mirror of
https://github.com/superseriousbusiness/gotosocial
synced 2024-12-19 01:03:25 +00:00
acc333c40b
When GTS is running in a container runtime which has configured CPU or memory limits or under an init system that uses cgroups to impose CPU and memory limits the values the Go runtime sees for GOMAXPROCS and GOMEMLIMIT are still based on the host resources, not the cgroup. At least for the throttling middlewares which use GOMAXPROCS to configure their queue size, this can result in GTS running with values too big compared to the resources that will actuall be available to it. This introduces 2 dependencies which can pick up resource contraints from the current cgroup and tune the Go runtime accordingly. This should result in the different queues being appropriately sized and in general more predictable performance. These dependencies are a no-op on non-Linux systems or if running in a cgroup that doesn't set a limit on CPU or memory. The automatic tuning of GOMEMLIMIT can be disabled by either explicitly setting GOMEMLIMIT yourself or by setting AUTOMEMLIMIT=off. The automatic tuning of GOMAXPROCS can similarly be counteracted by setting GOMAXPROCS yourself.
698 lines
18 KiB
Go
698 lines
18 KiB
Go
package ebpf
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/binary"
|
|
"errors"
|
|
"fmt"
|
|
"math"
|
|
"path/filepath"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/cilium/ebpf/asm"
|
|
"github.com/cilium/ebpf/internal"
|
|
"github.com/cilium/ebpf/internal/btf"
|
|
"github.com/cilium/ebpf/internal/unix"
|
|
)
|
|
|
|
// ErrNotSupported is returned whenever the kernel doesn't support a feature.
|
|
var ErrNotSupported = internal.ErrNotSupported
|
|
|
|
// ProgramID represents the unique ID of an eBPF program.
|
|
type ProgramID uint32
|
|
|
|
const (
|
|
// Number of bytes to pad the output buffer for BPF_PROG_TEST_RUN.
|
|
// This is currently the maximum of spare space allocated for SKB
|
|
// and XDP programs, and equal to XDP_PACKET_HEADROOM + NET_IP_ALIGN.
|
|
outputPad = 256 + 2
|
|
)
|
|
|
|
// DefaultVerifierLogSize is the default number of bytes allocated for the
|
|
// verifier log.
|
|
const DefaultVerifierLogSize = 64 * 1024
|
|
|
|
// ProgramOptions control loading a program into the kernel.
|
|
type ProgramOptions struct {
|
|
// Controls the detail emitted by the kernel verifier. Set to non-zero
|
|
// to enable logging.
|
|
LogLevel uint32
|
|
// Controls the output buffer size for the verifier. Defaults to
|
|
// DefaultVerifierLogSize.
|
|
LogSize int
|
|
}
|
|
|
|
// ProgramSpec defines a Program.
|
|
type ProgramSpec struct {
|
|
// Name is passed to the kernel as a debug aid. Must only contain
|
|
// alpha numeric and '_' characters.
|
|
Name string
|
|
// Type determines at which hook in the kernel a program will run.
|
|
Type ProgramType
|
|
AttachType AttachType
|
|
// Name of a kernel data structure to attach to. It's interpretation
|
|
// depends on Type and AttachType.
|
|
AttachTo string
|
|
Instructions asm.Instructions
|
|
|
|
// License of the program. Some helpers are only available if
|
|
// the license is deemed compatible with the GPL.
|
|
//
|
|
// See https://www.kernel.org/doc/html/latest/process/license-rules.html#id1
|
|
License string
|
|
|
|
// Version used by tracing programs.
|
|
//
|
|
// Deprecated: superseded by BTF.
|
|
KernelVersion uint32
|
|
|
|
// The BTF associated with this program. Changing Instructions
|
|
// will most likely invalidate the contained data, and may
|
|
// result in errors when attempting to load it into the kernel.
|
|
BTF *btf.Program
|
|
|
|
// The byte order this program was compiled for, may be nil.
|
|
ByteOrder binary.ByteOrder
|
|
}
|
|
|
|
// Copy returns a copy of the spec.
|
|
func (ps *ProgramSpec) Copy() *ProgramSpec {
|
|
if ps == nil {
|
|
return nil
|
|
}
|
|
|
|
cpy := *ps
|
|
cpy.Instructions = make(asm.Instructions, len(ps.Instructions))
|
|
copy(cpy.Instructions, ps.Instructions)
|
|
return &cpy
|
|
}
|
|
|
|
// Tag calculates the kernel tag for a series of instructions.
|
|
//
|
|
// Use asm.Instructions.Tag if you need to calculate for non-native endianness.
|
|
func (ps *ProgramSpec) Tag() (string, error) {
|
|
return ps.Instructions.Tag(internal.NativeEndian)
|
|
}
|
|
|
|
// Program represents BPF program loaded into the kernel.
|
|
//
|
|
// It is not safe to close a Program which is used by other goroutines.
|
|
type Program struct {
|
|
// Contains the output of the kernel verifier if enabled,
|
|
// otherwise it is empty.
|
|
VerifierLog string
|
|
|
|
fd *internal.FD
|
|
name string
|
|
pinnedPath string
|
|
typ ProgramType
|
|
}
|
|
|
|
// NewProgram creates a new Program.
|
|
//
|
|
// Loading a program for the first time will perform
|
|
// feature detection by loading small, temporary programs.
|
|
func NewProgram(spec *ProgramSpec) (*Program, error) {
|
|
return NewProgramWithOptions(spec, ProgramOptions{})
|
|
}
|
|
|
|
// NewProgramWithOptions creates a new Program.
|
|
//
|
|
// Loading a program for the first time will perform
|
|
// feature detection by loading small, temporary programs.
|
|
func NewProgramWithOptions(spec *ProgramSpec, opts ProgramOptions) (*Program, error) {
|
|
btfs := make(btfHandleCache)
|
|
defer btfs.close()
|
|
|
|
return newProgramWithOptions(spec, opts, btfs)
|
|
}
|
|
|
|
func newProgramWithOptions(spec *ProgramSpec, opts ProgramOptions, btfs btfHandleCache) (*Program, error) {
|
|
if len(spec.Instructions) == 0 {
|
|
return nil, errors.New("Instructions cannot be empty")
|
|
}
|
|
|
|
if len(spec.License) == 0 {
|
|
return nil, errors.New("License cannot be empty")
|
|
}
|
|
|
|
if spec.ByteOrder != nil && spec.ByteOrder != internal.NativeEndian {
|
|
return nil, fmt.Errorf("can't load %s program on %s", spec.ByteOrder, internal.NativeEndian)
|
|
}
|
|
|
|
insns := make(asm.Instructions, len(spec.Instructions))
|
|
copy(insns, spec.Instructions)
|
|
|
|
if err := fixupJumpsAndCalls(insns); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
buf := bytes.NewBuffer(make([]byte, 0, len(spec.Instructions)*asm.InstructionSize))
|
|
err := insns.Marshal(buf, internal.NativeEndian)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
bytecode := buf.Bytes()
|
|
insCount := uint32(len(bytecode) / asm.InstructionSize)
|
|
attr := &bpfProgLoadAttr{
|
|
progType: spec.Type,
|
|
expectedAttachType: spec.AttachType,
|
|
insCount: insCount,
|
|
instructions: internal.NewSlicePointer(bytecode),
|
|
license: internal.NewStringPointer(spec.License),
|
|
kernelVersion: spec.KernelVersion,
|
|
}
|
|
|
|
if haveObjName() == nil {
|
|
attr.progName = newBPFObjName(spec.Name)
|
|
}
|
|
|
|
var btfDisabled bool
|
|
if spec.BTF != nil {
|
|
if relos, err := btf.ProgramRelocations(spec.BTF, nil); err != nil {
|
|
return nil, fmt.Errorf("CO-RE relocations: %s", err)
|
|
} else if len(relos) > 0 {
|
|
return nil, fmt.Errorf("applying CO-RE relocations: %w", ErrNotSupported)
|
|
}
|
|
|
|
handle, err := btfs.load(btf.ProgramSpec(spec.BTF))
|
|
btfDisabled = errors.Is(err, btf.ErrNotSupported)
|
|
if err != nil && !btfDisabled {
|
|
return nil, fmt.Errorf("load BTF: %w", err)
|
|
}
|
|
|
|
if handle != nil {
|
|
attr.progBTFFd = uint32(handle.FD())
|
|
|
|
recSize, bytes, err := btf.ProgramLineInfos(spec.BTF)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get BTF line infos: %w", err)
|
|
}
|
|
attr.lineInfoRecSize = recSize
|
|
attr.lineInfoCnt = uint32(uint64(len(bytes)) / uint64(recSize))
|
|
attr.lineInfo = internal.NewSlicePointer(bytes)
|
|
|
|
recSize, bytes, err = btf.ProgramFuncInfos(spec.BTF)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get BTF function infos: %w", err)
|
|
}
|
|
attr.funcInfoRecSize = recSize
|
|
attr.funcInfoCnt = uint32(uint64(len(bytes)) / uint64(recSize))
|
|
attr.funcInfo = internal.NewSlicePointer(bytes)
|
|
}
|
|
}
|
|
|
|
if spec.AttachTo != "" {
|
|
target, err := resolveBTFType(spec.AttachTo, spec.Type, spec.AttachType)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if target != nil {
|
|
attr.attachBTFID = target.ID()
|
|
}
|
|
}
|
|
|
|
logSize := DefaultVerifierLogSize
|
|
if opts.LogSize > 0 {
|
|
logSize = opts.LogSize
|
|
}
|
|
|
|
var logBuf []byte
|
|
if opts.LogLevel > 0 {
|
|
logBuf = make([]byte, logSize)
|
|
attr.logLevel = opts.LogLevel
|
|
attr.logSize = uint32(len(logBuf))
|
|
attr.logBuf = internal.NewSlicePointer(logBuf)
|
|
}
|
|
|
|
fd, err := bpfProgLoad(attr)
|
|
if err == nil {
|
|
return &Program{internal.CString(logBuf), fd, spec.Name, "", spec.Type}, nil
|
|
}
|
|
|
|
logErr := err
|
|
if opts.LogLevel == 0 {
|
|
// Re-run with the verifier enabled to get better error messages.
|
|
logBuf = make([]byte, logSize)
|
|
attr.logLevel = 1
|
|
attr.logSize = uint32(len(logBuf))
|
|
attr.logBuf = internal.NewSlicePointer(logBuf)
|
|
|
|
_, logErr = bpfProgLoad(attr)
|
|
}
|
|
|
|
if errors.Is(logErr, unix.EPERM) && logBuf[0] == 0 {
|
|
// EPERM due to RLIMIT_MEMLOCK happens before the verifier, so we can
|
|
// check that the log is empty to reduce false positives.
|
|
return nil, fmt.Errorf("load program: RLIMIT_MEMLOCK may be too low: %w", logErr)
|
|
}
|
|
|
|
err = internal.ErrorWithLog(err, logBuf, logErr)
|
|
if btfDisabled {
|
|
return nil, fmt.Errorf("load program without BTF: %w", err)
|
|
}
|
|
return nil, fmt.Errorf("load program: %w", err)
|
|
}
|
|
|
|
// NewProgramFromFD creates a program from a raw fd.
|
|
//
|
|
// You should not use fd after calling this function.
|
|
//
|
|
// Requires at least Linux 4.10.
|
|
func NewProgramFromFD(fd int) (*Program, error) {
|
|
if fd < 0 {
|
|
return nil, errors.New("invalid fd")
|
|
}
|
|
|
|
return newProgramFromFD(internal.NewFD(uint32(fd)))
|
|
}
|
|
|
|
// NewProgramFromID returns the program for a given id.
|
|
//
|
|
// Returns ErrNotExist, if there is no eBPF program with the given id.
|
|
func NewProgramFromID(id ProgramID) (*Program, error) {
|
|
fd, err := bpfObjGetFDByID(internal.BPF_PROG_GET_FD_BY_ID, uint32(id))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("get program by id: %w", err)
|
|
}
|
|
|
|
return newProgramFromFD(fd)
|
|
}
|
|
|
|
func newProgramFromFD(fd *internal.FD) (*Program, error) {
|
|
info, err := newProgramInfoFromFd(fd)
|
|
if err != nil {
|
|
fd.Close()
|
|
return nil, fmt.Errorf("discover program type: %w", err)
|
|
}
|
|
|
|
return &Program{"", fd, "", "", info.Type}, nil
|
|
}
|
|
|
|
func (p *Program) String() string {
|
|
if p.name != "" {
|
|
return fmt.Sprintf("%s(%s)#%v", p.typ, p.name, p.fd)
|
|
}
|
|
return fmt.Sprintf("%s(%v)", p.typ, p.fd)
|
|
}
|
|
|
|
// Type returns the underlying type of the program.
|
|
func (p *Program) Type() ProgramType {
|
|
return p.typ
|
|
}
|
|
|
|
// Info returns metadata about the program.
|
|
//
|
|
// Requires at least 4.10.
|
|
func (p *Program) Info() (*ProgramInfo, error) {
|
|
return newProgramInfoFromFd(p.fd)
|
|
}
|
|
|
|
// FD gets the file descriptor of the Program.
|
|
//
|
|
// It is invalid to call this function after Close has been called.
|
|
func (p *Program) FD() int {
|
|
fd, err := p.fd.Value()
|
|
if err != nil {
|
|
// Best effort: -1 is the number most likely to be an
|
|
// invalid file descriptor.
|
|
return -1
|
|
}
|
|
|
|
return int(fd)
|
|
}
|
|
|
|
// Clone creates a duplicate of the Program.
|
|
//
|
|
// Closing the duplicate does not affect the original, and vice versa.
|
|
//
|
|
// Cloning a nil Program returns nil.
|
|
func (p *Program) Clone() (*Program, error) {
|
|
if p == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
dup, err := p.fd.Dup()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("can't clone program: %w", err)
|
|
}
|
|
|
|
return &Program{p.VerifierLog, dup, p.name, "", p.typ}, nil
|
|
}
|
|
|
|
// Pin persists the Program on the BPF virtual file system past the lifetime of
|
|
// the process that created it
|
|
//
|
|
// This requires bpffs to be mounted above fileName. See https://docs.cilium.io/en/k8s-doc/admin/#admin-mount-bpffs
|
|
func (p *Program) Pin(fileName string) error {
|
|
if err := pin(p.pinnedPath, fileName, p.fd); err != nil {
|
|
return err
|
|
}
|
|
p.pinnedPath = fileName
|
|
return nil
|
|
}
|
|
|
|
// Unpin removes the persisted state for the Program from the BPF virtual filesystem.
|
|
//
|
|
// Failed calls to Unpin will not alter the state returned by IsPinned.
|
|
//
|
|
// Unpinning an unpinned Program returns nil.
|
|
func (p *Program) Unpin() error {
|
|
if err := unpin(p.pinnedPath); err != nil {
|
|
return err
|
|
}
|
|
p.pinnedPath = ""
|
|
return nil
|
|
}
|
|
|
|
// IsPinned returns true if the Program has a non-empty pinned path.
|
|
func (p *Program) IsPinned() bool {
|
|
if p.pinnedPath == "" {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
// Close unloads the program from the kernel.
|
|
func (p *Program) Close() error {
|
|
if p == nil {
|
|
return nil
|
|
}
|
|
|
|
return p.fd.Close()
|
|
}
|
|
|
|
// Test runs the Program in the kernel with the given input and returns the
|
|
// value returned by the eBPF program. outLen may be zero.
|
|
//
|
|
// Note: the kernel expects at least 14 bytes input for an ethernet header for
|
|
// XDP and SKB programs.
|
|
//
|
|
// This function requires at least Linux 4.12.
|
|
func (p *Program) Test(in []byte) (uint32, []byte, error) {
|
|
ret, out, _, err := p.testRun(in, 1, nil)
|
|
if err != nil {
|
|
return ret, nil, fmt.Errorf("can't test program: %w", err)
|
|
}
|
|
return ret, out, nil
|
|
}
|
|
|
|
// Benchmark runs the Program with the given input for a number of times
|
|
// and returns the time taken per iteration.
|
|
//
|
|
// Returns the result of the last execution of the program and the time per
|
|
// run or an error. reset is called whenever the benchmark syscall is
|
|
// interrupted, and should be set to testing.B.ResetTimer or similar.
|
|
//
|
|
// Note: profiling a call to this function will skew it's results, see
|
|
// https://github.com/cilium/ebpf/issues/24
|
|
//
|
|
// This function requires at least Linux 4.12.
|
|
func (p *Program) Benchmark(in []byte, repeat int, reset func()) (uint32, time.Duration, error) {
|
|
ret, _, total, err := p.testRun(in, repeat, reset)
|
|
if err != nil {
|
|
return ret, total, fmt.Errorf("can't benchmark program: %w", err)
|
|
}
|
|
return ret, total, nil
|
|
}
|
|
|
|
var haveProgTestRun = internal.FeatureTest("BPF_PROG_TEST_RUN", "4.12", func() error {
|
|
prog, err := NewProgram(&ProgramSpec{
|
|
Type: SocketFilter,
|
|
Instructions: asm.Instructions{
|
|
asm.LoadImm(asm.R0, 0, asm.DWord),
|
|
asm.Return(),
|
|
},
|
|
License: "MIT",
|
|
})
|
|
if err != nil {
|
|
// This may be because we lack sufficient permissions, etc.
|
|
return err
|
|
}
|
|
defer prog.Close()
|
|
|
|
// Programs require at least 14 bytes input
|
|
in := make([]byte, 14)
|
|
attr := bpfProgTestRunAttr{
|
|
fd: uint32(prog.FD()),
|
|
dataSizeIn: uint32(len(in)),
|
|
dataIn: internal.NewSlicePointer(in),
|
|
}
|
|
|
|
err = bpfProgTestRun(&attr)
|
|
if errors.Is(err, unix.EINVAL) {
|
|
// Check for EINVAL specifically, rather than err != nil since we
|
|
// otherwise misdetect due to insufficient permissions.
|
|
return internal.ErrNotSupported
|
|
}
|
|
if errors.Is(err, unix.EINTR) {
|
|
// We know that PROG_TEST_RUN is supported if we get EINTR.
|
|
return nil
|
|
}
|
|
return err
|
|
})
|
|
|
|
func (p *Program) testRun(in []byte, repeat int, reset func()) (uint32, []byte, time.Duration, error) {
|
|
if uint(repeat) > math.MaxUint32 {
|
|
return 0, nil, 0, fmt.Errorf("repeat is too high")
|
|
}
|
|
|
|
if len(in) == 0 {
|
|
return 0, nil, 0, fmt.Errorf("missing input")
|
|
}
|
|
|
|
if uint(len(in)) > math.MaxUint32 {
|
|
return 0, nil, 0, fmt.Errorf("input is too long")
|
|
}
|
|
|
|
if err := haveProgTestRun(); err != nil {
|
|
return 0, nil, 0, err
|
|
}
|
|
|
|
// Older kernels ignore the dataSizeOut argument when copying to user space.
|
|
// Combined with things like bpf_xdp_adjust_head() we don't really know what the final
|
|
// size will be. Hence we allocate an output buffer which we hope will always be large
|
|
// enough, and panic if the kernel wrote past the end of the allocation.
|
|
// See https://patchwork.ozlabs.org/cover/1006822/
|
|
out := make([]byte, len(in)+outputPad)
|
|
|
|
fd, err := p.fd.Value()
|
|
if err != nil {
|
|
return 0, nil, 0, err
|
|
}
|
|
|
|
attr := bpfProgTestRunAttr{
|
|
fd: fd,
|
|
dataSizeIn: uint32(len(in)),
|
|
dataSizeOut: uint32(len(out)),
|
|
dataIn: internal.NewSlicePointer(in),
|
|
dataOut: internal.NewSlicePointer(out),
|
|
repeat: uint32(repeat),
|
|
}
|
|
|
|
for {
|
|
err = bpfProgTestRun(&attr)
|
|
if err == nil {
|
|
break
|
|
}
|
|
|
|
if errors.Is(err, unix.EINTR) {
|
|
if reset != nil {
|
|
reset()
|
|
}
|
|
continue
|
|
}
|
|
|
|
return 0, nil, 0, fmt.Errorf("can't run test: %w", err)
|
|
}
|
|
|
|
if int(attr.dataSizeOut) > cap(out) {
|
|
// Houston, we have a problem. The program created more data than we allocated,
|
|
// and the kernel wrote past the end of our buffer.
|
|
panic("kernel wrote past end of output buffer")
|
|
}
|
|
out = out[:int(attr.dataSizeOut)]
|
|
|
|
total := time.Duration(attr.duration) * time.Nanosecond
|
|
return attr.retval, out, total, nil
|
|
}
|
|
|
|
func unmarshalProgram(buf []byte) (*Program, error) {
|
|
if len(buf) != 4 {
|
|
return nil, errors.New("program id requires 4 byte value")
|
|
}
|
|
|
|
// Looking up an entry in a nested map or prog array returns an id,
|
|
// not an fd.
|
|
id := internal.NativeEndian.Uint32(buf)
|
|
return NewProgramFromID(ProgramID(id))
|
|
}
|
|
|
|
func marshalProgram(p *Program, length int) ([]byte, error) {
|
|
if length != 4 {
|
|
return nil, fmt.Errorf("can't marshal program to %d bytes", length)
|
|
}
|
|
|
|
value, err := p.fd.Value()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
buf := make([]byte, 4)
|
|
internal.NativeEndian.PutUint32(buf, value)
|
|
return buf, nil
|
|
}
|
|
|
|
// Attach a Program.
|
|
//
|
|
// Deprecated: use link.RawAttachProgram instead.
|
|
func (p *Program) Attach(fd int, typ AttachType, flags AttachFlags) error {
|
|
if fd < 0 {
|
|
return errors.New("invalid fd")
|
|
}
|
|
|
|
pfd, err := p.fd.Value()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
attr := internal.BPFProgAttachAttr{
|
|
TargetFd: uint32(fd),
|
|
AttachBpfFd: pfd,
|
|
AttachType: uint32(typ),
|
|
AttachFlags: uint32(flags),
|
|
}
|
|
|
|
return internal.BPFProgAttach(&attr)
|
|
}
|
|
|
|
// Detach a Program.
|
|
//
|
|
// Deprecated: use link.RawDetachProgram instead.
|
|
func (p *Program) Detach(fd int, typ AttachType, flags AttachFlags) error {
|
|
if fd < 0 {
|
|
return errors.New("invalid fd")
|
|
}
|
|
|
|
if flags != 0 {
|
|
return errors.New("flags must be zero")
|
|
}
|
|
|
|
pfd, err := p.fd.Value()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
attr := internal.BPFProgDetachAttr{
|
|
TargetFd: uint32(fd),
|
|
AttachBpfFd: pfd,
|
|
AttachType: uint32(typ),
|
|
}
|
|
|
|
return internal.BPFProgDetach(&attr)
|
|
}
|
|
|
|
// LoadPinnedProgram loads a Program from a BPF file.
|
|
//
|
|
// Requires at least Linux 4.11.
|
|
func LoadPinnedProgram(fileName string) (*Program, error) {
|
|
fd, err := internal.BPFObjGet(fileName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
info, err := newProgramInfoFromFd(fd)
|
|
if err != nil {
|
|
_ = fd.Close()
|
|
return nil, fmt.Errorf("info for %s: %w", fileName, err)
|
|
}
|
|
|
|
return &Program{"", fd, filepath.Base(fileName), "", info.Type}, nil
|
|
}
|
|
|
|
// SanitizeName replaces all invalid characters in name with replacement.
|
|
// Passing a negative value for replacement will delete characters instead
|
|
// of replacing them. Use this to automatically generate valid names for maps
|
|
// and programs at runtime.
|
|
//
|
|
// The set of allowed characters depends on the running kernel version.
|
|
// Dots are only allowed as of kernel 5.2.
|
|
func SanitizeName(name string, replacement rune) string {
|
|
return strings.Map(func(char rune) rune {
|
|
if invalidBPFObjNameChar(char) {
|
|
return replacement
|
|
}
|
|
return char
|
|
}, name)
|
|
}
|
|
|
|
// ProgramGetNextID returns the ID of the next eBPF program.
|
|
//
|
|
// Returns ErrNotExist, if there is no next eBPF program.
|
|
func ProgramGetNextID(startID ProgramID) (ProgramID, error) {
|
|
id, err := objGetNextID(internal.BPF_PROG_GET_NEXT_ID, uint32(startID))
|
|
return ProgramID(id), err
|
|
}
|
|
|
|
// ID returns the systemwide unique ID of the program.
|
|
//
|
|
// Deprecated: use ProgramInfo.ID() instead.
|
|
func (p *Program) ID() (ProgramID, error) {
|
|
info, err := bpfGetProgInfoByFD(p.fd)
|
|
if err != nil {
|
|
return ProgramID(0), err
|
|
}
|
|
return ProgramID(info.id), nil
|
|
}
|
|
|
|
func findKernelType(name string, typ btf.Type) error {
|
|
kernel, err := btf.LoadKernelSpec()
|
|
if err != nil {
|
|
return fmt.Errorf("can't load kernel spec: %w", err)
|
|
}
|
|
|
|
return kernel.FindType(name, typ)
|
|
}
|
|
|
|
func resolveBTFType(name string, progType ProgramType, attachType AttachType) (btf.Type, error) {
|
|
type match struct {
|
|
p ProgramType
|
|
a AttachType
|
|
}
|
|
|
|
target := match{progType, attachType}
|
|
switch target {
|
|
case match{LSM, AttachLSMMac}:
|
|
var target btf.Func
|
|
err := findKernelType("bpf_lsm_"+name, &target)
|
|
if errors.Is(err, btf.ErrNotFound) {
|
|
return nil, &internal.UnsupportedFeatureError{
|
|
Name: name + " LSM hook",
|
|
}
|
|
}
|
|
if err != nil {
|
|
return nil, fmt.Errorf("resolve BTF for LSM hook %s: %w", name, err)
|
|
}
|
|
|
|
return &target, nil
|
|
|
|
case match{Tracing, AttachTraceIter}:
|
|
var target btf.Func
|
|
err := findKernelType("bpf_iter_"+name, &target)
|
|
if errors.Is(err, btf.ErrNotFound) {
|
|
return nil, &internal.UnsupportedFeatureError{
|
|
Name: name + " iterator",
|
|
}
|
|
}
|
|
if err != nil {
|
|
return nil, fmt.Errorf("resolve BTF for iterator %s: %w", name, err)
|
|
}
|
|
|
|
return &target, nil
|
|
|
|
default:
|
|
return nil, nil
|
|
}
|
|
}
|