mirror of
https://github.com/eunomia-bpf/bpf-developer-tutorial.git
synced 2026-02-09 05:14:37 +08:00
add example of 34
This commit is contained in:
112
src/34-syscall/open_modify.bpf.c
Normal file
112
src/34-syscall/open_modify.bpf.c
Normal file
@@ -0,0 +1,112 @@
|
||||
// SPDX-License-Identifier: GPL-2.0
|
||||
// Copyright (c) 2019 Facebook
|
||||
// Copyright (c) 2020 Netflix
|
||||
#include <vmlinux.h>
|
||||
#include <bpf/bpf_helpers.h>
|
||||
#include "open_modify.h"
|
||||
|
||||
const volatile bool targ_failed = false;
|
||||
const volatile bool rewrite = false;
|
||||
const volatile int target_pid = 0;
|
||||
|
||||
struct args_t {
|
||||
const char *fname;
|
||||
int flags;
|
||||
};
|
||||
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_HASH);
|
||||
__uint(max_entries, 10240);
|
||||
__type(key, u32);
|
||||
__type(value, struct args_t);
|
||||
} start SEC(".maps");
|
||||
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_RINGBUF);
|
||||
__uint(max_entries, 256 * 1024);
|
||||
} rb SEC(".maps");
|
||||
|
||||
SEC("tracepoint/syscalls/sys_enter_open")
|
||||
int tracepoint__syscalls__sys_enter_open(struct trace_event_raw_sys_enter *ctx)
|
||||
{
|
||||
u64 pid = bpf_get_current_pid_tgid() >> 32;
|
||||
|
||||
/* store arg info for later lookup */
|
||||
struct args_t args = {};
|
||||
args.fname = (const char *)ctx->args[0];
|
||||
if (rewrite) {
|
||||
bpf_probe_write_user((char*)ctx->args[1], "hijacked", 9);
|
||||
}
|
||||
args.flags = (int)ctx->args[1];
|
||||
bpf_map_update_elem(&start, &pid, &args, 0);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
SEC("tracepoint/syscalls/sys_enter_openat")
|
||||
int tracepoint__syscalls__sys_enter_openat(struct trace_event_raw_sys_enter *ctx)
|
||||
{
|
||||
u64 pid = bpf_get_current_pid_tgid() >> 32;
|
||||
/* use kernel terminology here for tgid/pid: */
|
||||
if (target_pid && pid != target_pid) {
|
||||
return 0;
|
||||
}
|
||||
/* store arg info for later lookup */
|
||||
// since we can manually specify the attach process in userspace,
|
||||
// we don't need to check the process allowed here
|
||||
|
||||
struct args_t args = {};
|
||||
args.fname = (const char *)ctx->args[1];
|
||||
args.flags = (int)ctx->args[2];
|
||||
if (rewrite) {
|
||||
bpf_probe_write_user((char*)ctx->args[1], "hijacked", 9);
|
||||
}
|
||||
bpf_map_update_elem(&start, &pid, &args, 0);
|
||||
return 0;
|
||||
}
|
||||
|
||||
static __always_inline int trace_exit(struct trace_event_raw_sys_exit *ctx)
|
||||
{
|
||||
struct event *event;
|
||||
struct args_t *ap;
|
||||
int ret;
|
||||
u32 pid = bpf_get_current_pid_tgid();
|
||||
|
||||
ap = bpf_map_lookup_elem(&start, &pid);
|
||||
if (!ap)
|
||||
return 0; /* missed entry */
|
||||
ret = ctx->ret;
|
||||
|
||||
event = bpf_ringbuf_reserve(&rb, sizeof(*event), 0);
|
||||
if (!event)
|
||||
return 0;
|
||||
|
||||
/* event data */
|
||||
event->pid = bpf_get_current_pid_tgid() >> 32;
|
||||
event->uid = bpf_get_current_uid_gid();
|
||||
bpf_get_current_comm(&event->comm, sizeof(event->comm));
|
||||
bpf_probe_read_user_str(&event->fname, sizeof(event->fname), ap->fname);
|
||||
event->flags = ap->flags;
|
||||
event->ret = ret;
|
||||
|
||||
/* emit event */
|
||||
bpf_ringbuf_submit(event, 0);
|
||||
return 0;
|
||||
cleanup:
|
||||
bpf_map_delete_elem(&start, &pid);
|
||||
return 0;
|
||||
}
|
||||
|
||||
SEC("tracepoint/syscalls/sys_exit_open")
|
||||
int tracepoint__syscalls__sys_exit_open(struct trace_event_raw_sys_exit *ctx)
|
||||
{
|
||||
return trace_exit(ctx);
|
||||
}
|
||||
|
||||
SEC("tracepoint/syscalls/sys_exit_openat")
|
||||
int tracepoint__syscalls__sys_exit_openat(struct trace_event_raw_sys_exit *ctx)
|
||||
{
|
||||
return trace_exit(ctx);
|
||||
}
|
||||
|
||||
char LICENSE[] SEC("license") = "GPL";
|
||||
Reference in New Issue
Block a user