mirror of
https://github.com/kubeshark/kubeshark.git
synced 2025-08-06 02:57:03 +00:00
* Determine the Go ABI and get `goid` offset from DWARF
* Add `ABI` enum and morph the function according to the detected ABI
* Pass `goid` offset to an eBPF map to retrieve it in eBPF context
* Add `vmlinux.h` and implement `get_goid_from_thread_local_storage`
* Fix BPF verifier errors
* Update the comments
* Add `go_abi_0.h` and implement `ABI0` specific reads for `arm64`
* Upgrade `github.com/cilium/ebpf` to `v0.9.0`
* Add a comment
* Add macros for x86 specific parts
* Update `x86.o`
* Fix the map key type
* Add `user_pt_regs`
* Update arm64 object file
* Fix the version detection logic
* Add `getGStructOffset` method
* Define `goid_offsets`, `goid_offsets_map` structs and pass the offsets correctly
* Fix the `net.TCPConn` and buffer addresses for `ABI0`
* Remove comment
* Fix the issues for arm64 build
* Update x86.o
* Revert "Fix the issues for arm64 build"
This reverts commit 48b041b1b6
.
* Revert `user_pt_regs`
* Add `vmlinux` directory
* Fix the `build.sh` and `Dockerfile`
* Add vmlinux_arm64.h
* Disable `get_goid_from_thread_local_storage` on ARM64 with a macro
* Update x86.o
* Update arm64.o
* x86
* arm64
* Fix the cross-compilation issue from x86 to arm64
* Fix the same thing for x86
* Use `BPF_CORE_READ` macro instead of `bpf_ringbuf_reserve` to support kernel versions older than 5.8
Also;
Add legacy version of thread_struct: thread_struct___v46
Build an additional object file for the kernel versions older than or equal to 4.6 and load them accordingly.
Add github.com/moby/moby
* Make #define directives more definitive
* Select the x86 and arm64 versions of `vmlinux.h` using macros
* Put `goid` offsets into the map before installing `uprobe`(s)
* arm64
* #run_acceptance_tests
* Remove a forgotten `fmt.Printf`
* Log the detected Linux kernel version
340 lines
12 KiB
C
340 lines
12 KiB
C
/*
|
|
Note: This file is licenced differently from the rest of the project
|
|
SPDX-License-Identifier: GPL-2.0
|
|
Copyright (C) UP9 Inc.
|
|
|
|
|
|
---
|
|
|
|
README
|
|
|
|
Go does not follow any platform ABI like x86-64 System V ABI.
|
|
Before 1.17, Go followed stack-based Plan9 (Bell Labs) calling convention. (ABI0)
|
|
After 1.17, Go switched to an internal register-based calling convention. (ABIInternal)
|
|
For now, the probes in this file supports only ABIInternal (Go 1.17+)
|
|
|
|
`uretprobe` in Linux kernel uses trampoline pattern to jump to original return
|
|
address of the probed function. A Goroutine's stack size is 2Kb while a C thread is 2MB on Linux.
|
|
If stack size exceeds 2Kb, Go runtime relocates the stack. That causes the
|
|
return address to become incorrect in case of `uretprobe` and probed Go program crashes.
|
|
Therefore `uretprobe` CAN'T BE USED for a Go program.
|
|
|
|
`_ex_uprobe` suffixed probes suppose to be `uretprobe`(s) are actually `uprobe`(s)
|
|
because of the non-standard ABI of Go. Therefore we probe all `ret` mnemonics under the symbol
|
|
by automatically finding them through reading the ELF binary and disassembling the symbols.
|
|
Disassembly related code located in `go_offsets.go` file and it uses Capstone Engine.
|
|
Solution based on: https://github.com/iovisor/bcc/issues/1320#issuecomment-407927542
|
|
*Example* We probe an arbitrary point in a function body (offset +559):
|
|
https://github.com/golang/go/blob/go1.17.6/src/crypto/tls/conn.go#L1299
|
|
|
|
We get the file descriptor using the common $rax register that holds the address
|
|
of `go.itab.*net.TCPConn,net.Conn` and through a series of dereferencing
|
|
using `bpf_probe_read` calls in `go_crypto_tls_get_fd_from_tcp_conn` function.
|
|
|
|
---
|
|
|
|
SOURCES:
|
|
|
|
Tracing Go Functions with eBPF (<=1.16): https://www.grant.pizza/blog/tracing-go-functions-with-ebpf-part-2/
|
|
Challenges of BPF Tracing Go: https://blog.0x74696d.com/posts/challenges-of-bpf-tracing-go/
|
|
x86 calling conventions: https://en.wikipedia.org/wiki/X86_calling_conventions
|
|
Plan 9 from Bell Labs: https://en.wikipedia.org/wiki/Plan_9_from_Bell_Labs
|
|
The issue for calling convention change in Go: https://github.com/golang/go/issues/40724
|
|
Go ABI0 (<=1.16) specification: https://go.dev/doc/asm
|
|
Proposal of Register-based Go calling convention: https://go.googlesource.com/proposal/+/master/design/40724-register-calling.md
|
|
Go internal ABI (1.17) specification: https://go.googlesource.com/go/+/refs/heads/dev.regabi/src/cmd/compile/internal-abi.md
|
|
Go internal ABI (current) specification: https://go.googlesource.com/go/+/refs/heads/master/src/cmd/compile/abi-internal.md
|
|
A Quick Guide to Go's Assembler: https://go.googlesource.com/go/+/refs/heads/dev.regabi/doc/asm.html
|
|
Dissecting Go Binaries: https://www.grant.pizza/blog/dissecting-go-binaries/
|
|
Capstone Engine: https://www.capstone-engine.org/
|
|
*/
|
|
|
|
#include "include/headers.h"
|
|
#include "include/util.h"
|
|
#include "include/maps.h"
|
|
#include "include/log.h"
|
|
#include "include/logger_messages.h"
|
|
#include "include/pids.h"
|
|
#include "include/common.h"
|
|
#include "include/go_abi_0.h"
|
|
#include "include/go_abi_internal.h"
|
|
#include "include/go_types.h"
|
|
|
|
|
|
// TODO: cilium/ebpf does not support .kconfig Therefore; for now, we build object files per kernel version.
|
|
// Error: reference to .kconfig: not supported
|
|
// See: https://github.com/cilium/ebpf/issues/698
|
|
// extern int LINUX_KERNEL_VERSION __kconfig;
|
|
|
|
enum ABI {
|
|
ABI0=0,
|
|
ABIInternal=1,
|
|
};
|
|
|
|
#if defined(bpf_target_x86)
|
|
// get_goid_from_thread_local_storage function is x86 specific
|
|
static __always_inline __u32 get_goid_from_thread_local_storage(__u64 *goroutine_id) {
|
|
int zero = 0;
|
|
int one = 1;
|
|
struct goid_offsets* offsets = bpf_map_lookup_elem(&goid_offsets_map, &zero);
|
|
if (offsets == NULL) {
|
|
return 0;
|
|
}
|
|
|
|
// Get the task that currently assigned to this thread.
|
|
struct task_struct *task = (struct task_struct*) bpf_get_current_task();
|
|
if (task == NULL) {
|
|
return 0;
|
|
}
|
|
|
|
// Read task->thread
|
|
struct thread_struct *thr;
|
|
bpf_probe_read(&thr, sizeof(thr), &task->thread);
|
|
|
|
// Read task->thread.fsbase
|
|
u64 fsbase;
|
|
#ifdef KERNEL_BEFORE_4_6
|
|
// TODO: if (LINUX_KERNEL_VERSION <= KERNEL_VERSION(4, 6, 0)) {
|
|
fsbase = BPF_CORE_READ((struct thread_struct___v46 *)thr, fs);
|
|
#else
|
|
fsbase = BPF_CORE_READ(thr, fsbase);
|
|
#endif
|
|
|
|
// Get the Goroutine ID (goid) which is stored in thread-local storage.
|
|
size_t g_addr;
|
|
bpf_probe_read_user(&g_addr, sizeof(void *), (void*)(fsbase + offsets->g_addr_offset));
|
|
bpf_probe_read_user(goroutine_id, sizeof(void *), (void*)(g_addr + offsets->goid_offset));
|
|
|
|
return 1;
|
|
}
|
|
#endif
|
|
|
|
static __always_inline __u32 go_crypto_tls_get_fd_from_tcp_conn(struct pt_regs *ctx, enum ABI abi) {
|
|
struct go_interface conn;
|
|
long err;
|
|
__u64 addr;
|
|
#if defined(bpf_target_arm64)
|
|
err = bpf_probe_read(&addr, sizeof(addr), (void*)GO_ABI_INTERNAL_PT_REGS_SP(ctx)+0x8);
|
|
if (err != 0) {
|
|
return invalid_fd;
|
|
}
|
|
#elif defined(bpf_target_x86)
|
|
if (abi == ABI0) {
|
|
err = bpf_probe_read(&addr, sizeof(addr), (void*)GO_ABI_INTERNAL_PT_REGS_SP(ctx)+0x8);
|
|
if (err != 0) {
|
|
return invalid_fd;
|
|
}
|
|
} else {
|
|
addr = GO_ABI_INTERNAL_PT_REGS_R1(ctx);
|
|
}
|
|
#endif
|
|
|
|
err = bpf_probe_read(&conn, sizeof(conn), (void*)addr);
|
|
if (err != 0) {
|
|
return invalid_fd;
|
|
}
|
|
|
|
void* net_fd_ptr;
|
|
err = bpf_probe_read(&net_fd_ptr, sizeof(net_fd_ptr), conn.ptr);
|
|
if (err != 0) {
|
|
return invalid_fd;
|
|
}
|
|
|
|
__u32 fd;
|
|
err = bpf_probe_read(&fd, sizeof(fd), net_fd_ptr + 0x10);
|
|
if (err != 0) {
|
|
return invalid_fd;
|
|
}
|
|
|
|
return fd;
|
|
}
|
|
|
|
static __always_inline void go_crypto_tls_uprobe(struct pt_regs *ctx, struct bpf_map_def* go_context, enum ABI abi) {
|
|
__u64 pid_tgid = bpf_get_current_pid_tgid();
|
|
__u64 pid = pid_tgid >> 32;
|
|
if (!should_tap(pid)) {
|
|
return;
|
|
}
|
|
|
|
struct ssl_info info = new_ssl_info();
|
|
long err;
|
|
|
|
#if defined(bpf_target_arm64)
|
|
err = bpf_probe_read(&info.buffer_len, sizeof(__u32), (void*)GO_ABI_INTERNAL_PT_REGS_SP(ctx)+0x18);
|
|
if (err != 0) {
|
|
log_error(ctx, LOG_ERROR_READING_BYTES_COUNT, pid_tgid, err, ORIGIN_SSL_UPROBE_CODE);
|
|
return;
|
|
}
|
|
#elif defined(bpf_target_x86)
|
|
if (abi == ABI0) {
|
|
err = bpf_probe_read(&info.buffer_len, sizeof(__u32), (void*)GO_ABI_0_PT_REGS_SP(ctx)+0x18);
|
|
if (err != 0) {
|
|
log_error(ctx, LOG_ERROR_READING_BYTES_COUNT, pid_tgid, err, ORIGIN_SSL_UPROBE_CODE);
|
|
return;
|
|
}
|
|
} else {
|
|
info.buffer_len = GO_ABI_INTERNAL_PT_REGS_R2(ctx);
|
|
}
|
|
#endif
|
|
|
|
#if defined(bpf_target_x86)
|
|
if (abi == ABI0) {
|
|
err = bpf_probe_read(&info.buffer, sizeof(__u32), (void*)GO_ABI_0_PT_REGS_SP(ctx)+0x11);
|
|
if (err != 0) {
|
|
log_error(ctx, LOG_ERROR_READING_FROM_SSL_BUFFER, pid_tgid, err, ORIGIN_SSL_UPROBE_CODE);
|
|
return;
|
|
}
|
|
// We basically add 00 suffix to the hex address.
|
|
info.buffer = (void*)((long)info.buffer << 8);
|
|
} else {
|
|
#endif
|
|
info.buffer = (void*)GO_ABI_INTERNAL_PT_REGS_R4(ctx);
|
|
#if defined(bpf_target_x86)
|
|
}
|
|
#endif
|
|
info.fd = go_crypto_tls_get_fd_from_tcp_conn(ctx, abi);
|
|
|
|
__u64 goroutine_id;
|
|
if (abi == ABI0) {
|
|
#if defined(bpf_target_arm64)
|
|
// In case of ABI0 and arm64, it's stored in the Goroutine register
|
|
goroutine_id = GO_ABI_0_PT_REGS_GP(ctx);
|
|
#elif defined(bpf_target_x86)
|
|
// In case of ABI0 and amd64, it's stored in the thread-local storage
|
|
int status = get_goid_from_thread_local_storage(&goroutine_id);
|
|
if (!status) {
|
|
return;
|
|
}
|
|
#endif
|
|
} else {
|
|
// GO_ABI_INTERNAL_PT_REGS_GP is the Goroutine address in ABIInternal
|
|
goroutine_id = GO_ABI_INTERNAL_PT_REGS_GP(ctx);
|
|
}
|
|
__u64 pid_fp = pid << 32 | goroutine_id;
|
|
err = bpf_map_update_elem(go_context, &pid_fp, &info, BPF_ANY);
|
|
|
|
if (err != 0) {
|
|
log_error(ctx, LOG_ERROR_PUTTING_SSL_CONTEXT, pid_tgid, err, 0l);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
static __always_inline void go_crypto_tls_ex_uprobe(struct pt_regs *ctx, struct bpf_map_def* go_context, __u32 flags, enum ABI abi) {
|
|
__u64 pid_tgid = bpf_get_current_pid_tgid();
|
|
__u64 pid = pid_tgid >> 32;
|
|
if (!should_tap(pid)) {
|
|
return;
|
|
}
|
|
|
|
__u64 goroutine_id;
|
|
if (abi == ABI0) {
|
|
#if defined(bpf_target_arm64)
|
|
// In case of ABI0 and arm64, it's stored in the Goroutine register
|
|
goroutine_id = GO_ABI_0_PT_REGS_GP(ctx);
|
|
#elif defined(bpf_target_x86)
|
|
// In case of ABI0 and amd64, it's stored in the thread-local storage
|
|
int status = get_goid_from_thread_local_storage(&goroutine_id);
|
|
if (!status) {
|
|
return;
|
|
}
|
|
#endif
|
|
} else {
|
|
// GO_ABI_INTERNAL_PT_REGS_GP is the Goroutine address in ABIInternal
|
|
goroutine_id = GO_ABI_INTERNAL_PT_REGS_GP(ctx);
|
|
}
|
|
__u64 pid_fp = pid << 32 | goroutine_id;
|
|
struct ssl_info *info_ptr = bpf_map_lookup_elem(go_context, &pid_fp);
|
|
|
|
if (info_ptr == NULL) {
|
|
return;
|
|
}
|
|
bpf_map_delete_elem(go_context, &pid_fp);
|
|
|
|
struct ssl_info info;
|
|
long err = bpf_probe_read(&info, sizeof(struct ssl_info), info_ptr);
|
|
|
|
if (err != 0) {
|
|
log_error(ctx, LOG_ERROR_READING_SSL_CONTEXT, pid_tgid, err, ORIGIN_SSL_URETPROBE_CODE);
|
|
return;
|
|
}
|
|
|
|
// In case of read, the length is determined on return
|
|
if (flags == FLAGS_IS_READ_BIT) {
|
|
#if defined(bpf_target_arm64)
|
|
// On ARM64 we look at a general-purpose register as an indicator of error return
|
|
if (GO_ABI_INTERNAL_PT_REGS_R6(ctx) == 0x10) {
|
|
return;
|
|
}
|
|
info.buffer_len = GO_ABI_INTERNAL_PT_REGS_R7(ctx); // n in return n, nil
|
|
#elif defined(bpf_target_x86)
|
|
if (abi == ABI0) {
|
|
// n in return n, nil
|
|
err = bpf_probe_read(&info.buffer_len, sizeof(__u32), (void*)GO_ABI_0_PT_REGS_SP(ctx)+0x28);
|
|
if (err != 0) {
|
|
log_error(ctx, LOG_ERROR_READING_BYTES_COUNT, pid_tgid, err, ORIGIN_SSL_UPROBE_CODE);
|
|
return;
|
|
}
|
|
} else {
|
|
info.buffer_len = GO_ABI_INTERNAL_PT_REGS_R1(ctx); // n in return n, nil
|
|
}
|
|
#endif
|
|
// This check achieves ignoring 0 length reads (the reads result with an error)
|
|
if (info.buffer_len <= 0) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
output_ssl_chunk(ctx, &info, info.buffer_len, pid_tgid, flags);
|
|
|
|
return;
|
|
}
|
|
|
|
SEC("uprobe/go_crypto_tls_abi0_write")
|
|
int BPF_KPROBE(go_crypto_tls_abi0_write) {
|
|
go_crypto_tls_uprobe(ctx, &go_write_context, ABI0);
|
|
return 1;
|
|
}
|
|
|
|
SEC("uprobe/go_crypto_tls_abi0_write_ex")
|
|
int BPF_KPROBE(go_crypto_tls_abi0_write_ex) {
|
|
go_crypto_tls_ex_uprobe(ctx, &go_write_context, 0, ABI0);
|
|
return 1;
|
|
}
|
|
|
|
SEC("uprobe/go_crypto_tls_abi0_read")
|
|
int BPF_KPROBE(go_crypto_tls_abi0_read) {
|
|
go_crypto_tls_uprobe(ctx, &go_read_context, ABI0);
|
|
return 1;
|
|
}
|
|
|
|
SEC("uprobe/go_crypto_tls_abi0_read_ex")
|
|
int BPF_KPROBE(go_crypto_tls_abi0_read_ex) {
|
|
go_crypto_tls_ex_uprobe(ctx, &go_read_context, FLAGS_IS_READ_BIT, ABI0);
|
|
return 1;
|
|
}
|
|
|
|
SEC("uprobe/go_crypto_tls_abi_internal_write")
|
|
int BPF_KPROBE(go_crypto_tls_abi_internal_write) {
|
|
go_crypto_tls_uprobe(ctx, &go_write_context, ABIInternal);
|
|
return 1;
|
|
}
|
|
|
|
SEC("uprobe/go_crypto_tls_abi_internal_write_ex")
|
|
int BPF_KPROBE(go_crypto_tls_abi_internal_write_ex) {
|
|
go_crypto_tls_ex_uprobe(ctx, &go_write_context, 0, ABIInternal);
|
|
return 1;
|
|
}
|
|
|
|
SEC("uprobe/go_crypto_tls_abi_internal_read")
|
|
int BPF_KPROBE(go_crypto_tls_abi_internal_read) {
|
|
go_crypto_tls_uprobe(ctx, &go_read_context, ABIInternal);
|
|
return 1;
|
|
}
|
|
|
|
SEC("uprobe/go_crypto_tls_abi_internal_read_ex")
|
|
int BPF_KPROBE(go_crypto_tls_abi_internal_read_ex) {
|
|
go_crypto_tls_ex_uprobe(ctx, &go_read_context, FLAGS_IS_READ_BIT, ABIInternal);
|
|
return 1;
|
|
}
|