/vendor/github.com/cilium/ebpf/link/uprobe.go

https://github.com/dotcloud/docker · Go · 237 lines · 148 code · 33 blank · 56 comment · 48 complexity · 1c381b3f985538ee34f3d775407997da MD5 · raw file

  1. package link
  2. import (
  3. "debug/elf"
  4. "errors"
  5. "fmt"
  6. "os"
  7. "path/filepath"
  8. "regexp"
  9. "sync"
  10. "github.com/cilium/ebpf"
  11. "github.com/cilium/ebpf/internal"
  12. )
  13. var (
  14. uprobeEventsPath = filepath.Join(tracefsPath, "uprobe_events")
  15. // rgxUprobeSymbol is used to strip invalid characters from the uprobe symbol
  16. // as they are not allowed to be used as the EVENT token in tracefs.
  17. rgxUprobeSymbol = regexp.MustCompile("[^a-zA-Z0-9]+")
  18. uprobeRetprobeBit = struct {
  19. once sync.Once
  20. value uint64
  21. err error
  22. }{}
  23. )
  24. // Executable defines an executable program on the filesystem.
  25. type Executable struct {
  26. // Path of the executable on the filesystem.
  27. path string
  28. // Parsed ELF symbols and dynamic symbols.
  29. symbols map[string]elf.Symbol
  30. }
  31. // UprobeOptions defines additional parameters that will be used
  32. // when loading Uprobes.
  33. type UprobeOptions struct {
  34. // Symbol offset. Must be provided in case of external symbols (shared libs).
  35. // If set, overrides the offset eventually parsed from the executable.
  36. Offset uint64
  37. }
  38. // To open a new Executable, use:
  39. //
  40. // OpenExecutable("/bin/bash")
  41. //
  42. // The returned value can then be used to open Uprobe(s).
  43. func OpenExecutable(path string) (*Executable, error) {
  44. if path == "" {
  45. return nil, fmt.Errorf("path cannot be empty")
  46. }
  47. f, err := os.Open(path)
  48. if err != nil {
  49. return nil, fmt.Errorf("open file '%s': %w", path, err)
  50. }
  51. defer f.Close()
  52. se, err := internal.NewSafeELFFile(f)
  53. if err != nil {
  54. return nil, fmt.Errorf("parse ELF file: %w", err)
  55. }
  56. var ex = Executable{
  57. path: path,
  58. symbols: make(map[string]elf.Symbol),
  59. }
  60. if err := ex.addSymbols(se.Symbols); err != nil {
  61. return nil, err
  62. }
  63. if err := ex.addSymbols(se.DynamicSymbols); err != nil {
  64. return nil, err
  65. }
  66. return &ex, nil
  67. }
  68. func (ex *Executable) addSymbols(f func() ([]elf.Symbol, error)) error {
  69. // elf.Symbols and elf.DynamicSymbols return ErrNoSymbols if the section is not found.
  70. syms, err := f()
  71. if err != nil && !errors.Is(err, elf.ErrNoSymbols) {
  72. return err
  73. }
  74. for _, s := range syms {
  75. if elf.ST_TYPE(s.Info) != elf.STT_FUNC {
  76. // Symbol not associated with a function or other executable code.
  77. continue
  78. }
  79. ex.symbols[s.Name] = s
  80. }
  81. return nil
  82. }
  83. func (ex *Executable) symbol(symbol string) (*elf.Symbol, error) {
  84. if s, ok := ex.symbols[symbol]; ok {
  85. return &s, nil
  86. }
  87. return nil, fmt.Errorf("symbol %s not found", symbol)
  88. }
  89. // Uprobe attaches the given eBPF program to a perf event that fires when the
  90. // given symbol starts executing in the given Executable.
  91. // For example, /bin/bash::main():
  92. //
  93. // ex, _ = OpenExecutable("/bin/bash")
  94. // ex.Uprobe("main", prog, nil)
  95. //
  96. // When using symbols which belongs to shared libraries,
  97. // an offset must be provided via options:
  98. //
  99. // ex.Uprobe("main", prog, &UprobeOptions{Offset: 0x123})
  100. //
  101. // The resulting Link must be Closed during program shutdown to avoid leaking
  102. // system resources. Functions provided by shared libraries can currently not
  103. // be traced and will result in an ErrNotSupported.
  104. func (ex *Executable) Uprobe(symbol string, prog *ebpf.Program, opts *UprobeOptions) (Link, error) {
  105. u, err := ex.uprobe(symbol, prog, opts, false)
  106. if err != nil {
  107. return nil, err
  108. }
  109. err = u.attach(prog)
  110. if err != nil {
  111. u.Close()
  112. return nil, err
  113. }
  114. return u, nil
  115. }
  116. // Uretprobe attaches the given eBPF program to a perf event that fires right
  117. // before the given symbol exits. For example, /bin/bash::main():
  118. //
  119. // ex, _ = OpenExecutable("/bin/bash")
  120. // ex.Uretprobe("main", prog, nil)
  121. //
  122. // When using symbols which belongs to shared libraries,
  123. // an offset must be provided via options:
  124. //
  125. // ex.Uretprobe("main", prog, &UprobeOptions{Offset: 0x123})
  126. //
  127. // The resulting Link must be Closed during program shutdown to avoid leaking
  128. // system resources. Functions provided by shared libraries can currently not
  129. // be traced and will result in an ErrNotSupported.
  130. func (ex *Executable) Uretprobe(symbol string, prog *ebpf.Program, opts *UprobeOptions) (Link, error) {
  131. u, err := ex.uprobe(symbol, prog, opts, true)
  132. if err != nil {
  133. return nil, err
  134. }
  135. err = u.attach(prog)
  136. if err != nil {
  137. u.Close()
  138. return nil, err
  139. }
  140. return u, nil
  141. }
  142. // uprobe opens a perf event for the given binary/symbol and attaches prog to it.
  143. // If ret is true, create a uretprobe.
  144. func (ex *Executable) uprobe(symbol string, prog *ebpf.Program, opts *UprobeOptions, ret bool) (*perfEvent, error) {
  145. if prog == nil {
  146. return nil, fmt.Errorf("prog cannot be nil: %w", errInvalidInput)
  147. }
  148. if prog.Type() != ebpf.Kprobe {
  149. return nil, fmt.Errorf("eBPF program type %s is not Kprobe: %w", prog.Type(), errInvalidInput)
  150. }
  151. var offset uint64
  152. if opts != nil && opts.Offset != 0 {
  153. offset = opts.Offset
  154. } else {
  155. sym, err := ex.symbol(symbol)
  156. if err != nil {
  157. return nil, fmt.Errorf("symbol '%s' not found: %w", symbol, err)
  158. }
  159. // Symbols with location 0 from section undef are shared library calls and
  160. // are relocated before the binary is executed. Dynamic linking is not
  161. // implemented by the library, so mark this as unsupported for now.
  162. if sym.Section == elf.SHN_UNDEF && sym.Value == 0 {
  163. return nil, fmt.Errorf("cannot resolve %s library call '%s', "+
  164. "consider providing the offset via options: %w", ex.path, symbol, ErrNotSupported)
  165. }
  166. offset = sym.Value
  167. }
  168. // Use uprobe PMU if the kernel has it available.
  169. tp, err := pmuUprobe(symbol, ex.path, offset, ret)
  170. if err == nil {
  171. return tp, nil
  172. }
  173. if err != nil && !errors.Is(err, ErrNotSupported) {
  174. return nil, fmt.Errorf("creating perf_uprobe PMU: %w", err)
  175. }
  176. // Use tracefs if uprobe PMU is missing.
  177. tp, err = tracefsUprobe(uprobeSanitizedSymbol(symbol), ex.path, offset, ret)
  178. if err != nil {
  179. return nil, fmt.Errorf("creating trace event '%s:%s' in tracefs: %w", ex.path, symbol, err)
  180. }
  181. return tp, nil
  182. }
  183. // pmuUprobe opens a perf event based on the uprobe PMU.
  184. func pmuUprobe(symbol, path string, offset uint64, ret bool) (*perfEvent, error) {
  185. return pmuProbe(uprobeType, symbol, path, offset, ret)
  186. }
  187. // tracefsUprobe creates a Uprobe tracefs entry.
  188. func tracefsUprobe(symbol, path string, offset uint64, ret bool) (*perfEvent, error) {
  189. return tracefsProbe(uprobeType, symbol, path, offset, ret)
  190. }
  191. // uprobeSanitizedSymbol replaces every invalid characted for the tracefs api with an underscore.
  192. func uprobeSanitizedSymbol(symbol string) string {
  193. return rgxUprobeSymbol.ReplaceAllString(symbol, "_")
  194. }
  195. // uprobePathOffset creates the PATH:OFFSET token for the tracefs api.
  196. func uprobePathOffset(path string, offset uint64) string {
  197. return fmt.Sprintf("%s:%#x", path, offset)
  198. }
  199. func uretprobeBit() (uint64, error) {
  200. uprobeRetprobeBit.once.Do(func() {
  201. uprobeRetprobeBit.value, uprobeRetprobeBit.err = determineRetprobeBit(uprobeType)
  202. })
  203. return uprobeRetprobeBit.value, uprobeRetprobeBit.err
  204. }