123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600 |
- pub(crate) mod args;
- mod btf_tracepoint;
- mod cgroup_device;
- mod cgroup_skb;
- mod cgroup_sock;
- mod cgroup_sock_addr;
- mod cgroup_sockopt;
- mod cgroup_sysctl;
- mod fentry;
- mod fexit;
- mod kprobe;
- mod lsm;
- mod map;
- mod perf_event;
- mod raw_tracepoint;
- mod sk_lookup;
- mod sk_msg;
- mod sk_skb;
- mod sock_ops;
- mod socket_filter;
- mod tc;
- mod tracepoint;
- mod uprobe;
- mod xdp;
- use btf_tracepoint::BtfTracePoint;
- use cgroup_device::CgroupDevice;
- use cgroup_skb::CgroupSkb;
- use cgroup_sock::CgroupSock;
- use cgroup_sock_addr::CgroupSockAddr;
- use cgroup_sockopt::CgroupSockopt;
- use cgroup_sysctl::CgroupSysctl;
- use fentry::FEntry;
- use fexit::FExit;
- use kprobe::{KProbe, KProbeKind};
- use lsm::Lsm;
- use map::Map;
- use perf_event::PerfEvent;
- use proc_macro::TokenStream;
- use raw_tracepoint::RawTracePoint;
- use sk_lookup::SkLookup;
- use sk_msg::SkMsg;
- use sk_skb::{SkSkb, SkSkbKind};
- use sock_ops::SockOps;
- use socket_filter::SocketFilter;
- use tc::SchedClassifier;
- use tracepoint::TracePoint;
- use uprobe::{UProbe, UProbeKind};
- use xdp::Xdp;
- #[proc_macro_attribute]
- pub fn map(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match Map::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.into_compile_error(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn kprobe(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match KProbe::parse(KProbeKind::KProbe, attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn kretprobe(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match KProbe::parse(KProbeKind::KRetProbe, attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn uprobe(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match UProbe::parse(UProbeKind::UProbe, attrs.into(), item.into()) {
- Ok(prog) => match prog.expand() {
- Ok(tokens) => tokens,
- Err(err) => err.emit_as_expr_tokens(),
- },
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn uretprobe(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match UProbe::parse(UProbeKind::URetProbe, attrs.into(), item.into()) {
- Ok(prog) => match prog.expand() {
- Ok(tokens) => tokens,
- Err(err) => err.emit_as_expr_tokens(),
- },
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn sock_ops(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match SockOps::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn sk_msg(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match SkMsg::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- /// Marks a function as an eBPF XDP program that can be attached to a network interface.
- ///
- /// On some NIC drivers, XDP probes are compatible with jumbo frames through the use of
- /// multi-buffer packets. Programs can opt-in this support by passing the `frags` argument.
- ///
- /// XDP programs can also be chained through the use of CPU maps and dev maps, but must opt-in
- /// with the `map = "cpumap"` or `map = "devmap"` arguments.
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 4.8.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{bindings::xdp_action::XDP_PASS, macros::xdp, programs::XdpContext};
- ///
- /// #[xdp(frags)]
- /// pub fn xdp(ctx: XdpContext) -> u32 {
- /// XDP_PASS
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn xdp(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match Xdp::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn classifier(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match SchedClassifier::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn cgroup_sysctl(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match CgroupSysctl::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn cgroup_sockopt(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match CgroupSockopt::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn cgroup_skb(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match CgroupSkb::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- /// Marks a function as a [`CgroupSockAddr`] eBPF program.
- ///
- /// [`CgroupSockAddr`] programs can be used to inspect or modify socket addresses passed to
- /// various syscalls within a [cgroup]. The `attach_type` argument specifies a place to attach
- /// the eBPF program to. See [`CgroupSockAddrAttachType`] for more details.
- ///
- /// [cgroup]: https://man7.org/linux/man-pages/man7/cgroups.7.html
- /// [`CgroupSockAddrAttachType`]: ../aya/programs/cgroup_sock_addr/enum.CgroupSockAddrAttachType.html
- /// [`CgroupSockAddr`]: ../aya/programs/cgroup_sock_addr/struct.CgroupSockAddr.html
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 4.17.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{macros::cgroup_sock_addr, programs::SockAddrContext};
- ///
- /// #[cgroup_sock_addr(connect4)]
- /// pub fn connect4(ctx: SockAddrContext) -> i32 {
- /// match try_connect4(ctx) {
- /// Ok(ret) => ret,
- /// Err(ret) => match ret.try_into() {
- /// Ok(rt) => rt,
- /// Err(_) => 1,
- /// },
- /// }
- /// }
- ///
- /// fn try_connect4(ctx: SockAddrContext) -> Result<i32, i64> {
- /// Ok(0)
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn cgroup_sock_addr(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match CgroupSockAddr::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn cgroup_sock(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match CgroupSock::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn tracepoint(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match TracePoint::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- #[proc_macro_attribute]
- pub fn perf_event(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match PerfEvent::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- /// Marks a function as a raw tracepoint eBPF program that can be attached at a
- /// pre-defined kernel trace point.
- ///
- /// The kernel provides a set of pre-defined trace points that eBPF programs can
- /// be attached to. See `/sys/kernel/debug/tracing/events` for a list of which
- /// events can be traced.
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 4.7.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{macros::raw_tracepoint, programs::RawTracePointContext};
- ///
- /// #[raw_tracepoint(tracepoint = "sys_enter")]
- /// pub fn sys_enter(ctx: RawTracePointContext) -> i32 {
- /// match unsafe { try_sys_enter(ctx) } {
- /// Ok(ret) => ret,
- /// Err(ret) => ret,
- /// }
- /// }
- ///
- /// unsafe fn try_sys_enter(_ctx: RawTracePointContext) -> Result<i32, i32> {
- /// Ok(0)
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn raw_tracepoint(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match RawTracePoint::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.into_compile_error(),
- }
- .into()
- }
- /// Marks a function as an LSM program that can be attached to Linux LSM hooks.
- /// Used to implement security policy and audit logging.
- ///
- /// The hook name is the first argument to the macro.
- /// You may also provide `sleepable` to mark the program as sleepable.
- /// Arguments should be comma separated.
- ///
- /// LSM probes can be attached to the kernel's security hooks to implement mandatory
- /// access control policy and security auditing.
- ///
- /// LSM probes require a kernel compiled with `CONFIG_BPF_LSM=y` and `CONFIG_DEBUG_INFO_BTF=y`.
- /// In order for the probes to fire, you also need the BPF LSM to be enabled through your
- /// kernel's boot paramters (like `lsm=lockdown,yama,bpf`).
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 5.7.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{macros::lsm, programs::LsmContext};
- ///
- /// #[lsm(hook = "file_open")]
- /// pub fn file_open(ctx: LsmContext) -> i32 {
- /// match unsafe { try_file_open(ctx) } {
- /// Ok(ret) => ret,
- /// Err(ret) => ret,
- /// }
- /// }
- ///
- /// unsafe fn try_file_open(_ctx: LsmContext) -> Result<i32, i32> {
- /// Ok(0)
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn lsm(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match Lsm::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.into_compile_error(),
- }
- .into()
- }
- /// Marks a function as a [BTF-enabled raw tracepoint][1] eBPF program that can be attached at
- /// a pre-defined kernel trace point.
- ///
- /// The kernel provides a set of pre-defined trace points that eBPF programs can
- /// be attached to. See `/sys/kernel/debug/tracing/events` for a list of which
- /// events can be traced.
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 5.5.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{macros::btf_tracepoint, programs::BtfTracePointContext};
- ///
- /// #[btf_tracepoint(function = "sched_process_fork")]
- /// pub fn sched_process_fork(ctx: BtfTracePointContext) -> u32 {
- /// match unsafe { try_sched_process_fork(ctx) } {
- /// Ok(ret) => ret,
- /// Err(ret) => ret,
- /// }
- /// }
- ///
- /// unsafe fn try_sched_process_fork(_ctx: BtfTracePointContext) -> Result<u32, u32> {
- /// Ok(0)
- /// }
- /// ```
- ///
- /// [1]: https://github.com/torvalds/linux/commit/9e15db66136a14cde3f35691f1d839d950118826
- #[proc_macro_attribute]
- pub fn btf_tracepoint(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match BtfTracePoint::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.into_compile_error(),
- }
- .into()
- }
- /// Marks a function as a SK_SKB Stream Parser eBPF program that can be attached
- /// to a SockMap
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 4.14
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{macros::stream_parser, programs::SkBuffContext};
- ///
- ///
- ///#[stream_parser]
- ///fn stream_parser(ctx: SkBuffContext) -> u32 {
- /// match { try_stream_parser(ctx) } {
- /// Ok(ret) => ret,
- /// Err(ret) => ret,
- /// }
- ///}
- ///
- ///fn try_stream_parser(ctx: SkBuffContext) -> Result<u32, u32> {
- /// Ok(ctx.len())
- ///}
- /// ```
- #[proc_macro_attribute]
- pub fn stream_parser(attrs: TokenStream, item: TokenStream) -> TokenStream {
- sk_skb(SkSkbKind::StreamParser, attrs, item)
- }
- /// Marks a function as a SK_SKB Stream Verdict eBPF program that can be attached
- /// to a SockMap
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 4.14
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{macros::stream_verdict, programs::SkBuffContext, bindings::sk_action};
- ///
- ///
- ///#[stream_verdict]
- ///fn stream_verdict(ctx: SkBuffContext) -> u32 {
- /// match { try_stream_verdict(ctx) } {
- /// Ok(ret) => ret,
- /// Err(ret) => ret,
- /// }
- ///}
- ///
- ///fn try_stream_verdict(_ctx: SkBuffContext) -> Result<u32, u32> {
- /// Ok(sk_action::SK_PASS)
- ///}
- /// ```
- #[proc_macro_attribute]
- pub fn stream_verdict(attrs: TokenStream, item: TokenStream) -> TokenStream {
- sk_skb(SkSkbKind::StreamVerdict, attrs, item)
- }
- fn sk_skb(kind: SkSkbKind, attrs: TokenStream, item: TokenStream) -> TokenStream {
- match SkSkb::parse(kind, attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- /// Marks a function as a eBPF Socket Filter program that can be attached to
- /// a socket.
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 3.19
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{macros::socket_filter, programs::SkBuffContext};
- ///
- /// #[socket_filter]
- /// pub fn accept_all(_ctx: SkBuffContext) -> i64 {
- /// return 0
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn socket_filter(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match SocketFilter::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- /// Marks a function as a fentry eBPF program that can be attached to almost
- /// any function inside the kernel. The difference between fentry and kprobe
- /// is that fexit has practically zero overhead to call before kernel function.
- /// fentry programs can be also attached to other eBPF programs.
- ///
- /// # Minimumm kernel version
- ///
- /// The minimum kernel version required to use this feature is 5.5.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// # #![expect(non_camel_case_types)]
- /// use aya_ebpf::{macros::fentry, programs::FEntryContext};
- /// # type filename = u32;
- /// # type path = u32;
- ///
- /// #[fentry(function = "filename_lookup")]
- /// fn filename_lookup(ctx: FEntryContext) -> i32 {
- /// match unsafe { try_filename_lookup(ctx) } {
- /// Ok(ret) => ret,
- /// Err(ret) => ret,
- /// }
- /// }
- ///
- /// unsafe fn try_filename_lookup(ctx: FEntryContext) -> Result<i32, i32> {
- /// let _f: *const filename = ctx.arg(1);
- /// let _p: *const path = ctx.arg(3);
- ///
- /// Ok(0)
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn fentry(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match FEntry::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.into_compile_error(),
- }
- .into()
- }
- /// Marks a function as a fexit eBPF program that can be attached to almost
- /// any function inside the kernel. The difference between fexit and kretprobe
- /// is that fexit has practically zero overhead to call after kernel function
- /// and it focuses on access to arguments rather than the return value. fexit
- /// programs can be also attached to other eBPF programs
- ///
- /// # Minimumm kernel version
- ///
- /// The minimum kernel version required to use this feature is 5.5.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// # #![expect(non_camel_case_types)]
- /// use aya_ebpf::{macros::fexit, programs::FExitContext};
- /// # type filename = u32;
- /// # type path = u32;
- ///
- /// #[fexit(function = "filename_lookup")]
- /// fn filename_lookup(ctx: FExitContext) -> i32 {
- /// match unsafe { try_filename_lookup(ctx) } {
- /// Ok(ret) => ret,
- /// Err(ret) => ret,
- /// }
- /// }
- ///
- /// unsafe fn try_filename_lookup(ctx: FExitContext) -> Result<i32, i32> {
- /// let _f: *const filename = ctx.arg(1);
- /// let _p: *const path = ctx.arg(3);
- ///
- /// Ok(0)
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn fexit(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match FExit::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.into_compile_error(),
- }
- .into()
- }
- /// Marks a function as an eBPF Socket Lookup program that can be attached to
- /// a network namespace.
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 5.9
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{macros::sk_lookup, programs::SkLookupContext};
- ///
- /// #[sk_lookup]
- /// pub fn accept_all(_ctx: SkLookupContext) -> u32 {
- /// // use sk_assign to redirect
- /// return 0
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn sk_lookup(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match SkLookup::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
- /// Marks a function as a cgroup device eBPF program that can be attached to a
- /// cgroup.
- ///
- /// # Minimum kernel version
- ///
- /// The minimum kernel version required to use this feature is 4.15.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// use aya_ebpf::{
- /// macros::cgroup_device,
- /// programs::DeviceContext,
- /// };
- ///
- /// #[cgroup_device]
- /// pub fn cgroup_dev(ctx: DeviceContext) -> i32 {
- /// // Reject all device access
- /// return 0;
- /// }
- /// ```
- #[proc_macro_attribute]
- pub fn cgroup_device(attrs: TokenStream, item: TokenStream) -> TokenStream {
- match CgroupDevice::parse(attrs.into(), item.into()) {
- Ok(prog) => prog.expand(),
- Err(err) => err.emit_as_expr_tokens(),
- }
- .into()
- }
|