mirror of https://github.com/aya-rs/aya
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
207 lines
8.0 KiB
Rust
207 lines
8.0 KiB
Rust
use std::{
|
|
env,
|
|
ffi::OsString,
|
|
fs,
|
|
path::PathBuf,
|
|
process::{Child, Command, Output, Stdio},
|
|
};
|
|
|
|
use anyhow::{anyhow, Context as _, Ok, Result};
|
|
use aya_build::cargo_metadata::{Metadata, MetadataCommand, Package, Target, TargetKind};
|
|
use xtask::{exec, AYA_BUILD_INTEGRATION_BPF, LIBBPF_DIR};
|
|
|
|
/// This file, along with the xtask crate, allows analysis tools such as `cargo check`, `cargo
|
|
/// clippy`, and even `cargo build` to work as users expect. Prior to this file's existence, this
|
|
/// crate's undeclared dependency on artifacts from `integration-ebpf` would cause build (and `cargo check`,
|
|
/// and `cargo clippy`) failures until the user ran certain other commands in the workspace. Conversely,
|
|
/// those same tools (e.g. cargo test --no-run) would produce stale results if run naively because
|
|
/// they'd make use of artifacts from a previous build of `integration-ebpf`.
|
|
///
|
|
/// Note that this solution is imperfect: in particular it has to balance correctness with
|
|
/// performance; an environment variable is used to replace true builds of `integration-ebpf` with
|
|
/// stubs to preserve the property that code generation and linking (in `integration-ebpf`) do not
|
|
/// occur on metadata-only actions such as `cargo check` or `cargo clippy` of this crate. This means
|
|
/// that naively attempting to `cargo test --no-run` this crate will produce binaries that fail at
|
|
/// runtime because the stubs are inadequate for actually running the tests.
|
|
fn main() -> Result<()> {
|
|
println!("cargo:rerun-if-env-changed={AYA_BUILD_INTEGRATION_BPF}");
|
|
|
|
// TODO(https://github.com/rust-lang/cargo/issues/4001): generalize this and move it to
|
|
// aya-build if we can determine that we're in a check build.
|
|
let build_integration_bpf = env::var_os(AYA_BUILD_INTEGRATION_BPF)
|
|
.map(|build_integration_bpf| {
|
|
let build_integration_bpf = std::str::from_utf8(
|
|
build_integration_bpf.as_encoded_bytes(),
|
|
)
|
|
.with_context(|| format!("{AYA_BUILD_INTEGRATION_BPF}={build_integration_bpf:?}"))?;
|
|
let build_integration_bpf = build_integration_bpf
|
|
.parse()
|
|
.with_context(|| format!("{AYA_BUILD_INTEGRATION_BPF}={build_integration_bpf}"))?;
|
|
Ok(build_integration_bpf)
|
|
})
|
|
.transpose()?
|
|
.unwrap_or_default();
|
|
|
|
let Metadata {
|
|
packages,
|
|
workspace_root,
|
|
..
|
|
} = MetadataCommand::new()
|
|
.no_deps()
|
|
.exec()
|
|
.context("MetadataCommand::exec")?;
|
|
let integration_ebpf_package = packages
|
|
.into_iter()
|
|
.find(|Package { name, .. }| name == "integration-ebpf")
|
|
.ok_or_else(|| anyhow!("integration-ebpf package not found"))?;
|
|
|
|
let manifest_dir =
|
|
env::var_os("CARGO_MANIFEST_DIR").ok_or(anyhow!("CARGO_MANIFEST_DIR not set"))?;
|
|
let manifest_dir = PathBuf::from(manifest_dir);
|
|
let out_dir = env::var_os("OUT_DIR").ok_or(anyhow!("OUT_DIR not set"))?;
|
|
let out_dir = PathBuf::from(out_dir);
|
|
|
|
const C_BPF: &[(&str, bool)] = &[
|
|
("ext.bpf.c", false),
|
|
("iter.bpf.c", true),
|
|
("main.bpf.c", false),
|
|
("multimap-btf.bpf.c", false),
|
|
("reloc.bpf.c", true),
|
|
("text_64_64_reloc.c", false),
|
|
("variables_reloc.bpf.c", false),
|
|
];
|
|
|
|
if build_integration_bpf {
|
|
let endian = env::var_os("CARGO_CFG_TARGET_ENDIAN")
|
|
.ok_or(anyhow!("CARGO_CFG_TARGET_ENDIAN not set"))?;
|
|
let target = if endian == "big" {
|
|
"bpfeb"
|
|
} else if endian == "little" {
|
|
"bpfel"
|
|
} else {
|
|
return Err(anyhow!("unsupported endian={endian:?}"));
|
|
};
|
|
|
|
let libbpf_dir = workspace_root.join(LIBBPF_DIR);
|
|
println!("cargo:rerun-if-changed={libbpf_dir}");
|
|
|
|
let libbpf_headers_dir = out_dir.join("libbpf_headers");
|
|
|
|
let mut includedir = OsString::new();
|
|
includedir.push("INCLUDEDIR=");
|
|
includedir.push(&libbpf_headers_dir);
|
|
|
|
exec(
|
|
Command::new("make")
|
|
.arg("-C")
|
|
.arg(libbpf_dir.join("src"))
|
|
.arg(includedir)
|
|
.arg("install_headers"),
|
|
)?;
|
|
|
|
let bpf_dir = manifest_dir.join("bpf");
|
|
|
|
let mut target_arch = OsString::new();
|
|
target_arch.push("-D__TARGET_ARCH_");
|
|
|
|
let arch =
|
|
env::var_os("CARGO_CFG_TARGET_ARCH").ok_or(anyhow!("CARGO_CFG_TARGET_ARCH not set"))?;
|
|
if arch == "x86_64" {
|
|
target_arch.push("x86");
|
|
} else if arch == "aarch64" {
|
|
target_arch.push("arm64");
|
|
} else {
|
|
target_arch.push(&arch);
|
|
};
|
|
|
|
// NB: libbpf's documentation suggests that vmlinux.h be generated by running `bpftool btf
|
|
// dump file /sys/kernel/btf/vmlinux format c`; this allows CO-RE to work.
|
|
//
|
|
// However in our tests we do not make use of kernel data structures, and so any vmlinux.h
|
|
// which defines the constants we need (e.g. `__u8`, `__u64`, `BPF_MAP_TYPE_ARRAY`,
|
|
// `BPF_ANY`, `XDP_PASS`, `XDP_DROP`, etc.) will suffice. Since we already have a libbpf
|
|
// submodule which happens to include such a file, we use it.
|
|
let libbpf_vmlinux_dir = libbpf_dir.join(".github/actions/build-selftests");
|
|
|
|
let clang = || {
|
|
let mut cmd = Command::new("clang");
|
|
cmd.arg("-nostdlibinc")
|
|
.arg("-I")
|
|
.arg(&libbpf_headers_dir)
|
|
.arg("-I")
|
|
.arg(&libbpf_vmlinux_dir)
|
|
.args(["-g", "-O2", "-target", target, "-c"])
|
|
.arg(&target_arch);
|
|
cmd
|
|
};
|
|
|
|
for (src, build_btf) in C_BPF {
|
|
let dst = out_dir.join(src).with_extension("o");
|
|
let src = bpf_dir.join(src);
|
|
{
|
|
let src = src.to_str().with_context(|| format!("{src:?}"))?;
|
|
println!("cargo:rerun-if-changed={src}");
|
|
}
|
|
|
|
exec(clang().arg(&src).arg("-o").arg(&dst))?;
|
|
|
|
if *build_btf {
|
|
let mut cmd = clang();
|
|
let mut child = cmd
|
|
.arg("-DTARGET")
|
|
.arg(&src)
|
|
.args(["-o", "-"])
|
|
.stdout(Stdio::piped())
|
|
.spawn()
|
|
.with_context(|| format!("failed to spawn {cmd:?}"))?;
|
|
|
|
let Child { stdout, .. } = &mut child;
|
|
let stdout = stdout.take().expect("stdout");
|
|
|
|
let dst = dst.with_extension("target.o");
|
|
|
|
let mut output = OsString::new();
|
|
output.push(".BTF=");
|
|
output.push(dst);
|
|
exec(
|
|
// NB: objcopy doesn't support reading from stdin, so we have to use llvm-objcopy.
|
|
Command::new("llvm-objcopy")
|
|
.arg("--dump-section")
|
|
.arg(output)
|
|
.arg("-")
|
|
.stdin(stdout),
|
|
)?;
|
|
|
|
let output = child
|
|
.wait_with_output()
|
|
.with_context(|| format!("failed to wait for {cmd:?}"))?;
|
|
let Output { status, .. } = &output;
|
|
if !status.success() {
|
|
return Err(anyhow!("{cmd:?} failed: {status:?}"));
|
|
}
|
|
}
|
|
}
|
|
|
|
aya_build::build_ebpf([integration_ebpf_package])?;
|
|
} else {
|
|
for (src, build_btf) in C_BPF {
|
|
let dst = out_dir.join(src).with_extension("o");
|
|
fs::write(&dst, []).with_context(|| format!("failed to create {dst:?}"))?;
|
|
if *build_btf {
|
|
let dst = dst.with_extension("target.o");
|
|
fs::write(&dst, []).with_context(|| format!("failed to create {dst:?}"))?;
|
|
}
|
|
}
|
|
|
|
let Package { targets, .. } = integration_ebpf_package;
|
|
for Target { name, kind, .. } in targets {
|
|
if *kind != [TargetKind::Bin] {
|
|
continue;
|
|
}
|
|
let dst = out_dir.join(name);
|
|
fs::write(&dst, []).with_context(|| format!("failed to create {dst:?}"))?;
|
|
}
|
|
}
|
|
Ok(())
|
|
}
|