diff options
author | We-unite <3205135446@qq.com> | 2024-07-26 15:20:45 +0800 |
---|---|---|
committer | We-unite <3205135446@qq.com> | 2024-07-26 15:20:45 +0800 |
commit | b765715b4795ce4bc8940c7b1a1092a78550de94 (patch) | |
tree | 2e81f5f914b59f332e54d6802c942224d5f37ff6 /src/godo.go | |
parent | fc61a4a525846fa31ee2288df4e82f745bb39c95 (diff) | |
download | godo-b765715b4795ce4bc8940c7b1a1092a78550de94.tar.gz godo-b765715b4795ce4bc8940c7b1a1092a78550de94.zip |
The 1st prompt to record file changed by process
To record it, we must listen to open/write and several syscalls,
and now I've add open into the 2nd coroutine. In syscall open,
what we should do is to judge the permission flag (the 2nd param
in the syscall), to find out if it can write to the file. If so,
the exit code is its file descriptor, and when write is called, the
audit shows only file descriptor but no file name.
So the next step is to add things into 3rd coroutine, to make the
whole program running again, and find out bugs.
Diffstat (limited to 'src/godo.go')
-rw-r--r-- | src/godo.go | 14 |
1 files changed, 11 insertions, 3 deletions
diff --git a/src/godo.go b/src/godo.go index cc29a01..2a00dad 100644 --- a/src/godo.go +++ b/src/godo.go | |||
@@ -33,16 +33,24 @@ func main() { | |||
33 | fmt.Printf("Error figuring out syscall numbers: %v\n", err) | 33 | fmt.Printf("Error figuring out syscall numbers: %v\n", err) |
34 | } | 34 | } |
35 | 35 | ||
36 | syscall := [6]string{"fork", "vfork", "clone", "execve", "exit", "exit_group"} | ||
37 | var auditCmd *exec.Cmd | 36 | var auditCmd *exec.Cmd |
38 | auditCmd = exec.Command("auditctl", "-D") // 清空所有规则 | 37 | auditCmd = exec.Command("auditctl", "-D") // 清空所有规则 |
39 | auditCmd.Run() | 38 | auditCmd.Run() |
39 | |||
40 | pidSyscall := []string{"fork", "vfork", "clone", "execve", "exit", "exit_group"} | ||
40 | // 设置监听规则 | 41 | // 设置监听规则 |
41 | for i := 0; i < len(syscall); i++ { | 42 | for i := 0; i < len(pidSyscall); i++ { |
42 | auditCmd = exec.Command("auditctl", "-a", "exit,always", "-F", "arch=b64", "-S", syscall[i]) | 43 | auditCmd = exec.Command("auditctl", "-a", "exit,always", "-F", "arch=b64", "-S", pidSyscall[i]) |
43 | auditCmd.Run() | 44 | auditCmd.Run() |
44 | } | 45 | } |
45 | 46 | ||
47 | // // 监听文件的消息 | ||
48 | // fileSyscall := []string{"open", "write", "creat", "unlink", "opendir", "mkdir", "rmdir", "chmod", "fchmod", "chown", "fchown", "lchown", "flock"} | ||
49 | // for i := 0; i < len(fileSyscall); i++ { | ||
50 | // auditCmd = exec.Command("auditctl", "-a", "exit,always", "-F", "arch=b64", "-S", pidSyscall[i]) | ||
51 | // auditCmd.Run() | ||
52 | // } | ||
53 | |||
46 | // 查找pid | 54 | // 查找pid |
47 | containerdPid, err = getPid() | 55 | containerdPid, err = getPid() |
48 | if err != nil { | 56 | if err != nil { |