bpf.rs 43 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163
  1. use std::{
  2. borrow::Cow,
  3. collections::{HashMap, HashSet},
  4. fs, io,
  5. os::fd::{AsFd as _, AsRawFd as _},
  6. path::{Path, PathBuf},
  7. sync::{Arc, LazyLock},
  8. };
  9. use aya_obj::{
  10. btf::{Btf, BtfError, BtfFeatures, BtfRelocationError},
  11. generated::{
  12. bpf_map_type::{self, *},
  13. BPF_F_SLEEPABLE, BPF_F_XDP_HAS_FRAGS,
  14. },
  15. relocation::EbpfRelocationError,
  16. EbpfSectionKind, Features, Object, ParseError, ProgramSection,
  17. };
  18. use log::{debug, warn};
  19. use thiserror::Error;
  20. use crate::{
  21. maps::{Map, MapData, MapError},
  22. programs::{
  23. BtfTracePoint, CgroupDevice, CgroupSkb, CgroupSkbAttachType, CgroupSock, CgroupSockAddr,
  24. CgroupSockopt, CgroupSysctl, Extension, FEntry, FExit, Iter, KProbe, LircMode2, Lsm,
  25. PerfEvent, ProbeKind, Program, ProgramData, ProgramError, RawTracePoint, SchedClassifier,
  26. SkLookup, SkMsg, SkSkb, SkSkbKind, SockOps, SocketFilter, TracePoint, UProbe, Xdp,
  27. },
  28. sys::{
  29. bpf_load_btf, is_bpf_cookie_supported, is_bpf_global_data_supported,
  30. is_btf_datasec_supported, is_btf_decl_tag_supported, is_btf_enum64_supported,
  31. is_btf_float_supported, is_btf_func_global_supported, is_btf_func_supported,
  32. is_btf_supported, is_btf_type_tag_supported, is_info_gpl_compatible_supported,
  33. is_info_map_ids_supported, is_perf_link_supported, is_probe_read_kernel_supported,
  34. is_prog_id_supported, is_prog_name_supported, retry_with_verifier_logs,
  35. },
  36. util::{bytes_of, bytes_of_slice, nr_cpus, page_size},
  37. };
  38. /// Marker trait for types that can safely be converted to and from byte slices.
  39. pub unsafe trait Pod: Copy + 'static {}
  40. macro_rules! unsafe_impl_pod {
  41. ($($struct_name:ident),+ $(,)?) => {
  42. $(
  43. unsafe impl Pod for $struct_name { }
  44. )+
  45. }
  46. }
  47. unsafe_impl_pod!(i8, u8, i16, u16, i32, u32, i64, u64, u128, i128);
  48. // It only makes sense that an array of POD types is itself POD
  49. unsafe impl<T: Pod, const N: usize> Pod for [T; N] {}
  50. pub use aya_obj::maps::{bpf_map_def, PinningType};
  51. pub(crate) static FEATURES: LazyLock<Features> = LazyLock::new(detect_features);
  52. fn detect_features() -> Features {
  53. let btf = if is_btf_supported() {
  54. Some(BtfFeatures::new(
  55. is_btf_func_supported(),
  56. is_btf_func_global_supported(),
  57. is_btf_datasec_supported(),
  58. is_btf_float_supported(),
  59. is_btf_decl_tag_supported(),
  60. is_btf_type_tag_supported(),
  61. is_btf_enum64_supported(),
  62. ))
  63. } else {
  64. None
  65. };
  66. let f = Features::new(
  67. is_prog_name_supported(),
  68. is_probe_read_kernel_supported(),
  69. is_perf_link_supported(),
  70. is_bpf_global_data_supported(),
  71. is_bpf_cookie_supported(),
  72. is_prog_id_supported(BPF_MAP_TYPE_CPUMAP),
  73. is_prog_id_supported(BPF_MAP_TYPE_DEVMAP),
  74. is_info_map_ids_supported(),
  75. is_info_gpl_compatible_supported(),
  76. btf,
  77. );
  78. debug!("BPF Feature Detection: {:#?}", f);
  79. f
  80. }
  81. /// Returns a reference to the detected BPF features.
  82. pub fn features() -> &'static Features {
  83. &FEATURES
  84. }
  85. /// Builder style API for advanced loading of eBPF programs.
  86. ///
  87. /// Loading eBPF code involves a few steps, including loading maps and applying
  88. /// relocations. You can use `EbpfLoader` to customize some of the loading
  89. /// options.
  90. ///
  91. /// # Examples
  92. ///
  93. /// ```no_run
  94. /// use aya::{EbpfLoader, Btf};
  95. /// use std::fs;
  96. ///
  97. /// let bpf = EbpfLoader::new()
  98. /// // load the BTF data from /sys/kernel/btf/vmlinux
  99. /// .btf(Btf::from_sys_fs().ok().as_ref())
  100. /// // load pinned maps from /sys/fs/bpf/my-program
  101. /// .map_pin_path("/sys/fs/bpf/my-program")
  102. /// // finally load the code
  103. /// .load_file("file.o")?;
  104. /// # Ok::<(), aya::EbpfError>(())
  105. /// ```
  106. #[derive(Debug)]
  107. pub struct EbpfLoader<'a> {
  108. btf: Option<Cow<'a, Btf>>,
  109. map_pin_path: Option<PathBuf>,
  110. globals: HashMap<&'a str, (&'a [u8], bool)>,
  111. max_entries: HashMap<&'a str, u32>,
  112. extensions: HashSet<&'a str>,
  113. verifier_log_level: VerifierLogLevel,
  114. allow_unsupported_maps: bool,
  115. }
  116. /// Builder style API for advanced loading of eBPF programs.
  117. #[deprecated(since = "0.13.0", note = "use `EbpfLoader` instead")]
  118. pub type BpfLoader<'a> = EbpfLoader<'a>;
  119. bitflags::bitflags! {
  120. /// Used to set the verifier log level flags in [EbpfLoader](EbpfLoader::verifier_log_level()).
  121. #[derive(Clone, Copy, Debug)]
  122. pub struct VerifierLogLevel: u32 {
  123. /// Sets no verifier logging.
  124. const DISABLE = 0;
  125. /// Enables debug verifier logging.
  126. const DEBUG = 1;
  127. /// Enables verbose verifier logging.
  128. const VERBOSE = 2 | Self::DEBUG.bits();
  129. /// Enables verifier stats.
  130. const STATS = 4;
  131. }
  132. }
  133. impl Default for VerifierLogLevel {
  134. fn default() -> Self {
  135. Self::DEBUG | Self::STATS
  136. }
  137. }
  138. impl<'a> EbpfLoader<'a> {
  139. /// Creates a new loader instance.
  140. pub fn new() -> Self {
  141. Self {
  142. btf: Btf::from_sys_fs().ok().map(Cow::Owned),
  143. map_pin_path: None,
  144. globals: HashMap::new(),
  145. max_entries: HashMap::new(),
  146. extensions: HashSet::new(),
  147. verifier_log_level: VerifierLogLevel::default(),
  148. allow_unsupported_maps: false,
  149. }
  150. }
  151. /// Sets the target [BTF](Btf) info.
  152. ///
  153. /// The loader defaults to loading `BTF` info using [Btf::from_sys_fs].
  154. /// Use this method if you want to load `BTF` from a custom location or
  155. /// pass `None` to disable `BTF` relocations entirely.
  156. /// # Example
  157. ///
  158. /// ```no_run
  159. /// use aya::{EbpfLoader, Btf, Endianness};
  160. ///
  161. /// let bpf = EbpfLoader::new()
  162. /// // load the BTF data from a custom location
  163. /// .btf(Btf::parse_file("/custom_btf_file", Endianness::default()).ok().as_ref())
  164. /// .load_file("file.o")?;
  165. ///
  166. /// # Ok::<(), aya::EbpfError>(())
  167. /// ```
  168. pub fn btf(&mut self, btf: Option<&'a Btf>) -> &mut Self {
  169. self.btf = btf.map(Cow::Borrowed);
  170. self
  171. }
  172. /// Allows programs containing unsupported maps to be loaded.
  173. ///
  174. /// By default programs containing unsupported maps will fail to load. This
  175. /// method can be used to configure the loader so that unsupported maps will
  176. /// be loaded, but won't be accessible from userspace. Can be useful when
  177. /// using unsupported maps that are only accessed from eBPF code and don't
  178. /// require any userspace interaction.
  179. ///
  180. /// # Example
  181. ///
  182. /// ```no_run
  183. /// use aya::EbpfLoader;
  184. ///
  185. /// let bpf = EbpfLoader::new()
  186. /// .allow_unsupported_maps()
  187. /// .load_file("file.o")?;
  188. /// # Ok::<(), aya::EbpfError>(())
  189. /// ```
  190. ///
  191. pub fn allow_unsupported_maps(&mut self) -> &mut Self {
  192. self.allow_unsupported_maps = true;
  193. self
  194. }
  195. /// Sets the base directory path for pinned maps.
  196. ///
  197. /// Pinned maps will be loaded from `path/MAP_NAME`.
  198. /// The caller is responsible for ensuring the directory exists.
  199. ///
  200. /// # Example
  201. ///
  202. /// ```no_run
  203. /// use aya::EbpfLoader;
  204. ///
  205. /// let bpf = EbpfLoader::new()
  206. /// .map_pin_path("/sys/fs/bpf/my-program")
  207. /// .load_file("file.o")?;
  208. /// # Ok::<(), aya::EbpfError>(())
  209. /// ```
  210. ///
  211. pub fn map_pin_path<P: AsRef<Path>>(&mut self, path: P) -> &mut Self {
  212. self.map_pin_path = Some(path.as_ref().to_owned());
  213. self
  214. }
  215. /// Sets the value of a global variable.
  216. ///
  217. /// If the `must_exist` argument is `true`, [`EbpfLoader::load`] will fail with [`ParseError::SymbolNotFound`] if the loaded object code does not contain the variable.
  218. ///
  219. /// From Rust eBPF, a global variable can be defined as follows:
  220. ///
  221. /// ```no_run
  222. /// #[no_mangle]
  223. /// static VERSION: i32 = 0;
  224. /// ```
  225. ///
  226. /// Then it can be accessed using `core::ptr::read_volatile`:
  227. ///
  228. /// ```no_run
  229. /// # #[no_mangle]
  230. /// # static VERSION: i32 = 0;
  231. /// # unsafe fn try_test() {
  232. /// let version = core::ptr::read_volatile(&VERSION);
  233. /// # }
  234. /// ```
  235. ///
  236. /// The type of a global variable must be `Pod` (plain old data), for instance `u8`, `u32` and
  237. /// all other primitive types. You may use custom types as well, but you must ensure that those
  238. /// types are `#[repr(C)]` and only contain other `Pod` types.
  239. ///
  240. /// From C eBPF, you would annotate a global variable as `volatile const`.
  241. ///
  242. /// # Example
  243. ///
  244. /// ```no_run
  245. /// use aya::EbpfLoader;
  246. ///
  247. /// let bpf = EbpfLoader::new()
  248. /// .set_global("VERSION", &2, true)
  249. /// .set_global("PIDS", &[1234u16, 5678], true)
  250. /// .load_file("file.o")?;
  251. /// # Ok::<(), aya::EbpfError>(())
  252. /// ```
  253. ///
  254. pub fn set_global<T: Into<GlobalData<'a>>>(
  255. &mut self,
  256. name: &'a str,
  257. value: T,
  258. must_exist: bool,
  259. ) -> &mut Self {
  260. self.globals.insert(name, (value.into().bytes, must_exist));
  261. self
  262. }
  263. /// Set the max_entries for specified map.
  264. ///
  265. /// Overwrite the value of max_entries of the map that matches
  266. /// the provided name before the map is created.
  267. ///
  268. /// # Example
  269. ///
  270. /// ```no_run
  271. /// use aya::EbpfLoader;
  272. ///
  273. /// let bpf = EbpfLoader::new()
  274. /// .set_max_entries("map", 64)
  275. /// .load_file("file.o")?;
  276. /// # Ok::<(), aya::EbpfError>(())
  277. /// ```
  278. ///
  279. pub fn set_max_entries(&mut self, name: &'a str, size: u32) -> &mut Self {
  280. self.max_entries.insert(name, size);
  281. self
  282. }
  283. /// Treat the provided program as an [`Extension`]
  284. ///
  285. /// When attempting to load the program with the provided `name`
  286. /// the program type is forced to be ] [`Extension`] and is not
  287. /// inferred from the ELF section name.
  288. ///
  289. /// # Example
  290. ///
  291. /// ```no_run
  292. /// use aya::EbpfLoader;
  293. ///
  294. /// let bpf = EbpfLoader::new()
  295. /// .extension("myfunc")
  296. /// .load_file("file.o")?;
  297. /// # Ok::<(), aya::EbpfError>(())
  298. /// ```
  299. ///
  300. pub fn extension(&mut self, name: &'a str) -> &mut Self {
  301. self.extensions.insert(name);
  302. self
  303. }
  304. /// Sets BPF verifier log level.
  305. ///
  306. /// # Example
  307. ///
  308. /// ```no_run
  309. /// use aya::{EbpfLoader, VerifierLogLevel};
  310. ///
  311. /// let bpf = EbpfLoader::new()
  312. /// .verifier_log_level(VerifierLogLevel::VERBOSE | VerifierLogLevel::STATS)
  313. /// .load_file("file.o")?;
  314. /// # Ok::<(), aya::EbpfError>(())
  315. /// ```
  316. ///
  317. pub fn verifier_log_level(&mut self, level: VerifierLogLevel) -> &mut Self {
  318. self.verifier_log_level = level;
  319. self
  320. }
  321. /// Loads eBPF bytecode from a file.
  322. ///
  323. /// # Examples
  324. ///
  325. /// ```no_run
  326. /// use aya::EbpfLoader;
  327. ///
  328. /// let bpf = EbpfLoader::new().load_file("file.o")?;
  329. /// # Ok::<(), aya::EbpfError>(())
  330. /// ```
  331. pub fn load_file<P: AsRef<Path>>(&mut self, path: P) -> Result<Ebpf, EbpfError> {
  332. let path = path.as_ref();
  333. self.load(&fs::read(path).map_err(|error| EbpfError::FileError {
  334. path: path.to_owned(),
  335. error,
  336. })?)
  337. }
  338. /// Loads eBPF bytecode from a buffer.
  339. ///
  340. /// The buffer needs to be 4-bytes aligned. If you are bundling the bytecode statically
  341. /// into your binary, it is recommended that you do so using
  342. /// [`include_bytes_aligned`](crate::include_bytes_aligned).
  343. ///
  344. /// # Examples
  345. ///
  346. /// ```no_run
  347. /// use aya::EbpfLoader;
  348. /// use std::fs;
  349. ///
  350. /// let data = fs::read("file.o").unwrap();
  351. /// let bpf = EbpfLoader::new().load(&data)?;
  352. /// # Ok::<(), aya::EbpfError>(())
  353. /// ```
  354. pub fn load(&mut self, data: &[u8]) -> Result<Ebpf, EbpfError> {
  355. let Self {
  356. btf,
  357. map_pin_path,
  358. globals,
  359. max_entries,
  360. extensions,
  361. verifier_log_level,
  362. allow_unsupported_maps,
  363. } = self;
  364. let mut obj = Object::parse(data)?;
  365. obj.patch_map_data(globals.clone())?;
  366. let btf_fd = if let Some(features) = &FEATURES.btf() {
  367. if let Some(btf) = obj.fixup_and_sanitize_btf(features)? {
  368. match load_btf(btf.to_bytes(), *verifier_log_level) {
  369. Ok(btf_fd) => Some(Arc::new(btf_fd)),
  370. // Only report an error here if the BTF is truly needed, otherwise proceed without.
  371. Err(err) => {
  372. for program in obj.programs.values() {
  373. match program.section {
  374. ProgramSection::Extension
  375. | ProgramSection::FEntry { sleepable: _ }
  376. | ProgramSection::FExit { sleepable: _ }
  377. | ProgramSection::Lsm { sleepable: _ }
  378. | ProgramSection::BtfTracePoint
  379. | ProgramSection::Iter { sleepable: _ } => {
  380. return Err(EbpfError::BtfError(err))
  381. }
  382. ProgramSection::KRetProbe
  383. | ProgramSection::KProbe
  384. | ProgramSection::UProbe { sleepable: _ }
  385. | ProgramSection::URetProbe { sleepable: _ }
  386. | ProgramSection::TracePoint
  387. | ProgramSection::SocketFilter
  388. | ProgramSection::Xdp {
  389. frags: _,
  390. attach_type: _,
  391. }
  392. | ProgramSection::SkMsg
  393. | ProgramSection::SkSkbStreamParser
  394. | ProgramSection::SkSkbStreamVerdict
  395. | ProgramSection::SockOps
  396. | ProgramSection::SchedClassifier
  397. | ProgramSection::CgroupSkb
  398. | ProgramSection::CgroupSkbIngress
  399. | ProgramSection::CgroupSkbEgress
  400. | ProgramSection::CgroupSockAddr { attach_type: _ }
  401. | ProgramSection::CgroupSysctl
  402. | ProgramSection::CgroupSockopt { attach_type: _ }
  403. | ProgramSection::LircMode2
  404. | ProgramSection::PerfEvent
  405. | ProgramSection::RawTracePoint
  406. | ProgramSection::SkLookup
  407. | ProgramSection::CgroupSock { attach_type: _ }
  408. | ProgramSection::CgroupDevice => {}
  409. }
  410. }
  411. warn!("Object BTF couldn't be loaded in the kernel: {err}");
  412. None
  413. }
  414. }
  415. } else {
  416. None
  417. }
  418. } else {
  419. None
  420. };
  421. if let Some(btf) = &btf {
  422. obj.relocate_btf(btf)?;
  423. }
  424. let mut maps = HashMap::new();
  425. for (name, mut obj) in obj.maps.drain() {
  426. if let (false, EbpfSectionKind::Bss | EbpfSectionKind::Data | EbpfSectionKind::Rodata) =
  427. (FEATURES.bpf_global_data(), obj.section_kind())
  428. {
  429. continue;
  430. }
  431. let num_cpus = || {
  432. Ok(nr_cpus().map_err(|(path, error)| EbpfError::FileError {
  433. path: PathBuf::from(path),
  434. error,
  435. })? as u32)
  436. };
  437. let map_type: bpf_map_type = obj.map_type().try_into().map_err(MapError::from)?;
  438. if let Some(max_entries) = max_entries_override(
  439. map_type,
  440. max_entries.get(name.as_str()).copied(),
  441. || obj.max_entries(),
  442. num_cpus,
  443. || page_size() as u32,
  444. )? {
  445. obj.set_max_entries(max_entries)
  446. }
  447. match obj.map_type().try_into() {
  448. Ok(BPF_MAP_TYPE_CPUMAP) => {
  449. obj.set_value_size(if FEATURES.cpumap_prog_id() { 8 } else { 4 })
  450. }
  451. Ok(BPF_MAP_TYPE_DEVMAP | BPF_MAP_TYPE_DEVMAP_HASH) => {
  452. obj.set_value_size(if FEATURES.devmap_prog_id() { 8 } else { 4 })
  453. }
  454. _ => (),
  455. }
  456. let btf_fd = btf_fd.as_deref().map(|fd| fd.as_fd());
  457. let mut map = match obj.pinning() {
  458. PinningType::None => MapData::create(obj, &name, btf_fd)?,
  459. PinningType::ByName => {
  460. // pin maps in /sys/fs/bpf by default to align with libbpf
  461. // behavior https://github.com/libbpf/libbpf/blob/v1.2.2/src/libbpf.c#L2161.
  462. let path = map_pin_path
  463. .as_deref()
  464. .unwrap_or_else(|| Path::new("/sys/fs/bpf"));
  465. MapData::create_pinned_by_name(path, obj, &name, btf_fd)?
  466. }
  467. };
  468. map.finalize()?;
  469. maps.insert(name, map);
  470. }
  471. let text_sections = obj
  472. .functions
  473. .keys()
  474. .map(|(section_index, _)| *section_index)
  475. .collect();
  476. obj.relocate_maps(
  477. maps.iter()
  478. .map(|(s, data)| (s.as_str(), data.fd().as_fd().as_raw_fd(), data.obj())),
  479. &text_sections,
  480. )?;
  481. obj.relocate_calls(&text_sections)?;
  482. obj.sanitize_functions(&FEATURES);
  483. let programs = obj
  484. .programs
  485. .drain()
  486. .map(|(name, prog_obj)| {
  487. let function_obj = obj.functions.get(&prog_obj.function_key()).unwrap().clone();
  488. let prog_name = if FEATURES.bpf_name() {
  489. Some(name.clone())
  490. } else {
  491. None
  492. };
  493. let section = prog_obj.section.clone();
  494. let obj = (prog_obj, function_obj);
  495. let btf_fd = btf_fd.as_ref().map(Arc::clone);
  496. let program = if extensions.contains(name.as_str()) {
  497. Program::Extension(Extension {
  498. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  499. })
  500. } else {
  501. match &section {
  502. ProgramSection::KProbe => Program::KProbe(KProbe {
  503. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  504. kind: ProbeKind::KProbe,
  505. }),
  506. ProgramSection::KRetProbe => Program::KProbe(KProbe {
  507. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  508. kind: ProbeKind::KRetProbe,
  509. }),
  510. ProgramSection::UProbe { sleepable } => {
  511. let mut data =
  512. ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level);
  513. if *sleepable {
  514. data.flags = BPF_F_SLEEPABLE;
  515. }
  516. Program::UProbe(UProbe {
  517. data,
  518. kind: ProbeKind::UProbe,
  519. })
  520. }
  521. ProgramSection::URetProbe { sleepable } => {
  522. let mut data =
  523. ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level);
  524. if *sleepable {
  525. data.flags = BPF_F_SLEEPABLE;
  526. }
  527. Program::UProbe(UProbe {
  528. data,
  529. kind: ProbeKind::URetProbe,
  530. })
  531. }
  532. ProgramSection::TracePoint => Program::TracePoint(TracePoint {
  533. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  534. }),
  535. ProgramSection::SocketFilter => Program::SocketFilter(SocketFilter {
  536. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  537. }),
  538. ProgramSection::Xdp {
  539. frags, attach_type, ..
  540. } => {
  541. let mut data =
  542. ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level);
  543. if *frags {
  544. data.flags = BPF_F_XDP_HAS_FRAGS;
  545. }
  546. Program::Xdp(Xdp {
  547. data,
  548. attach_type: *attach_type,
  549. })
  550. }
  551. ProgramSection::SkMsg => Program::SkMsg(SkMsg {
  552. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  553. }),
  554. ProgramSection::CgroupSysctl => Program::CgroupSysctl(CgroupSysctl {
  555. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  556. }),
  557. ProgramSection::CgroupSockopt { attach_type, .. } => {
  558. Program::CgroupSockopt(CgroupSockopt {
  559. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  560. attach_type: *attach_type,
  561. })
  562. }
  563. ProgramSection::SkSkbStreamParser => Program::SkSkb(SkSkb {
  564. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  565. kind: SkSkbKind::StreamParser,
  566. }),
  567. ProgramSection::SkSkbStreamVerdict => Program::SkSkb(SkSkb {
  568. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  569. kind: SkSkbKind::StreamVerdict,
  570. }),
  571. ProgramSection::SockOps => Program::SockOps(SockOps {
  572. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  573. }),
  574. ProgramSection::SchedClassifier => {
  575. Program::SchedClassifier(SchedClassifier {
  576. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  577. })
  578. }
  579. ProgramSection::CgroupSkb => Program::CgroupSkb(CgroupSkb {
  580. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  581. expected_attach_type: None,
  582. }),
  583. ProgramSection::CgroupSkbIngress => Program::CgroupSkb(CgroupSkb {
  584. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  585. expected_attach_type: Some(CgroupSkbAttachType::Ingress),
  586. }),
  587. ProgramSection::CgroupSkbEgress => Program::CgroupSkb(CgroupSkb {
  588. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  589. expected_attach_type: Some(CgroupSkbAttachType::Egress),
  590. }),
  591. ProgramSection::CgroupSockAddr { attach_type, .. } => {
  592. Program::CgroupSockAddr(CgroupSockAddr {
  593. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  594. attach_type: *attach_type,
  595. })
  596. }
  597. ProgramSection::LircMode2 => Program::LircMode2(LircMode2 {
  598. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  599. }),
  600. ProgramSection::PerfEvent => Program::PerfEvent(PerfEvent {
  601. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  602. }),
  603. ProgramSection::RawTracePoint => Program::RawTracePoint(RawTracePoint {
  604. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  605. }),
  606. ProgramSection::Lsm { sleepable } => {
  607. let mut data =
  608. ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level);
  609. if *sleepable {
  610. data.flags = BPF_F_SLEEPABLE;
  611. }
  612. Program::Lsm(Lsm { data })
  613. }
  614. ProgramSection::BtfTracePoint => Program::BtfTracePoint(BtfTracePoint {
  615. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  616. }),
  617. ProgramSection::FEntry { sleepable } => {
  618. let mut data =
  619. ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level);
  620. if *sleepable {
  621. data.flags = BPF_F_SLEEPABLE;
  622. }
  623. Program::FEntry(FEntry { data })
  624. }
  625. ProgramSection::FExit { sleepable } => {
  626. let mut data =
  627. ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level);
  628. if *sleepable {
  629. data.flags = BPF_F_SLEEPABLE;
  630. }
  631. Program::FExit(FExit { data })
  632. }
  633. ProgramSection::Extension => Program::Extension(Extension {
  634. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  635. }),
  636. ProgramSection::SkLookup => Program::SkLookup(SkLookup {
  637. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  638. }),
  639. ProgramSection::CgroupSock { attach_type, .. } => {
  640. Program::CgroupSock(CgroupSock {
  641. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  642. attach_type: *attach_type,
  643. })
  644. }
  645. ProgramSection::CgroupDevice => Program::CgroupDevice(CgroupDevice {
  646. data: ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level),
  647. }),
  648. ProgramSection::Iter { sleepable } => {
  649. let mut data =
  650. ProgramData::new(prog_name, obj, btf_fd, *verifier_log_level);
  651. if *sleepable {
  652. data.flags = BPF_F_SLEEPABLE;
  653. }
  654. Program::Iter(Iter { data })
  655. }
  656. }
  657. };
  658. (name, program)
  659. })
  660. .collect();
  661. let maps = maps
  662. .drain()
  663. .map(|data| parse_map(data, *allow_unsupported_maps))
  664. .collect::<Result<HashMap<String, Map>, EbpfError>>()?;
  665. Ok(Ebpf { maps, programs })
  666. }
  667. }
  668. fn parse_map(
  669. data: (String, MapData),
  670. allow_unsupported_maps: bool,
  671. ) -> Result<(String, Map), EbpfError> {
  672. let (name, map) = data;
  673. let map_type = bpf_map_type::try_from(map.obj().map_type()).map_err(MapError::from)?;
  674. let map = match map_type {
  675. BPF_MAP_TYPE_ARRAY => Map::Array(map),
  676. BPF_MAP_TYPE_PERCPU_ARRAY => Map::PerCpuArray(map),
  677. BPF_MAP_TYPE_PROG_ARRAY => Map::ProgramArray(map),
  678. BPF_MAP_TYPE_HASH => Map::HashMap(map),
  679. BPF_MAP_TYPE_LRU_HASH => Map::LruHashMap(map),
  680. BPF_MAP_TYPE_PERCPU_HASH => Map::PerCpuHashMap(map),
  681. BPF_MAP_TYPE_LRU_PERCPU_HASH => Map::PerCpuLruHashMap(map),
  682. BPF_MAP_TYPE_PERF_EVENT_ARRAY => Map::PerfEventArray(map),
  683. BPF_MAP_TYPE_RINGBUF => Map::RingBuf(map),
  684. BPF_MAP_TYPE_SOCKHASH => Map::SockHash(map),
  685. BPF_MAP_TYPE_SOCKMAP => Map::SockMap(map),
  686. BPF_MAP_TYPE_BLOOM_FILTER => Map::BloomFilter(map),
  687. BPF_MAP_TYPE_LPM_TRIE => Map::LpmTrie(map),
  688. BPF_MAP_TYPE_STACK => Map::Stack(map),
  689. BPF_MAP_TYPE_STACK_TRACE => Map::StackTraceMap(map),
  690. BPF_MAP_TYPE_QUEUE => Map::Queue(map),
  691. BPF_MAP_TYPE_CPUMAP => Map::CpuMap(map),
  692. BPF_MAP_TYPE_DEVMAP => Map::DevMap(map),
  693. BPF_MAP_TYPE_DEVMAP_HASH => Map::DevMapHash(map),
  694. BPF_MAP_TYPE_XSKMAP => Map::XskMap(map),
  695. m_type => {
  696. if allow_unsupported_maps {
  697. Map::Unsupported(map)
  698. } else {
  699. return Err(EbpfError::MapError(MapError::Unsupported {
  700. name,
  701. map_type: m_type,
  702. }));
  703. }
  704. }
  705. };
  706. Ok((name, map))
  707. }
  708. /// Computes the value which should be used to override the max_entries value of the map
  709. /// based on the user-provided override and the rules for that map type.
  710. fn max_entries_override(
  711. map_type: bpf_map_type,
  712. user_override: Option<u32>,
  713. current_value: impl Fn() -> u32,
  714. num_cpus: impl Fn() -> Result<u32, EbpfError>,
  715. page_size: impl Fn() -> u32,
  716. ) -> Result<Option<u32>, EbpfError> {
  717. let max_entries = || user_override.unwrap_or_else(&current_value);
  718. Ok(match map_type {
  719. BPF_MAP_TYPE_PERF_EVENT_ARRAY if max_entries() == 0 => Some(num_cpus()?),
  720. BPF_MAP_TYPE_RINGBUF => Some(adjust_to_page_size(max_entries(), page_size()))
  721. .filter(|adjusted| *adjusted != max_entries())
  722. .or(user_override),
  723. _ => user_override,
  724. })
  725. }
  726. // Adjusts the byte size of a RingBuf map to match a power-of-two multiple of the page size.
  727. //
  728. // This mirrors the logic used by libbpf.
  729. // See https://github.com/libbpf/libbpf/blob/ec6f716eda43/src/libbpf.c#L2461-L2463
  730. fn adjust_to_page_size(byte_size: u32, page_size: u32) -> u32 {
  731. // If the byte_size is zero, return zero and let the verifier reject the map
  732. // when it is loaded. This is the behavior of libbpf.
  733. if byte_size == 0 {
  734. return 0;
  735. }
  736. // TODO: Replace with primitive method when int_roundings (https://github.com/rust-lang/rust/issues/88581)
  737. // is stabilized.
  738. fn div_ceil(n: u32, rhs: u32) -> u32 {
  739. let d = n / rhs;
  740. let r = n % rhs;
  741. if r > 0 && rhs > 0 {
  742. d + 1
  743. } else {
  744. d
  745. }
  746. }
  747. let pages_needed = div_ceil(byte_size, page_size);
  748. page_size * pages_needed.next_power_of_two()
  749. }
  750. #[cfg(test)]
  751. mod tests {
  752. use aya_obj::generated::bpf_map_type::*;
  753. const PAGE_SIZE: u32 = 4096;
  754. const NUM_CPUS: u32 = 4;
  755. #[test]
  756. fn test_adjust_to_page_size() {
  757. use super::adjust_to_page_size;
  758. [
  759. (0, 0),
  760. (4096, 1),
  761. (4096, 4095),
  762. (4096, 4096),
  763. (8192, 4097),
  764. (8192, 8192),
  765. (16384, 8193),
  766. ]
  767. .into_iter()
  768. .for_each(|(exp, input)| assert_eq!(exp, adjust_to_page_size(input, PAGE_SIZE)))
  769. }
  770. #[test]
  771. fn test_max_entries_override() {
  772. use super::max_entries_override;
  773. [
  774. (BPF_MAP_TYPE_RINGBUF, Some(1), 1, Some(PAGE_SIZE)),
  775. (BPF_MAP_TYPE_RINGBUF, None, 1, Some(PAGE_SIZE)),
  776. (BPF_MAP_TYPE_RINGBUF, None, PAGE_SIZE, None),
  777. (BPF_MAP_TYPE_PERF_EVENT_ARRAY, None, 1, None),
  778. (BPF_MAP_TYPE_PERF_EVENT_ARRAY, Some(42), 1, Some(42)),
  779. (BPF_MAP_TYPE_PERF_EVENT_ARRAY, Some(0), 1, Some(NUM_CPUS)),
  780. (BPF_MAP_TYPE_PERF_EVENT_ARRAY, None, 0, Some(NUM_CPUS)),
  781. (BPF_MAP_TYPE_PERF_EVENT_ARRAY, None, 42, None),
  782. (BPF_MAP_TYPE_ARRAY, None, 1, None),
  783. (BPF_MAP_TYPE_ARRAY, Some(2), 1, Some(2)),
  784. ]
  785. .into_iter()
  786. .for_each(|(map_type, user_override, current_value, exp)| {
  787. assert_eq!(
  788. exp,
  789. max_entries_override(
  790. map_type,
  791. user_override,
  792. || { current_value },
  793. || Ok(NUM_CPUS),
  794. || PAGE_SIZE
  795. )
  796. .unwrap()
  797. )
  798. })
  799. }
  800. }
  801. impl Default for EbpfLoader<'_> {
  802. fn default() -> Self {
  803. EbpfLoader::new()
  804. }
  805. }
  806. /// The main entry point into the library, used to work with eBPF programs and maps.
  807. #[derive(Debug)]
  808. pub struct Ebpf {
  809. maps: HashMap<String, Map>,
  810. programs: HashMap<String, Program>,
  811. }
  812. /// The main entry point into the library, used to work with eBPF programs and maps.
  813. #[deprecated(since = "0.13.0", note = "use `Ebpf` instead")]
  814. pub type Bpf = Ebpf;
  815. impl Ebpf {
  816. /// Loads eBPF bytecode from a file.
  817. ///
  818. /// Parses the given object code file and initializes the [maps](crate::maps) defined in it. If
  819. /// the kernel supports [BTF](Btf) debug info, it is automatically loaded from
  820. /// `/sys/kernel/btf/vmlinux`.
  821. ///
  822. /// For more loading options, see [EbpfLoader].
  823. ///
  824. /// # Examples
  825. ///
  826. /// ```no_run
  827. /// use aya::Ebpf;
  828. ///
  829. /// let bpf = Ebpf::load_file("file.o")?;
  830. /// # Ok::<(), aya::EbpfError>(())
  831. /// ```
  832. pub fn load_file<P: AsRef<Path>>(path: P) -> Result<Self, EbpfError> {
  833. EbpfLoader::new()
  834. .btf(Btf::from_sys_fs().ok().as_ref())
  835. .load_file(path)
  836. }
  837. /// Loads eBPF bytecode from a buffer.
  838. ///
  839. /// Parses the object code contained in `data` and initializes the
  840. /// [maps](crate::maps) defined in it. If the kernel supports [BTF](Btf)
  841. /// debug info, it is automatically loaded from `/sys/kernel/btf/vmlinux`.
  842. ///
  843. /// The buffer needs to be 4-bytes aligned. If you are bundling the bytecode statically
  844. /// into your binary, it is recommended that you do so using
  845. /// [`include_bytes_aligned`](crate::include_bytes_aligned).
  846. ///
  847. /// For more loading options, see [EbpfLoader].
  848. ///
  849. /// # Examples
  850. ///
  851. /// ```no_run
  852. /// use aya::{Ebpf, Btf};
  853. /// use std::fs;
  854. ///
  855. /// let data = fs::read("file.o").unwrap();
  856. /// // load the BTF data from /sys/kernel/btf/vmlinux
  857. /// let bpf = Ebpf::load(&data)?;
  858. /// # Ok::<(), aya::EbpfError>(())
  859. /// ```
  860. pub fn load(data: &[u8]) -> Result<Self, EbpfError> {
  861. EbpfLoader::new()
  862. .btf(Btf::from_sys_fs().ok().as_ref())
  863. .load(data)
  864. }
  865. /// Returns a reference to the map with the given name.
  866. ///
  867. /// The returned type is mostly opaque. In order to do anything useful with it you need to
  868. /// convert it to a [typed map](crate::maps).
  869. ///
  870. /// For more details and examples on maps and their usage, see the [maps module
  871. /// documentation][crate::maps].
  872. pub fn map(&self, name: &str) -> Option<&Map> {
  873. self.maps.get(name)
  874. }
  875. /// Returns a mutable reference to the map with the given name.
  876. ///
  877. /// The returned type is mostly opaque. In order to do anything useful with it you need to
  878. /// convert it to a [typed map](crate::maps).
  879. ///
  880. /// For more details and examples on maps and their usage, see the [maps module
  881. /// documentation][crate::maps].
  882. pub fn map_mut(&mut self, name: &str) -> Option<&mut Map> {
  883. self.maps.get_mut(name)
  884. }
  885. /// Takes ownership of a map with the given name.
  886. ///
  887. /// Use this when borrowing with [`map`](crate::Ebpf::map) or [`map_mut`](crate::Ebpf::map_mut)
  888. /// is not possible (eg when using the map from an async task). The returned
  889. /// map will be closed on `Drop`, therefore the caller is responsible for
  890. /// managing its lifetime.
  891. ///
  892. /// The returned type is mostly opaque. In order to do anything useful with it you need to
  893. /// convert it to a [typed map](crate::maps).
  894. ///
  895. /// For more details and examples on maps and their usage, see the [maps module
  896. /// documentation][crate::maps].
  897. pub fn take_map(&mut self, name: &str) -> Option<Map> {
  898. self.maps.remove(name)
  899. }
  900. /// An iterator over all the maps.
  901. ///
  902. /// # Examples
  903. /// ```no_run
  904. /// # let mut bpf = aya::Ebpf::load(&[])?;
  905. /// for (name, map) in bpf.maps() {
  906. /// println!(
  907. /// "found map `{}`",
  908. /// name,
  909. /// );
  910. /// }
  911. /// # Ok::<(), aya::EbpfError>(())
  912. /// ```
  913. pub fn maps(&self) -> impl Iterator<Item = (&str, &Map)> {
  914. self.maps.iter().map(|(name, map)| (name.as_str(), map))
  915. }
  916. /// A mutable iterator over all the maps.
  917. ///
  918. /// # Examples
  919. /// ```no_run
  920. /// # use std::path::Path;
  921. /// # #[derive(thiserror::Error, Debug)]
  922. /// # enum Error {
  923. /// # #[error(transparent)]
  924. /// # Ebpf(#[from] aya::EbpfError),
  925. /// # #[error(transparent)]
  926. /// # Pin(#[from] aya::pin::PinError)
  927. /// # }
  928. /// # let mut bpf = aya::Ebpf::load(&[])?;
  929. /// # let pin_path = Path::new("/tmp/pin_path");
  930. /// for (_, map) in bpf.maps_mut() {
  931. /// map.pin(pin_path)?;
  932. /// }
  933. /// # Ok::<(), Error>(())
  934. /// ```
  935. pub fn maps_mut(&mut self) -> impl Iterator<Item = (&str, &mut Map)> {
  936. self.maps.iter_mut().map(|(name, map)| (name.as_str(), map))
  937. }
  938. /// Returns a reference to the program with the given name.
  939. ///
  940. /// You can use this to inspect a program and its properties. To load and attach a program, use
  941. /// [program_mut](Self::program_mut) instead.
  942. ///
  943. /// For more details on programs and their usage, see the [programs module
  944. /// documentation](crate::programs).
  945. ///
  946. /// # Examples
  947. ///
  948. /// ```no_run
  949. /// # let bpf = aya::Ebpf::load(&[])?;
  950. /// let program = bpf.program("SSL_read").unwrap();
  951. /// println!("program SSL_read is of type {:?}", program.prog_type());
  952. /// # Ok::<(), aya::EbpfError>(())
  953. /// ```
  954. pub fn program(&self, name: &str) -> Option<&Program> {
  955. self.programs.get(name)
  956. }
  957. /// Returns a mutable reference to the program with the given name.
  958. ///
  959. /// Used to get a program before loading and attaching it. For more details on programs and
  960. /// their usage, see the [programs module documentation](crate::programs).
  961. ///
  962. /// # Examples
  963. ///
  964. /// ```no_run
  965. /// # let mut bpf = aya::Ebpf::load(&[])?;
  966. /// use aya::programs::UProbe;
  967. ///
  968. /// let program: &mut UProbe = bpf.program_mut("SSL_read").unwrap().try_into()?;
  969. /// program.load()?;
  970. /// program.attach("SSL_read", "libssl", None, None)?;
  971. /// # Ok::<(), aya::EbpfError>(())
  972. /// ```
  973. pub fn program_mut(&mut self, name: &str) -> Option<&mut Program> {
  974. self.programs.get_mut(name)
  975. }
  976. /// An iterator over all the programs.
  977. ///
  978. /// # Examples
  979. /// ```no_run
  980. /// # let bpf = aya::Ebpf::load(&[])?;
  981. /// for (name, program) in bpf.programs() {
  982. /// println!(
  983. /// "found program `{}` of type `{:?}`",
  984. /// name,
  985. /// program.prog_type()
  986. /// );
  987. /// }
  988. /// # Ok::<(), aya::EbpfError>(())
  989. /// ```
  990. pub fn programs(&self) -> impl Iterator<Item = (&str, &Program)> {
  991. self.programs.iter().map(|(s, p)| (s.as_str(), p))
  992. }
  993. /// An iterator mutably referencing all of the programs.
  994. ///
  995. /// # Examples
  996. /// ```no_run
  997. /// # use std::path::Path;
  998. /// # #[derive(thiserror::Error, Debug)]
  999. /// # enum Error {
  1000. /// # #[error(transparent)]
  1001. /// # Ebpf(#[from] aya::EbpfError),
  1002. /// # #[error(transparent)]
  1003. /// # Pin(#[from] aya::pin::PinError)
  1004. /// # }
  1005. /// # let mut bpf = aya::Ebpf::load(&[])?;
  1006. /// # let pin_path = Path::new("/tmp/pin_path");
  1007. /// for (_, program) in bpf.programs_mut() {
  1008. /// program.pin(pin_path)?;
  1009. /// }
  1010. /// # Ok::<(), Error>(())
  1011. /// ```
  1012. pub fn programs_mut(&mut self) -> impl Iterator<Item = (&str, &mut Program)> {
  1013. self.programs.iter_mut().map(|(s, p)| (s.as_str(), p))
  1014. }
  1015. }
  1016. /// The error type returned by [`Ebpf::load_file`] and [`Ebpf::load`].
  1017. #[derive(Debug, Error)]
  1018. pub enum EbpfError {
  1019. /// Error loading file
  1020. #[error("error loading {path}")]
  1021. FileError {
  1022. /// The file path
  1023. path: PathBuf,
  1024. #[source]
  1025. /// The original io::Error
  1026. error: io::Error,
  1027. },
  1028. /// Unexpected pinning type
  1029. #[error("unexpected pinning type {name}")]
  1030. UnexpectedPinningType {
  1031. /// The value encountered
  1032. name: u32,
  1033. },
  1034. /// Error parsing BPF object
  1035. #[error("error parsing BPF object: {0}")]
  1036. ParseError(#[from] ParseError),
  1037. /// Error parsing BTF object
  1038. #[error("BTF error: {0}")]
  1039. BtfError(#[from] BtfError),
  1040. /// Error performing relocations
  1041. #[error("error relocating function")]
  1042. RelocationError(#[from] EbpfRelocationError),
  1043. /// Error performing relocations
  1044. #[error("error relocating section")]
  1045. BtfRelocationError(#[from] BtfRelocationError),
  1046. /// No BTF parsed for object
  1047. #[error("no BTF parsed for object")]
  1048. NoBTF,
  1049. #[error("map error: {0}")]
  1050. /// A map error
  1051. MapError(#[from] MapError),
  1052. #[error("program error: {0}")]
  1053. /// A program error
  1054. ProgramError(#[from] ProgramError),
  1055. }
  1056. /// The error type returned by [`Bpf::load_file`] and [`Bpf::load`].
  1057. #[deprecated(since = "0.13.0", note = "use `EbpfError` instead")]
  1058. pub type BpfError = EbpfError;
  1059. fn load_btf(
  1060. raw_btf: Vec<u8>,
  1061. verifier_log_level: VerifierLogLevel,
  1062. ) -> Result<crate::MockableFd, BtfError> {
  1063. let (ret, verifier_log) = retry_with_verifier_logs(10, |logger| {
  1064. bpf_load_btf(raw_btf.as_slice(), logger, verifier_log_level)
  1065. });
  1066. ret.map_err(|io_error| BtfError::LoadError {
  1067. io_error,
  1068. verifier_log,
  1069. })
  1070. }
  1071. /// Global data that can be exported to eBPF programs before they are loaded.
  1072. ///
  1073. /// Valid global data includes `Pod` types and slices of `Pod` types. See also
  1074. /// [EbpfLoader::set_global].
  1075. pub struct GlobalData<'a> {
  1076. bytes: &'a [u8],
  1077. }
  1078. impl<'a, T: Pod> From<&'a [T]> for GlobalData<'a> {
  1079. fn from(s: &'a [T]) -> Self {
  1080. GlobalData {
  1081. bytes: bytes_of_slice(s),
  1082. }
  1083. }
  1084. }
  1085. impl<'a, T: Pod> From<&'a T> for GlobalData<'a> {
  1086. fn from(v: &'a T) -> Self {
  1087. GlobalData {
  1088. // Safety: v is Pod
  1089. bytes: unsafe { bytes_of(v) },
  1090. }
  1091. }
  1092. }