mirror of
https://github.com/safing/portmaster
synced 2025-09-01 18:19:12 +00:00
116 lines
No EOL
3.6 KiB
C
116 lines
No EOL
3.6 KiB
C
#include "vmlinux-x86.h"
|
|
#include "bpf/bpf_helpers.h"
|
|
#include "bpf/bpf_tracing.h"
|
|
|
|
#define ARGLEN 32 // maximum amount of args in argv we'll copy
|
|
#define ARGSIZE 1024 // maximum byte length of each arg in argv we'll copy
|
|
|
|
char __license[] SEC("license") = "GPL";
|
|
|
|
// Ring buffer for all connection events
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_RINGBUF);
|
|
__uint(max_entries, 1 << 24);
|
|
} pm_exec_map SEC(".maps");
|
|
|
|
// This struct is defined according to
|
|
// /sys/kernel/debug/tracing/events/syscalls/sys_enter_execve/format
|
|
struct exec_info {
|
|
u16 common_type; // offset=0, size=2
|
|
u8 common_flags; // offset=2, size=1
|
|
u8 common_preempt_count; // offset=3, size=1
|
|
s32 common_pid; // offset=4, size=4
|
|
|
|
s32 syscall_nr; // offset=8, size=4
|
|
u32 pad; // offset=12, size=4 (pad)
|
|
const u8 *filename; // offset=16, size=8 (ptr)
|
|
const u8 *const *argv; // offset=24, size=8 (ptr)
|
|
const u8 *const *envp; // offset=32, size=8 (ptr)
|
|
};
|
|
|
|
// The event struct. This struct must be kept in sync with the Golang
|
|
// counterpart.
|
|
struct event_t {
|
|
// Details about the process being launched.
|
|
u8 filename[ARGSIZE];
|
|
u8 argv[ARGLEN][ARGSIZE];
|
|
u32 argc; // set to ARGLEN + 1 if there were more than ARGLEN arguments
|
|
u32 uid;
|
|
u32 gid;
|
|
u32 pid;
|
|
|
|
// Name of the calling process.
|
|
u8 comm[ARGSIZE];
|
|
};
|
|
|
|
// Tracepoint at the top of execve() syscall.
|
|
SEC("tracepoint/syscalls/sys_enter_execve")
|
|
s32 enter_execve(struct exec_info *ctx) {
|
|
// Reserve memory for our event on the `events` ring buffer defined above.
|
|
struct event_t *event;
|
|
event = bpf_ringbuf_reserve(&pm_exec_map, sizeof(struct event_t), 0);
|
|
if (!event) {
|
|
bpf_printk("could not reserve ringbuf memory");
|
|
|
|
return 1;
|
|
}
|
|
|
|
// Store process/calling process details.
|
|
u64 uidgid = bpf_get_current_uid_gid();
|
|
u64 pidtgid = bpf_get_current_pid_tgid();
|
|
event->uid = uidgid; // uid is the first 32 bits
|
|
event->gid = uidgid >> 32; // gid is the last 32 bits NOLINT(readability-magic-numbers)
|
|
event->pid = pidtgid; // pid is the first 32 bits
|
|
s32 ret = bpf_get_current_comm(&event->comm, sizeof(event->comm));
|
|
if (ret) {
|
|
bpf_printk("could not get current comm: %d", ret);
|
|
bpf_ringbuf_discard(event, 0);
|
|
return 1;
|
|
}
|
|
|
|
// Write the filename in addition to argv[0] because the filename contains
|
|
// the full path to the file which could be more useful in some situations.
|
|
ret = bpf_probe_read_user_str(event->filename, sizeof(event->filename), ctx->filename);
|
|
if (ret < 0) {
|
|
bpf_printk("could not read filename into event struct: %d", ret);
|
|
bpf_ringbuf_discard(event, 0);
|
|
return 1;
|
|
}
|
|
|
|
// Copy everything from ctx->argv to event->argv, incrementing event->argc
|
|
// as we go.
|
|
for (s32 i = 0; i < ARGLEN; i++) {
|
|
if (!(&ctx->argv[i])) {
|
|
goto out;
|
|
}
|
|
|
|
// Copying the arg into it's own variable before copying it into
|
|
// event->argv[i] prevents memory corruption.
|
|
const u8 *argp = NULL;
|
|
ret = bpf_probe_read_user(&argp, sizeof(argp), &ctx->argv[i]);
|
|
if (ret || !argp) {
|
|
goto out;
|
|
}
|
|
|
|
// Copy argp to event->argv[i].
|
|
ret = bpf_probe_read_user_str(event->argv[i], sizeof(event->argv[i]), argp);
|
|
if (ret < 0) {
|
|
bpf_printk("read argv %d: %d", i, ret);
|
|
goto out;
|
|
}
|
|
|
|
event->argc++;
|
|
}
|
|
|
|
// This won't get hit if we `goto out` in the loop above. This is to signify
|
|
// to userspace that we couldn't copy all of the arguments because it
|
|
// exceeded ARGLEN.
|
|
event->argc++;
|
|
|
|
out:
|
|
// Write the event to the ring buffer and notify userspace. This will cause
|
|
// the `Read()` call in userspace to return if it was blocked.
|
|
bpf_ringbuf_submit(event, 0);
|
|
|
|
return 0;
|
|
} |