2017-08-16 12:34:22 +07:00
|
|
|
#include <linux/bpf.h>
|
|
|
|
#include "bpf_helpers.h"
|
|
|
|
#include "bpf_util.h"
|
|
|
|
#include "bpf_endian.h"
|
|
|
|
|
|
|
|
int _version SEC("version") = 1;
|
|
|
|
|
|
|
|
#define bpf_printk(fmt, ...) \
|
|
|
|
({ \
|
|
|
|
char ____fmt[] = fmt; \
|
|
|
|
bpf_trace_printk(____fmt, sizeof(____fmt), \
|
|
|
|
##__VA_ARGS__); \
|
|
|
|
})
|
|
|
|
|
|
|
|
SEC("sk_skb1")
|
|
|
|
int bpf_prog1(struct __sk_buff *skb)
|
|
|
|
{
|
|
|
|
void *data_end = (void *)(long) skb->data_end;
|
|
|
|
void *data = (void *)(long) skb->data;
|
|
|
|
__u32 lport = skb->local_port;
|
|
|
|
__u32 rport = skb->remote_port;
|
2017-08-28 21:11:05 +07:00
|
|
|
__u8 *d = data;
|
2018-03-19 02:57:31 +07:00
|
|
|
__u32 len = (__u32) data_end - (__u32) data;
|
|
|
|
int err;
|
2017-08-16 12:34:22 +07:00
|
|
|
|
2018-03-19 02:57:31 +07:00
|
|
|
if (data + 10 > data_end) {
|
|
|
|
err = bpf_skb_pull_data(skb, 10);
|
|
|
|
if (err)
|
|
|
|
return SK_DROP;
|
|
|
|
|
|
|
|
data_end = (void *)(long)skb->data_end;
|
|
|
|
data = (void *)(long)skb->data;
|
|
|
|
if (data + 10 > data_end)
|
|
|
|
return SK_DROP;
|
|
|
|
}
|
2017-08-16 12:34:22 +07:00
|
|
|
|
|
|
|
/* This write/read is a bit pointless but tests the verifier and
|
|
|
|
* strparser handler for read/write pkt data and access into sk
|
|
|
|
* fields.
|
|
|
|
*/
|
2018-03-19 02:57:31 +07:00
|
|
|
d = data;
|
2017-08-28 21:11:05 +07:00
|
|
|
d[7] = 1;
|
2017-08-16 12:34:22 +07:00
|
|
|
return skb->len;
|
|
|
|
}
|
|
|
|
|
|
|
|
char _license[] SEC("license") = "GPL";
|