|
|
|
/* Copyright (C) 2018 Open Information Security Foundation
|
|
|
|
*
|
|
|
|
* You can copy, redistribute or modify this Program under the terms of
|
|
|
|
* the GNU General Public License version 2 as published by the Free
|
|
|
|
* Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* version 2 along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
|
|
* 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stddef.h>
|
|
|
|
#include <linux/bpf.h>
|
|
|
|
|
|
|
|
#include <linux/if_ether.h>
|
|
|
|
#include <linux/in.h>
|
|
|
|
#include <linux/ip.h>
|
|
|
|
#include <linux/in6.h>
|
|
|
|
#include <linux/ipv6.h>
|
|
|
|
#include <linux/filter.h>
|
|
|
|
|
|
|
|
#include "bpf_helpers.h"
|
|
|
|
|
|
|
|
#define LINUX_VERSION_CODE 263682
|
|
|
|
|
|
|
|
struct flowv4_keys {
|
|
|
|
__be32 src;
|
|
|
|
__be32 dst;
|
|
|
|
union {
|
|
|
|
__be32 ports;
|
|
|
|
__be16 port16[2];
|
|
|
|
};
|
|
|
|
__u32 ip_proto;
|
|
|
|
} __attribute__((__aligned__(8)));
|
|
|
|
|
|
|
|
struct flowv6_keys {
|
|
|
|
__be32 src[4];
|
|
|
|
__be32 dst[4];
|
|
|
|
union {
|
|
|
|
__be32 ports;
|
|
|
|
__be16 port16[2];
|
|
|
|
};
|
|
|
|
__u32 ip_proto;
|
|
|
|
} __attribute__((__aligned__(8)));
|
|
|
|
|
|
|
|
struct pair {
|
|
|
|
__u64 time;
|
|
|
|
__u64 packets;
|
|
|
|
__u64 bytes;
|
|
|
|
} __attribute__((__aligned__(8)));
|
|
|
|
|
|
|
|
struct bpf_map_def SEC("maps") flow_table_v4 = {
|
|
|
|
.type = BPF_MAP_TYPE_PERCPU_HASH,
|
|
|
|
.key_size = sizeof(struct flowv4_keys),
|
|
|
|
.value_size = sizeof(struct pair),
|
|
|
|
.max_entries = 32768,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct bpf_map_def SEC("maps") flow_table_v6 = {
|
|
|
|
.type = BPF_MAP_TYPE_PERCPU_HASH,
|
|
|
|
.key_size = sizeof(struct flowv6_keys),
|
|
|
|
.value_size = sizeof(struct pair),
|
|
|
|
.max_entries = 32768,
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* IPv4 filter
|
|
|
|
*
|
|
|
|
* \return 0 to drop packet out and -1 to accept it
|
|
|
|
*/
|
|
|
|
static __always_inline int ipv4_filter(struct __sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u32 nhoff, verlen;
|
|
|
|
struct flowv4_keys tuple;
|
|
|
|
struct pair *value;
|
|
|
|
__u16 port;
|
|
|
|
|
|
|
|
nhoff = skb->cb[0];
|
|
|
|
|
|
|
|
tuple.ip_proto = load_byte(skb, nhoff + offsetof(struct iphdr, protocol));
|
|
|
|
/* only support TCP and UDP for now */
|
|
|
|
switch (tuple.ip_proto) {
|
|
|
|
case IPPROTO_TCP:
|
|
|
|
case IPPROTO_UDP:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
tuple.src = load_word(skb, nhoff + offsetof(struct iphdr, saddr));
|
|
|
|
tuple.dst = load_word(skb, nhoff + offsetof(struct iphdr, daddr));
|
|
|
|
|
|
|
|
verlen = load_byte(skb, nhoff + 0/*offsetof(struct iphdr, ihl)*/);
|
|
|
|
nhoff += (verlen & 0xF) << 2;
|
|
|
|
tuple.ports = load_word(skb, nhoff);
|
|
|
|
port = tuple.port16[1];
|
|
|
|
tuple.port16[1] = tuple.port16[0];
|
|
|
|
tuple.port16[0] = port;
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
if ((tuple.port16[0] == 22) || (tuple.port16[1] == 22))
|
|
|
|
{
|
|
|
|
__u16 sp = tuple.port16[0];
|
|
|
|
//__u16 dp = tuple.port16[1];
|
|
|
|
char fmt[] = "Parsed SSH flow: %u %d -> %u\n";
|
|
|
|
bpf_trace_printk(fmt, sizeof(fmt), tuple.src, sp, tuple.dst);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
/* Test if src is in hash */
|
|
|
|
value = bpf_map_lookup_elem(&flow_table_v4, &tuple);
|
|
|
|
if (value) {
|
|
|
|
#if 0
|
|
|
|
{
|
|
|
|
__u16 sp = tuple.port16[0];
|
|
|
|
//__u16 dp = tuple.port16[1];
|
|
|
|
char bfmt[] = "Found flow: %u %d -> %u\n";
|
|
|
|
bpf_trace_printk(bfmt, sizeof(bfmt), tuple.src, sp, tuple.dst);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
value->packets++;
|
|
|
|
value->bytes += skb->len;
|
|
|
|
value->time = bpf_ktime_get_ns();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* IPv6 filter
|
|
|
|
*
|
|
|
|
* \return 0 to drop packet out and -1 to accept it
|
|
|
|
*/
|
|
|
|
static __always_inline int ipv6_filter(struct __sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u32 nhoff;
|
|
|
|
__u8 nhdr;
|
|
|
|
struct flowv6_keys tuple;
|
|
|
|
struct pair *value;
|
|
|
|
__u16 port;
|
|
|
|
|
|
|
|
nhoff = skb->cb[0];
|
|
|
|
|
|
|
|
/* get next header */
|
|
|
|
nhdr = load_byte(skb, nhoff + offsetof(struct ipv6hdr, nexthdr));
|
|
|
|
|
|
|
|
/* only support direct TCP and UDP for now */
|
|
|
|
switch (nhdr) {
|
|
|
|
case IPPROTO_TCP:
|
|
|
|
case IPPROTO_UDP:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
tuple.src[0] = load_word(skb, nhoff + offsetof(struct ipv6hdr, saddr));
|
|
|
|
tuple.src[1] = load_word(skb, nhoff + offsetof(struct ipv6hdr, saddr) + 4);
|
|
|
|
tuple.src[2] = load_word(skb, nhoff + offsetof(struct ipv6hdr, saddr) + 8);
|
|
|
|
tuple.src[3] = load_word(skb, nhoff + offsetof(struct ipv6hdr, saddr) + 12);
|
|
|
|
tuple.dst[0] = load_word(skb, nhoff + offsetof(struct ipv6hdr, daddr));
|
|
|
|
tuple.dst[1] = load_word(skb, nhoff + offsetof(struct ipv6hdr, daddr) + 4);
|
|
|
|
tuple.dst[2] = load_word(skb, nhoff + offsetof(struct ipv6hdr, daddr) + 8);
|
|
|
|
tuple.dst[3] = load_word(skb, nhoff + offsetof(struct ipv6hdr, daddr) + 12);
|
|
|
|
|
|
|
|
/* Parse TCP */
|
|
|
|
tuple.ports = load_word(skb, nhoff + 40 /* IPV6_HEADER_LEN */);
|
|
|
|
port = tuple.port16[1];
|
|
|
|
tuple.port16[1] = tuple.port16[0];
|
|
|
|
tuple.port16[0] = port;
|
|
|
|
tuple.ip_proto = nhdr;
|
|
|
|
|
|
|
|
//char fmt[] = "Now Got IPv6 port %u and %u\n";
|
|
|
|
//bpf_trace_printk(fmt, sizeof(fmt), tuple.port16[0], tuple.port16[1]);
|
|
|
|
/* Test if src is in hash */
|
|
|
|
value = bpf_map_lookup_elem(&flow_table_v6, &tuple);
|
|
|
|
if (value) {
|
|
|
|
//char fmt[] = "Got a match IPv6: %u and %u\n";
|
|
|
|
//bpf_trace_printk(fmt, sizeof(fmt), tuple.port16[0], tuple.port16[1]);
|
|
|
|
value->packets++;
|
|
|
|
value->bytes += skb->len;
|
|
|
|
value->time = bpf_ktime_get_ns();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* filter function
|
|
|
|
*
|
|
|
|
* It is loaded in kernel by Suricata that uses the section name specified
|
|
|
|
* by the SEC call to find it in the Elf binary object and load it.
|
|
|
|
*
|
|
|
|
* \return 0 to drop packet out and -1 to accept it
|
|
|
|
*/
|
|
|
|
int SEC("filter") hashfilter(struct __sk_buff *skb) {
|
|
|
|
__u32 nhoff = BPF_LL_OFF + ETH_HLEN;
|
|
|
|
|
|
|
|
skb->cb[0] = nhoff;
|
|
|
|
switch (skb->protocol) {
|
|
|
|
case __constant_htons(ETH_P_IP):
|
|
|
|
return ipv4_filter(skb);
|
|
|
|
case __constant_htons(ETH_P_IPV6):
|
|
|
|
return ipv6_filter(skb);
|
|
|
|
default:
|
|
|
|
#if 0
|
|
|
|
{
|
|
|
|
char fmt[] = "Got proto %u\n";
|
|
|
|
bpf_trace_printk(fmt, sizeof(fmt), h_proto);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
char __license[] SEC("license") = "GPL";
|
|
|
|
|
|
|
|
__u32 __version SEC("version") = LINUX_VERSION_CODE;
|