From 5240c9339cc894f9d40234967ea30acaddfc62d5 Mon Sep 17 00:00:00 2001 From: root Date: Thu, 1 Jan 2026 01:31:21 +0800 Subject: udpated_aya_version --- packet-detector/src/main.rs | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'packet-detector/src/main.rs') diff --git a/packet-detector/src/main.rs b/packet-detector/src/main.rs index 69cccec..fd79e8b 100644 --- a/packet-detector/src/main.rs +++ b/packet-detector/src/main.rs @@ -7,7 +7,7 @@ use std::net::Ipv4Addr; use anyhow::{Context, Result}; use aya::maps::{HashMap as AyaHashMap, RingBuf}; use aya::programs::{Xdp, XdpFlags}; -use aya::{include_bytes_aligned, Bpf}; +use aya::{include_bytes_aligned, Ebpf}; use log::{info, warn}; use tls_parser::{parse_tls_plaintext, TlsMessage, TlsMessageHandshake}; use tokio::signal; @@ -111,7 +111,7 @@ async fn main() -> Result<()> { let validator = args.get(2).map(|p| CertValidator::with_ca_file(p)).transpose()?; info!("Mode: {}", if validator.is_some() { "TLS cert validation" } else { "UDP magic detection" }); - let mut bpf = Bpf::load(include_bytes_aligned!("../../target/bpfel-unknown-none/release/packet-detector"))?; + let mut bpf = Ebpf::load(include_bytes_aligned!("../../target/bpfel-unknown-none/release/packet-detector"))?; let program: &mut Xdp = bpf.program_mut("packet_detector").unwrap().try_into()?; program.load()?; program.attach(iface, XdpFlags::default()).context("XDP attach failed")?; -- cgit