mod.rs 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535
  1. //! eBPF program types.
  2. //!
  3. //! eBPF programs are loaded inside the kernel and attached to one or more hook
  4. //! points. Whenever the hook points are reached, the programs are executed.
  5. //!
  6. //! # Loading and attaching programs
  7. //!
  8. //! When you call [`Bpf::load_file`] or [`Bpf::load`], all the programs included
  9. //! in the object code are parsed and relocated. Programs are not loaded
  10. //! automatically though, since often you will need to do some application
  11. //! specific setup before you can actually load them.
  12. //!
  13. //! In order to load and attach a program, you need to retrieve it using [`Bpf::program_mut`],
  14. //! then call the `load()` and `attach()` methods, for example:
  15. //!
  16. //! ```no_run
  17. //! use aya::{Bpf, programs::KProbe};
  18. //! use std::convert::TryInto;
  19. //!
  20. //! let mut bpf = Bpf::load_file("ebpf_programs.o")?;
  21. //! // intercept_wakeups is the name of the program we want to load
  22. //! let program: &mut KProbe = bpf.program_mut("intercept_wakeups")?.try_into()?;
  23. //! program.load()?;
  24. //! // intercept_wakeups will be called every time try_to_wake_up() is called
  25. //! // inside the kernel
  26. //! program.attach("try_to_wake_up", 0, None)?;
  27. //! # Ok::<(), aya::BpfError>(())
  28. //! ```
  29. //!
  30. //! The signature of the `attach()` method varies depending on what kind of
  31. //! program you're trying to attach.
  32. //!
  33. //! [`Bpf::load_file`]: crate::Bpf::load_file
  34. //! [`Bpf::load`]: crate::Bpf::load
  35. //! [`Bpf::programs`]: crate::Bpf::programs
  36. //! [`Bpf::program`]: crate::Bpf::program
  37. //! [`Bpf::program_mut`]: crate::Bpf::program_mut
  38. //! [`maps`]: crate::maps
  39. mod cgroup_skb;
  40. mod kprobe;
  41. mod lirc_mode2;
  42. mod perf_attach;
  43. mod probe;
  44. mod sk_msg;
  45. mod sk_skb;
  46. mod sock_ops;
  47. mod socket_filter;
  48. pub mod tc;
  49. mod trace_point;
  50. mod uprobe;
  51. mod xdp;
  52. use libc::{close, dup, ENOSPC};
  53. use std::{cell::RefCell, cmp, convert::TryFrom, ffi::CStr, io, os::unix::io::RawFd, rc::Rc};
  54. use thiserror::Error;
  55. pub use cgroup_skb::{CgroupSkb, CgroupSkbAttachType};
  56. pub use kprobe::{KProbe, KProbeError};
  57. pub use lirc_mode2::LircMode2;
  58. use perf_attach::*;
  59. pub use probe::ProbeKind;
  60. pub use sk_msg::SkMsg;
  61. pub use sk_skb::{SkSkb, SkSkbKind};
  62. pub use sock_ops::SockOps;
  63. pub use socket_filter::{SocketFilter, SocketFilterError};
  64. pub use tc::{SchedClassifier, TcAttachType, TcError};
  65. pub use trace_point::{TracePoint, TracePointError};
  66. pub use uprobe::{UProbe, UProbeError};
  67. pub use xdp::{Xdp, XdpError, XdpFlags};
  68. use crate::{
  69. generated::{bpf_attach_type, bpf_prog_type},
  70. maps::MapError,
  71. obj::{self, Function},
  72. sys::{bpf_load_program, bpf_prog_detach},
  73. };
  74. /// Error type returned when working with programs.
  75. #[derive(Debug, Error)]
  76. pub enum ProgramError {
  77. /// The program could not be found in the object code.
  78. #[error("program `{name}` not found")]
  79. NotFound { name: String },
  80. /// The program is already loaded.
  81. #[error("the program is already loaded")]
  82. AlreadyLoaded,
  83. /// The program is not loaded.
  84. #[error("the program is not loaded")]
  85. NotLoaded,
  86. /// The program is already detached.
  87. #[error("the program was already detached")]
  88. AlreadyDetached,
  89. /// The program is not attached.
  90. #[error("the program is not attached")]
  91. NotAttached,
  92. /// Loading the program failed.
  93. #[error("the BPF_PROG_LOAD syscall failed. Verifier output: {verifier_log}")]
  94. LoadError {
  95. /// The [`io::Error`] returned by the `BPF_PROG_LOAD` syscall.
  96. #[source]
  97. io_error: io::Error,
  98. /// The error log produced by the kernel verifier.
  99. verifier_log: String,
  100. },
  101. /// A syscall failed.
  102. #[error("`{call}` failed")]
  103. SyscallError {
  104. /// The name of the syscall which failed.
  105. call: String,
  106. /// The [`io::Error`] returned by the syscall.
  107. #[source]
  108. io_error: io::Error,
  109. },
  110. /// The network interface does not exist.
  111. #[error("unknown network interface {name}")]
  112. UnknownInterface { name: String },
  113. /// The program is not of the expected type.
  114. #[error("unexpected program type")]
  115. UnexpectedProgramType,
  116. /// A map error occurred while loading or attaching a program.
  117. #[error(transparent)]
  118. MapError(#[from] MapError),
  119. /// An error occurred while working with a [`KProbe`].
  120. #[error(transparent)]
  121. KProbeError(#[from] KProbeError),
  122. /// An error occurred while working with an [`UProbe`].
  123. #[error(transparent)]
  124. UProbeError(#[from] UProbeError),
  125. /// An error occurred while working with a [`TracePoint`].
  126. #[error(transparent)]
  127. TracePointError(#[from] TracePointError),
  128. /// An error occurred while working with a [`SocketFilter`].
  129. #[error(transparent)]
  130. SocketFilterError(#[from] SocketFilterError),
  131. /// An error occurred while working with an [`Xdp`] program.
  132. #[error(transparent)]
  133. XdpError(#[from] XdpError),
  134. /// An error occurred while working with a TC program.
  135. #[error(transparent)]
  136. TcError(#[from] TcError),
  137. }
  138. pub trait ProgramFd {
  139. fn fd(&self) -> Option<RawFd>;
  140. }
  141. /// eBPF program type.
  142. #[derive(Debug)]
  143. pub enum Program {
  144. KProbe(KProbe),
  145. UProbe(UProbe),
  146. TracePoint(TracePoint),
  147. SocketFilter(SocketFilter),
  148. Xdp(Xdp),
  149. SkMsg(SkMsg),
  150. SkSkb(SkSkb),
  151. SockOps(SockOps),
  152. SchedClassifier(SchedClassifier),
  153. CgroupSkb(CgroupSkb),
  154. LircMode2(LircMode2),
  155. }
  156. impl Program {
  157. /// Loads the program in the kernel.
  158. ///
  159. /// # Errors
  160. ///
  161. /// If the load operation fails, the method returns
  162. /// [`ProgramError::LoadError`] and the error's `verifier_log` field
  163. /// contains the output from the kernel verifier.
  164. ///
  165. /// If the program is already loaded, [`ProgramError::AlreadyLoaded`] is
  166. /// returned.
  167. pub fn load(&mut self) -> Result<(), ProgramError> {
  168. load_program(self.prog_type(), self.data_mut())
  169. }
  170. /// Returns the low level program type.
  171. pub fn prog_type(&self) -> bpf_prog_type {
  172. use crate::generated::bpf_prog_type::*;
  173. match self {
  174. Program::KProbe(_) => BPF_PROG_TYPE_KPROBE,
  175. Program::UProbe(_) => BPF_PROG_TYPE_KPROBE,
  176. Program::TracePoint(_) => BPF_PROG_TYPE_TRACEPOINT,
  177. Program::SocketFilter(_) => BPF_PROG_TYPE_SOCKET_FILTER,
  178. Program::Xdp(_) => BPF_PROG_TYPE_XDP,
  179. Program::SkMsg(_) => BPF_PROG_TYPE_SK_MSG,
  180. Program::SkSkb(_) => BPF_PROG_TYPE_SK_SKB,
  181. Program::SockOps(_) => BPF_PROG_TYPE_SOCK_OPS,
  182. Program::SchedClassifier(_) => BPF_PROG_TYPE_SCHED_CLS,
  183. Program::CgroupSkb(_) => BPF_PROG_TYPE_CGROUP_SKB,
  184. Program::LircMode2(_) => BPF_PROG_TYPE_LIRC_MODE2,
  185. }
  186. }
  187. /// Returns the name of the program.
  188. pub fn name(&self) -> &str {
  189. &self.data().name
  190. }
  191. fn data(&self) -> &ProgramData {
  192. match self {
  193. Program::KProbe(p) => &p.data,
  194. Program::UProbe(p) => &p.data,
  195. Program::TracePoint(p) => &p.data,
  196. Program::SocketFilter(p) => &p.data,
  197. Program::Xdp(p) => &p.data,
  198. Program::SkMsg(p) => &p.data,
  199. Program::SkSkb(p) => &p.data,
  200. Program::SockOps(p) => &p.data,
  201. Program::SchedClassifier(p) => &p.data,
  202. Program::CgroupSkb(p) => &p.data,
  203. Program::LircMode2(p) => &p.data,
  204. }
  205. }
  206. fn data_mut(&mut self) -> &mut ProgramData {
  207. match self {
  208. Program::KProbe(p) => &mut p.data,
  209. Program::UProbe(p) => &mut p.data,
  210. Program::TracePoint(p) => &mut p.data,
  211. Program::SocketFilter(p) => &mut p.data,
  212. Program::Xdp(p) => &mut p.data,
  213. Program::SkMsg(p) => &mut p.data,
  214. Program::SkSkb(p) => &mut p.data,
  215. Program::SockOps(p) => &mut p.data,
  216. Program::SchedClassifier(p) => &mut p.data,
  217. Program::CgroupSkb(p) => &mut p.data,
  218. Program::LircMode2(p) => &mut p.data,
  219. }
  220. }
  221. }
  222. #[derive(Debug)]
  223. pub(crate) struct ProgramData {
  224. pub(crate) name: String,
  225. pub(crate) obj: obj::Program,
  226. pub(crate) fd: Option<RawFd>,
  227. pub(crate) links: Vec<Rc<RefCell<dyn Link>>>,
  228. }
  229. impl ProgramData {
  230. fn fd_or_err(&self) -> Result<RawFd, ProgramError> {
  231. self.fd.ok_or(ProgramError::NotLoaded)
  232. }
  233. pub fn link<T: Link + 'static>(&mut self, link: T) -> LinkRef {
  234. let link: Rc<RefCell<dyn Link>> = Rc::new(RefCell::new(link));
  235. self.links.push(Rc::clone(&link));
  236. LinkRef::new(link)
  237. }
  238. }
  239. const MIN_LOG_BUF_SIZE: usize = 1024 * 10;
  240. const MAX_LOG_BUF_SIZE: usize = (std::u32::MAX >> 8) as usize;
  241. pub(crate) struct VerifierLog {
  242. buf: Vec<u8>,
  243. }
  244. impl VerifierLog {
  245. fn new() -> VerifierLog {
  246. VerifierLog { buf: Vec::new() }
  247. }
  248. pub(crate) fn buf(&mut self) -> &mut Vec<u8> {
  249. &mut self.buf
  250. }
  251. fn grow(&mut self) {
  252. let len = cmp::max(
  253. MIN_LOG_BUF_SIZE,
  254. cmp::min(MAX_LOG_BUF_SIZE, self.buf.capacity() * 10),
  255. );
  256. self.buf.resize(len, 0);
  257. self.reset();
  258. }
  259. fn reset(&mut self) {
  260. if !self.buf.is_empty() {
  261. self.buf[0] = 0;
  262. }
  263. }
  264. fn truncate(&mut self) {
  265. if self.buf.is_empty() {
  266. return;
  267. }
  268. let pos = self
  269. .buf
  270. .iter()
  271. .position(|b| *b == 0)
  272. .unwrap_or(self.buf.len() - 1);
  273. self.buf[pos] = 0;
  274. self.buf.truncate(pos + 1);
  275. }
  276. pub fn as_c_str(&self) -> Option<&CStr> {
  277. if self.buf.is_empty() {
  278. None
  279. } else {
  280. Some(CStr::from_bytes_with_nul(&self.buf).unwrap())
  281. }
  282. }
  283. }
  284. fn load_program(prog_type: bpf_prog_type, data: &mut ProgramData) -> Result<(), ProgramError> {
  285. let ProgramData { obj, fd, .. } = data;
  286. if fd.is_some() {
  287. return Err(ProgramError::AlreadyLoaded);
  288. }
  289. let crate::obj::Program {
  290. function: Function { instructions, .. },
  291. license,
  292. kernel_version,
  293. ..
  294. } = obj;
  295. let mut log_buf = VerifierLog::new();
  296. let mut retries = 0;
  297. let mut ret;
  298. loop {
  299. ret = bpf_load_program(
  300. prog_type,
  301. instructions,
  302. license,
  303. (*kernel_version).into(),
  304. &mut log_buf,
  305. );
  306. match &ret {
  307. Ok(prog_fd) => {
  308. *fd = Some(*prog_fd as RawFd);
  309. return Ok(());
  310. }
  311. Err((_, io_error)) if retries == 0 || io_error.raw_os_error() == Some(ENOSPC) => {
  312. if retries == 10 {
  313. break;
  314. }
  315. retries += 1;
  316. log_buf.grow();
  317. }
  318. Err(_) => break,
  319. };
  320. }
  321. if let Err((_, io_error)) = ret {
  322. log_buf.truncate();
  323. return Err(ProgramError::LoadError {
  324. io_error,
  325. verifier_log: log_buf
  326. .as_c_str()
  327. .map(|s| s.to_string_lossy().to_string())
  328. .unwrap_or_else(|| "[none]".to_owned()),
  329. });
  330. }
  331. Ok(())
  332. }
  333. /// Detach an attached program.
  334. pub trait Link: std::fmt::Debug {
  335. fn detach(&mut self) -> Result<(), ProgramError>;
  336. }
  337. /// The return type of `program.attach(...)`.
  338. ///
  339. /// [`LinkRef`] implements the [`Link`] trait and can be used to detach a
  340. /// program.
  341. #[derive(Debug)]
  342. pub struct LinkRef {
  343. inner: Rc<RefCell<dyn Link>>,
  344. }
  345. impl LinkRef {
  346. fn new(link: Rc<RefCell<dyn Link>>) -> LinkRef {
  347. LinkRef { inner: link }
  348. }
  349. }
  350. impl Link for LinkRef {
  351. fn detach(&mut self) -> Result<(), ProgramError> {
  352. self.inner.borrow_mut().detach()
  353. }
  354. }
  355. #[derive(Debug)]
  356. pub(crate) struct FdLink {
  357. fd: Option<RawFd>,
  358. }
  359. impl Link for FdLink {
  360. fn detach(&mut self) -> Result<(), ProgramError> {
  361. if let Some(fd) = self.fd.take() {
  362. unsafe { close(fd) };
  363. Ok(())
  364. } else {
  365. Err(ProgramError::AlreadyDetached)
  366. }
  367. }
  368. }
  369. impl Drop for FdLink {
  370. fn drop(&mut self) {
  371. let _ = self.detach();
  372. }
  373. }
  374. #[derive(Debug)]
  375. struct ProgAttachLink {
  376. prog_fd: Option<RawFd>,
  377. target_fd: Option<RawFd>,
  378. attach_type: bpf_attach_type,
  379. }
  380. impl ProgAttachLink {
  381. pub(crate) fn new(
  382. prog_fd: RawFd,
  383. target_fd: RawFd,
  384. attach_type: bpf_attach_type,
  385. ) -> ProgAttachLink {
  386. ProgAttachLink {
  387. prog_fd: Some(prog_fd),
  388. target_fd: Some(unsafe { dup(target_fd) }),
  389. attach_type,
  390. }
  391. }
  392. }
  393. impl Link for ProgAttachLink {
  394. fn detach(&mut self) -> Result<(), ProgramError> {
  395. if let Some(prog_fd) = self.prog_fd.take() {
  396. let target_fd = self.target_fd.take().unwrap();
  397. let _ = bpf_prog_detach(prog_fd, target_fd, self.attach_type);
  398. unsafe { close(target_fd) };
  399. Ok(())
  400. } else {
  401. Err(ProgramError::AlreadyDetached)
  402. }
  403. }
  404. }
  405. impl Drop for ProgAttachLink {
  406. fn drop(&mut self) {
  407. let _ = self.detach();
  408. }
  409. }
  410. impl ProgramFd for Program {
  411. fn fd(&self) -> Option<RawFd> {
  412. self.data().fd
  413. }
  414. }
  415. macro_rules! impl_program_fd {
  416. ($($struct_name:ident),+ $(,)?) => {
  417. $(
  418. impl ProgramFd for $struct_name {
  419. fn fd(&self) -> Option<RawFd> {
  420. self.data.fd
  421. }
  422. }
  423. )+
  424. }
  425. }
  426. impl_program_fd!(
  427. KProbe,
  428. UProbe,
  429. TracePoint,
  430. SocketFilter,
  431. Xdp,
  432. SkMsg,
  433. SkSkb,
  434. SchedClassifier,
  435. CgroupSkb,
  436. LircMode2
  437. );
  438. macro_rules! impl_try_from_program {
  439. ($($ty:ident),+ $(,)?) => {
  440. $(
  441. impl<'a> TryFrom<&'a Program> for &'a $ty {
  442. type Error = ProgramError;
  443. fn try_from(program: &'a Program) -> Result<&'a $ty, ProgramError> {
  444. match program {
  445. Program::$ty(p) => Ok(p),
  446. _ => Err(ProgramError::UnexpectedProgramType),
  447. }
  448. }
  449. }
  450. impl<'a> TryFrom<&'a mut Program> for &'a mut $ty {
  451. type Error = ProgramError;
  452. fn try_from(program: &'a mut Program) -> Result<&'a mut $ty, ProgramError> {
  453. match program {
  454. Program::$ty(p) => Ok(p),
  455. _ => Err(ProgramError::UnexpectedProgramType),
  456. }
  457. }
  458. }
  459. )+
  460. }
  461. }
  462. impl_try_from_program!(
  463. KProbe,
  464. UProbe,
  465. TracePoint,
  466. SocketFilter,
  467. Xdp,
  468. SkMsg,
  469. SkSkb,
  470. SockOps,
  471. SchedClassifier,
  472. CgroupSkb,
  473. LircMode2
  474. );