forked from solo-io/bumblebee
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtcpconnect.c
115 lines (96 loc) · 2.74 KB
/
tcpconnect.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
// Based on: https://github.com/iovisor/bcc/blob/master/libbpf-tools/tcpconnect.c
#include "vmlinux.h"
#include "solo_types.h"
#include "bpf/bpf_helpers.h"
#include "bpf/bpf_core_read.h"
#include "bpf/bpf_tracing.h"
char __license[] SEC("license") = "Dual MIT/GPL";
struct dimensions_t {
ipv4_addr saddr;
ipv4_addr daddr;
} __attribute__((packed));
struct {
__uint(type, BPF_MAP_TYPE_HASH);
__uint(max_entries, 8192);
__type(key, u32);
__type(value, struct sock *);
__uint(map_flags, BPF_F_NO_PREALLOC);
} sockets SEC(".maps");
struct {
__uint(type, BPF_MAP_TYPE_HASH);
__uint(max_entries, 8192);
__type(key, struct dimensions_t);
__type(value, u64);
} counter_events_hash SEC(".maps");
struct {
__uint(type, BPF_MAP_TYPE_RINGBUF);
__uint(max_entries, 1 << 24);
__type(value, struct dimensions_t);
} counter_events_ring SEC(".maps");
static __always_inline int
enter_tcp_connect(struct pt_regs *ctx, struct sock *sk)
{
__u64 pid_tgid = bpf_get_current_pid_tgid();
__u32 tid = pid_tgid;
bpf_printk("enter called");
bpf_printk("enter: setting sk for tid: %u", tid);
bpf_map_update_elem(&sockets, &tid, &sk, 0);
return 0;
}
static __always_inline int
exit_tcp_connect(struct pt_regs *ctx, int ret)
{
__u64 pid_tgid = bpf_get_current_pid_tgid();
__u32 tid = pid_tgid;
struct sock **skpp;
struct sock *sk;
__u32 saddr;
__u32 daddr;
u64 val;
u64 *valp;
struct dimensions_t hash_key = {};
bpf_printk("exit: getting sk for tid: '%u', ret is: '%d'", tid, ret);
skpp = bpf_map_lookup_elem(&sockets, &tid);
if (!skpp) {
bpf_printk("exit: no pointer for tid, returning: %u", tid);
return 0;
}
sk = *skpp;
bpf_printk("exit: found sk for tid: %u", tid);
BPF_CORE_READ_INTO(&saddr, sk, __sk_common.skc_rcv_saddr);
BPF_CORE_READ_INTO(&daddr, sk, __sk_common.skc_daddr);
hash_key.saddr = saddr;
hash_key.daddr = daddr;
// Set Hash map
valp = bpf_map_lookup_elem(&counter_events_hash, &hash_key);
if (!valp) {
bpf_printk("no entry for {saddr: %u, daddr: %u}", hash_key.saddr, hash_key.daddr);
val = 1;
}
else {
bpf_printk("found existing value '%llu' for {saddr: %u, daddr: %u}", *valp, hash_key.saddr, hash_key.daddr);
val = *valp + 1;
}
bpf_map_update_elem(&counter_events_hash, &hash_key, &val, 0);
bpf_map_delete_elem(&sockets, &tid);
// Set Ringbuffer
struct dimensions_t *ring_val;
ring_val = bpf_ringbuf_reserve(&counter_events_ring, sizeof(struct dimensions_t), 0);
if (!ring_val) {
return 0;
}
ring_val->saddr = saddr;
ring_val->daddr = daddr;
bpf_ringbuf_submit(ring_val, 0);
return 0;
}
SEC("kprobe/tcp_v4_connect")
int BPF_KPROBE(tcp_v4_connect, struct sock *sk)
{
return enter_tcp_connect(ctx, sk);
}
SEC("kretprobe/tcp_v4_connect")
int BPF_KRETPROBE(tcp_v4_connect_ret, int ret)
{
return exit_tcp_connect(ctx, ret);
}