|
| 1 | +//go:build ignore |
| 2 | +#include "shared.h" |
| 3 | +#include <bpf/bpf_helpers.h> |
| 4 | +#include <bpf/bpf_core_read.h> |
| 5 | +#include <bpf/bpf_tracing.h> |
| 6 | +#include <bpf/bpf_endian.h> |
| 7 | + |
| 8 | +char LICENSE[] SEC("license") = "Dual BSD/GPL"; |
| 9 | + |
| 10 | +#define ETH_P_IP 0x0800 /* Internet Protocol packet */ |
| 11 | +#define ETH_HLEN 14 |
| 12 | +#define PACKET_HOST 0 |
| 13 | +#define MAX_BUF_SIZE 300 |
| 14 | +#define DNS_TYPE_A 1 // https://datatracker.ietf.org/doc/html/rfc1035#section-3.2.2 |
| 15 | +#define MAX_DNS_NAME 255 |
| 16 | + |
| 17 | +struct event_t { |
| 18 | + __u32 netns; |
| 19 | + __u32 saddr_v4; |
| 20 | + __u32 daddr_v4; |
| 21 | + __u32 af; |
| 22 | + __u16 sport; |
| 23 | + __u16 dport; |
| 24 | + __u32 dns_length; |
| 25 | + __u64 pid; |
| 26 | + __u64 ppid; |
| 27 | + __u8 task[TASK_COMM_LEN]; |
| 28 | + __u16 payload[MAX_BUF_SIZE]; |
| 29 | +}; |
| 30 | + |
| 31 | + |
| 32 | +struct { |
| 33 | + __uint(type, BPF_MAP_TYPE_RINGBUF); |
| 34 | + __uint(max_entries, 1 << 24); |
| 35 | +} socket_events SEC(".maps"); |
| 36 | + |
| 37 | +# define DNS_OFF (ETH_HLEN + sizeof(struct iphdr) + sizeof(struct udphdr)) |
| 38 | + |
| 39 | +static volatile const __u32 current_netns ; |
| 40 | + |
| 41 | +SEC("socket") |
| 42 | +int simple_socket_handler(struct __sk_buff *skb){ |
| 43 | + |
| 44 | + __u32 h_proto; |
| 45 | + __u8 protoc; |
| 46 | + __u8 name[MAX_DNS_NAME]; |
| 47 | + __u16 sport, dport, l4_off, dns_off, id; |
| 48 | + //Check if the protocol is Ipv4 |
| 49 | + bpf_skb_load_bytes(skb, offsetof(struct ethhdr, h_proto), &h_proto, sizeof(h_proto)); |
| 50 | + |
| 51 | + if (bpf_ntohs(h_proto) == ETH_P_IP){ |
| 52 | + bpf_skb_load_bytes(skb, ETH_HLEN + offsetof(struct iphdr, protocol),&protoc, sizeof(protoc)); |
| 53 | + |
| 54 | + if (protoc == IPPROTO_UDP){ |
| 55 | + __u8 ihl_byte; |
| 56 | + bpf_skb_load_bytes(skb, ETH_HLEN, &ihl_byte,sizeof(ihl_byte)); |
| 57 | + struct iphdr *iph = (struct iphdr *)&ihl_byte; |
| 58 | + __u8 ip_header_len = iph->ihl * 4; |
| 59 | + l4_off = ETH_HLEN + ip_header_len; |
| 60 | + |
| 61 | + int off = l4_off; |
| 62 | + |
| 63 | + if (skb->pkt_type == PACKET_HOST) |
| 64 | + off += offsetof(struct udphdr, dest); |
| 65 | + else |
| 66 | + off += offsetof(struct udphdr, source); |
| 67 | + |
| 68 | + bpf_skb_load_bytes(skb, l4_off + offsetof(struct udphdr, dest),&dport, sizeof(dport)); |
| 69 | + bpf_skb_load_bytes(skb, l4_off + offsetof(struct udphdr, source),&sport, sizeof(sport)); |
| 70 | + |
| 71 | + if (bpf_ntohs(sport) == 53 || bpf_ntohs(dport) == 53 || bpf_ntohs(sport) == 5353 || bpf_ntohs(dport) == 5353 ) { |
| 72 | + bpf_printk("currentns is %u",current_netns); |
| 73 | + struct sockets_key socket_key = {0,0,0,0}; |
| 74 | + long err; |
| 75 | + __u8 packet_present = 0; |
| 76 | + |
| 77 | + __u32 port; |
| 78 | + err = bpf_skb_load_bytes(skb, off, &port , sizeof(port)); |
| 79 | + if (err < 0) |
| 80 | + return 0; |
| 81 | + |
| 82 | + struct event_t *event; |
| 83 | + event = bpf_ringbuf_reserve(&socket_events, sizeof(struct event_t), 0); |
| 84 | + if (!event) { |
| 85 | + return 0; |
| 86 | + } |
| 87 | + |
| 88 | + __u16 udp_total_length; |
| 89 | + bpf_skb_load_bytes(skb, l4_off + offsetof(struct udphdr, len), &udp_total_length, sizeof(udp_total_length)); |
| 90 | + |
| 91 | + __u32 dns_length = bpf_ntohs(udp_total_length) - sizeof(struct udphdr); |
| 92 | + event->dns_length = bpf_ntohs(dns_length); |
| 93 | + |
| 94 | + u32 len_payload = 0; |
| 95 | + for (len_payload = 0; len_payload < 328; len_payload++) { |
| 96 | + if (len_payload == dns_length-1){ |
| 97 | + break; |
| 98 | + } |
| 99 | + } |
| 100 | + len_payload = len_payload+1; |
| 101 | + |
| 102 | + err = bpf_skb_load_bytes(skb, DNS_OFF, event->payload, len_payload); |
| 103 | + if (err != 0) { |
| 104 | + bpf_ringbuf_discard(event, 0); |
| 105 | + return 0; |
| 106 | + } |
| 107 | + |
| 108 | + bpf_skb_load_bytes(skb, ETH_HLEN + offsetof(struct iphdr, saddr),&event->saddr_v4, sizeof(event->saddr_v4)); |
| 109 | + bpf_skb_load_bytes(skb, ETH_HLEN + offsetof(struct iphdr, daddr),&event->daddr_v4, sizeof(event->daddr_v4)); |
| 110 | + |
| 111 | + socket_key.netns = current_netns; |
| 112 | + socket_key.saddr = bpf_ntohs(event->saddr_v4); |
| 113 | + socket_key.daddr = bpf_ntohs(event->daddr_v4); |
| 114 | + socket_key.sport = bpf_ntohs(sport); |
| 115 | + socket_key.dport = bpf_ntohs(dport); |
| 116 | + |
| 117 | + struct socket_value *skb_val; |
| 118 | + skb_val = bpf_map_lookup_elem(&dns_shared_map, &socket_key); |
| 119 | + if (skb_val != NULL){ |
| 120 | + event->pid = skb_val->uid_gid; |
| 121 | + event->ppid = skb_val->pid_tgid; |
| 122 | + packet_present = (uint32_t)1; |
| 123 | + } |
| 124 | + |
| 125 | + event->sport = bpf_ntohs(sport); |
| 126 | + event->dport = bpf_ntohs(dport); |
| 127 | + event->netns = current_netns; |
| 128 | + |
| 129 | + bpf_ringbuf_submit(event, 0); |
| 130 | + } |
| 131 | + } |
| 132 | + } |
| 133 | + return 0; |
| 134 | +} |
0 commit comments