build.rs 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. use std::{
  2. env,
  3. ffi::OsString,
  4. fs,
  5. path::PathBuf,
  6. process::{Child, Command, Output, Stdio},
  7. };
  8. use anyhow::{Context as _, Ok, Result, anyhow};
  9. use aya_build::cargo_metadata::{Metadata, MetadataCommand, Package, Target, TargetKind};
  10. use xtask::{AYA_BUILD_INTEGRATION_BPF, LIBBPF_DIR, exec, install_libbpf_headers};
  11. /// This file, along with the xtask crate, allows analysis tools such as `cargo check`, `cargo
  12. /// clippy`, and even `cargo build` to work as users expect. Prior to this file's existence, this
  13. /// crate's undeclared dependency on artifacts from `integration-ebpf` would cause build (and `cargo check`,
  14. /// and `cargo clippy`) failures until the user ran certain other commands in the workspace. Conversely,
  15. /// those same tools (e.g. cargo test --no-run) would produce stale results if run naively because
  16. /// they'd make use of artifacts from a previous build of `integration-ebpf`.
  17. ///
  18. /// Note that this solution is imperfect: in particular it has to balance correctness with
  19. /// performance; an environment variable is used to replace true builds of `integration-ebpf` with
  20. /// stubs to preserve the property that code generation and linking (in `integration-ebpf`) do not
  21. /// occur on metadata-only actions such as `cargo check` or `cargo clippy` of this crate. This means
  22. /// that naively attempting to `cargo test --no-run` this crate will produce binaries that fail at
  23. /// runtime because the stubs are inadequate for actually running the tests.
  24. fn main() -> Result<()> {
  25. println!("cargo:rerun-if-env-changed={AYA_BUILD_INTEGRATION_BPF}");
  26. // TODO(https://github.com/rust-lang/cargo/issues/4001): generalize this and move it to
  27. // aya-build if we can determine that we're in a check build.
  28. let build_integration_bpf = env::var_os(AYA_BUILD_INTEGRATION_BPF)
  29. .map(|build_integration_bpf| {
  30. let build_integration_bpf = std::str::from_utf8(
  31. build_integration_bpf.as_encoded_bytes(),
  32. )
  33. .with_context(|| format!("{AYA_BUILD_INTEGRATION_BPF}={build_integration_bpf:?}"))?;
  34. let build_integration_bpf = build_integration_bpf
  35. .parse()
  36. .with_context(|| format!("{AYA_BUILD_INTEGRATION_BPF}={build_integration_bpf}"))?;
  37. Ok(build_integration_bpf)
  38. })
  39. .transpose()?
  40. .unwrap_or_default();
  41. let Metadata {
  42. packages,
  43. workspace_root,
  44. ..
  45. } = MetadataCommand::new()
  46. .no_deps()
  47. .exec()
  48. .context("MetadataCommand::exec")?;
  49. let integration_ebpf_package = packages
  50. .into_iter()
  51. .find(|Package { name, .. }| name == "integration-ebpf")
  52. .ok_or_else(|| anyhow!("integration-ebpf package not found"))?;
  53. let manifest_dir =
  54. env::var_os("CARGO_MANIFEST_DIR").ok_or(anyhow!("CARGO_MANIFEST_DIR not set"))?;
  55. let manifest_dir = PathBuf::from(manifest_dir);
  56. let out_dir = env::var_os("OUT_DIR").ok_or(anyhow!("OUT_DIR not set"))?;
  57. let out_dir = PathBuf::from(out_dir);
  58. const C_BPF: &[(&str, bool)] = &[
  59. ("ext.bpf.c", false),
  60. ("iter.bpf.c", true),
  61. ("main.bpf.c", false),
  62. ("multimap-btf.bpf.c", false),
  63. ("reloc.bpf.c", true),
  64. ("text_64_64_reloc.c", false),
  65. ("variables_reloc.bpf.c", false),
  66. ];
  67. if build_integration_bpf {
  68. let endian = env::var_os("CARGO_CFG_TARGET_ENDIAN")
  69. .ok_or(anyhow!("CARGO_CFG_TARGET_ENDIAN not set"))?;
  70. let target = if endian == "big" {
  71. "bpfeb"
  72. } else if endian == "little" {
  73. "bpfel"
  74. } else {
  75. return Err(anyhow!("unsupported endian={endian:?}"));
  76. };
  77. let libbpf_dir = workspace_root.join(LIBBPF_DIR);
  78. println!("cargo:rerun-if-changed={libbpf_dir}");
  79. let libbpf_headers_dir = out_dir.join("libbpf_headers");
  80. install_libbpf_headers(&libbpf_dir, &libbpf_headers_dir)?;
  81. let bpf_dir = manifest_dir.join("bpf");
  82. let mut target_arch = OsString::new();
  83. target_arch.push("-D__TARGET_ARCH_");
  84. let arch =
  85. env::var_os("CARGO_CFG_TARGET_ARCH").ok_or(anyhow!("CARGO_CFG_TARGET_ARCH not set"))?;
  86. if arch == "x86_64" {
  87. target_arch.push("x86");
  88. } else if arch == "aarch64" {
  89. target_arch.push("arm64");
  90. } else {
  91. target_arch.push(&arch);
  92. };
  93. // NB: libbpf's documentation suggests that vmlinux.h be generated by running `bpftool btf
  94. // dump file /sys/kernel/btf/vmlinux format c`; this allows CO-RE to work.
  95. //
  96. // However in our tests we do not make use of kernel data structures, and so any vmlinux.h
  97. // which defines the constants we need (e.g. `__u8`, `__u64`, `BPF_MAP_TYPE_ARRAY`,
  98. // `BPF_ANY`, `XDP_PASS`, `XDP_DROP`, etc.) will suffice. Since we already have a libbpf
  99. // submodule which happens to include such a file, we use it.
  100. let libbpf_vmlinux_dir = libbpf_dir.join(".github/actions/build-selftests");
  101. let clang = || {
  102. let mut cmd = Command::new("clang");
  103. cmd.arg("-nostdlibinc")
  104. .arg("-I")
  105. .arg(&libbpf_headers_dir)
  106. .arg("-I")
  107. .arg(&libbpf_vmlinux_dir)
  108. .args(["-g", "-O2", "-target", target, "-c"])
  109. .arg(&target_arch);
  110. cmd
  111. };
  112. for (src, build_btf) in C_BPF {
  113. let dst = out_dir.join(src).with_extension("o");
  114. let src = bpf_dir.join(src);
  115. {
  116. let src = src.to_str().with_context(|| format!("{src:?}"))?;
  117. println!("cargo:rerun-if-changed={src}");
  118. }
  119. exec(clang().arg(&src).arg("-o").arg(&dst))?;
  120. if *build_btf {
  121. let mut cmd = clang();
  122. let mut child = cmd
  123. .arg("-DTARGET")
  124. .arg(&src)
  125. .args(["-o", "-"])
  126. .stdout(Stdio::piped())
  127. .spawn()
  128. .with_context(|| format!("failed to spawn {cmd:?}"))?;
  129. let Child { stdout, .. } = &mut child;
  130. let stdout = stdout.take().expect("stdout");
  131. let dst = dst.with_extension("target.o");
  132. let mut output = OsString::new();
  133. output.push(".BTF=");
  134. output.push(dst);
  135. exec(
  136. // NB: objcopy doesn't support reading from stdin, so we have to use llvm-objcopy.
  137. Command::new(env::var_os("LLVM_OBJCOPY").unwrap_or("llvm-objcopy".into()))
  138. .arg("--dump-section")
  139. .arg(output)
  140. .arg("-")
  141. .stdin(stdout),
  142. )?;
  143. let output = child
  144. .wait_with_output()
  145. .with_context(|| format!("failed to wait for {cmd:?}"))?;
  146. let Output { status, .. } = &output;
  147. if !status.success() {
  148. return Err(anyhow!("{cmd:?} failed: {status:?}"));
  149. }
  150. }
  151. }
  152. aya_build::build_ebpf([integration_ebpf_package], aya_build::Toolchain::default())?;
  153. } else {
  154. for (src, build_btf) in C_BPF {
  155. let dst = out_dir.join(src).with_extension("o");
  156. fs::write(&dst, []).with_context(|| format!("failed to create {dst:?}"))?;
  157. if *build_btf {
  158. let dst = dst.with_extension("target.o");
  159. fs::write(&dst, []).with_context(|| format!("failed to create {dst:?}"))?;
  160. }
  161. }
  162. let Package { targets, .. } = integration_ebpf_package;
  163. for Target { name, kind, .. } in targets {
  164. if *kind != [TargetKind::Bin] {
  165. continue;
  166. }
  167. let dst = out_dir.join(name);
  168. fs::write(&dst, []).with_context(|| format!("failed to create {dst:?}"))?;
  169. }
  170. }
  171. Ok(())
  172. }