Skip to content

Conversation

@Molter73
Copy link
Collaborator

@Molter73 Molter73 commented Jan 8, 2026

Description

The paths generated from calling bpf_d_path can have a " (deleted)" suffix when a file is removed from the system, this can mess with our files being reported, so some basic sanitization is added to these buffers.

Checklist

  • Investigated and inspected CI test results
  • Updated documentation accordingly

Automated testing

  • Added unit tests
  • Added integration tests
  • Added regression tests

If any of these don't apply, please comment below.

Testing Performed

Created a small Rust binary that will delete its own executable and then try to access a file provided as an argument, this can be run standalone for manual checking. A new integration test was added which builds a container with this binary and then runs it to check the (deleted) suffix is properly stripped from the executable path.

@Molter73 Molter73 force-pushed the mauro/feat/sanitize-d-paths branch from bec7609 to f10cf81 Compare January 8, 2026 16:52
The paths generated from calling bpf_d_path can have a " (deleted)"
suffix when a file is removed from the system, this can mess with our
files being reported, so some basic sanitization is added to these
buffers.
A new test is added which builds and runs a small container with a Rust
binary that deletes itself and accesses a monitored file. This will
trigger an open event where the executable path retrieved by the
`bpf_d_path` helper will add a " (deleted)" suffix, the test checks our
code correctly strips this suffix.
@Molter73 Molter73 force-pushed the mauro/feat/sanitize-d-paths branch from e4419d8 to 30ceda3 Compare January 9, 2026 11:23
@Molter73 Molter73 marked this pull request as ready for review January 12, 2026 14:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant