Setup development environment with libbpf

This commit is contained in:
h3xduck
2021-11-20 21:07:23 -05:00
parent 8e7fd92dc4
commit 53da2d141d
313 changed files with 563362 additions and 0 deletions

View File

@@ -0,0 +1,162 @@
// SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause
#include "vmlinux.h"
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_core_read.h>
#include <bpf/bpf_tracing.h>
#define memcpy(dest, src, n) __builtin_memcpy((dest), (src), (n))
#define HOSTNAME_LEN 84
const volatile pid_t target_pid = 0;
/* Copied from: include/netdb.h */
struct addrinfo {
int ai_flags; /* Input flags. */
int ai_family; /* Protocol family for socket. */
int ai_socktype; /* Socket type. */
int ai_protocol; /* Protocol for socket. */
u32 ai_addrlen; /* Length of socket address. */
struct sockaddr *ai_addr; /* Socket address for socket. */
char *ai_canonname; /* Canonical name for service location. */
struct addrinfo *ai_next; /* Pointer to next in list. */
};
struct lookup {
char c[84];
struct addrinfo **results;
};
struct {
__uint(type, BPF_MAP_TYPE_HASH);
__uint(max_entries, 10240);
__type(key, u32);
__type(value, struct lookup);
} lookups SEC(".maps");
struct {
__uint(type, BPF_MAP_TYPE_HASH);
__uint(max_entries, 10240);
__type(key, u32);
__type(value, struct lookup);
} hostnames SEC(".maps");
struct {
__uint(type, BPF_MAP_TYPE_HASH);
__uint(max_entries, 10240);
__type(key, u32);
__type(value, struct sock *);
} sockets SEC(".maps");
struct {
__uint(type, BPF_MAP_TYPE_PERF_EVENT_ARRAY);
__uint(key_size, sizeof(u32));
__uint(value_size, sizeof(u32));
} events SEC(".maps");
enum tag { IP = 0, HOSTNAME = 1 };
struct event {
u8 tag;
u8 ip[4];
u8 hostname[HOSTNAME_LEN];
};
/* trigger creation of event struct in skeleton code */
struct event _event = {};
static u32 get_tid()
{
u64 tgid = bpf_get_current_pid_tgid();
pid_t pid = tgid >> 32;
if (target_pid != 0 && target_pid != pid)
return 0;
return (u32)tgid;
}
SEC("uprobe/getaddrinfo")
int BPF_KPROBE(getaddrinfo_enter, const char *hostname, const char *service,
const struct addrinfo *hints, struct addrinfo **res)
{
u32 tid = get_tid();
struct lookup lookup = {};
if (!tid)
return 0;
bpf_probe_read_user_str(&lookup.c, sizeof(lookup.c), hostname);
lookup.results = res;
bpf_map_update_elem(&lookups, &tid, &lookup, BPF_ANY);
return 0;
}
SEC("uretprobe/getaddrinfo")
int BPF_KRETPROBE(getaddrinfo_exit, int ret)
{
u32 tid = get_tid();
struct lookup *lookup;
struct addrinfo *result;
struct sockaddr_in *addr;
struct in_addr ipv4_addr;
if (!tid)
return 0;
if (ret != 0)
goto cleanup;
lookup = bpf_map_lookup_elem(&lookups, &tid);
if (!lookup)
return 0;
bpf_probe_read_user(&result, sizeof(result), lookup->results);
bpf_probe_read_user(&addr, sizeof(addr), &result->ai_addr);
bpf_probe_read_user(&ipv4_addr, sizeof(ipv4_addr), &addr->sin_addr);
bpf_map_update_elem(&hostnames, &ipv4_addr.s_addr, lookup, BPF_ANY);
cleanup:
bpf_map_delete_elem(&lookups, &tid);
return 0;
}
SEC("kprobe/tcp_v4_connect")
int BPF_KPROBE(tcp_v4_connect_enter, struct sock *sk, struct sockaddr *uaddr, int addr_len)
{
u32 tid = get_tid();
if (!tid)
return 0;
bpf_map_update_elem(&sockets, &tid, &sk, 0);
return 0;
};
SEC("kretprobe/tcp_v4_connect")
int BPF_KRETPROBE(tcp_v4_connect_exit, int ret)
{
u32 tid = get_tid();
struct sock **sockpp;
struct lookup *lookup;
struct event event = {};
u32 ip;
if (!tid)
return 0;
if (ret != 0)
goto cleanup;
sockpp = bpf_map_lookup_elem(&sockets, &tid);
if (!sockpp)
return 0;
ip = BPF_CORE_READ(*sockpp, __sk_common.skc_daddr);
lookup = bpf_map_lookup_elem(&hostnames, &ip);
if (!lookup) {
event.tag = IP;
memcpy(&event.ip, &ip, sizeof(event.ip));
} else {
event.tag = HOSTNAME;
memcpy(&event.hostname, &lookup->c, sizeof(lookup->c));
bpf_map_delete_elem(&hostnames, &ip);
}
/* ctx is implied in the signature macro */
bpf_perf_event_output(ctx, &events, BPF_F_CURRENT_CPU, &event, sizeof(event));
cleanup:
bpf_map_delete_elem(&sockets, &tid);
return 0;
}
char LICENSE[] SEC("license") = "Dual BSD/GPL";

View File

@@ -0,0 +1 @@
../../../../../vmlinux/vmlinux.h

View File

@@ -0,0 +1,127 @@
use anyhow::{anyhow, bail, Result};
use core::time::Duration;
use libbpf_rs::PerfBufferBuilder;
use object::Object;
use object::ObjectSymbol;
use plain::Plain;
use std::fs;
use std::net::Ipv4Addr;
use std::path::Path;
use std::sync::atomic::{AtomicBool, Ordering};
use std::sync::Arc;
use structopt::StructOpt;
#[path = "bpf/.output/tracecon.skel.rs"]
mod tracecon;
use tracecon::*;
type Event = tracecon_bss_types::event;
unsafe impl Plain for Event {}
#[derive(Debug, StructOpt)]
struct Command {
/// verbose output
#[structopt(long, short)]
verbose: bool,
/// glibc path
#[structopt(long, short, default_value = "/lib/x86_64-linux-gnu/libc.so.6")]
glibc: String,
#[structopt(long, short)]
/// pid to observe
pid: Option<i32>,
}
fn bump_memlock_rlimit() -> Result<()> {
let rlimit = libc::rlimit {
rlim_cur: 128 << 20,
rlim_max: 128 << 20,
};
if unsafe { libc::setrlimit(libc::RLIMIT_MEMLOCK, &rlimit) } != 0 {
bail!("Failed to increase rlimit");
}
Ok(())
}
fn get_symbol_address(so_path: &str, fn_name: &str) -> Result<usize> {
let path = Path::new(so_path);
let buffer = fs::read(path)?;
let file = object::File::parse(buffer.as_slice())?;
let mut symbols = file.dynamic_symbols();
let symbol = symbols
.find(|symbol| {
if let Ok(name) = symbol.name() {
return name == fn_name;
}
false
})
.ok_or(anyhow!("symbol not found"))?;
Ok(symbol.address() as usize)
}
fn handle_event(_cpu: i32, data: &[u8]) {
let mut event = Event::default();
plain::copy_from_bytes(&mut event, data).expect("Event data buffer was too short");
match event.tag {
0 => println!("ip event: {}", Ipv4Addr::from(event.ip)),
1 => println!("host event: {}", String::from_utf8_lossy(&event.hostname)),
_ => {}
}
}
fn main() -> Result<()> {
let opts = Command::from_args();
let mut skel_builder = TraceconSkelBuilder::default();
if opts.verbose {
skel_builder.obj_builder.debug(true);
}
bump_memlock_rlimit()?;
let mut open_skel = skel_builder.open()?;
if let Some(pid) = opts.pid {
open_skel.rodata().target_pid = pid;
}
let mut skel = open_skel.load()?;
let address = get_symbol_address(&opts.glibc, "getaddrinfo")?;
let _uprobe =
skel.progs_mut()
.getaddrinfo_enter()
.attach_uprobe(false, -1, &opts.glibc, address)?;
let _uretprobe =
skel.progs_mut()
.getaddrinfo_exit()
.attach_uprobe(true, -1, &opts.glibc, address)?;
let _kprobe = skel
.progs_mut()
.tcp_v4_connect_enter()
.attach_kprobe(false, "tcp_v4_connect")?;
let _kretprobe = skel
.progs_mut()
.tcp_v4_connect_exit()
.attach_kprobe(true, "tcp_v4_connect")?;
let perf = PerfBufferBuilder::new(skel.maps_mut().events())
.sample_cb(handle_event)
.build()?;
let running = Arc::new(AtomicBool::new(true));
let r = running.clone();
ctrlc::set_handler(move || {
r.store(false, Ordering::SeqCst);
})?;
while running.load(Ordering::SeqCst) {
perf.poll(Duration::from_millis(100))?;
}
Ok(())
}