-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathtrace_file_delete.c
48 lines (37 loc) · 1.7 KB
/
trace_file_delete.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
#define __TARGET_ARCH_x86
#define MSG_SIZE 128
// Include the vmlinux.h header for kernel structures and definitions
#include "vmlinux.h"
// Include the BPF-specific functions
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#include <bpf/bpf_core_read.h>
// Define the structure for the event data that will be sent to user space
struct event {
__u32 pid; // Process ID
char comm[16]; // Command name (process name)
char filename[256]; // Filename being deleted
};
// Define a BPF map to send events to user space
struct {
__uint(type, BPF_MAP_TYPE_PERF_EVENT_ARRAY); // Type of BPF map
__uint(max_entries, 1024); // Maximum number of entries in the map
__type(key, int); // Type of the key
__type(value, int); // Type of the value
} events SEC(".maps"); // Place the map in the "maps" section
// Tracepoint for the sys_enter_unlinkat syscall
SEC("tracepoint/syscalls/sys_enter_unlinkat")
int trace_unlinkat(struct trace_event_raw_sys_enter* ctx) {
struct event evt = {}; // Initialize an event structure
// Get the current process ID
evt.pid = bpf_get_current_pid_tgid() >> 32;
// Get the current command name (process name)
bpf_get_current_comm(&evt.comm, sizeof(evt.comm));
// Read the filename argument from user space
bpf_probe_read_user_str(&evt.filename, sizeof(evt.filename), (void *)(ctx->args[1]));
// Output the event to user space
bpf_perf_event_output(ctx, &events, BPF_F_CURRENT_CPU, &evt, sizeof(evt));
return 0; // Return 0 to indicate success
}
// Define the license for the eBPF program
char _license[] SEC("license") = "GPL";