lib.rs 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600
  1. pub(crate) mod args;
  2. mod btf_tracepoint;
  3. mod cgroup_device;
  4. mod cgroup_skb;
  5. mod cgroup_sock;
  6. mod cgroup_sock_addr;
  7. mod cgroup_sockopt;
  8. mod cgroup_sysctl;
  9. mod fentry;
  10. mod fexit;
  11. mod kprobe;
  12. mod lsm;
  13. mod map;
  14. mod perf_event;
  15. mod raw_tracepoint;
  16. mod sk_lookup;
  17. mod sk_msg;
  18. mod sk_skb;
  19. mod sock_ops;
  20. mod socket_filter;
  21. mod tc;
  22. mod tracepoint;
  23. mod uprobe;
  24. mod xdp;
  25. use btf_tracepoint::BtfTracePoint;
  26. use cgroup_device::CgroupDevice;
  27. use cgroup_skb::CgroupSkb;
  28. use cgroup_sock::CgroupSock;
  29. use cgroup_sock_addr::CgroupSockAddr;
  30. use cgroup_sockopt::CgroupSockopt;
  31. use cgroup_sysctl::CgroupSysctl;
  32. use fentry::FEntry;
  33. use fexit::FExit;
  34. use kprobe::{KProbe, KProbeKind};
  35. use lsm::Lsm;
  36. use map::Map;
  37. use perf_event::PerfEvent;
  38. use proc_macro::TokenStream;
  39. use raw_tracepoint::RawTracePoint;
  40. use sk_lookup::SkLookup;
  41. use sk_msg::SkMsg;
  42. use sk_skb::{SkSkb, SkSkbKind};
  43. use sock_ops::SockOps;
  44. use socket_filter::SocketFilter;
  45. use tc::SchedClassifier;
  46. use tracepoint::TracePoint;
  47. use uprobe::{UProbe, UProbeKind};
  48. use xdp::Xdp;
  49. #[proc_macro_attribute]
  50. pub fn map(attrs: TokenStream, item: TokenStream) -> TokenStream {
  51. match Map::parse(attrs.into(), item.into()) {
  52. Ok(prog) => prog.expand(),
  53. Err(err) => err.into_compile_error(),
  54. }
  55. .into()
  56. }
  57. #[proc_macro_attribute]
  58. pub fn kprobe(attrs: TokenStream, item: TokenStream) -> TokenStream {
  59. match KProbe::parse(KProbeKind::KProbe, attrs.into(), item.into()) {
  60. Ok(prog) => prog.expand(),
  61. Err(err) => err.emit_as_expr_tokens(),
  62. }
  63. .into()
  64. }
  65. #[proc_macro_attribute]
  66. pub fn kretprobe(attrs: TokenStream, item: TokenStream) -> TokenStream {
  67. match KProbe::parse(KProbeKind::KRetProbe, attrs.into(), item.into()) {
  68. Ok(prog) => prog.expand(),
  69. Err(err) => err.emit_as_expr_tokens(),
  70. }
  71. .into()
  72. }
  73. #[proc_macro_attribute]
  74. pub fn uprobe(attrs: TokenStream, item: TokenStream) -> TokenStream {
  75. match UProbe::parse(UProbeKind::UProbe, attrs.into(), item.into()) {
  76. Ok(prog) => match prog.expand() {
  77. Ok(tokens) => tokens,
  78. Err(err) => err.emit_as_expr_tokens(),
  79. },
  80. Err(err) => err.emit_as_expr_tokens(),
  81. }
  82. .into()
  83. }
  84. #[proc_macro_attribute]
  85. pub fn uretprobe(attrs: TokenStream, item: TokenStream) -> TokenStream {
  86. match UProbe::parse(UProbeKind::URetProbe, attrs.into(), item.into()) {
  87. Ok(prog) => match prog.expand() {
  88. Ok(tokens) => tokens,
  89. Err(err) => err.emit_as_expr_tokens(),
  90. },
  91. Err(err) => err.emit_as_expr_tokens(),
  92. }
  93. .into()
  94. }
  95. #[proc_macro_attribute]
  96. pub fn sock_ops(attrs: TokenStream, item: TokenStream) -> TokenStream {
  97. match SockOps::parse(attrs.into(), item.into()) {
  98. Ok(prog) => prog.expand(),
  99. Err(err) => err.emit_as_expr_tokens(),
  100. }
  101. .into()
  102. }
  103. #[proc_macro_attribute]
  104. pub fn sk_msg(attrs: TokenStream, item: TokenStream) -> TokenStream {
  105. match SkMsg::parse(attrs.into(), item.into()) {
  106. Ok(prog) => prog.expand(),
  107. Err(err) => err.emit_as_expr_tokens(),
  108. }
  109. .into()
  110. }
  111. /// Marks a function as an eBPF XDP program that can be attached to a network interface.
  112. ///
  113. /// On some NIC drivers, XDP probes are compatible with jumbo frames through the use of
  114. /// multi-buffer packets. Programs can opt-in this support by passing the `frags` argument.
  115. ///
  116. /// XDP programs can also be chained through the use of CPU maps and dev maps, but must opt-in
  117. /// with the `map = "cpumap"` or `map = "devmap"` arguments.
  118. ///
  119. /// # Minimum kernel version
  120. ///
  121. /// The minimum kernel version required to use this feature is 4.8.
  122. ///
  123. /// # Examples
  124. ///
  125. /// ```no_run
  126. /// use aya_ebpf::{bindings::xdp_action::XDP_PASS, macros::xdp, programs::XdpContext};
  127. ///
  128. /// #[xdp(frags)]
  129. /// pub fn xdp(ctx: XdpContext) -> u32 {
  130. /// XDP_PASS
  131. /// }
  132. /// ```
  133. #[proc_macro_attribute]
  134. pub fn xdp(attrs: TokenStream, item: TokenStream) -> TokenStream {
  135. match Xdp::parse(attrs.into(), item.into()) {
  136. Ok(prog) => prog.expand(),
  137. Err(err) => err.emit_as_expr_tokens(),
  138. }
  139. .into()
  140. }
  141. #[proc_macro_attribute]
  142. pub fn classifier(attrs: TokenStream, item: TokenStream) -> TokenStream {
  143. match SchedClassifier::parse(attrs.into(), item.into()) {
  144. Ok(prog) => prog.expand(),
  145. Err(err) => err.emit_as_expr_tokens(),
  146. }
  147. .into()
  148. }
  149. #[proc_macro_attribute]
  150. pub fn cgroup_sysctl(attrs: TokenStream, item: TokenStream) -> TokenStream {
  151. match CgroupSysctl::parse(attrs.into(), item.into()) {
  152. Ok(prog) => prog.expand(),
  153. Err(err) => err.emit_as_expr_tokens(),
  154. }
  155. .into()
  156. }
  157. #[proc_macro_attribute]
  158. pub fn cgroup_sockopt(attrs: TokenStream, item: TokenStream) -> TokenStream {
  159. match CgroupSockopt::parse(attrs.into(), item.into()) {
  160. Ok(prog) => prog.expand(),
  161. Err(err) => err.emit_as_expr_tokens(),
  162. }
  163. .into()
  164. }
  165. #[proc_macro_attribute]
  166. pub fn cgroup_skb(attrs: TokenStream, item: TokenStream) -> TokenStream {
  167. match CgroupSkb::parse(attrs.into(), item.into()) {
  168. Ok(prog) => prog.expand(),
  169. Err(err) => err.emit_as_expr_tokens(),
  170. }
  171. .into()
  172. }
  173. /// Marks a function as a [`CgroupSockAddr`] eBPF program.
  174. ///
  175. /// [`CgroupSockAddr`] programs can be used to inspect or modify socket addresses passed to
  176. /// various syscalls within a [cgroup]. The `attach_type` argument specifies a place to attach
  177. /// the eBPF program to. See [`CgroupSockAddrAttachType`] for more details.
  178. ///
  179. /// [cgroup]: https://man7.org/linux/man-pages/man7/cgroups.7.html
  180. /// [`CgroupSockAddrAttachType`]: ../aya/programs/cgroup_sock_addr/enum.CgroupSockAddrAttachType.html
  181. /// [`CgroupSockAddr`]: ../aya/programs/cgroup_sock_addr/struct.CgroupSockAddr.html
  182. ///
  183. /// # Minimum kernel version
  184. ///
  185. /// The minimum kernel version required to use this feature is 4.17.
  186. ///
  187. /// # Examples
  188. ///
  189. /// ```no_run
  190. /// use aya_ebpf::{macros::cgroup_sock_addr, programs::SockAddrContext};
  191. ///
  192. /// #[cgroup_sock_addr(connect4)]
  193. /// pub fn connect4(ctx: SockAddrContext) -> i32 {
  194. /// match try_connect4(ctx) {
  195. /// Ok(ret) => ret,
  196. /// Err(ret) => match ret.try_into() {
  197. /// Ok(rt) => rt,
  198. /// Err(_) => 1,
  199. /// },
  200. /// }
  201. /// }
  202. ///
  203. /// fn try_connect4(ctx: SockAddrContext) -> Result<i32, i64> {
  204. /// Ok(0)
  205. /// }
  206. /// ```
  207. #[proc_macro_attribute]
  208. pub fn cgroup_sock_addr(attrs: TokenStream, item: TokenStream) -> TokenStream {
  209. match CgroupSockAddr::parse(attrs.into(), item.into()) {
  210. Ok(prog) => prog.expand(),
  211. Err(err) => err.emit_as_expr_tokens(),
  212. }
  213. .into()
  214. }
  215. #[proc_macro_attribute]
  216. pub fn cgroup_sock(attrs: TokenStream, item: TokenStream) -> TokenStream {
  217. match CgroupSock::parse(attrs.into(), item.into()) {
  218. Ok(prog) => prog.expand(),
  219. Err(err) => err.emit_as_expr_tokens(),
  220. }
  221. .into()
  222. }
  223. #[proc_macro_attribute]
  224. pub fn tracepoint(attrs: TokenStream, item: TokenStream) -> TokenStream {
  225. match TracePoint::parse(attrs.into(), item.into()) {
  226. Ok(prog) => prog.expand(),
  227. Err(err) => err.emit_as_expr_tokens(),
  228. }
  229. .into()
  230. }
  231. #[proc_macro_attribute]
  232. pub fn perf_event(attrs: TokenStream, item: TokenStream) -> TokenStream {
  233. match PerfEvent::parse(attrs.into(), item.into()) {
  234. Ok(prog) => prog.expand(),
  235. Err(err) => err.emit_as_expr_tokens(),
  236. }
  237. .into()
  238. }
  239. /// Marks a function as a raw tracepoint eBPF program that can be attached at a
  240. /// pre-defined kernel trace point.
  241. ///
  242. /// The kernel provides a set of pre-defined trace points that eBPF programs can
  243. /// be attached to. See `/sys/kernel/debug/tracing/events` for a list of which
  244. /// events can be traced.
  245. ///
  246. /// # Minimum kernel version
  247. ///
  248. /// The minimum kernel version required to use this feature is 4.7.
  249. ///
  250. /// # Examples
  251. ///
  252. /// ```no_run
  253. /// use aya_ebpf::{macros::raw_tracepoint, programs::RawTracePointContext};
  254. ///
  255. /// #[raw_tracepoint(tracepoint = "sys_enter")]
  256. /// pub fn sys_enter(ctx: RawTracePointContext) -> i32 {
  257. /// match unsafe { try_sys_enter(ctx) } {
  258. /// Ok(ret) => ret,
  259. /// Err(ret) => ret,
  260. /// }
  261. /// }
  262. ///
  263. /// unsafe fn try_sys_enter(_ctx: RawTracePointContext) -> Result<i32, i32> {
  264. /// Ok(0)
  265. /// }
  266. /// ```
  267. #[proc_macro_attribute]
  268. pub fn raw_tracepoint(attrs: TokenStream, item: TokenStream) -> TokenStream {
  269. match RawTracePoint::parse(attrs.into(), item.into()) {
  270. Ok(prog) => prog.expand(),
  271. Err(err) => err.into_compile_error(),
  272. }
  273. .into()
  274. }
  275. /// Marks a function as an LSM program that can be attached to Linux LSM hooks.
  276. /// Used to implement security policy and audit logging.
  277. ///
  278. /// The hook name is the first argument to the macro.
  279. /// You may also provide `sleepable` to mark the program as sleepable.
  280. /// Arguments should be comma separated.
  281. ///
  282. /// LSM probes can be attached to the kernel's security hooks to implement mandatory
  283. /// access control policy and security auditing.
  284. ///
  285. /// LSM probes require a kernel compiled with `CONFIG_BPF_LSM=y` and `CONFIG_DEBUG_INFO_BTF=y`.
  286. /// In order for the probes to fire, you also need the BPF LSM to be enabled through your
  287. /// kernel's boot paramters (like `lsm=lockdown,yama,bpf`).
  288. ///
  289. /// # Minimum kernel version
  290. ///
  291. /// The minimum kernel version required to use this feature is 5.7.
  292. ///
  293. /// # Examples
  294. ///
  295. /// ```no_run
  296. /// use aya_ebpf::{macros::lsm, programs::LsmContext};
  297. ///
  298. /// #[lsm(hook = "file_open")]
  299. /// pub fn file_open(ctx: LsmContext) -> i32 {
  300. /// match unsafe { try_file_open(ctx) } {
  301. /// Ok(ret) => ret,
  302. /// Err(ret) => ret,
  303. /// }
  304. /// }
  305. ///
  306. /// unsafe fn try_file_open(_ctx: LsmContext) -> Result<i32, i32> {
  307. /// Ok(0)
  308. /// }
  309. /// ```
  310. #[proc_macro_attribute]
  311. pub fn lsm(attrs: TokenStream, item: TokenStream) -> TokenStream {
  312. match Lsm::parse(attrs.into(), item.into()) {
  313. Ok(prog) => prog.expand(),
  314. Err(err) => err.into_compile_error(),
  315. }
  316. .into()
  317. }
  318. /// Marks a function as a [BTF-enabled raw tracepoint][1] eBPF program that can be attached at
  319. /// a pre-defined kernel trace point.
  320. ///
  321. /// The kernel provides a set of pre-defined trace points that eBPF programs can
  322. /// be attached to. See `/sys/kernel/debug/tracing/events` for a list of which
  323. /// events can be traced.
  324. ///
  325. /// # Minimum kernel version
  326. ///
  327. /// The minimum kernel version required to use this feature is 5.5.
  328. ///
  329. /// # Examples
  330. ///
  331. /// ```no_run
  332. /// use aya_ebpf::{macros::btf_tracepoint, programs::BtfTracePointContext};
  333. ///
  334. /// #[btf_tracepoint(function = "sched_process_fork")]
  335. /// pub fn sched_process_fork(ctx: BtfTracePointContext) -> u32 {
  336. /// match unsafe { try_sched_process_fork(ctx) } {
  337. /// Ok(ret) => ret,
  338. /// Err(ret) => ret,
  339. /// }
  340. /// }
  341. ///
  342. /// unsafe fn try_sched_process_fork(_ctx: BtfTracePointContext) -> Result<u32, u32> {
  343. /// Ok(0)
  344. /// }
  345. /// ```
  346. ///
  347. /// [1]: https://github.com/torvalds/linux/commit/9e15db66136a14cde3f35691f1d839d950118826
  348. #[proc_macro_attribute]
  349. pub fn btf_tracepoint(attrs: TokenStream, item: TokenStream) -> TokenStream {
  350. match BtfTracePoint::parse(attrs.into(), item.into()) {
  351. Ok(prog) => prog.expand(),
  352. Err(err) => err.into_compile_error(),
  353. }
  354. .into()
  355. }
  356. /// Marks a function as a SK_SKB Stream Parser eBPF program that can be attached
  357. /// to a SockMap
  358. ///
  359. /// # Minimum kernel version
  360. ///
  361. /// The minimum kernel version required to use this feature is 4.14
  362. ///
  363. /// # Examples
  364. ///
  365. /// ```no_run
  366. /// use aya_ebpf::{macros::stream_parser, programs::SkBuffContext};
  367. ///
  368. ///
  369. ///#[stream_parser]
  370. ///fn stream_parser(ctx: SkBuffContext) -> u32 {
  371. /// match { try_stream_parser(ctx) } {
  372. /// Ok(ret) => ret,
  373. /// Err(ret) => ret,
  374. /// }
  375. ///}
  376. ///
  377. ///fn try_stream_parser(ctx: SkBuffContext) -> Result<u32, u32> {
  378. /// Ok(ctx.len())
  379. ///}
  380. /// ```
  381. #[proc_macro_attribute]
  382. pub fn stream_parser(attrs: TokenStream, item: TokenStream) -> TokenStream {
  383. sk_skb(SkSkbKind::StreamParser, attrs, item)
  384. }
  385. /// Marks a function as a SK_SKB Stream Verdict eBPF program that can be attached
  386. /// to a SockMap
  387. ///
  388. /// # Minimum kernel version
  389. ///
  390. /// The minimum kernel version required to use this feature is 4.14
  391. ///
  392. /// # Examples
  393. ///
  394. /// ```no_run
  395. /// use aya_ebpf::{macros::stream_verdict, programs::SkBuffContext, bindings::sk_action};
  396. ///
  397. ///
  398. ///#[stream_verdict]
  399. ///fn stream_verdict(ctx: SkBuffContext) -> u32 {
  400. /// match { try_stream_verdict(ctx) } {
  401. /// Ok(ret) => ret,
  402. /// Err(ret) => ret,
  403. /// }
  404. ///}
  405. ///
  406. ///fn try_stream_verdict(_ctx: SkBuffContext) -> Result<u32, u32> {
  407. /// Ok(sk_action::SK_PASS)
  408. ///}
  409. /// ```
  410. #[proc_macro_attribute]
  411. pub fn stream_verdict(attrs: TokenStream, item: TokenStream) -> TokenStream {
  412. sk_skb(SkSkbKind::StreamVerdict, attrs, item)
  413. }
  414. fn sk_skb(kind: SkSkbKind, attrs: TokenStream, item: TokenStream) -> TokenStream {
  415. match SkSkb::parse(kind, attrs.into(), item.into()) {
  416. Ok(prog) => prog.expand(),
  417. Err(err) => err.emit_as_expr_tokens(),
  418. }
  419. .into()
  420. }
  421. /// Marks a function as a eBPF Socket Filter program that can be attached to
  422. /// a socket.
  423. ///
  424. /// # Minimum kernel version
  425. ///
  426. /// The minimum kernel version required to use this feature is 3.19
  427. ///
  428. /// # Examples
  429. ///
  430. /// ```no_run
  431. /// use aya_ebpf::{macros::socket_filter, programs::SkBuffContext};
  432. ///
  433. /// #[socket_filter]
  434. /// pub fn accept_all(_ctx: SkBuffContext) -> i64 {
  435. /// return 0
  436. /// }
  437. /// ```
  438. #[proc_macro_attribute]
  439. pub fn socket_filter(attrs: TokenStream, item: TokenStream) -> TokenStream {
  440. match SocketFilter::parse(attrs.into(), item.into()) {
  441. Ok(prog) => prog.expand(),
  442. Err(err) => err.emit_as_expr_tokens(),
  443. }
  444. .into()
  445. }
  446. /// Marks a function as a fentry eBPF program that can be attached to almost
  447. /// any function inside the kernel. The difference between fentry and kprobe
  448. /// is that fexit has practically zero overhead to call before kernel function.
  449. /// fentry programs can be also attached to other eBPF programs.
  450. ///
  451. /// # Minimumm kernel version
  452. ///
  453. /// The minimum kernel version required to use this feature is 5.5.
  454. ///
  455. /// # Examples
  456. ///
  457. /// ```no_run
  458. /// # #![expect(non_camel_case_types)]
  459. /// use aya_ebpf::{macros::fentry, programs::FEntryContext};
  460. /// # type filename = u32;
  461. /// # type path = u32;
  462. ///
  463. /// #[fentry(function = "filename_lookup")]
  464. /// fn filename_lookup(ctx: FEntryContext) -> i32 {
  465. /// match unsafe { try_filename_lookup(ctx) } {
  466. /// Ok(ret) => ret,
  467. /// Err(ret) => ret,
  468. /// }
  469. /// }
  470. ///
  471. /// unsafe fn try_filename_lookup(ctx: FEntryContext) -> Result<i32, i32> {
  472. /// let _f: *const filename = ctx.arg(1);
  473. /// let _p: *const path = ctx.arg(3);
  474. ///
  475. /// Ok(0)
  476. /// }
  477. /// ```
  478. #[proc_macro_attribute]
  479. pub fn fentry(attrs: TokenStream, item: TokenStream) -> TokenStream {
  480. match FEntry::parse(attrs.into(), item.into()) {
  481. Ok(prog) => prog.expand(),
  482. Err(err) => err.into_compile_error(),
  483. }
  484. .into()
  485. }
  486. /// Marks a function as a fexit eBPF program that can be attached to almost
  487. /// any function inside the kernel. The difference between fexit and kretprobe
  488. /// is that fexit has practically zero overhead to call after kernel function
  489. /// and it focuses on access to arguments rather than the return value. fexit
  490. /// programs can be also attached to other eBPF programs
  491. ///
  492. /// # Minimumm kernel version
  493. ///
  494. /// The minimum kernel version required to use this feature is 5.5.
  495. ///
  496. /// # Examples
  497. ///
  498. /// ```no_run
  499. /// # #![expect(non_camel_case_types)]
  500. /// use aya_ebpf::{macros::fexit, programs::FExitContext};
  501. /// # type filename = u32;
  502. /// # type path = u32;
  503. ///
  504. /// #[fexit(function = "filename_lookup")]
  505. /// fn filename_lookup(ctx: FExitContext) -> i32 {
  506. /// match unsafe { try_filename_lookup(ctx) } {
  507. /// Ok(ret) => ret,
  508. /// Err(ret) => ret,
  509. /// }
  510. /// }
  511. ///
  512. /// unsafe fn try_filename_lookup(ctx: FExitContext) -> Result<i32, i32> {
  513. /// let _f: *const filename = ctx.arg(1);
  514. /// let _p: *const path = ctx.arg(3);
  515. ///
  516. /// Ok(0)
  517. /// }
  518. /// ```
  519. #[proc_macro_attribute]
  520. pub fn fexit(attrs: TokenStream, item: TokenStream) -> TokenStream {
  521. match FExit::parse(attrs.into(), item.into()) {
  522. Ok(prog) => prog.expand(),
  523. Err(err) => err.into_compile_error(),
  524. }
  525. .into()
  526. }
  527. /// Marks a function as an eBPF Socket Lookup program that can be attached to
  528. /// a network namespace.
  529. ///
  530. /// # Minimum kernel version
  531. ///
  532. /// The minimum kernel version required to use this feature is 5.9
  533. ///
  534. /// # Examples
  535. ///
  536. /// ```no_run
  537. /// use aya_ebpf::{macros::sk_lookup, programs::SkLookupContext};
  538. ///
  539. /// #[sk_lookup]
  540. /// pub fn accept_all(_ctx: SkLookupContext) -> u32 {
  541. /// // use sk_assign to redirect
  542. /// return 0
  543. /// }
  544. /// ```
  545. #[proc_macro_attribute]
  546. pub fn sk_lookup(attrs: TokenStream, item: TokenStream) -> TokenStream {
  547. match SkLookup::parse(attrs.into(), item.into()) {
  548. Ok(prog) => prog.expand(),
  549. Err(err) => err.emit_as_expr_tokens(),
  550. }
  551. .into()
  552. }
  553. /// Marks a function as a cgroup device eBPF program that can be attached to a
  554. /// cgroup.
  555. ///
  556. /// # Minimum kernel version
  557. ///
  558. /// The minimum kernel version required to use this feature is 4.15.
  559. ///
  560. /// # Examples
  561. ///
  562. /// ```no_run
  563. /// use aya_ebpf::{
  564. /// macros::cgroup_device,
  565. /// programs::DeviceContext,
  566. /// };
  567. ///
  568. /// #[cgroup_device]
  569. /// pub fn cgroup_dev(ctx: DeviceContext) -> i32 {
  570. /// // Reject all device access
  571. /// return 0;
  572. /// }
  573. /// ```
  574. #[proc_macro_attribute]
  575. pub fn cgroup_device(attrs: TokenStream, item: TokenStream) -> TokenStream {
  576. match CgroupDevice::parse(attrs.into(), item.into()) {
  577. Ok(prog) => prog.expand(),
  578. Err(err) => err.emit_as_expr_tokens(),
  579. }
  580. .into()
  581. }