123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535 |
- //! eBPF program types.
- //!
- //! eBPF programs are loaded inside the kernel and attached to one or more hook
- //! points. Whenever the hook points are reached, the programs are executed.
- //!
- //! # Loading and attaching programs
- //!
- //! When you call [`Bpf::load_file`] or [`Bpf::load`], all the programs included
- //! in the object code are parsed and relocated. Programs are not loaded
- //! automatically though, since often you will need to do some application
- //! specific setup before you can actually load them.
- //!
- //! In order to load and attach a program, you need to retrieve it using [`Bpf::program_mut`],
- //! then call the `load()` and `attach()` methods, for example:
- //!
- //! ```no_run
- //! use aya::{Bpf, programs::KProbe};
- //! use std::convert::TryInto;
- //!
- //! let mut bpf = Bpf::load_file("ebpf_programs.o")?;
- //! // intercept_wakeups is the name of the program we want to load
- //! let program: &mut KProbe = bpf.program_mut("intercept_wakeups")?.try_into()?;
- //! program.load()?;
- //! // intercept_wakeups will be called every time try_to_wake_up() is called
- //! // inside the kernel
- //! program.attach("try_to_wake_up", 0, None)?;
- //! # Ok::<(), aya::BpfError>(())
- //! ```
- //!
- //! The signature of the `attach()` method varies depending on what kind of
- //! program you're trying to attach.
- //!
- //! [`Bpf::load_file`]: crate::Bpf::load_file
- //! [`Bpf::load`]: crate::Bpf::load
- //! [`Bpf::programs`]: crate::Bpf::programs
- //! [`Bpf::program`]: crate::Bpf::program
- //! [`Bpf::program_mut`]: crate::Bpf::program_mut
- //! [`maps`]: crate::maps
- mod cgroup_skb;
- mod kprobe;
- mod lirc_mode2;
- mod perf_attach;
- mod probe;
- mod sk_msg;
- mod sk_skb;
- mod sock_ops;
- mod socket_filter;
- pub mod tc;
- mod trace_point;
- mod uprobe;
- mod xdp;
- use libc::{close, dup, ENOSPC};
- use std::{cell::RefCell, cmp, convert::TryFrom, ffi::CStr, io, os::unix::io::RawFd, rc::Rc};
- use thiserror::Error;
- pub use cgroup_skb::{CgroupSkb, CgroupSkbAttachType};
- pub use kprobe::{KProbe, KProbeError};
- pub use lirc_mode2::LircMode2;
- use perf_attach::*;
- pub use probe::ProbeKind;
- pub use sk_msg::SkMsg;
- pub use sk_skb::{SkSkb, SkSkbKind};
- pub use sock_ops::SockOps;
- pub use socket_filter::{SocketFilter, SocketFilterError};
- pub use tc::{SchedClassifier, TcAttachType, TcError};
- pub use trace_point::{TracePoint, TracePointError};
- pub use uprobe::{UProbe, UProbeError};
- pub use xdp::{Xdp, XdpError, XdpFlags};
- use crate::{
- generated::{bpf_attach_type, bpf_prog_type},
- maps::MapError,
- obj::{self, Function},
- sys::{bpf_load_program, bpf_prog_detach},
- };
- /// Error type returned when working with programs.
- #[derive(Debug, Error)]
- pub enum ProgramError {
- /// The program could not be found in the object code.
- #[error("program `{name}` not found")]
- NotFound { name: String },
- /// The program is already loaded.
- #[error("the program is already loaded")]
- AlreadyLoaded,
- /// The program is not loaded.
- #[error("the program is not loaded")]
- NotLoaded,
- /// The program is already detached.
- #[error("the program was already detached")]
- AlreadyDetached,
- /// The program is not attached.
- #[error("the program is not attached")]
- NotAttached,
- /// Loading the program failed.
- #[error("the BPF_PROG_LOAD syscall failed. Verifier output: {verifier_log}")]
- LoadError {
- /// The [`io::Error`] returned by the `BPF_PROG_LOAD` syscall.
- #[source]
- io_error: io::Error,
- /// The error log produced by the kernel verifier.
- verifier_log: String,
- },
- /// A syscall failed.
- #[error("`{call}` failed")]
- SyscallError {
- /// The name of the syscall which failed.
- call: String,
- /// The [`io::Error`] returned by the syscall.
- #[source]
- io_error: io::Error,
- },
- /// The network interface does not exist.
- #[error("unknown network interface {name}")]
- UnknownInterface { name: String },
- /// The program is not of the expected type.
- #[error("unexpected program type")]
- UnexpectedProgramType,
- /// A map error occurred while loading or attaching a program.
- #[error(transparent)]
- MapError(#[from] MapError),
- /// An error occurred while working with a [`KProbe`].
- #[error(transparent)]
- KProbeError(#[from] KProbeError),
- /// An error occurred while working with an [`UProbe`].
- #[error(transparent)]
- UProbeError(#[from] UProbeError),
- /// An error occurred while working with a [`TracePoint`].
- #[error(transparent)]
- TracePointError(#[from] TracePointError),
- /// An error occurred while working with a [`SocketFilter`].
- #[error(transparent)]
- SocketFilterError(#[from] SocketFilterError),
- /// An error occurred while working with an [`Xdp`] program.
- #[error(transparent)]
- XdpError(#[from] XdpError),
- /// An error occurred while working with a TC program.
- #[error(transparent)]
- TcError(#[from] TcError),
- }
- pub trait ProgramFd {
- fn fd(&self) -> Option<RawFd>;
- }
- /// eBPF program type.
- #[derive(Debug)]
- pub enum Program {
- KProbe(KProbe),
- UProbe(UProbe),
- TracePoint(TracePoint),
- SocketFilter(SocketFilter),
- Xdp(Xdp),
- SkMsg(SkMsg),
- SkSkb(SkSkb),
- SockOps(SockOps),
- SchedClassifier(SchedClassifier),
- CgroupSkb(CgroupSkb),
- LircMode2(LircMode2),
- }
- impl Program {
- /// Loads the program in the kernel.
- ///
- /// # Errors
- ///
- /// If the load operation fails, the method returns
- /// [`ProgramError::LoadError`] and the error's `verifier_log` field
- /// contains the output from the kernel verifier.
- ///
- /// If the program is already loaded, [`ProgramError::AlreadyLoaded`] is
- /// returned.
- pub fn load(&mut self) -> Result<(), ProgramError> {
- load_program(self.prog_type(), self.data_mut())
- }
- /// Returns the low level program type.
- pub fn prog_type(&self) -> bpf_prog_type {
- use crate::generated::bpf_prog_type::*;
- match self {
- Program::KProbe(_) => BPF_PROG_TYPE_KPROBE,
- Program::UProbe(_) => BPF_PROG_TYPE_KPROBE,
- Program::TracePoint(_) => BPF_PROG_TYPE_TRACEPOINT,
- Program::SocketFilter(_) => BPF_PROG_TYPE_SOCKET_FILTER,
- Program::Xdp(_) => BPF_PROG_TYPE_XDP,
- Program::SkMsg(_) => BPF_PROG_TYPE_SK_MSG,
- Program::SkSkb(_) => BPF_PROG_TYPE_SK_SKB,
- Program::SockOps(_) => BPF_PROG_TYPE_SOCK_OPS,
- Program::SchedClassifier(_) => BPF_PROG_TYPE_SCHED_CLS,
- Program::CgroupSkb(_) => BPF_PROG_TYPE_CGROUP_SKB,
- Program::LircMode2(_) => BPF_PROG_TYPE_LIRC_MODE2,
- }
- }
- /// Returns the name of the program.
- pub fn name(&self) -> &str {
- &self.data().name
- }
- fn data(&self) -> &ProgramData {
- match self {
- Program::KProbe(p) => &p.data,
- Program::UProbe(p) => &p.data,
- Program::TracePoint(p) => &p.data,
- Program::SocketFilter(p) => &p.data,
- Program::Xdp(p) => &p.data,
- Program::SkMsg(p) => &p.data,
- Program::SkSkb(p) => &p.data,
- Program::SockOps(p) => &p.data,
- Program::SchedClassifier(p) => &p.data,
- Program::CgroupSkb(p) => &p.data,
- Program::LircMode2(p) => &p.data,
- }
- }
- fn data_mut(&mut self) -> &mut ProgramData {
- match self {
- Program::KProbe(p) => &mut p.data,
- Program::UProbe(p) => &mut p.data,
- Program::TracePoint(p) => &mut p.data,
- Program::SocketFilter(p) => &mut p.data,
- Program::Xdp(p) => &mut p.data,
- Program::SkMsg(p) => &mut p.data,
- Program::SkSkb(p) => &mut p.data,
- Program::SockOps(p) => &mut p.data,
- Program::SchedClassifier(p) => &mut p.data,
- Program::CgroupSkb(p) => &mut p.data,
- Program::LircMode2(p) => &mut p.data,
- }
- }
- }
- #[derive(Debug)]
- pub(crate) struct ProgramData {
- pub(crate) name: String,
- pub(crate) obj: obj::Program,
- pub(crate) fd: Option<RawFd>,
- pub(crate) links: Vec<Rc<RefCell<dyn Link>>>,
- }
- impl ProgramData {
- fn fd_or_err(&self) -> Result<RawFd, ProgramError> {
- self.fd.ok_or(ProgramError::NotLoaded)
- }
- pub fn link<T: Link + 'static>(&mut self, link: T) -> LinkRef {
- let link: Rc<RefCell<dyn Link>> = Rc::new(RefCell::new(link));
- self.links.push(Rc::clone(&link));
- LinkRef::new(link)
- }
- }
- const MIN_LOG_BUF_SIZE: usize = 1024 * 10;
- const MAX_LOG_BUF_SIZE: usize = (std::u32::MAX >> 8) as usize;
- pub(crate) struct VerifierLog {
- buf: Vec<u8>,
- }
- impl VerifierLog {
- fn new() -> VerifierLog {
- VerifierLog { buf: Vec::new() }
- }
- pub(crate) fn buf(&mut self) -> &mut Vec<u8> {
- &mut self.buf
- }
- fn grow(&mut self) {
- let len = cmp::max(
- MIN_LOG_BUF_SIZE,
- cmp::min(MAX_LOG_BUF_SIZE, self.buf.capacity() * 10),
- );
- self.buf.resize(len, 0);
- self.reset();
- }
- fn reset(&mut self) {
- if !self.buf.is_empty() {
- self.buf[0] = 0;
- }
- }
- fn truncate(&mut self) {
- if self.buf.is_empty() {
- return;
- }
- let pos = self
- .buf
- .iter()
- .position(|b| *b == 0)
- .unwrap_or(self.buf.len() - 1);
- self.buf[pos] = 0;
- self.buf.truncate(pos + 1);
- }
- pub fn as_c_str(&self) -> Option<&CStr> {
- if self.buf.is_empty() {
- None
- } else {
- Some(CStr::from_bytes_with_nul(&self.buf).unwrap())
- }
- }
- }
- fn load_program(prog_type: bpf_prog_type, data: &mut ProgramData) -> Result<(), ProgramError> {
- let ProgramData { obj, fd, .. } = data;
- if fd.is_some() {
- return Err(ProgramError::AlreadyLoaded);
- }
- let crate::obj::Program {
- function: Function { instructions, .. },
- license,
- kernel_version,
- ..
- } = obj;
- let mut log_buf = VerifierLog::new();
- let mut retries = 0;
- let mut ret;
- loop {
- ret = bpf_load_program(
- prog_type,
- instructions,
- license,
- (*kernel_version).into(),
- &mut log_buf,
- );
- match &ret {
- Ok(prog_fd) => {
- *fd = Some(*prog_fd as RawFd);
- return Ok(());
- }
- Err((_, io_error)) if retries == 0 || io_error.raw_os_error() == Some(ENOSPC) => {
- if retries == 10 {
- break;
- }
- retries += 1;
- log_buf.grow();
- }
- Err(_) => break,
- };
- }
- if let Err((_, io_error)) = ret {
- log_buf.truncate();
- return Err(ProgramError::LoadError {
- io_error,
- verifier_log: log_buf
- .as_c_str()
- .map(|s| s.to_string_lossy().to_string())
- .unwrap_or_else(|| "[none]".to_owned()),
- });
- }
- Ok(())
- }
- /// Detach an attached program.
- pub trait Link: std::fmt::Debug {
- fn detach(&mut self) -> Result<(), ProgramError>;
- }
- /// The return type of `program.attach(...)`.
- ///
- /// [`LinkRef`] implements the [`Link`] trait and can be used to detach a
- /// program.
- #[derive(Debug)]
- pub struct LinkRef {
- inner: Rc<RefCell<dyn Link>>,
- }
- impl LinkRef {
- fn new(link: Rc<RefCell<dyn Link>>) -> LinkRef {
- LinkRef { inner: link }
- }
- }
- impl Link for LinkRef {
- fn detach(&mut self) -> Result<(), ProgramError> {
- self.inner.borrow_mut().detach()
- }
- }
- #[derive(Debug)]
- pub(crate) struct FdLink {
- fd: Option<RawFd>,
- }
- impl Link for FdLink {
- fn detach(&mut self) -> Result<(), ProgramError> {
- if let Some(fd) = self.fd.take() {
- unsafe { close(fd) };
- Ok(())
- } else {
- Err(ProgramError::AlreadyDetached)
- }
- }
- }
- impl Drop for FdLink {
- fn drop(&mut self) {
- let _ = self.detach();
- }
- }
- #[derive(Debug)]
- struct ProgAttachLink {
- prog_fd: Option<RawFd>,
- target_fd: Option<RawFd>,
- attach_type: bpf_attach_type,
- }
- impl ProgAttachLink {
- pub(crate) fn new(
- prog_fd: RawFd,
- target_fd: RawFd,
- attach_type: bpf_attach_type,
- ) -> ProgAttachLink {
- ProgAttachLink {
- prog_fd: Some(prog_fd),
- target_fd: Some(unsafe { dup(target_fd) }),
- attach_type,
- }
- }
- }
- impl Link for ProgAttachLink {
- fn detach(&mut self) -> Result<(), ProgramError> {
- if let Some(prog_fd) = self.prog_fd.take() {
- let target_fd = self.target_fd.take().unwrap();
- let _ = bpf_prog_detach(prog_fd, target_fd, self.attach_type);
- unsafe { close(target_fd) };
- Ok(())
- } else {
- Err(ProgramError::AlreadyDetached)
- }
- }
- }
- impl Drop for ProgAttachLink {
- fn drop(&mut self) {
- let _ = self.detach();
- }
- }
- impl ProgramFd for Program {
- fn fd(&self) -> Option<RawFd> {
- self.data().fd
- }
- }
- macro_rules! impl_program_fd {
- ($($struct_name:ident),+ $(,)?) => {
- $(
- impl ProgramFd for $struct_name {
- fn fd(&self) -> Option<RawFd> {
- self.data.fd
- }
- }
- )+
- }
- }
- impl_program_fd!(
- KProbe,
- UProbe,
- TracePoint,
- SocketFilter,
- Xdp,
- SkMsg,
- SkSkb,
- SchedClassifier,
- CgroupSkb,
- LircMode2
- );
- macro_rules! impl_try_from_program {
- ($($ty:ident),+ $(,)?) => {
- $(
- impl<'a> TryFrom<&'a Program> for &'a $ty {
- type Error = ProgramError;
- fn try_from(program: &'a Program) -> Result<&'a $ty, ProgramError> {
- match program {
- Program::$ty(p) => Ok(p),
- _ => Err(ProgramError::UnexpectedProgramType),
- }
- }
- }
- impl<'a> TryFrom<&'a mut Program> for &'a mut $ty {
- type Error = ProgramError;
- fn try_from(program: &'a mut Program) -> Result<&'a mut $ty, ProgramError> {
- match program {
- Program::$ty(p) => Ok(p),
- _ => Err(ProgramError::UnexpectedProgramType),
- }
- }
- }
- )+
- }
- }
- impl_try_from_program!(
- KProbe,
- UProbe,
- TracePoint,
- SocketFilter,
- Xdp,
- SkMsg,
- SkSkb,
- SockOps,
- SchedClassifier,
- CgroupSkb,
- LircMode2
- );
|