main.rs 2.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. use std::{net::Ipv4Addr, path::PathBuf};
  2. use aya::{Bpf, maps::HashMap};
  3. use anyhow::{anyhow, Context};
  4. use aya::programs::{Xdp, XdpFlags};
  5. use aya_log::BpfLogger;
  6. use clap::Parser;
  7. use env_logger::Env;
  8. use log::{info, warn};
  9. use tokio::signal;
  10. use csv::ReaderBuilder;
  11. use serde::Deserialize;
  12. #[cfg(all(debug_assertions, not(feature = "default_artifact_build")))]
  13. const DEFAULT_TARGET: &str = "target/bpfel-unknown-none/debug";
  14. #[cfg(all(not(debug_assertions), not(feature = "default_artifact_build")))]
  15. const DEFAULT_TARGET: &str = "target/bpfel-unknown-none/release";
  16. #[cfg(feature = "default_artifact_build")]
  17. const DEFAULT_TARGET: &str = "bin/ebpf";
  18. #[derive(Debug, Parser)]
  19. struct Opt {
  20. #[clap(short, long, default_value = "lo")]
  21. iface: String,
  22. #[clap(short, long, default_value = "syn")]
  23. scan_type: String,
  24. #[clap(short, long)]
  25. csv: Option<String>,
  26. #[clap(default_value = DEFAULT_TARGET, long)]
  27. target: PathBuf,
  28. }
  29. #[derive(Debug, Deserialize, Eq, PartialEq)]
  30. struct CsvRow {
  31. saddr: Ipv4Addr,
  32. }
  33. #[tokio::main]
  34. async fn main() -> Result<(), anyhow::Error> {
  35. let opt = Opt::parse();
  36. env_logger::Builder::from_env(Env::default().default_filter_or("info")).init();
  37. let mut bpf_path = PathBuf::new();
  38. bpf_path.push(opt.target);
  39. let xdp_name = opt.scan_type;
  40. bpf_path.push(xdp_name.clone());
  41. let mut bpf = Bpf::load_file(bpf_path)?;
  42. if let Err(e) = BpfLogger::init(&mut bpf) {
  43. warn!("failed to initialize eBPF logger: {}
  44. This can happen if the loaded eBPF program has no log statements.", e);
  45. }
  46. // Obtain and load the XDP program called "responder" defined in the XDP file loaded above
  47. let program: &mut Xdp = bpf.program_mut("responder").unwrap().try_into()?;
  48. program.load()?;
  49. program.attach(&opt.iface, XdpFlags::default())
  50. .context(format!(
  51. "failed to attach the {} XDP program with default flags \
  52. - try changing XdpFlags::default() to XdpFlags::SKB_MODE",
  53. xdp_name
  54. ))?;
  55. info!("Loaded {} XDP program", xdp_name);
  56. let mut filter_map: HashMap<_, u32, u8> =
  57. HashMap::try_from(bpf.map_mut("FILTER_MAP")
  58. .ok_or(anyhow!("Could not construct mutable FILTER_MAP"))?)?;
  59. if let Some(csv_path) = opt.csv {
  60. info!("Installing filter rules from {}", csv_path);
  61. let mut reader = ReaderBuilder::new()
  62. .has_headers(true)
  63. .from_path(csv_path)?;
  64. for record in reader.deserialize() {
  65. let row: CsvRow = record?;
  66. filter_map.insert(u32::from(row.saddr), 1u8, 0)?;
  67. // TODO replace with BPF_MAP_UPDATE_BATCH
  68. }
  69. };
  70. info!("press ctrl-c to exit");
  71. signal::ctrl_c().await?;
  72. info!("Exiting...");
  73. Ok(())
  74. }