2020-03-10 08:09:25 -04:00
|
|
|
package ebpf
|
|
|
|
|
|
|
|
import (
|
2020-07-24 03:53:45 -04:00
|
|
|
"fmt"
|
|
|
|
|
2020-03-10 08:09:25 -04:00
|
|
|
"github.com/cilium/ebpf/asm"
|
|
|
|
)
|
|
|
|
|
|
|
|
// link resolves bpf-to-bpf calls.
|
|
|
|
//
|
2020-07-24 03:53:45 -04:00
|
|
|
// Each library may contain multiple functions / labels, and is only linked
|
|
|
|
// if prog references one of these functions.
|
2020-03-10 08:09:25 -04:00
|
|
|
//
|
2020-07-24 03:53:45 -04:00
|
|
|
// Libraries also linked.
|
|
|
|
func link(prog *ProgramSpec, libs []*ProgramSpec) error {
|
|
|
|
var (
|
|
|
|
linked = make(map[*ProgramSpec]bool)
|
|
|
|
pending = []asm.Instructions{prog.Instructions}
|
|
|
|
insns asm.Instructions
|
|
|
|
)
|
|
|
|
for len(pending) > 0 {
|
|
|
|
insns, pending = pending[0], pending[1:]
|
|
|
|
for _, lib := range libs {
|
|
|
|
if linked[lib] {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
needed, err := needSection(insns, lib.Instructions)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("linking %s: %w", lib.Name, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !needed {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
linked[lib] = true
|
|
|
|
prog.Instructions = append(prog.Instructions, lib.Instructions...)
|
|
|
|
pending = append(pending, lib.Instructions)
|
|
|
|
|
|
|
|
if prog.BTF != nil && lib.BTF != nil {
|
2022-02-06 02:29:51 -05:00
|
|
|
if err := prog.BTF.Append(lib.BTF); err != nil {
|
2020-07-24 03:53:45 -04:00
|
|
|
return fmt.Errorf("linking BTF of %s: %w", lib.Name, err)
|
|
|
|
}
|
|
|
|
}
|
2020-03-10 08:09:25 -04:00
|
|
|
}
|
|
|
|
}
|
2020-07-24 03:53:45 -04:00
|
|
|
|
|
|
|
return nil
|
2020-03-10 08:09:25 -04:00
|
|
|
}
|
|
|
|
|
2020-07-24 03:53:45 -04:00
|
|
|
func needSection(insns, section asm.Instructions) (bool, error) {
|
2020-03-10 08:09:25 -04:00
|
|
|
// A map of symbols to the libraries which contain them.
|
|
|
|
symbols, err := section.SymbolOffsets()
|
|
|
|
if err != nil {
|
2020-07-24 03:53:45 -04:00
|
|
|
return false, err
|
2020-03-10 08:09:25 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, ins := range insns {
|
|
|
|
if ins.Reference == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2020-07-24 03:53:45 -04:00
|
|
|
if ins.OpCode.JumpOp() != asm.Call || ins.Src != asm.PseudoCall {
|
2020-03-10 08:09:25 -04:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if ins.Constant != -1 {
|
|
|
|
// This is already a valid call, no need to link again.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, ok := symbols[ins.Reference]; !ok {
|
|
|
|
// Symbol isn't available in this section
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// At this point we know that at least one function in the
|
2020-07-24 03:53:45 -04:00
|
|
|
// library is called from insns, so we have to link it.
|
|
|
|
return true, nil
|
2020-03-10 08:09:25 -04:00
|
|
|
}
|
|
|
|
|
2020-07-24 03:53:45 -04:00
|
|
|
// None of the functions in the section are called.
|
|
|
|
return false, nil
|
2020-03-10 08:09:25 -04:00
|
|
|
}
|
2021-04-04 17:11:06 -04:00
|
|
|
|
|
|
|
func fixupJumpsAndCalls(insns asm.Instructions) error {
|
|
|
|
symbolOffsets := make(map[string]asm.RawInstructionOffset)
|
|
|
|
iter := insns.Iterate()
|
|
|
|
for iter.Next() {
|
|
|
|
ins := iter.Ins
|
|
|
|
|
|
|
|
if ins.Symbol == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, ok := symbolOffsets[ins.Symbol]; ok {
|
|
|
|
return fmt.Errorf("duplicate symbol %s", ins.Symbol)
|
|
|
|
}
|
|
|
|
|
|
|
|
symbolOffsets[ins.Symbol] = iter.Offset
|
|
|
|
}
|
|
|
|
|
|
|
|
iter = insns.Iterate()
|
|
|
|
for iter.Next() {
|
|
|
|
i := iter.Index
|
|
|
|
offset := iter.Offset
|
|
|
|
ins := iter.Ins
|
|
|
|
|
2021-07-19 02:57:52 -04:00
|
|
|
if ins.Reference == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2021-04-04 17:11:06 -04:00
|
|
|
switch {
|
|
|
|
case ins.IsFunctionCall() && ins.Constant == -1:
|
|
|
|
// Rewrite bpf to bpf call
|
|
|
|
callOffset, ok := symbolOffsets[ins.Reference]
|
|
|
|
if !ok {
|
2021-07-19 02:57:52 -04:00
|
|
|
return fmt.Errorf("call at %d: reference to missing symbol %q", i, ins.Reference)
|
2021-04-04 17:11:06 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
ins.Constant = int64(callOffset - offset - 1)
|
|
|
|
|
|
|
|
case ins.OpCode.Class() == asm.JumpClass && ins.Offset == -1:
|
|
|
|
// Rewrite jump to label
|
|
|
|
jumpOffset, ok := symbolOffsets[ins.Reference]
|
|
|
|
if !ok {
|
2021-07-19 02:57:52 -04:00
|
|
|
return fmt.Errorf("jump at %d: reference to missing symbol %q", i, ins.Reference)
|
2021-04-04 17:11:06 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
ins.Offset = int16(jumpOffset - offset - 1)
|
2021-07-19 02:57:52 -04:00
|
|
|
|
|
|
|
case ins.IsLoadFromMap() && ins.MapPtr() == -1:
|
|
|
|
return fmt.Errorf("map %s: %w", ins.Reference, errUnsatisfiedReference)
|
2021-04-04 17:11:06 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-06 02:29:51 -05:00
|
|
|
// fixupBPFCalls replaces bpf_probe_read_{kernel,user}[_str] with bpf_probe_read[_str] on older kernels
|
|
|
|
// https://github.com/libbpf/libbpf/blob/master/src/libbpf.c#L6009
|
|
|
|
iter = insns.Iterate()
|
|
|
|
for iter.Next() {
|
|
|
|
ins := iter.Ins
|
|
|
|
if !ins.IsBuiltinCall() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
switch asm.BuiltinFunc(ins.Constant) {
|
|
|
|
case asm.FnProbeReadKernel, asm.FnProbeReadUser:
|
|
|
|
if err := haveProbeReadKernel(); err != nil {
|
|
|
|
ins.Constant = int64(asm.FnProbeRead)
|
|
|
|
}
|
|
|
|
case asm.FnProbeReadKernelStr, asm.FnProbeReadUserStr:
|
|
|
|
if err := haveProbeReadKernel(); err != nil {
|
|
|
|
ins.Constant = int64(asm.FnProbeReadStr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-04 17:11:06 -04:00
|
|
|
return nil
|
|
|
|
}
|