diff --git a/src/nf-monitor.c b/src/nf-monitor.c index 2bc58c9..fad5100 100644 --- a/src/nf-monitor.c +++ b/src/nf-monitor.c @@ -13,6 +13,9 @@ #include "utils.h" #include +#include +#include +#include static void obj_input(struct nl_object *obj, void *arg) { @@ -34,6 +37,113 @@ static int event_input(struct nl_msg *msg, void *arg) return NL_STOP; } +#define SKF_AD_NLATTR 12 + +static int sk_set_filter(int fd) +{ + struct sock_filter filter[] = { + { + /* A = sizeof(struct nlmsghdr) + sizeof(struct nfgenmsg) */ + .code = BPF_LD|BPF_IMM, + .k = sizeof(struct nlmsghdr) + sizeof(struct nfgenmsg), + }, + { + /* X = CTA_PROTOINFO */ + .code = BPF_LDX|BPF_IMM, + .k = CTA_PROTOINFO, + }, + { + /* A = netlink attribute offset */ + .code = BPF_LD|BPF_B|BPF_ABS, + .k = SKF_AD_OFF + SKF_AD_NLATTR, + }, + { + /* Reject if not found (A == 0) */ + .code = BPF_JMP|BPF_JEQ|BPF_K, + .k = 0, + .jt = 20 - 3 - 1, + }, + + { + /* A += sizeof(struct nlattr) */ + .code = BPF_ALU|BPF_ADD|BPF_K, + .k = sizeof(struct nlattr), + }, + { + /* X = CTA_PROTOINFO_TCP */ + .code = BPF_LDX|BPF_IMM, + .k = CTA_PROTOINFO_TCP, + }, + { + /* A = netlink attribute offset */ + .code = BPF_LD|BPF_B|BPF_ABS, + .k = SKF_AD_OFF + SKF_AD_NLATTR, + }, + { + /* Reject if not found (A == 0) */ + .code = BPF_JMP|BPF_JEQ|BPF_K, + .k = 0, + .jt = 20 - 7 - 1, + }, + + { + /* A += sizeof(struct nlattr) */ + .code = BPF_ALU|BPF_ADD|BPF_K, + .k = sizeof(struct nlattr), + }, + { + /* X = CTA_PROTOINFO_TCP_STATE */ + .code = BPF_LDX|BPF_IMM, + .k = CTA_PROTOINFO_TCP_STATE, + }, + { + /* A = netlink attribute offset */ + .code = BPF_LD|BPF_B|BPF_ABS, + .k = SKF_AD_OFF + SKF_AD_NLATTR, + }, + { + /* Reject if not found (A == 0) */ + .code = BPF_JMP|BPF_JEQ|BPF_K, + .k = 0, + .jt = 20 - 11 - 1, + }, + + { + /* X = A */ + .code = BPF_MISC|BPF_TAX, + }, + { + /* A = skb->data[X + k] */ + .code = BPF_LD|BPF_B|BPF_IND, + .k = sizeof(struct nlattr), + }, + { + /* Reject if A != TCA_CONNTRACK_ESTABLISHED */ + .code = BPF_JMP|BPF_JEQ|BPF_K, + .k = TCP_CONNTRACK_ESTABLISHED, + .jf = 20 - 14 - 1, + }, + + { + /* Accept */ + .code = BPF_RET|BPF_K, + .k = 1, + }, + [20] = { + /* Reject */ + .code = BPF_RET|BPF_K, + .k = 0, + }, + }; + struct sock_fprog fprog = { + .len = sizeof(filter) / sizeof(filter[0]), + .filter = filter, + }; + + return setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, + &fprog, sizeof(fprog)); +} + int main(int argc, char *argv[]) { struct nl_handle *nlh; @@ -92,6 +202,11 @@ int main(int argc, char *argv[]) fprintf(stderr, "Warning: Unknown group: %s\n", argv[idx]); } + if (sk_set_filter(nl_socket_get_fd(nlh)) < 0) { + perror("setsockopt(SO_ATTACH_FILTER)"); + goto errout; + } + while (1) { fd_set rfds; int fd, retval;