123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115 |
- use core::{cell::UnsafeCell, hint::unreachable_unchecked, mem};
- use aya_ebpf_cty::c_long;
- use crate::{
- bindings::{bpf_map_def, bpf_map_type::BPF_MAP_TYPE_PROG_ARRAY},
- helpers::bpf_tail_call,
- maps::PinningType,
- BpfContext,
- };
- /// A BPF map that stores an array of program indices for tail calling.
- ///
- /// # Examples
- ///
- /// ```no_run
- /// # #![allow(dead_code)]
- /// use aya_ebpf::{macros::map, maps::ProgramArray, cty::c_long};
- /// # use aya_ebpf::{programs::LsmContext};
- ///
- /// #[map]
- /// static JUMP_TABLE: ProgramArray = ProgramArray::with_max_entries(16, 0);
- ///
- /// # unsafe fn try_test(ctx: &LsmContext) -> Result<(), c_long> {
- /// let index: u32 = 13;
- ///
- /// if let Err(e) = JUMP_TABLE.tail_call(ctx, index) {
- /// return Err(e);
- /// }
- ///
- /// # Err(-1)
- /// }
- /// ```
- #[repr(transparent)]
- pub struct ProgramArray {
- def: UnsafeCell<bpf_map_def>,
- }
- unsafe impl Sync for ProgramArray {}
- impl ProgramArray {
- pub const fn with_max_entries(max_entries: u32, flags: u32) -> ProgramArray {
- ProgramArray {
- def: UnsafeCell::new(bpf_map_def {
- type_: BPF_MAP_TYPE_PROG_ARRAY,
- key_size: mem::size_of::<u32>() as u32,
- value_size: mem::size_of::<u32>() as u32,
- max_entries,
- map_flags: flags,
- id: 0,
- pinning: PinningType::None as u32,
- }),
- }
- }
- pub const fn pinned(max_entries: u32, flags: u32) -> ProgramArray {
- ProgramArray {
- def: UnsafeCell::new(bpf_map_def {
- type_: BPF_MAP_TYPE_PROG_ARRAY,
- key_size: mem::size_of::<u32>() as u32,
- value_size: mem::size_of::<u32>() as u32,
- max_entries,
- map_flags: flags,
- id: 0,
- pinning: PinningType::ByName as u32,
- }),
- }
- }
- /// Perform a tail call into a program indexed by this map.
- ///
- /// # Safety
- ///
- /// This function is inherently unsafe, since it causes control flow to jump into
- /// another eBPF program. This can have side effects, such as drop methods not being
- /// called. Note that tail calling into an eBPF program is not the same thing as
- /// a function call -- control flow never returns to the caller.
- ///
- /// # Return Value
- ///
- /// On success, this function **does not return** into the original program.
- /// On failure, a negative error is returned, wrapped in `Err()`.
- #[cfg(not(unstable))]
- pub unsafe fn tail_call<C: BpfContext>(&self, ctx: &C, index: u32) -> Result<(), c_long> {
- let res = bpf_tail_call(ctx.as_ptr(), self.def.get() as *mut _, index);
- if res != 0 {
- Err(res)
- } else {
- unreachable_unchecked()
- }
- }
- /// Perform a tail call into a program indexed by this map.
- ///
- /// # Safety
- ///
- /// This function is inherently unsafe, since it causes control flow to jump into
- /// another eBPF program. This can have side effects, such as drop methods not being
- /// called. Note that tail calling into an eBPF program is not the same thing as
- /// a function call -- control flow never returns to the caller.
- ///
- /// # Return Value
- ///
- /// On success, this function **does not return** into the original program.
- /// On failure, a negative error is returned, wrapped in `Err()`.
- #[cfg(unstable)]
- pub unsafe fn tail_call<C: BpfContext>(&self, ctx: &C, index: u32) -> Result<!, c_long> {
- let res = bpf_tail_call(ctx.as_ptr(), self.def.get() as *mut _, index);
- if res != 0 {
- Err(res)
- } else {
- unreachable_unchecked()
- }
- }
- }
|