1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
|
use core::{mem, ptr};
use aya_bpf::{helpers::{bpf_d_path, bpf_probe_read, bpf_probe_read_kernel, gen}, cty::{c_void, c_long}, maps::PerCpuArray};
use crate::{*, vmlinux::files_struct};
#[repr(C)]
pub struct Buffer {
pub buf: [u8; 4096],
}
#[map]
static mut BUF: PerCpuArray<Buffer> = PerCpuArray::with_max_entries(1, 0);
pub fn handle_sys_open(ctx: TracePointContext, syscall_type: SyscallType) -> Result<c_long, c_long> {
//info!(&ctx, "called");
match syscall_type {
SyscallType::Enter => unsafe { handle_sys_open_enter(ctx) },
SyscallType::Exit => unsafe { handle_sys_open_exit(ctx) },
}
}
unsafe fn handle_sys_open_enter(ctx: TracePointContext) -> Result<c_long, c_long> {
//info!(&ctx, "handle_sys_open_enter start");
let x = bpf_get_current_task_btf() as *const task_struct;
let pid = (*x).fs as *const fs_struct;
let uwu = (*pid).pwd;
let ra = uwu.dentry as *const dentry;
let ma = str::from_utf8_unchecked(&(*ra).d_iname);
let buf = unsafe {
let ptr = BUF.get_ptr_mut(0).ok_or(0)?;
&mut *ptr
};
#[derive(Clone, Copy)]
struct OpenAtSyscallArgs {
dfd: i64,
filename: *const u8,
flags: u64,
mode: u64,
}
//TODO: Check if the flags is relative
let args = *ptr_at::<OpenAtSyscallArgs>(&ctx, 16).unwrap_unchecked();
if args.dfd == -100 {
info!(&ctx, "relative call!");
}
else {
info!(&ctx, "not relative call!");
/* let files = (*x).files;
let fdt = (*files).fdt;
let fdd = (*fdt).fd;*/
info!(&ctx, "pid from ctx: {}", ctx.pid());
info!(&ctx, "pid from task {}", (*x).pid);
//let x_addr = &x as *const _ as usize;
//info!(&ctx, "x_addr: {}", x_addr);
// let good_files = bpf_probe_read_kernel(&(*x).files).unwrap_unchecked();
//info!(&ctx, "test: {}", (*good_files).next_fd)
/*let file = (*fdd).add(args.dfd as usize * 8);
let mut pat = (*file).f_path;
//info!(&ctx, "path: {}", &pat)
let aya_bpf_path_ptr: *mut aya_bpf::bindings::path = unsafe {
mem::transmute::<&mut vmlinux::path, *mut aya_bpf::bindings::path>(&mut pat)
};
let mut buff = [0i8; 120];
bpf_d_path( aya_bpf_path_ptr , &mut buff as *mut i8, 120);*/
/*let pathname = pat.dentry;
let mut huh = [0u8; 64];
let xxxx = (*pathname).d_name.name;
let aa = core::slice::from_raw_parts(xxxx, 10);
info!(&ctx, "dawdwa: {}", str::from_utf8_unchecked(aa))*/
//let filename = bpf_probe_read_kernel_str_bytes(xxxx.name, &mut huh);
}
let filename = unsafe {
core::str::from_utf8_unchecked(bpf_probe_read_user_str_bytes(
args.filename as *const u8,
&mut buf.buf,
).unwrap_unchecked())
};
info!(
&ctx,
"Tf {} {} dfd: {}",
ma,
filename,
args.dfd
);
Ok(0)
}
unsafe fn handle_sys_open_exit(ctx: TracePointContext) -> Result<c_long, c_long> {
//info!(&ctx, "handle_sys_open_exit start");
let ret = *ptr_at::<i64>(&ctx, 16).unwrap_unchecked(); //TODO: We cant use unwrap, thats why we couldnt use the aya helper fns
let tgid = ctx.tgid();
if let Some(syscall) = SYSCALL_ENTERS.get(&tgid) {
let SyscallInfo::Write(mut syscall_write) = syscall;
syscall_write.ret = ret;
EVENTS.output(&ctx, &SyscallInfo::Write(syscall_write), 0);
let _ = SYSCALL_ENTERS.remove(&tgid);
return Ok(0);
}
Err(0)
}
|