浏览代码

Remove duplication

Use `BPF_PROG_TYPE_TRACEPOINT` instead of `BPF_PROG_TYPE_SOCKET_FILTER`
as the former seems to work with more feature detection functions.
Tamir Duberstein 1 月之前
父节点
当前提交
8ea11ef9e8
共有 1 个文件被更改,包括 57 次插入94 次删除
  1. 57 94
      aya/src/sys/bpf.rs

+ 57 - 94
aya/src/sys/bpf.rs

@@ -730,13 +730,23 @@ pub(crate) fn bpf_btf_get_fd_by_id(id: u32) -> Result<crate::MockableFd, Syscall
 }
 
 pub(crate) fn is_prog_name_supported() -> bool {
+    with_trivial_prog(|attr| {
+        let u = unsafe { &mut attr.__bindgen_anon_3 };
+        let name = c"aya_name_check";
+        let name_bytes = name.to_bytes();
+        let len = cmp::min(name_bytes.len(), u.prog_name.len());
+        u.prog_name[..len]
+            .copy_from_slice(unsafe { mem::transmute::<&[u8], &[c_char]>(&name_bytes[..len]) });
+        bpf_prog_load(attr).is_ok()
+    })
+}
+
+fn with_trivial_prog<T, F>(op: F) -> T
+where
+    F: FnOnce(&mut bpf_attr) -> T,
+{
     let mut attr = unsafe { mem::zeroed::<bpf_attr>() };
     let u = unsafe { &mut attr.__bindgen_anon_3 };
-    let name = c"aya_name_check";
-    let name_bytes = name.to_bytes();
-    let len = cmp::min(name_bytes.len(), u.prog_name.len());
-    u.prog_name[..len]
-        .copy_from_slice(unsafe { mem::transmute::<&[u8], &[c_char]>(&name_bytes[..len]) });
 
     // The fields conforming an encoded basic instruction are stored in the following order:
     //   opcode:8 src_reg:4 dst_reg:4 offset:16 imm:32   - In little-endian BPF.
@@ -748,71 +758,43 @@ pub(crate) fn is_prog_name_supported() -> bool {
         0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // exit
     ];
 
-    let gpl = b"GPL\0";
+    let gpl = c"GPL";
     u.license = gpl.as_ptr() as u64;
 
     let insns = copy_instructions(prog).unwrap();
     u.insn_cnt = insns.len() as u32;
     u.insns = insns.as_ptr() as u64;
-    u.prog_type = bpf_prog_type::BPF_PROG_TYPE_SOCKET_FILTER as u32;
+    u.prog_type = bpf_prog_type::BPF_PROG_TYPE_TRACEPOINT as u32;
 
-    bpf_prog_load(&mut attr).is_ok()
+    op(&mut attr)
 }
 
 /// Tests whether `nr_map_ids` & `map_ids` fields in `bpf_prog_info` is available.
 pub(crate) fn is_info_map_ids_supported() -> bool {
-    let mut attr = unsafe { mem::zeroed::<bpf_attr>() };
-    let u = unsafe { &mut attr.__bindgen_anon_3 };
-
-    u.prog_type = bpf_prog_type::BPF_PROG_TYPE_SOCKET_FILTER as u32;
-
-    let prog: &[u8] = &[
-        0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov64 r0 = 0
-        0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // exit
-    ];
-    let insns = copy_instructions(prog).unwrap();
-    u.insn_cnt = insns.len() as u32;
-    u.insns = insns.as_ptr() as u64;
-
-    let gpl = b"GPL\0";
-    u.license = gpl.as_ptr() as u64;
-
-    let prog_fd = match bpf_prog_load(&mut attr) {
-        Ok(fd) => fd,
-        Err(_) => return false,
-    };
-    bpf_obj_get_info_by_fd(prog_fd.as_fd(), |info: &mut bpf_prog_info| {
-        info.nr_map_ids = 1
+    with_trivial_prog(|attr| {
+        let prog_fd = match bpf_prog_load(attr) {
+            Ok(fd) => fd,
+            Err(_) => return false,
+        };
+        bpf_obj_get_info_by_fd(prog_fd.as_fd(), |info: &mut bpf_prog_info| {
+            info.nr_map_ids = 1
+        })
+        .is_ok()
     })
-    .is_ok()
 }
 
 /// Tests whether `gpl_compatible` field in `bpf_prog_info` is available.
 pub(crate) fn is_info_gpl_compatible_supported() -> bool {
-    let mut attr = unsafe { mem::zeroed::<bpf_attr>() };
-    let u = unsafe { &mut attr.__bindgen_anon_3 };
-
-    u.prog_type = bpf_prog_type::BPF_PROG_TYPE_SOCKET_FILTER as u32;
-
-    let prog: &[u8] = &[
-        0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov64 r0 = 0
-        0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // exit
-    ];
-    let insns = copy_instructions(prog).unwrap();
-    u.insn_cnt = insns.len() as u32;
-    u.insns = insns.as_ptr() as u64;
-
-    let gpl = b"GPL\0";
-    u.license = gpl.as_ptr() as u64;
-
-    let prog_fd = match bpf_prog_load(&mut attr) {
-        Ok(fd) => fd,
-        Err(_) => return false,
-    };
-    if let Ok::<bpf_prog_info, _>(info) = bpf_obj_get_info_by_fd(prog_fd.as_fd(), |_| {}) {
-        return info.gpl_compatible() != 0;
-    }
-    false
+    with_trivial_prog(|attr| {
+        let prog_fd = match bpf_prog_load(attr) {
+            Ok(fd) => fd,
+            Err(_) => return false,
+        };
+        if let Ok::<bpf_prog_info, _>(info) = bpf_obj_get_info_by_fd(prog_fd.as_fd(), |_| {}) {
+            return info.gpl_compatible() != 0;
+        }
+        false
+    })
 }
 
 pub(crate) fn is_probe_read_kernel_supported() -> bool {
@@ -843,7 +825,7 @@ pub(crate) fn is_probe_read_kernel_supported() -> bool {
         0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // exit
     ];
 
-    let gpl = b"GPL\0";
+    let gpl = c"GPL";
     u.license = gpl.as_ptr() as u64;
 
     let insns = copy_instructions(prog).unwrap();
@@ -855,42 +837,23 @@ pub(crate) fn is_probe_read_kernel_supported() -> bool {
 }
 
 pub(crate) fn is_perf_link_supported() -> bool {
-    let mut attr = unsafe { mem::zeroed::<bpf_attr>() };
-    let u = unsafe { &mut attr.__bindgen_anon_3 };
-
-    // The fields conforming an encoded basic instruction are stored in the following order:
-    //   opcode:8 src_reg:4 dst_reg:4 offset:16 imm:32   - In little-endian BPF.
-    //   opcode:8 dst_reg:4 src_reg:4 offset:16 imm:32   - In big-endian BPF.
-    // Multi-byte fields ('imm' and 'offset') are stored using endian order.
-    // https://www.kernel.org/doc/html/v6.4-rc7/bpf/instruction-set.html#instruction-encoding
-    let prog: &[u8] = &[
-        0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov64 r0 = 0
-        0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // exit
-    ];
-
-    let gpl = b"GPL\0";
-    u.license = gpl.as_ptr() as u64;
-
-    let insns = copy_instructions(prog).unwrap();
-    u.insn_cnt = insns.len() as u32;
-    u.insns = insns.as_ptr() as u64;
-    u.prog_type = bpf_prog_type::BPF_PROG_TYPE_TRACEPOINT as u32;
-
-    if let Ok(fd) = bpf_prog_load(&mut attr) {
-        let fd = fd.as_fd();
-        // Uses an invalid target FD so we get EBADF if supported.
-        let link = bpf_link_create(
-            fd,
-            LinkTarget::IfIndex(u32::MAX),
-            bpf_attach_type::BPF_PERF_EVENT,
-            0,
-            None,
-        );
-        // Returns EINVAL if unsupported. EBADF if supported.
-        matches!(link, Err((_, e)) if e.raw_os_error() == Some(libc::EBADF))
-    } else {
-        false
-    }
+    with_trivial_prog(|attr| {
+        if let Ok(fd) = bpf_prog_load(attr) {
+            let fd = fd.as_fd();
+            // Uses an invalid target FD so we get EBADF if supported.
+            let link = bpf_link_create(
+                fd,
+                LinkTarget::IfIndex(u32::MAX),
+                bpf_attach_type::BPF_PERF_EVENT,
+                0,
+                None,
+            );
+            // Returns EINVAL if unsupported. EBADF if supported.
+            matches!(link, Err((_, e)) if e.raw_os_error() == Some(libc::EBADF))
+        } else {
+            false
+        }
+    })
 }
 
 pub(crate) fn is_bpf_global_data_supported() -> bool {
@@ -942,7 +905,7 @@ pub(crate) fn is_bpf_global_data_supported() -> bool {
     if let Ok(map) = map {
         insns[0].imm = map.fd().as_fd().as_raw_fd();
 
-        let gpl = b"GPL\0";
+        let gpl = c"GPL";
         u.license = gpl.as_ptr() as u64;
         u.insn_cnt = insns.len() as u32;
         u.insns = insns.as_ptr() as u64;
@@ -974,7 +937,7 @@ pub(crate) fn is_bpf_cookie_supported() -> bool {
         0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // exit
     ];
 
-    let gpl = b"GPL\0";
+    let gpl = c"GPL";
     u.license = gpl.as_ptr() as u64;
 
     let insns = copy_instructions(prog).unwrap();