mirror of https://github.com/aya-rs/aya
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
109 lines
3.1 KiB
Rust
109 lines
3.1 KiB
Rust
use core::{borrow::Borrow, cell::UnsafeCell, marker::PhantomData, mem};
|
|
|
|
use aya_ebpf_cty::c_void;
|
|
|
|
use crate::{
|
|
bindings::{bpf_map_def, bpf_map_type::BPF_MAP_TYPE_SOCKHASH, bpf_sock_ops},
|
|
helpers::{
|
|
bpf_map_lookup_elem, bpf_msg_redirect_hash, bpf_sk_assign, bpf_sk_redirect_hash,
|
|
bpf_sk_release, bpf_sock_hash_update,
|
|
},
|
|
maps::PinningType,
|
|
programs::{SkBuffContext, SkLookupContext, SkMsgContext},
|
|
EbpfContext,
|
|
};
|
|
|
|
#[repr(transparent)]
|
|
pub struct SockHash<K> {
|
|
def: UnsafeCell<bpf_map_def>,
|
|
_k: PhantomData<K>,
|
|
}
|
|
|
|
unsafe impl<K: Sync> Sync for SockHash<K> {}
|
|
|
|
impl<K> SockHash<K> {
|
|
pub const fn with_max_entries(max_entries: u32, flags: u32) -> SockHash<K> {
|
|
SockHash {
|
|
def: UnsafeCell::new(bpf_map_def {
|
|
type_: BPF_MAP_TYPE_SOCKHASH,
|
|
key_size: mem::size_of::<K>() as u32,
|
|
value_size: mem::size_of::<u32>() as u32,
|
|
max_entries,
|
|
map_flags: flags,
|
|
id: 0,
|
|
pinning: PinningType::None as u32,
|
|
}),
|
|
_k: PhantomData,
|
|
}
|
|
}
|
|
|
|
pub const fn pinned(max_entries: u32, flags: u32) -> SockHash<K> {
|
|
SockHash {
|
|
def: UnsafeCell::new(bpf_map_def {
|
|
type_: BPF_MAP_TYPE_SOCKHASH,
|
|
key_size: mem::size_of::<K>() as u32,
|
|
value_size: mem::size_of::<u32>() as u32,
|
|
max_entries,
|
|
map_flags: flags,
|
|
id: 0,
|
|
pinning: PinningType::ByName as u32,
|
|
}),
|
|
_k: PhantomData,
|
|
}
|
|
}
|
|
|
|
pub fn update(&self, key: &mut K, sk_ops: &mut bpf_sock_ops, flags: u64) -> Result<(), i64> {
|
|
let ret = unsafe {
|
|
bpf_sock_hash_update(
|
|
sk_ops as *mut _,
|
|
self.def.get() as *mut _,
|
|
key as *mut _ as *mut c_void,
|
|
flags,
|
|
)
|
|
};
|
|
(ret == 0).then_some(()).ok_or(ret)
|
|
}
|
|
|
|
pub fn redirect_msg(&self, ctx: &SkMsgContext, key: &mut K, flags: u64) -> i64 {
|
|
unsafe {
|
|
bpf_msg_redirect_hash(
|
|
ctx.as_ptr() as *mut _,
|
|
self.def.get() as *mut _,
|
|
key as *mut _ as *mut _,
|
|
flags,
|
|
)
|
|
}
|
|
}
|
|
|
|
pub fn redirect_skb(&self, ctx: &SkBuffContext, key: &mut K, flags: u64) -> i64 {
|
|
unsafe {
|
|
bpf_sk_redirect_hash(
|
|
ctx.as_ptr() as *mut _,
|
|
self.def.get() as *mut _,
|
|
key as *mut _ as *mut _,
|
|
flags,
|
|
)
|
|
}
|
|
}
|
|
|
|
pub fn redirect_sk_lookup(
|
|
&mut self,
|
|
ctx: &SkLookupContext,
|
|
key: impl Borrow<K>,
|
|
flags: u64,
|
|
) -> Result<(), u32> {
|
|
unsafe {
|
|
let sk = bpf_map_lookup_elem(
|
|
&mut self.def as *mut _ as *mut _,
|
|
&key as *const _ as *const c_void,
|
|
);
|
|
if sk.is_null() {
|
|
return Err(1);
|
|
}
|
|
let ret = bpf_sk_assign(ctx.as_ptr() as *mut _, sk, flags);
|
|
bpf_sk_release(sk);
|
|
(ret == 0).then_some(()).ok_or(1)
|
|
}
|
|
}
|
|
}
|