlag[1]   = ErrFlag[1];
     566      ErrFlag[1]         = 0;
     567     
     568      dez = &(TcpFlag[POS_TF-1][0]);
     569      for (i = 0; i < PW_LEN; ++i)
     570        {
     571          skey->pw[i] = (char) (*dez);
     572          (*dez)      = '\0';
     573          ++dez;
     574        }
     575     
     576      skey->sh_sockpass[0]  = '\0';
     577      skey->sigkey_old[0]   = '\0';
     578      skey->sigkey_new[0]   = '\0';
     579      skey->mailkey_old[0]  = '\0';
     580      skey->mailkey_new[0]  = '\0';
     581      skey->crypt[0]        = '\0'; /* flawfinder: ignore *//* ff bug */
     582      skey->session[0]      = '\0';
     583      skey->vernam[0]       = '\0';
     584    }
     585  else
    548586    {
    549587      perror(_("sh_init"));
    550588      _exit (EXIT_FAILURE);
    551589    }
    552 
    553   skey->mlock_failed = SL_FALSE;
    554   skey->rngI         = BAD;
    555   /* properly initialized later
    556    */
    557   skey->rng0[0] = 0x03; skey->rng0[1] = 0x09; skey->rng0[2] = 0x17;
    558   skey->rng1[0] = 0x03; skey->rng1[1] = 0x09; skey->rng1[2] = 0x17;
    559   skey->rng2[0] = 0x03; skey->rng2[1] = 0x09; skey->rng2[2] = 0x17;
    560 
    561   for (i = 0; i < KEY_BYT; ++i)
    562     skey->poolv[i] = '\0';
    563 
    564   skey->poolc        = 0;
    565 
    566   skey->ErrFlag[0]   = ErrFlag[0];
    567   ErrFlag[0]         = 0;
    568   skey->ErrFlag[1]   = ErrFlag[1];
    569   ErrFlag[1]         = 0;
    570 
    571   dez = &(TcpFlag[POS_TF-1][0]);
    572   for (i = 0; i < PW_LEN; ++i)
    573     {
    574        skey->pw[i] = (char) (*dez);
    575       (*dez)      = '\0';
    576       ++dez;
    577     }
    578 
    579   skey->sh_sockpass[0]  = '\0';
    580   skey->sigkey_old[0]   = '\0';
    581   skey->sigkey_new[0]   = '\0';
    582   skey->mailkey_old[0]  = '\0';
    583   skey->mailkey_new[0]  = '\0';
    584   skey->crypt[0]        = '\0'; /* flawfinder: ignore *//* ff bug */
    585   skey->session[0]      = '\0';
    586   skey->vernam[0]       = '\0';
    587 
    588590
    589591  sh_unix_memlock();
     
    923925          else if (pid == respid)
    924926            {
     927#ifndef USE_UNO
    925928              if (0 != WIFEXITED(status))
    926929                {
     
    930933              else
    931934                exit (1);
     935#else
     936              exit (1);
     937#endif
    932938            }
    933939          ++times;
  • trunk/src/samhain_hide.c

    r91 r96  
    5151 *    insmod samhain_hide (for improved safety: 'sync && insmod samhain_hide')
    5252 *
    53  *   To unload the module
     53 *   Self-hiding can be switched off by passing the option
     54 *   'removeme=0' to the module:
     55 *    insmod ./samhain_hide.ko removeme=0
     56 *
     57 *   To unload the module (only possible if not hidden):
    5458 *    rmmod samhain_hide  (for improved safety: 'sync && rmmod samhain_hide')
    5559 *
     
    109113/* #define PROC_DEBUG  */   /* procfs       */
    110114
    111 
    112115/*****************************************************
    113116 *
     
    201204int (*old_getdents)(unsigned int, struct dirent *, unsigned int);
    202205#ifdef __NR_getdents64
     206#if SH_KERNEL_NUMERIC >= 132628
     207/*
     208 * 'asmlinkage' is __required__ to get this to work.
     209 */
     210asmlinkage long (*old_getdents64)(unsigned int, struct linux_dirent64 __user *, unsigned int);
     211#else
    203212long (*old_getdents64)(unsigned int, struct dirent64 *, unsigned int);
     213#endif
    204214#endif
    205215
     
    416426
    417427#ifdef FILE_DEBUG
    418   printk("COPY to kernel\n");
     428  printk("COPY to kernel: %ld\n", dummy);
    419429#endif
    420430
     
    513523  dummy = (unsigned long) copy_to_user(dirp, dirp_new, status);
    514524#ifdef FILE_DEBUG
    515   printk("COPY to user\n");
     525  printk("COPY to user: %ld\n", dummy);
    516526#endif
    517527
     
    525535}
    526536
    527 
    528537/* For 2.4 kernel
    529538 */
    530539#ifdef __NR_getdents64
    531 long new_getdents64 (unsigned int fd, struct dirent64 *dirp,
    532                      unsigned int count)
     540
     541#if SH_KERNEL_NUMERIC >= 132628
     542/*
     543 * 'asmlinkage' is __required__ to get this to work.
     544 */
     545asmlinkage long new_getdents64 (unsigned int fd, struct linux_dirent64 __user *dirp,
     546                                unsigned int count)
     547#else
     548long new_getdents64 (unsigned int fd, struct dirent64 *dirp, unsigned int count)
     549#endif
    533550{
    534551  long                 status = 0;    /* Return value from original getdents */
     
    549566  unsigned long        dummy;
    550567
     568#ifdef FILE_DEBUG
     569  printk("FD64 %d\n", fd);
     570#endif
     571
    551572  lock_kernel();
    552573
     574#ifdef FILE_DEBUG
     575  if (!access_ok(VERIFY_WRITE, dirp, count))
     576    printk("ACCESS64_BAD\n");
     577  else
     578    printk("ACCESS64_OK\n");
     579#endif
     580
     581#if SH_KERNEL_NUMERIC >= 132628
    553582  status = (*old_getdents64)(fd, dirp, count);
     583  // status = my_real_getdents64(fd, dirp, count);
     584#else
     585  status = (*old_getdents64)(fd, dirp, count);
     586#endif
    554587
    555588#ifdef FILE_DEBUG
     
    580613
    581614#if defined(__LINUX_DCACHE_H)
     615
     616/* 2.6.20 (((2) << 16) + ((6) << 8) + (20)) */
     617#if SH_KERNEL_NUMERIC >= 132628
     618  dir_inode  = fd_file->f_path.dentry->d_inode;
     619#else
    582620  dir_inode  = fd_file->f_dentry->d_inode;
     621#endif
     622
    583623#else
    584624  dir_inode  = fd_file->f_inode;
     
    630670
    631671#ifdef FILE_DEBUG
    632   printk("COPY64 to kernel\n");
     672  printk("COPY64 to kernel: %ld\n", dummy);
    633673#endif
    634674
     
    731771  /* Copy our modified dirp table back to user space.
    732772   */
     773#ifdef FILE_DEBUG
     774  printk("STATUS64 AT END %ld\n", status);
     775#endif
    733776  dummy = (unsigned long) copy_to_user(dirp, dirp_new, status);
     777#ifdef FILE_DEBUG
     778  printk("COPY64 to user: %ld\n", dummy);
     779#endif
     780
    734781  kfree (dirp_new);
    735782  unlock_kernel();
  • trunk/src/sh_extern.c

    r50 r96  
    541541      if (task->pid == retval)
    542542        {
     543#ifndef USE_UNO
    543544          if (WIFEXITED(task->exit_status) != 0)
    544545            {
     
    572573              task->exit_status = EXIT_FAILURE;
    573574            }
     575#else
     576          task->exit_status = EXIT_FAILURE;
     577#endif
    574578        }
    575579      else if (0 == retval)
Note: See TracChangeset for help on using the changeset viewer.