Sen descrición

Michal Rostecki 7ccc027de5 Revert "Add ability to iterate over LpmTrie keys and matches" hai 1 ano
.cargo 455cc95e8f integration-tests: run on macos to get nested virtualization hai 1 ano
.github 455cc95e8f integration-tests: run on macos to get nested virtualization hai 1 ano
.vim dc31e11691 Re-organize into a single workspace %!s(int64=2) %!d(string=hai) anos
.vscode dc31e11691 Re-organize into a single workspace %!s(int64=2) %!d(string=hai) anos
assets 2b98259be7 readme: Add crabby, sync with aya/README.md %!s(int64=2) %!d(string=hai) anos
aya 7ccc027de5 Revert "Add ability to iterate over LpmTrie keys and matches" hai 1 ano
aya-bpf-macros 6ad2c3c373 aya-bpf-macros: Allow to make programs public hai 1 ano
aya-log dad75f45ac Update Tokio and inventory hai 1 ano
aya-log-common 0b41018ee2 Revert "aya-log, aya-log-common: temporarily revert to old map API so we can release" %!s(int64=2) %!d(string=hai) anos
aya-log-ebpf-macros 055d94f58b fix uninlined_format_args clippy issues hai 1 ano
aya-log-parser 055d94f58b fix uninlined_format_args clippy issues hai 1 ano
aya-obj 9a6f8143a1 aya: btf: add support for BTF_KIND_ENUM64 hai 1 ano
aya-tool 81bc307dce aya-obj: migrate bindgen destination hai 1 ano
bpf 556463a85f ebpf: SkbBuff: add some accessors hai 1 ano
test 9a6f8143a1 aya: btf: add support for BTF_KIND_ENUM64 hai 1 ano
xtask 912ee06f39 build(deps): update indoc requirement from 1.0 to 2.0 hai 1 ano
.gitignore ac07608b79 Support using handle in tc programs %!s(int64=2) %!d(string=hai) anos
CODE_OF_CONDUCT.md e752ffb3be Add a Code of Conduct %!s(int64=2) %!d(string=hai) anos
CONTRIBUTING.md d4a399fb0c Update CONTRIBUTING.md to link to the test/README.md %!s(int64=2) %!d(string=hai) anos
Cargo.toml 81bc307dce aya-obj: migrate bindgen destination hai 1 ano
LICENSE-APACHE 01e9f81043 Add license files %!s(int64=3) %!d(string=hai) anos
LICENSE-MIT 01e9f81043 Add license files %!s(int64=3) %!d(string=hai) anos
README.md 944d6b8a16 Change from Rust edition 2018 to 2021 %!s(int64=2) %!d(string=hai) anos
netlify.toml 7d19bde66b Unpin Rust nightly hai 1 ano
release.toml dfb03382f6 release.toml: fix pre/post release templates %!s(int64=2) %!d(string=hai) anos
rustfmt.toml d6f299065d Add rustfmt.toml %!s(int64=3) %!d(string=hai) anos

README.md

Aya

Crates.io License Build status Book

API Documentation

Unreleased Documentation Documentaiton

Community

Discord Awesome

Join the conversation on Discord to discuss anything related to Aya, or discover and contribute to a list of Awesome Aya projects.

Overview

eBPF is a technology that allows running user-supplied programs inside the Linux kernel. For more info see https://ebpf.io/what-is-ebpf.

Aya is an eBPF library built with a focus on operability and developer experience. It does not rely on libbpf nor bcc - it's built from the ground up purely in Rust, using only the libc crate to execute syscalls. With BTF support and when linked with musl, it offers a true compile once, run everywhere solution, where a single self-contained binary can be deployed on many linux distributions and kernel versions.

Some of the major features provided include:

  • Support for the BPF Type Format (BTF), which is transparently enabled when supported by the target kernel. This allows eBPF programs compiled against one kernel version to run on different kernel versions without the need to recompile.
  • Support for function call relocation and global data maps, which allows eBPF programs to make function calls and use global variables and initializers.
  • Async support with both tokio and async-std.
  • Easy to deploy and fast to build: aya doesn't require a kernel build or compiled headers, and not even a C toolchain; a release build completes in a matter of seconds.

Example

Aya supports a large chunk of the eBPF API. The following example shows how to use a BPF_PROG_TYPE_CGROUP_SKB program with aya:

use std::fs::File;
use aya::Bpf;
use aya::programs::{CgroupSkb, CgroupSkbAttachType};

// load the BPF code
let mut bpf = Bpf::load_file("bpf.o")?;

// get the `ingress_filter` program compiled into `bpf.o`.
let ingress: &mut CgroupSkb = bpf.program_mut("ingress_filter")?.try_into()?;

// load the program into the kernel
ingress.load()?;

// attach the program to the root cgroup. `ingress_filter` will be called for all
// incoming packets.
let cgroup = File::open("/sys/fs/cgroup/unified")?;
ingress.attach(cgroup, CgroupSkbAttachType::Ingress)?;

Contributing

Please see the contributing guide.

License

Aya is distributed under the terms of either the MIT license or the Apache License, at your option.

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in this crate by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.