Няма описание

Tamir Duberstein de7972483b aya-log-ebpf: avoid requiring Copy преди 1 година
.cargo 455cc95e8f integration-tests: run on macos to get nested virtualization преди 2 години
.github 4e2f8322cc Build tests with all features преди 1 година
.vim dc31e11691 Re-organize into a single workspace преди 2 години
.vscode dc31e11691 Re-organize into a single workspace преди 2 години
assets 2b98259be7 readme: Add crabby, sync with aya/README.md преди 2 години
aya 3a9a54fd9b Merge pull request #602 from marysaka/fix/btf-reloc-all-functions преди 1 година
aya-bpf-macros 1fa1c142f4 docs(macros): add rust docs for cgroup_sock_addr macro (#566) преди 1 година
aya-log 84e5e2894f aya-log: Unify IP format hints into one, repsesent it by `:i` token преди 1 година
aya-log-common de7972483b aya-log-ebpf: avoid requiring Copy преди 1 година
aya-log-ebpf-macros de7972483b aya-log-ebpf: avoid requiring Copy преди 1 година
aya-log-parser 84e5e2894f aya-log: Unify IP format hints into one, repsesent it by `:i` token преди 1 година
aya-obj 85ad0197e0 Merge pull request #563 from marysaka/fix/reloc-less-strict преди 1 година
aya-tool ee0a3c7924 build(deps): update bindgen requirement from 0.64 to 0.65 преди 1 година
bpf 0bc886f163 [codegen] Update libbpf to f7eb43b90f4c8882edf6354f8585094f8f3aade0Update libbpf to f7eb43b90f4c8882edf6354f8585094f8f3aade0 преди 1 година
test de7972483b aya-log-ebpf: avoid requiring Copy преди 1 година
xtask a06a5ae07e Merge pull request #598 from nak3/add-user_regs_strct преди 1 година
.gitignore ac07608b79 Support using handle in tc programs преди 2 години
CODE_OF_CONDUCT.md e752ffb3be Add a Code of Conduct преди 2 години
CONTRIBUTING.md d4a399fb0c Update CONTRIBUTING.md to link to the test/README.md преди 2 години
Cargo.toml ed9c2a1780 integration-tests: Build eBPF programs always with release profile преди 1 година
LICENSE-APACHE 01e9f81043 Add license files преди 4 години
LICENSE-MIT 01e9f81043 Add license files преди 4 години
README.md 4ddbc1cacb Fix Aya build badge преди 2 години
netlify.toml 7d19bde66b Unpin Rust nightly преди 2 години
release.toml dfb03382f6 release.toml: fix pre/post release templates преди 2 години
rustfmt.toml d6f299065d Add rustfmt.toml преди 4 години

README.md

Aya

Crates.io License Build status Book

API Documentation

Unreleased Documentation Documentaiton

Community

Discord Awesome

Join the conversation on Discord to discuss anything related to Aya, or discover and contribute to a list of Awesome Aya projects.

Overview

eBPF is a technology that allows running user-supplied programs inside the Linux kernel. For more info see https://ebpf.io/what-is-ebpf.

Aya is an eBPF library built with a focus on operability and developer experience. It does not rely on libbpf nor bcc - it's built from the ground up purely in Rust, using only the libc crate to execute syscalls. With BTF support and when linked with musl, it offers a true compile once, run everywhere solution, where a single self-contained binary can be deployed on many linux distributions and kernel versions.

Some of the major features provided include:

  • Support for the BPF Type Format (BTF), which is transparently enabled when supported by the target kernel. This allows eBPF programs compiled against one kernel version to run on different kernel versions without the need to recompile.
  • Support for function call relocation and global data maps, which allows eBPF programs to make function calls and use global variables and initializers.
  • Async support with both tokio and async-std.
  • Easy to deploy and fast to build: aya doesn't require a kernel build or compiled headers, and not even a C toolchain; a release build completes in a matter of seconds.

Example

Aya supports a large chunk of the eBPF API. The following example shows how to use a BPF_PROG_TYPE_CGROUP_SKB program with aya:

use std::fs::File;
use aya::Bpf;
use aya::programs::{CgroupSkb, CgroupSkbAttachType};

// load the BPF code
let mut bpf = Bpf::load_file("bpf.o")?;

// get the `ingress_filter` program compiled into `bpf.o`.
let ingress: &mut CgroupSkb = bpf.program_mut("ingress_filter")?.try_into()?;

// load the program into the kernel
ingress.load()?;

// attach the program to the root cgroup. `ingress_filter` will be called for all
// incoming packets.
let cgroup = File::open("/sys/fs/cgroup/unified")?;
ingress.attach(cgroup, CgroupSkbAttachType::Ingress)?;

Contributing

Please see the contributing guide.

License

Aya is distributed under the terms of either the MIT license or the Apache License, at your option.

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in this crate by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.