-
Notifications
You must be signed in to change notification settings - Fork 166
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
new(modern_bpf): add
fchmodat
syscall
Signed-off-by: Andrea Terzolo <[email protected]>
- Loading branch information
1 parent
18e3527
commit decbc3b
Showing
5 changed files
with
181 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
85 changes: 85 additions & 0 deletions
85
driver/modern_bpf/programs/tail_called/events/syscall_dispatched_events/fchmodat.bpf.c
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,85 @@ | ||
/* | ||
* Copyright (C) 2022 The Falco Authors. | ||
* | ||
* This file is dual licensed under either the MIT or GPL 2. See MIT.txt | ||
* or GPL2.txt for full copies of the license. | ||
*/ | ||
|
||
#include <helpers/interfaces/fixed_size_event.h> | ||
#include <helpers/interfaces/variable_size_event.h> | ||
|
||
/*=============================== ENTER EVENT ===========================*/ | ||
|
||
SEC("tp_btf/sys_enter") | ||
int BPF_PROG(fchmodat_e, | ||
struct pt_regs *regs, | ||
long id) | ||
{ | ||
struct ringbuf_struct ringbuf; | ||
if(!ringbuf__reserve_space(&ringbuf, FCHMODAT_E_SIZE)) | ||
{ | ||
return 0; | ||
} | ||
|
||
ringbuf__store_event_header(&ringbuf, PPME_SYSCALL_FCHMODAT_E, FCHMODAT_E_SIZE); | ||
|
||
/*=============================== COLLECT PARAMETERS ===========================*/ | ||
|
||
// Here we have no parameters to collect. | ||
|
||
/*=============================== COLLECT PARAMETERS ===========================*/ | ||
|
||
ringbuf__submit_event(&ringbuf); | ||
|
||
return 0; | ||
} | ||
|
||
/*=============================== ENTER EVENT ===========================*/ | ||
|
||
/*=============================== EXIT EVENT ===========================*/ | ||
|
||
SEC("tp_btf/sys_exit") | ||
int BPF_PROG(fchmodat_x, | ||
struct pt_regs *regs, | ||
long ret) | ||
{ | ||
struct auxiliary_map *auxmap = auxmap__get(); | ||
if(!auxmap) | ||
{ | ||
return 0; | ||
} | ||
|
||
auxmap__preload_event_header(auxmap, PPME_SYSCALL_FCHMODAT_X); | ||
|
||
/*=============================== COLLECT PARAMETERS ===========================*/ | ||
|
||
/* Parameter 1: res (type: PT_ERRNO) */ | ||
auxmap__store_s64_param(auxmap, ret); | ||
|
||
/* Parameter 2: dirfd (type: PT_FD) */ | ||
s32 dirfd = (s32)extract__syscall_argument(regs, 0); | ||
if(dirfd == AT_FDCWD) | ||
{ | ||
dirfd = PPM_AT_FDCWD; | ||
} | ||
auxmap__store_s64_param(auxmap, (s64)dirfd); | ||
|
||
/* Parameter 3: filename (type: PT_FSRELPATH) */ | ||
unsigned long path_pointer = extract__syscall_argument(regs, 1); | ||
auxmap__store_charbuf_param(auxmap, path_pointer, USER); | ||
|
||
/* Parameter 4: mode (type: PT_MODE) */ | ||
unsigned long mode = extract__syscall_argument(regs, 2); | ||
auxmap__store_u32_param(auxmap, chmod_mode_to_scap(mode)); | ||
|
||
/*=============================== COLLECT PARAMETERS ===========================*/ | ||
|
||
auxmap__finalize_event_header(auxmap); | ||
|
||
auxmap__submit_event(auxmap); | ||
|
||
return 0; | ||
} | ||
|
||
|
||
/*=============================== EXIT EVENT ===========================*/ |
41 changes: 41 additions & 0 deletions
41
test/modern_bpf/test_suites/syscall_enter_suite/fchmodat_e.cpp
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
#include "../../event_class/event_class.h" | ||
|
||
#ifdef __NR_fchmodat | ||
TEST(SyscallEnter, fchmodatE) | ||
{ | ||
auto evt_test = new event_test(__NR_fchmodat, ENTER_EVENT); | ||
|
||
evt_test->enable_capture(); | ||
|
||
/*=============================== TRIGGER SYSCALL ===========================*/ | ||
|
||
int32_t mock_dirfd = 0; | ||
const char* pathname = NULL; | ||
uint32_t mode = 0; | ||
uint32_t flags = 0; | ||
assert_syscall_state(SYSCALL_FAILURE, "fchmodat", syscall(__NR_fchmodat, mock_dirfd, pathname, mode, flags)); | ||
|
||
/*=============================== TRIGGER SYSCALL ===========================*/ | ||
|
||
evt_test->disable_capture(); | ||
|
||
evt_test->assert_event_presence(); | ||
|
||
if(HasFatalFailure()) | ||
{ | ||
return; | ||
} | ||
|
||
evt_test->parse_event(); | ||
|
||
evt_test->assert_header(); | ||
|
||
/*=============================== ASSERT PARAMETERS ===========================*/ | ||
|
||
// Here we have no parameters to assert. | ||
|
||
/*=============================== ASSERT PARAMETERS ===========================*/ | ||
|
||
evt_test->assert_num_params_pushed(0); | ||
} | ||
#endif |
52 changes: 52 additions & 0 deletions
52
test/modern_bpf/test_suites/syscall_exit_suite/fchmodat_x.cpp
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
#include "../../event_class/event_class.h" | ||
|
||
#ifdef __NR_fchmodat | ||
TEST(SyscallExit, fchmodatX) | ||
{ | ||
auto evt_test = new event_test(__NR_fchmodat, EXIT_EVENT); | ||
|
||
evt_test->enable_capture(); | ||
|
||
/*=============================== TRIGGER SYSCALL ===========================*/ | ||
|
||
int32_t mock_dirfd = -1; | ||
const char* pathname = "*//null"; | ||
uint32_t mode = S_IXUSR; | ||
uint32_t flags = 0; | ||
assert_syscall_state(SYSCALL_FAILURE, "fchmodat", syscall(__NR_fchmodat, mock_dirfd, pathname, mode, flags)); | ||
int64_t errno_value = -errno; | ||
|
||
/*=============================== TRIGGER SYSCALL ===========================*/ | ||
|
||
evt_test->disable_capture(); | ||
|
||
evt_test->assert_event_presence(); | ||
|
||
if(HasFatalFailure()) | ||
{ | ||
return; | ||
} | ||
|
||
evt_test->parse_event(); | ||
|
||
evt_test->assert_header(); | ||
|
||
/*=============================== ASSERT PARAMETERS ===========================*/ | ||
|
||
/* Parameter 1: res (type: PT_ERRNO) */ | ||
evt_test->assert_numeric_param(1, (int64_t)errno_value); | ||
|
||
/* Parameter 2: dirfd (type: PT_FD) */ | ||
evt_test->assert_numeric_param(2, (int64_t)mock_dirfd); | ||
|
||
/* Parameter 3: filename (type: PT_FSPATH) */ | ||
evt_test->assert_charbuf_param(3, pathname); | ||
|
||
/* Parameter 4: mode (type: PT_MODE) */ | ||
evt_test->assert_numeric_param(4, (uint32_t)PPM_S_IXUSR); | ||
|
||
/*=============================== ASSERT PARAMETERS ===========================*/ | ||
|
||
evt_test->assert_num_params_pushed(4); | ||
} | ||
#endif |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters