123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524 |
- package ebpf
- import (
- "bytes"
- "fmt"
- "math"
- "path/filepath"
- "strings"
- "time"
- "unsafe"
- "github.com/cilium/ebpf/asm"
- "github.com/cilium/ebpf/internal"
- "github.com/cilium/ebpf/internal/unix"
- "github.com/pkg/errors"
- )
- var (
- errNotSupported = errors.New("ebpf: not supported by kernel")
- )
- const (
- // Number of bytes to pad the output buffer for BPF_PROG_TEST_RUN.
- // This is currently the maximum of spare space allocated for SKB
- // and XDP programs, and equal to XDP_PACKET_HEADROOM + NET_IP_ALIGN.
- outputPad = 256 + 2
- )
- // DefaultVerifierLogSize is the default number of bytes allocated for the
- // verifier log.
- const DefaultVerifierLogSize = 64 * 1024
- // ProgramOptions control loading a program into the kernel.
- type ProgramOptions struct {
- // Controls the detail emitted by the kernel verifier. Set to non-zero
- // to enable logging.
- LogLevel uint32
- // Controls the output buffer size for the verifier. Defaults to
- // DefaultVerifierLogSize.
- LogSize int
- }
- // ProgramSpec defines a Program
- type ProgramSpec struct {
- // Name is passed to the kernel as a debug aid. Must only contain
- // alpha numeric and '_' characters.
- Name string
- Type ProgramType
- AttachType AttachType
- Instructions asm.Instructions
- License string
- KernelVersion uint32
- }
- // Copy returns a copy of the spec.
- func (ps *ProgramSpec) Copy() *ProgramSpec {
- if ps == nil {
- return nil
- }
- cpy := *ps
- cpy.Instructions = make(asm.Instructions, len(ps.Instructions))
- copy(cpy.Instructions, ps.Instructions)
- return &cpy
- }
- // Program represents BPF program loaded into the kernel.
- //
- // It is not safe to close a Program which is used by other goroutines.
- type Program struct {
- // Contains the output of the kernel verifier if enabled,
- // otherwise it is empty.
- VerifierLog string
- fd *bpfFD
- name string
- abi ProgramABI
- }
- // NewProgram creates a new Program.
- //
- // Loading a program for the first time will perform
- // feature detection by loading small, temporary programs.
- func NewProgram(spec *ProgramSpec) (*Program, error) {
- return NewProgramWithOptions(spec, ProgramOptions{})
- }
- // NewProgramWithOptions creates a new Program.
- //
- // Loading a program for the first time will perform
- // feature detection by loading small, temporary programs.
- func NewProgramWithOptions(spec *ProgramSpec, opts ProgramOptions) (*Program, error) {
- attr, err := convertProgramSpec(spec, haveObjName.Result())
- if err != nil {
- return nil, err
- }
- logSize := DefaultVerifierLogSize
- if opts.LogSize > 0 {
- logSize = opts.LogSize
- }
- var logBuf []byte
- if opts.LogLevel > 0 {
- logBuf = make([]byte, logSize)
- attr.logLevel = opts.LogLevel
- attr.logSize = uint32(len(logBuf))
- attr.logBuf = newPtr(unsafe.Pointer(&logBuf[0]))
- }
- fd, err := bpfProgLoad(attr)
- if err == nil {
- prog := newProgram(fd, spec.Name, &ProgramABI{spec.Type})
- prog.VerifierLog = convertCString(logBuf)
- return prog, nil
- }
- truncated := errors.Cause(err) == unix.ENOSPC
- if opts.LogLevel == 0 {
- // Re-run with the verifier enabled to get better error messages.
- logBuf = make([]byte, logSize)
- attr.logLevel = 1
- attr.logSize = uint32(len(logBuf))
- attr.logBuf = newPtr(unsafe.Pointer(&logBuf[0]))
- _, nerr := bpfProgLoad(attr)
- truncated = errors.Cause(nerr) == unix.ENOSPC
- }
- logs := convertCString(logBuf)
- if truncated {
- logs += "\n(truncated...)"
- }
- return nil, &loadError{err, logs}
- }
- // NewProgramFromFD creates a program from a raw fd.
- //
- // You should not use fd after calling this function.
- func NewProgramFromFD(fd int) (*Program, error) {
- if fd < 0 {
- return nil, errors.New("invalid fd")
- }
- bpfFd := newBPFFD(uint32(fd))
- info, err := bpfGetProgInfoByFD(bpfFd)
- if err != nil {
- bpfFd.forget()
- return nil, err
- }
- var name string
- if bpfName := convertCString(info.name[:]); bpfName != "" {
- name = bpfName
- } else {
- name = convertCString(info.tag[:])
- }
- return newProgram(bpfFd, name, newProgramABIFromInfo(info)), nil
- }
- func newProgram(fd *bpfFD, name string, abi *ProgramABI) *Program {
- return &Program{
- name: name,
- fd: fd,
- abi: *abi,
- }
- }
- func convertProgramSpec(spec *ProgramSpec, includeName bool) (*bpfProgLoadAttr, error) {
- if len(spec.Instructions) == 0 {
- return nil, errors.New("Instructions cannot be empty")
- }
- if len(spec.License) == 0 {
- return nil, errors.New("License cannot be empty")
- }
- buf := bytes.NewBuffer(make([]byte, 0, len(spec.Instructions)*asm.InstructionSize))
- err := spec.Instructions.Marshal(buf, internal.NativeEndian)
- if err != nil {
- return nil, err
- }
- bytecode := buf.Bytes()
- insCount := uint32(len(bytecode) / asm.InstructionSize)
- lic := []byte(spec.License)
- attr := &bpfProgLoadAttr{
- progType: spec.Type,
- expectedAttachType: spec.AttachType,
- insCount: insCount,
- instructions: newPtr(unsafe.Pointer(&bytecode[0])),
- license: newPtr(unsafe.Pointer(&lic[0])),
- }
- name, err := newBPFObjName(spec.Name)
- if err != nil {
- return nil, err
- }
- if includeName {
- attr.progName = name
- }
- return attr, nil
- }
- func (p *Program) String() string {
- if p.name != "" {
- return fmt.Sprintf("%s(%s)#%s", p.abi.Type, p.name, p.fd)
- }
- return fmt.Sprintf("%s#%s", p.abi.Type, p.fd)
- }
- // ABI gets the ABI of the Program
- func (p *Program) ABI() ProgramABI {
- return p.abi
- }
- // FD gets the file descriptor of the Program.
- //
- // It is invalid to call this function after Close has been called.
- func (p *Program) FD() int {
- fd, err := p.fd.value()
- if err != nil {
- // Best effort: -1 is the number most likely to be an
- // invalid file descriptor.
- return -1
- }
- return int(fd)
- }
- // Clone creates a duplicate of the Program.
- //
- // Closing the duplicate does not affect the original, and vice versa.
- //
- // Cloning a nil Program returns nil.
- func (p *Program) Clone() (*Program, error) {
- if p == nil {
- return nil, nil
- }
- dup, err := p.fd.dup()
- if err != nil {
- return nil, errors.Wrap(err, "can't clone program")
- }
- return newProgram(dup, p.name, &p.abi), nil
- }
- // Pin persists the Program past the lifetime of the process that created it
- //
- // This requires bpffs to be mounted above fileName. See http://cilium.readthedocs.io/en/doc-1.0/kubernetes/install/#mounting-the-bpf-fs-optional
- func (p *Program) Pin(fileName string) error {
- return errors.Wrap(bpfPinObject(fileName, p.fd), "can't pin program")
- }
- // Close unloads the program from the kernel.
- func (p *Program) Close() error {
- if p == nil {
- return nil
- }
- return p.fd.close()
- }
- // Test runs the Program in the kernel with the given input and returns the
- // value returned by the eBPF program. outLen may be zero.
- //
- // Note: the kernel expects at least 14 bytes input for an ethernet header for
- // XDP and SKB programs.
- //
- // This function requires at least Linux 4.12.
- func (p *Program) Test(in []byte) (uint32, []byte, error) {
- ret, out, _, err := p.testRun(in, 1)
- return ret, out, err
- }
- // Benchmark runs the Program with the given input for a number of times
- // and returns the time taken per iteration.
- //
- // The returned value is the return value of the last execution of
- // the program.
- //
- // This function requires at least Linux 4.12.
- func (p *Program) Benchmark(in []byte, repeat int) (uint32, time.Duration, error) {
- ret, _, total, err := p.testRun(in, repeat)
- return ret, total, err
- }
- var noProgTestRun = featureTest{
- Fn: func() bool {
- prog, err := NewProgram(&ProgramSpec{
- Type: SocketFilter,
- Instructions: asm.Instructions{
- asm.LoadImm(asm.R0, 0, asm.DWord),
- asm.Return(),
- },
- License: "MIT",
- })
- if err != nil {
- // This may be because we lack sufficient permissions, etc.
- return false
- }
- defer prog.Close()
- fd, err := prog.fd.value()
- if err != nil {
- return false
- }
- // Programs require at least 14 bytes input
- in := make([]byte, 14)
- attr := bpfProgTestRunAttr{
- fd: fd,
- dataSizeIn: uint32(len(in)),
- dataIn: newPtr(unsafe.Pointer(&in[0])),
- }
- _, err = bpfCall(_ProgTestRun, unsafe.Pointer(&attr), unsafe.Sizeof(attr))
- return errors.Cause(err) == unix.EINVAL
- },
- }
- func (p *Program) testRun(in []byte, repeat int) (uint32, []byte, time.Duration, error) {
- if uint(repeat) > math.MaxUint32 {
- return 0, nil, 0, fmt.Errorf("repeat is too high")
- }
- if len(in) == 0 {
- return 0, nil, 0, fmt.Errorf("missing input")
- }
- if uint(len(in)) > math.MaxUint32 {
- return 0, nil, 0, fmt.Errorf("input is too long")
- }
- if noProgTestRun.Result() {
- return 0, nil, 0, errNotSupported
- }
- // Older kernels ignore the dataSizeOut argument when copying to user space.
- // Combined with things like bpf_xdp_adjust_head() we don't really know what the final
- // size will be. Hence we allocate an output buffer which we hope will always be large
- // enough, and panic if the kernel wrote past the end of the allocation.
- // See https://patchwork.ozlabs.org/cover/1006822/
- out := make([]byte, len(in)+outputPad)
- fd, err := p.fd.value()
- if err != nil {
- return 0, nil, 0, err
- }
- attr := bpfProgTestRunAttr{
- fd: fd,
- dataSizeIn: uint32(len(in)),
- dataSizeOut: uint32(len(out)),
- dataIn: newPtr(unsafe.Pointer(&in[0])),
- dataOut: newPtr(unsafe.Pointer(&out[0])),
- repeat: uint32(repeat),
- }
- _, err = bpfCall(_ProgTestRun, unsafe.Pointer(&attr), unsafe.Sizeof(attr))
- if err != nil {
- return 0, nil, 0, errors.Wrap(err, "can't run test")
- }
- if int(attr.dataSizeOut) > cap(out) {
- // Houston, we have a problem. The program created more data than we allocated,
- // and the kernel wrote past the end of our buffer.
- panic("kernel wrote past end of output buffer")
- }
- out = out[:int(attr.dataSizeOut)]
- total := time.Duration(attr.duration) * time.Nanosecond
- return attr.retval, out, total, nil
- }
- func unmarshalProgram(buf []byte) (*Program, error) {
- if len(buf) != 4 {
- return nil, errors.New("program id requires 4 byte value")
- }
- // Looking up an entry in a nested map or prog array returns an id,
- // not an fd.
- id := internal.NativeEndian.Uint32(buf)
- fd, err := bpfGetProgramFDByID(id)
- if err != nil {
- return nil, err
- }
- abi, err := newProgramABIFromFd(fd)
- if err != nil {
- _ = fd.close()
- return nil, err
- }
- return newProgram(fd, "", abi), nil
- }
- // MarshalBinary implements BinaryMarshaler.
- func (p *Program) MarshalBinary() ([]byte, error) {
- value, err := p.fd.value()
- if err != nil {
- return nil, err
- }
- buf := make([]byte, 4)
- internal.NativeEndian.PutUint32(buf, value)
- return buf, nil
- }
- // Attach a Program to a container object fd
- func (p *Program) Attach(fd int, typ AttachType, flags AttachFlags) error {
- if fd < 0 {
- return errors.New("invalid fd")
- }
- pfd, err := p.fd.value()
- if err != nil {
- return err
- }
- attr := bpfProgAlterAttr{
- targetFd: uint32(fd),
- attachBpfFd: pfd,
- attachType: uint32(typ),
- attachFlags: uint32(flags),
- }
- return bpfProgAlter(_ProgAttach, &attr)
- }
- // Detach a Program from a container object fd
- func (p *Program) Detach(fd int, typ AttachType, flags AttachFlags) error {
- if fd < 0 {
- return errors.New("invalid fd")
- }
- pfd, err := p.fd.value()
- if err != nil {
- return err
- }
- attr := bpfProgAlterAttr{
- targetFd: uint32(fd),
- attachBpfFd: pfd,
- attachType: uint32(typ),
- attachFlags: uint32(flags),
- }
- return bpfProgAlter(_ProgDetach, &attr)
- }
- // LoadPinnedProgram loads a Program from a BPF file.
- //
- // Requires at least Linux 4.13, use LoadPinnedProgramExplicit on
- // earlier versions.
- func LoadPinnedProgram(fileName string) (*Program, error) {
- fd, err := bpfGetObject(fileName)
- if err != nil {
- return nil, err
- }
- abi, err := newProgramABIFromFd(fd)
- if err != nil {
- _ = fd.close()
- return nil, err
- }
- return newProgram(fd, filepath.Base(fileName), abi), nil
- }
- // LoadPinnedProgramExplicit loads a program with explicit parameters.
- func LoadPinnedProgramExplicit(fileName string, abi *ProgramABI) (*Program, error) {
- fd, err := bpfGetObject(fileName)
- if err != nil {
- return nil, err
- }
- return newProgram(fd, filepath.Base(fileName), abi), nil
- }
- // SanitizeName replaces all invalid characters in name.
- //
- // Use this to automatically generate valid names for maps and
- // programs at run time.
- //
- // Passing a negative value for replacement will delete characters
- // instead of replacing them.
- func SanitizeName(name string, replacement rune) string {
- return strings.Map(func(char rune) rune {
- if invalidBPFObjNameChar(char) {
- return replacement
- }
- return char
- }, name)
- }
- type loadError struct {
- cause error
- verifierLog string
- }
- func (le *loadError) Error() string {
- if le.verifierLog == "" {
- return fmt.Sprintf("failed to load program: %s", le.cause)
- }
- return fmt.Sprintf("failed to load program: %s: %s", le.cause, le.verifierLog)
- }
- func (le *loadError) Cause() error {
- return le.cause
- }
- // IsNotSupported returns true if an error occurred because
- // the kernel does not have support for a specific feature.
- func IsNotSupported(err error) bool {
- return errors.Cause(err) == errNotSupported
- }
|