use std::{
borrow::Borrow,
ffi::CString,
fmt, io,
marker::PhantomData,
mem,
ops::Deref,
os::fd::{AsFd, BorrowedFd, OwnedFd},
path::Path,
ptr,
};
use aya_obj::{generated::bpf_map_type, InvalidTypeBinding};
use libc::{getrlimit, rlim_t, rlimit, RLIMIT_MEMLOCK, RLIM_INFINITY};
use log::warn;
use thiserror::Error;
use crate::{
obj::{self, parse_map_info, EbpfSectionKind},
pin::PinError,
sys::{
bpf_create_map, bpf_get_object, bpf_map_freeze, bpf_map_get_fd_by_id, bpf_map_get_next_key,
bpf_map_update_elem_ptr, bpf_pin_object, SyscallError,
},
util::{nr_cpus, KernelVersion},
PinningType, Pod,
};
pub mod array;
pub mod bloom_filter;
pub mod hash_map;
mod info;
pub mod lpm_trie;
pub mod perf;
pub mod queue;
pub mod ring_buf;
pub mod sock;
pub mod stack;
pub mod stack_trace;
pub mod xdp;
pub use array::{Array, PerCpuArray, ProgramArray};
pub use bloom_filter::BloomFilter;
pub use hash_map::{HashMap, PerCpuHashMap};
pub use info::{loaded_maps, MapInfo, MapType};
pub use lpm_trie::LpmTrie;
#[cfg(any(feature = "async_tokio", feature = "async_std"))]
#[cfg_attr(docsrs, doc(cfg(any(feature = "async_tokio", feature = "async_std"))))]
pub use perf::AsyncPerfEventArray;
pub use perf::PerfEventArray;
pub use queue::Queue;
pub use ring_buf::RingBuf;
pub use sock::{SockHash, SockMap};
pub use stack::Stack;
pub use stack_trace::StackTraceMap;
pub use xdp::{CpuMap, DevMap, DevMapHash, XskMap};
#[derive(Error, Debug)]
pub enum MapError {
#[error("invalid map type {map_type}")]
InvalidMapType {
map_type: u32,
},
#[error("invalid map name `{name}`")]
InvalidName {
name: String,
},
#[error("failed to create map `{name}` with code {code}")]
CreateError {
name: String,
code: i64,
#[source]
io_error: io::Error,
},
#[error("invalid key size {size}, expected {expected}")]
InvalidKeySize {
size: usize,
expected: usize,
},
#[error("invalid value size {size}, expected {expected}")]
InvalidValueSize {
size: usize,
expected: usize,
},
#[error("the index is {index} but `max_entries` is {max_entries}")]
OutOfBounds {
index: u32,
max_entries: u32,
},
#[error("key not found")]
KeyNotFound,
#[error("element not found")]
ElementNotFound,
#[error("the program is not loaded")]
ProgramNotLoaded,
#[error(transparent)]
IoError(#[from] io::Error),
#[error(transparent)]
SyscallError(#[from] SyscallError),
#[error("map `{name:?}` requested pinning. pinning failed")]
PinError {
name: Option<String>,
#[source]
error: PinError,
},
#[error("program ids are not supported by the current kernel")]
ProgIdNotSupported,
#[error("Unsupported map type found {map_type}")]
Unsupported {
map_type: u32,
},
}
impl From<InvalidTypeBinding<u32>> for MapError {
fn from(e: InvalidTypeBinding<u32>) -> Self {
let InvalidTypeBinding { value } = e;
Self::InvalidMapType { map_type: value }
}
}
#[derive(Debug)]
pub struct MapFd {
fd: crate::MockableFd,
}
impl MapFd {
fn from_fd(fd: crate::MockableFd) -> Self {
Self { fd }
}
fn try_clone(&self) -> io::Result<Self> {
let Self { fd } = self;
let fd = fd.try_clone()?;
Ok(Self { fd })
}
}
impl AsFd for MapFd {
fn as_fd(&self) -> BorrowedFd<'_> {
let Self { fd } = self;
fd.as_fd()
}
}
fn maybe_warn_rlimit() {
let mut limit = mem::MaybeUninit::<rlimit>::uninit();
let ret = unsafe { getrlimit(RLIMIT_MEMLOCK, limit.as_mut_ptr()) };
if ret == 0 {
let limit = unsafe { limit.assume_init() };
if limit.rlim_cur == RLIM_INFINITY {
return;
}
struct HumanSize(rlim_t);
impl fmt::Display for HumanSize {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
let &Self(size) = self;
if size < 1024 {
write!(f, "{} bytes", size)
} else if size < 1024 * 1024 {
write!(f, "{} KiB", size / 1024)
} else {
write!(f, "{} MiB", size / 1024 / 1024)
}
}
}
warn!(
"RLIMIT_MEMLOCK value is {}, not RLIM_INFINITY; if experiencing problems with creating \
maps, try raising RLIMIT_MEMLOCK either to RLIM_INFINITY or to a higher value sufficient \
for the size of your maps",
HumanSize(limit.rlim_cur)
);
}
}
#[derive(Debug)]
pub enum Map {
Array(MapData),
BloomFilter(MapData),
CpuMap(MapData),
DevMap(MapData),
DevMapHash(MapData),
HashMap(MapData),
LpmTrie(MapData),
LruHashMap(MapData),
PerCpuArray(MapData),
PerCpuHashMap(MapData),
PerCpuLruHashMap(MapData),
PerfEventArray(MapData),
ProgramArray(MapData),
Queue(MapData),
RingBuf(MapData),
SockHash(MapData),
SockMap(MapData),
Stack(MapData),
StackTraceMap(MapData),
Unsupported(MapData),
XskMap(MapData),
}
impl Map {
fn map_type(&self) -> u32 {
match self {
Self::Array(map) => map.obj.map_type(),
Self::BloomFilter(map) => map.obj.map_type(),
Self::CpuMap(map) => map.obj.map_type(),
Self::DevMap(map) => map.obj.map_type(),
Self::DevMapHash(map) => map.obj.map_type(),
Self::HashMap(map) => map.obj.map_type(),
Self::LpmTrie(map) => map.obj.map_type(),
Self::LruHashMap(map) => map.obj.map_type(),
Self::PerCpuArray(map) => map.obj.map_type(),
Self::PerCpuHashMap(map) => map.obj.map_type(),
Self::PerCpuLruHashMap(map) => map.obj.map_type(),
Self::PerfEventArray(map) => map.obj.map_type(),
Self::ProgramArray(map) => map.obj.map_type(),
Self::Queue(map) => map.obj.map_type(),
Self::RingBuf(map) => map.obj.map_type(),
Self::SockHash(map) => map.obj.map_type(),
Self::SockMap(map) => map.obj.map_type(),
Self::Stack(map) => map.obj.map_type(),
Self::StackTraceMap(map) => map.obj.map_type(),
Self::Unsupported(map) => map.obj.map_type(),
Self::XskMap(map) => map.obj.map_type(),
}
}
pub fn pin<P: AsRef<Path>>(&self, path: P) -> Result<(), PinError> {
match self {
Self::Array(map) => map.pin(path),
Self::BloomFilter(map) => map.pin(path),
Self::CpuMap(map) => map.pin(path),
Self::DevMap(map) => map.pin(path),
Self::DevMapHash(map) => map.pin(path),
Self::HashMap(map) => map.pin(path),
Self::LpmTrie(map) => map.pin(path),
Self::LruHashMap(map) => map.pin(path),
Self::PerCpuArray(map) => map.pin(path),
Self::PerCpuHashMap(map) => map.pin(path),
Self::PerCpuLruHashMap(map) => map.pin(path),
Self::PerfEventArray(map) => map.pin(path),
Self::ProgramArray(map) => map.pin(path),
Self::Queue(map) => map.pin(path),
Self::RingBuf(map) => map.pin(path),
Self::SockHash(map) => map.pin(path),
Self::SockMap(map) => map.pin(path),
Self::Stack(map) => map.pin(path),
Self::StackTraceMap(map) => map.pin(path),
Self::Unsupported(map) => map.pin(path),
Self::XskMap(map) => map.pin(path),
}
}
}
macro_rules! impl_map_pin {
($ty_param:tt {
$($ty:ident),+ $(,)?
}) => {
$(impl_map_pin!(<$ty_param> $ty);)+
};
(
<($($ty_param:ident),*)>
$ty:ident
) => {
impl<T: Borrow<MapData>, $($ty_param: Pod),*> $ty<T, $($ty_param),*>
{
pub fn pin<P: AsRef<Path>>(self, path: P) -> Result<(), PinError> {
let data = self.inner.borrow();
data.pin(path)
}
}
};
}
impl_map_pin!(() {
ProgramArray,
SockMap,
StackTraceMap,
CpuMap,
DevMap,
DevMapHash,
XskMap,
});
impl_map_pin!((V) {
Array,
PerCpuArray,
SockHash,
BloomFilter,
Queue,
Stack,
});
impl_map_pin!((K, V) {
HashMap,
PerCpuHashMap,
LpmTrie,
});
macro_rules! impl_try_from_map {
($ty_param:tt {
$($ty:ident $(from $($variant:ident)|+)?),+ $(,)?
}) => {
$(impl_try_from_map!(<$ty_param> $ty $(from $($variant)|+)?);)+
};
(<$ty_param:tt> $ty:ident) => {
impl_try_from_map!(<$ty_param> $ty from $ty);
};
(
<($($ty_param:ident),*)> $ty:ident from $($variant:ident)|+
) => {
impl_try_from_map!(<'a> ($($ty_param),*) $ty from $($variant)|+);
impl_try_from_map!(<'a mut> ($($ty_param),*) $ty from $($variant)|+);
impl_try_from_map!(<> ($($ty_param),*) $ty from $($variant)|+);
};
(
<$($l:lifetime $($m:ident)?)?>
($($ty_param:ident),*)
$ty:ident from $($variant:ident)|+
) => {
impl<$($l,)? $($ty_param: Pod),*> TryFrom<$(&$l $($m)?)? Map>
for $ty<$(&$l $($m)?)? MapData, $($ty_param),*>
{
type Error = MapError;
fn try_from(map: $(&$l $($m)?)? Map) -> Result<Self, Self::Error> {
match map {
$(Map::$variant(map_data) => Self::new(map_data),)+
map => Err(MapError::InvalidMapType {
map_type: map.map_type()
}),
}
}
}
};
}
impl_try_from_map!(() {
CpuMap,
DevMap,
DevMapHash,
PerfEventArray,
ProgramArray,
RingBuf,
SockMap,
StackTraceMap,
XskMap,
});
#[cfg(any(feature = "async_tokio", feature = "async_std"))]
#[cfg_attr(docsrs, doc(cfg(any(feature = "async_tokio", feature = "async_std"))))]
impl_try_from_map!(() {
AsyncPerfEventArray from PerfEventArray,
});
impl_try_from_map!((V) {
Array,
BloomFilter,
PerCpuArray,
Queue,
SockHash,
Stack,
});
impl_try_from_map!((K, V) {
HashMap from HashMap|LruHashMap,
LpmTrie,
PerCpuHashMap from PerCpuHashMap|PerCpuLruHashMap,
});
pub(crate) fn check_bounds(map: &MapData, index: u32) -> Result<(), MapError> {
let max_entries = map.obj.max_entries();
if index >= max_entries {
Err(MapError::OutOfBounds { index, max_entries })
} else {
Ok(())
}
}
pub(crate) fn check_kv_size<K, V>(map: &MapData) -> Result<(), MapError> {
let size = mem::size_of::<K>();
let expected = map.obj.key_size() as usize;
if size != expected {
return Err(MapError::InvalidKeySize { size, expected });
}
let size = mem::size_of::<V>();
let expected = map.obj.value_size() as usize;
if size != expected {
return Err(MapError::InvalidValueSize { size, expected });
};
Ok(())
}
pub(crate) fn check_v_size<V>(map: &MapData) -> Result<(), MapError> {
let size = mem::size_of::<V>();
let expected = map.obj.value_size() as usize;
if size != expected {
return Err(MapError::InvalidValueSize { size, expected });
};
Ok(())
}
#[derive(Debug)]
pub struct MapData {
obj: obj::Map,
fd: MapFd,
}
impl MapData {
pub fn create(
mut obj: obj::Map,
name: &str,
btf_fd: Option<BorrowedFd<'_>>,
) -> Result<Self, MapError> {
let c_name = CString::new(name).map_err(|_| MapError::InvalidName { name: name.into() })?;
if obj.map_type() == bpf_map_type::BPF_MAP_TYPE_PERF_EVENT_ARRAY as u32 {
let nr_cpus = nr_cpus().map_err(|(_, error)| MapError::IoError(error))? as u32;
if obj.max_entries() == 0 || obj.max_entries() > nr_cpus {
obj.set_max_entries(nr_cpus);
}
};
#[cfg(not(test))]
let kernel_version = KernelVersion::current().unwrap();
#[cfg(test)]
let kernel_version = KernelVersion::new(0xff, 0xff, 0xff);
let fd =
bpf_create_map(&c_name, &obj, btf_fd, kernel_version).map_err(|(code, io_error)| {
if kernel_version < KernelVersion::new(5, 11, 0) {
maybe_warn_rlimit();
}
MapError::CreateError {
name: name.into(),
code,
io_error,
}
})?;
Ok(Self {
obj,
fd: MapFd::from_fd(fd),
})
}
pub(crate) fn create_pinned_by_name<P: AsRef<Path>>(
path: P,
obj: obj::Map,
name: &str,
btf_fd: Option<BorrowedFd<'_>>,
) -> Result<Self, MapError> {
use std::os::unix::ffi::OsStrExt as _;
let path = path.as_ref().join(name);
let path_string = match CString::new(path.as_os_str().as_bytes()) {
Ok(path) => path,
Err(error) => {
return Err(MapError::PinError {
name: Some(name.into()),
error: PinError::InvalidPinPath { path, error },
});
}
};
match bpf_get_object(&path_string).map_err(|(_, io_error)| SyscallError {
call: "BPF_OBJ_GET",
io_error,
}) {
Ok(fd) => Ok(Self {
obj,
fd: MapFd::from_fd(fd),
}),
Err(_) => {
let map = Self::create(obj, name, btf_fd)?;
map.pin(&path).map_err(|error| MapError::PinError {
name: Some(name.into()),
error,
})?;
Ok(map)
}
}
}
pub(crate) fn finalize(&mut self) -> Result<(), MapError> {
let Self { obj, fd } = self;
if !obj.data().is_empty() {
bpf_map_update_elem_ptr(fd.as_fd(), &0 as *const _, obj.data_mut().as_mut_ptr(), 0)
.map_err(|(_, io_error)| SyscallError {
call: "bpf_map_update_elem",
io_error,
})
.map_err(MapError::from)?;
}
if obj.section_kind() == EbpfSectionKind::Rodata {
bpf_map_freeze(fd.as_fd())
.map_err(|(_, io_error)| SyscallError {
call: "bpf_map_freeze",
io_error,
})
.map_err(MapError::from)?;
}
Ok(())
}
pub fn from_pin<P: AsRef<Path>>(path: P) -> Result<Self, MapError> {
use std::os::unix::ffi::OsStrExt as _;
let path = path.as_ref();
let path_string =
CString::new(path.as_os_str().as_bytes()).map_err(|error| MapError::PinError {
name: None,
error: PinError::InvalidPinPath {
path: path.into(),
error,
},
})?;
let fd = bpf_get_object(&path_string).map_err(|(_, io_error)| SyscallError {
call: "BPF_OBJ_GET",
io_error,
})?;
Self::from_fd_inner(fd)
}
pub fn from_id(id: u32) -> Result<Self, MapError> {
let fd = bpf_map_get_fd_by_id(id)?;
Self::from_fd_inner(fd)
}
fn from_fd_inner(fd: crate::MockableFd) -> Result<Self, MapError> {
let MapInfo(info) = MapInfo::new_from_fd(fd.as_fd())?;
Ok(Self {
obj: parse_map_info(info, PinningType::None),
fd: MapFd::from_fd(fd),
})
}
pub fn from_fd(fd: OwnedFd) -> Result<Self, MapError> {
let fd = crate::MockableFd::from_fd(fd);
Self::from_fd_inner(fd)
}
pub fn pin<P: AsRef<Path>>(&self, path: P) -> Result<(), PinError> {
use std::os::unix::ffi::OsStrExt as _;
let Self { fd, obj: _ } = self;
let path = path.as_ref();
let path_string = CString::new(path.as_os_str().as_bytes()).map_err(|error| {
PinError::InvalidPinPath {
path: path.to_path_buf(),
error,
}
})?;
bpf_pin_object(fd.as_fd(), &path_string).map_err(|(_, io_error)| SyscallError {
call: "BPF_OBJ_PIN",
io_error,
})?;
Ok(())
}
pub fn fd(&self) -> &MapFd {
let Self { obj: _, fd } = self;
fd
}
pub(crate) fn obj(&self) -> &obj::Map {
let Self { obj, fd: _ } = self;
obj
}
pub fn info(&self) -> Result<MapInfo, MapError> {
MapInfo::new_from_fd(self.fd.as_fd())
}
}
pub trait IterableMap<K: Pod, V> {
fn map(&self) -> &MapData;
fn get(&self, key: &K) -> Result<V, MapError>;
}
pub struct MapKeys<'coll, K: Pod> {
map: &'coll MapData,
err: bool,
key: Option<K>,
}
impl<'coll, K: Pod> MapKeys<'coll, K> {
fn new(map: &'coll MapData) -> Self {
Self {
map,
err: false,
key: None,
}
}
}
impl<K: Pod> Iterator for MapKeys<'_, K> {
type Item = Result<K, MapError>;
fn next(&mut self) -> Option<Result<K, MapError>> {
if self.err {
return None;
}
let fd = self.map.fd().as_fd();
let key =
bpf_map_get_next_key(fd, self.key.as_ref()).map_err(|(_, io_error)| SyscallError {
call: "bpf_map_get_next_key",
io_error,
});
match key {
Err(err) => {
self.err = true;
Some(Err(err.into()))
}
Ok(key) => {
self.key = key;
key.map(Ok)
}
}
}
}
pub struct MapIter<'coll, K: Pod, V, I: IterableMap<K, V>> {
keys: MapKeys<'coll, K>,
map: &'coll I,
_v: PhantomData<V>,
}
impl<'coll, K: Pod, V, I: IterableMap<K, V>> MapIter<'coll, K, V, I> {
fn new(map: &'coll I) -> Self {
Self {
keys: MapKeys::new(map.map()),
map,
_v: PhantomData,
}
}
}
impl<K: Pod, V, I: IterableMap<K, V>> Iterator for MapIter<'_, K, V, I> {
type Item = Result<(K, V), MapError>;
fn next(&mut self) -> Option<Self::Item> {
loop {
match self.keys.next() {
Some(Ok(key)) => match self.map.get(&key) {
Ok(value) => return Some(Ok((key, value))),
Err(MapError::KeyNotFound) => continue,
Err(e) => return Some(Err(e)),
},
Some(Err(e)) => return Some(Err(e)),
None => return None,
}
}
}
}
pub(crate) struct PerCpuKernelMem {
bytes: Vec<u8>,
}
impl PerCpuKernelMem {
pub(crate) fn as_mut_ptr(&mut self) -> *mut u8 {
self.bytes.as_mut_ptr()
}
}
#[derive(Debug)]
pub struct PerCpuValues<T: Pod> {
values: Box<[T]>,
}
impl<T: Pod> TryFrom<Vec<T>> for PerCpuValues<T> {
type Error = io::Error;
fn try_from(values: Vec<T>) -> Result<Self, Self::Error> {
let nr_cpus = nr_cpus().map_err(|(_, error)| error)?;
if values.len() != nr_cpus {
return Err(io::Error::new(
io::ErrorKind::InvalidInput,
format!("not enough values ({}), nr_cpus: {}", values.len(), nr_cpus),
));
}
Ok(Self {
values: values.into_boxed_slice(),
})
}
}
impl<T: Pod> PerCpuValues<T> {
pub(crate) fn alloc_kernel_mem() -> Result<PerCpuKernelMem, io::Error> {
let value_size = (mem::size_of::<T>() + 7) & !7;
let nr_cpus = nr_cpus().map_err(|(_, error)| error)?;
Ok(PerCpuKernelMem {
bytes: vec![0u8; nr_cpus * value_size],
})
}
pub(crate) unsafe fn from_kernel_mem(mem: PerCpuKernelMem) -> Self {
let mem_ptr = mem.bytes.as_ptr() as usize;
let value_size = (mem::size_of::<T>() + 7) & !7;
let mut values = Vec::new();
let mut offset = 0;
while offset < mem.bytes.len() {
values.push(ptr::read_unaligned((mem_ptr + offset) as *const _));
offset += value_size;
}
Self {
values: values.into_boxed_slice(),
}
}
pub(crate) fn build_kernel_mem(&self) -> Result<PerCpuKernelMem, io::Error> {
let mut mem = Self::alloc_kernel_mem()?;
let mem_ptr = mem.as_mut_ptr() as usize;
let value_size = (mem::size_of::<T>() + 7) & !7;
for i in 0..self.values.len() {
unsafe { ptr::write_unaligned((mem_ptr + i * value_size) as *mut _, self.values[i]) };
}
Ok(mem)
}
}
impl<T: Pod> Deref for PerCpuValues<T> {
type Target = Box<[T]>;
fn deref(&self) -> &Self::Target {
&self.values
}
}
#[cfg(test)]
mod test_utils {
use crate::{
bpf_map_def,
generated::{bpf_cmd, bpf_map_type},
maps::MapData,
obj::{self, maps::LegacyMap, EbpfSectionKind},
sys::{override_syscall, Syscall},
};
pub(super) fn new_map(obj: obj::Map) -> MapData {
override_syscall(|call| match call {
Syscall::Ebpf {
cmd: bpf_cmd::BPF_MAP_CREATE,
..
} => Ok(crate::MockableFd::mock_signed_fd().into()),
call => panic!("unexpected syscall {:?}", call),
});
MapData::create(obj, "foo", None).unwrap()
}
pub(super) fn new_obj_map<K>(map_type: bpf_map_type) -> obj::Map {
obj::Map::Legacy(LegacyMap {
def: bpf_map_def {
map_type: map_type as u32,
key_size: std::mem::size_of::<K>() as u32,
value_size: 4,
max_entries: 1024,
..Default::default()
},
section_index: 0,
section_kind: EbpfSectionKind::Maps,
data: Vec::new(),
symbol_index: None,
})
}
pub(super) fn new_obj_map_with_max_entries<K>(
map_type: bpf_map_type,
max_entries: u32,
) -> obj::Map {
obj::Map::Legacy(LegacyMap {
def: bpf_map_def {
map_type: map_type as u32,
key_size: std::mem::size_of::<K>() as u32,
value_size: 4,
max_entries,
..Default::default()
},
section_index: 0,
section_kind: EbpfSectionKind::Maps,
data: Vec::new(),
symbol_index: None,
})
}
}
#[cfg(test)]
mod tests {
use std::os::fd::AsRawFd as _;
use assert_matches::assert_matches;
use libc::{c_char, EFAULT};
fn new_obj_map() -> obj::Map {
test_utils::new_obj_map::<u32>(crate::generated::bpf_map_type::BPF_MAP_TYPE_HASH)
}
use super::*;
use crate::{
generated::bpf_cmd,
sys::{override_syscall, Syscall},
};
#[test]
fn test_from_map_id() {
override_syscall(|call| match call {
Syscall::Ebpf {
cmd: bpf_cmd::BPF_MAP_GET_FD_BY_ID,
attr,
} => {
assert_eq!(
unsafe { attr.__bindgen_anon_6.__bindgen_anon_1.map_id },
1234
);
Ok(crate::MockableFd::mock_signed_fd().into())
}
Syscall::Ebpf {
cmd: bpf_cmd::BPF_OBJ_GET_INFO_BY_FD,
attr,
} => {
assert_eq!(
unsafe { attr.info.bpf_fd },
crate::MockableFd::mock_unsigned_fd(),
);
Ok(0)
}
_ => Err((-1, io::Error::from_raw_os_error(EFAULT))),
});
assert_matches!(
MapData::from_id(1234),
Ok(MapData {
obj: _,
fd,
}) => assert_eq!(fd.as_fd().as_raw_fd(), crate::MockableFd::mock_signed_fd())
);
}
#[test]
fn test_create() {
override_syscall(|call| match call {
Syscall::Ebpf {
cmd: bpf_cmd::BPF_MAP_CREATE,
..
} => Ok(crate::MockableFd::mock_signed_fd().into()),
_ => Err((-1, io::Error::from_raw_os_error(EFAULT))),
});
assert_matches!(
MapData::create(new_obj_map(), "foo", None),
Ok(MapData {
obj: _,
fd,
}) => assert_eq!(fd.as_fd().as_raw_fd(), crate::MockableFd::mock_signed_fd())
);
}
#[test]
#[cfg_attr(miri, ignore = "nr_cpus() opens a file on procfs that upsets miri")]
fn test_create_perf_event_array() {
override_syscall(|call| match call {
Syscall::Ebpf {
cmd: bpf_cmd::BPF_MAP_CREATE,
..
} => Ok(crate::MockableFd::mock_signed_fd().into()),
_ => Err((-1, io::Error::from_raw_os_error(EFAULT))),
});
let nr_cpus = nr_cpus().unwrap();
assert_matches!(
MapData::create(test_utils::new_obj_map_with_max_entries::<u32>(
crate::generated::bpf_map_type::BPF_MAP_TYPE_PERF_EVENT_ARRAY,
65535,
), "foo", None),
Ok(MapData {
obj,
fd,
}) => {
assert_eq!(fd.as_fd().as_raw_fd(), crate::MockableFd::mock_signed_fd());
assert_eq!(obj.max_entries(), nr_cpus as u32)
}
);
assert_matches!(
MapData::create(test_utils::new_obj_map_with_max_entries::<u32>(
crate::generated::bpf_map_type::BPF_MAP_TYPE_PERF_EVENT_ARRAY,
0,
), "foo", None),
Ok(MapData {
obj,
fd,
}) => {
assert_eq!(fd.as_fd().as_raw_fd(), crate::MockableFd::mock_signed_fd());
assert_eq!(obj.max_entries(), nr_cpus as u32)
}
);
assert_matches!(
MapData::create(test_utils::new_obj_map_with_max_entries::<u32>(
crate::generated::bpf_map_type::BPF_MAP_TYPE_PERF_EVENT_ARRAY,
1,
), "foo", None),
Ok(MapData {
obj,
fd,
}) => {
assert_eq!(fd.as_fd().as_raw_fd(), crate::MockableFd::mock_signed_fd());
assert_eq!(obj.max_entries(), 1)
}
);
}
#[test]
#[cfg_attr(
miri,
ignore = "`let map_info = unsafe { &mut *(attr.info.info as *mut bpf_map_info) }` is trying to retag from <wildcard> for Unique permission, but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_name() {
use crate::generated::bpf_map_info;
const TEST_NAME: &str = "foo";
override_syscall(|call| match call {
Syscall::Ebpf {
cmd: bpf_cmd::BPF_MAP_CREATE,
..
} => Ok(crate::MockableFd::mock_signed_fd().into()),
Syscall::Ebpf {
cmd: bpf_cmd::BPF_OBJ_GET_INFO_BY_FD,
attr,
} => {
assert_eq!(
unsafe { attr.info.info_len },
mem::size_of::<bpf_map_info>() as u32
);
let map_info = unsafe { &mut *(attr.info.info as *mut bpf_map_info) };
map_info.name[..TEST_NAME.len()].copy_from_slice(unsafe {
mem::transmute::<&[u8], &[c_char]>(TEST_NAME.as_bytes())
});
Ok(0)
}
_ => Err((-1, io::Error::from_raw_os_error(EFAULT))),
});
let map_data = MapData::create(new_obj_map(), TEST_NAME, None).unwrap();
assert_eq!(TEST_NAME, map_data.info().unwrap().name_as_str().unwrap());
}
#[test]
#[cfg_attr(
miri,
ignore = "`let map_info = unsafe { &mut *(attr.info.info as *mut bpf_map_info) }` is trying to retag from <wildcard> for Unique permission, but no exposed tags have suitable permission in the borrow stack for this location"
)]
fn test_loaded_maps() {
use crate::generated::bpf_map_info;
override_syscall(|call| match call {
Syscall::Ebpf {
cmd: bpf_cmd::BPF_MAP_GET_NEXT_ID,
attr,
} => unsafe {
let id = attr.__bindgen_anon_6.__bindgen_anon_1.start_id;
if id < 5 {
attr.__bindgen_anon_6.next_id = id + 1;
Ok(0)
} else {
Err((-1, io::Error::from_raw_os_error(libc::ENOENT)))
}
},
Syscall::Ebpf {
cmd: bpf_cmd::BPF_MAP_GET_FD_BY_ID,
attr,
} => Ok((unsafe { attr.__bindgen_anon_6.__bindgen_anon_1.map_id }
+ crate::MockableFd::mock_unsigned_fd())
.into()),
Syscall::Ebpf {
cmd: bpf_cmd::BPF_OBJ_GET_INFO_BY_FD,
attr,
} => {
let map_info = unsafe { &mut *(attr.info.info as *mut bpf_map_info) };
map_info.id = unsafe { attr.info.bpf_fd } - crate::MockableFd::mock_unsigned_fd();
map_info.key_size = 32;
map_info.value_size = 64;
map_info.map_flags = 1234;
map_info.max_entries = 99;
Ok(0)
}
_ => Err((-1, io::Error::from_raw_os_error(EFAULT))),
});
assert_eq!(
loaded_maps()
.map(|map_info| {
let map_info = map_info.unwrap();
(
map_info.id(),
map_info.key_size(),
map_info.value_size(),
map_info.map_flags(),
map_info.max_entries(),
map_info.fd().unwrap().as_fd().as_raw_fd(),
)
})
.collect::<Vec<_>>(),
(1..6)
.map(|i: u8| (
i.into(),
32,
64,
1234,
99,
crate::MockableFd::mock_signed_fd() + i32::from(i)
))
.collect::<Vec<_>>(),
);
}
#[test]
fn test_create_failed() {
override_syscall(|_| Err((-42, io::Error::from_raw_os_error(EFAULT))));
assert_matches!(
MapData::create(new_obj_map(), "foo", None),
Err(MapError::CreateError { name, code, io_error }) => {
assert_eq!(name, "foo");
assert_eq!(code, -42);
assert_eq!(io_error.raw_os_error(), Some(EFAULT));
}
);
}
}