1

与 BPF 编译器集合 (bcc) 中的gethostlatency.py工具类似,我想跟踪对getaddrinfo. 另外,我想收集返回值(IP 地址、地址族)

但是,我似乎无法通过 BPF 验证程序返回正确结果的解决方案。

getaddrinfo 函数:

int getaddrinfo(const char *node, const char *service,
                   const struct addrinfo *hints,
                   struct addrinfo **res);

结果以struct addrinfo **res.

此代码示例直接基于gethostlatency.py至少不会返回任何错误,而是返回错误的结果:

#!/usr/bin/python
#
# Based on (gethostlatency.py) https://github.com/iovisor/bcc/blob/master/tools/gethostlatency.py
# Licensed under the Apache License, Version 2.0 (the "License")

from __future__ import print_function
from bcc import BPF
from time import strftime
import argparse

examples = """examples:
    ./gethostlatency           # trace all TCP accept()s
    ./gethostlatency -p 181    # only trace PID 181
"""
parser = argparse.ArgumentParser(
    description="Show latency for getaddrinfo/gethostbyname[2] calls",
    formatter_class=argparse.RawDescriptionHelpFormatter,
    epilog=examples)
parser.add_argument("-p", "--pid", help="trace this PID only", type=int,
    default=-1)
parser.add_argument("--ebpf", action="store_true",
    help=argparse.SUPPRESS)
args = parser.parse_args()

# load BPF program
bpf_text = """
#include <uapi/linux/ptrace.h>
#include <linux/sched.h>

// Copied from: include/netdb.h
struct addrinfo
{
  int ai_flags;         /* Input flags.  */
  int ai_family;        /* Protocol family for socket.  */
  int ai_socktype;      /* Socket type.  */
  int ai_protocol;      /* Protocol for socket.  */
  u32 ai_addrlen;       /* Length of socket address.  */ // CHANGED from socklen_t
  struct sockaddr *ai_addr; /* Socket address for socket.  */
  char *ai_canonname;       /* Canonical name for service location.  */
  struct addrinfo *ai_next; /* Pointer to next in list.  */
};

struct val_t {
    u32 pid;
    char comm[TASK_COMM_LEN];
    char host[80];
    u64 ts;
};

struct data_t {
    u32 pid;
    u64 delta;
    char comm[TASK_COMM_LEN];
    u32 af;
    char host[80];
};

BPF_HASH(start, u32, struct val_t);
BPF_HASH(currres, u32, struct addrinfo *);
BPF_PERF_OUTPUT(events);

int do_entry(struct pt_regs *ctx, const char *node, const char *service,
                       const struct addrinfo *hints,
                       struct addrinfo **res) {
    if (!PT_REGS_PARM1(ctx))
        return 0;

    struct val_t val = {};
    u32 pid = bpf_get_current_pid_tgid();

    if (bpf_get_current_comm(&val.comm, sizeof(val.comm)) == 0) {
        bpf_probe_read(&val.host, sizeof(val.host),
                       (void *)PT_REGS_PARM1(ctx));
        val.pid = bpf_get_current_pid_tgid();
        val.ts = bpf_ktime_get_ns();
        start.update(&pid, &val);
        currres.update(&pid, &res);
    }

    return 0;
}

int do_return(struct pt_regs *ctx) {
    struct val_t *valp;
    struct data_t data = {};
    u64 delta;
    u32 pid = bpf_get_current_pid_tgid();

    u64 tsp = bpf_ktime_get_ns();

    valp = start.lookup(&pid);
    if (valp == 0)
        return 0;       // missed start

    bpf_probe_read(&data.comm, sizeof(data.comm), valp->comm);
    bpf_probe_read(&data.host, sizeof(data.host), (void *)valp->host);

    struct addrinfo **result;
    result = currres.lookup(&pid);
    if (result == 0) {
        return 0;   // missed entry
    }
    
    struct addrinfo* resx = *result;
    bpf_probe_read(&data.af, sizeof(data.af), &resx->ai_family);

    //data.af = resx->ai_family;

    data.pid = valp->pid;
    data.delta = tsp - valp->ts;
    events.perf_submit(ctx, &data, sizeof(data));
    start.delete(&pid);
    return 0;
}
"""
if args.ebpf:
    print(bpf_text)
    exit()

b = BPF(text=bpf_text)
b.attach_uprobe(name="c", sym="getaddrinfo", fn_name="do_entry", pid=args.pid)
b.attach_uretprobe(name="c", sym="getaddrinfo", fn_name="do_return",
                   pid=args.pid)

# header
print("%-9s %-6s %-16s %10s %-10s %s" % ("TIME", "PID", "COMM", "LATms", "AF", "HOST"))

def print_event(cpu, data, size):
    event = b["events"].event(data)
    print("%-9s %-6d %-16s %10.2f %-10d %s" % (strftime("%H:%M:%S"), event.pid,
        event.comm.decode('utf-8', 'replace'), (float(event.delta) / 1000000),
        event.af,
        event.host.decode('utf-8', 'replace')))

# loop with callback to print_event
b["events"].open_perf_buffer(print_event)
while 1:
    try:
        b.perf_buffer_poll()
    except KeyboardInterrupt:
        exit()

可能出错的事情:

  • 我复制了addrinfo类型定义,netdb.h因为它在密件抄送中似乎无法访问。
  • 我收集结果的方式:currres.update(&pid, &res);
  • 我从结果中读取的方式:bpf_probe_read(&data.af, sizeof(data.af), &resx->ai_family);

在这个示例中,程序只是试图读取地址族(AF)。因此,预期值将是 2 (AF_INET) 或 10 (AF_INET6),而不是显示像 32xxx 这样的数字。

要触发输出,必须发出 DNS 请求。

上面的这个程序版本也显示了一个警告:

/virtual/main.c:52:30: warning: incompatible pointer types passing 'struct addrinfo ***' to parameter of type
    'struct addrinfo **'; remove & [-Wincompatible-pointer-types]
        currres.update(&pid, &res);
                            ^~~~

解决警告会导致 BPF 验证器中出现更多神秘错误。

使用内核版本 4.18 在 x64 上测试。

4

1 回答 1

2

您想currres存储从中获得的内核指针getaddrinfo,因此其声明应为:

BPF_HASH(currres, u32, struct addrinfo *);

然后,您将需要使用两个 probe_reads 来访问来自该内核指针的值:

struct addrinfo **resx = *result;
struct addrinfo *resxx;
bpf_probe_read(&resxx, sizeof(resxx), resx);
bpf_probe_read(&data.af, sizeof(data.af), &resxx->ai_family);

请注意,对于最新的 bcc 版本 (>= v0.6.0),您也可以直接编写以下内容,bcc 会将其转换为对bpf_probe_read.

struct addrinfo **resx = *result;
struct addrinfo *resxx = *resx;
data.af = resxx->ai_family;

这是完整的程序:

#!/usr/bin/python
#
# Based on (gethostlatency.py) https://github.com/iovisor/bcc/blob/master/tools/gethostlatency.py
# Licensed under the Apache License, Version 2.0 (the "License")

from __future__ import print_function
from bcc import BPF
from time import strftime
import argparse

examples = """examples:
    ./gethostlatency           # trace all TCP accept()s
    ./gethostlatency -p 181    # only trace PID 181
"""
parser = argparse.ArgumentParser(
    description="Show latency for getaddrinfo/gethostbyname[2] calls",
    formatter_class=argparse.RawDescriptionHelpFormatter,
    epilog=examples)
parser.add_argument("-p", "--pid", help="trace this PID only", type=int,
    default=-1)
parser.add_argument("--ebpf", action="store_true",
    help=argparse.SUPPRESS)
args = parser.parse_args()

# load BPF program
bpf_text = """
#include <uapi/linux/ptrace.h>
#include <linux/sched.h>

// Copied from: include/netdb.h
struct addrinfo
{
  int ai_flags;         /* Input flags.  */
  int ai_family;        /* Protocol family for socket.  */
  int ai_socktype;      /* Socket type.  */
  int ai_protocol;      /* Protocol for socket.  */
  u32 ai_addrlen;       /* Length of socket address.  */ // CHANGED from socklen_t
  struct sockaddr *ai_addr; /* Socket address for socket.  */
  char *ai_canonname;       /* Canonical name for service location.  */
  struct addrinfo *ai_next; /* Pointer to next in list.  */
};

struct val_t {
    u32 pid;
    char comm[TASK_COMM_LEN];
    char host[80];
    u64 ts;
};

struct data_t {
    u32 pid;
    u64 delta;
    char comm[TASK_COMM_LEN];
    u32 af;
    char host[80];
};

BPF_HASH(start, u32, struct val_t);
BPF_HASH(currres, u32, struct addrinfo **);
BPF_PERF_OUTPUT(events);

int do_entry(struct pt_regs *ctx, const char *node, const char *service,
                       const struct addrinfo *hints,
                       struct addrinfo **res) {
    if (!PT_REGS_PARM1(ctx))
        return 0;

    struct val_t val = {};
    u32 pid = bpf_get_current_pid_tgid();

    if (bpf_get_current_comm(&val.comm, sizeof(val.comm)) == 0) {
        bpf_probe_read(&val.host, sizeof(val.host),
                       (void *)PT_REGS_PARM1(ctx));
        val.pid = bpf_get_current_pid_tgid();
        val.ts = bpf_ktime_get_ns();
        start.update(&pid, &val);
        currres.update(&pid, &res);
    }

    return 0;
}

int do_return(struct pt_regs *ctx) {
    struct val_t *valp;
    struct data_t data = {};
    u64 delta;
    u32 pid = bpf_get_current_pid_tgid();

    u64 tsp = bpf_ktime_get_ns();

    valp = start.lookup(&pid);
    if (valp == 0)
        return 0;       // missed start

    bpf_probe_read(&data.comm, sizeof(data.comm), valp->comm);
    bpf_probe_read(&data.host, sizeof(data.host), (void *)valp->host);

    struct addrinfo ***result;
    result = currres.lookup(&pid);
    if (!result || !(*result)) {
        return 0;   // missed entry
    }

    struct addrinfo **resx = *result;
    struct addrinfo *resxx = *resx;
    data.af = resxx->ai_family;

    //data.af = resx->ai_family;

    data.pid = valp->pid;
    data.delta = tsp - valp->ts;
    events.perf_submit(ctx, &data, sizeof(data));
    start.delete(&pid);
    return 0;
}
"""
if args.ebpf:
    print(bpf_text)
    exit()

b = BPF(text=bpf_text)
b.attach_uprobe(name="c", sym="getaddrinfo", fn_name="do_entry", pid=args.pid)
b.attach_uretprobe(name="c", sym="getaddrinfo", fn_name="do_return",
                   pid=args.pid)

# header
print("%-9s %-6s %-16s %10s %-10s %s" % ("TIME", "PID", "COMM", "LATms", "AF", "HOST"))

def print_event(cpu, data, size):
    event = b["events"].event(data)
    print("%-9s %-6d %-16s %10.2f %-10d %s" % (strftime("%H:%M:%S"), event.pid,
        event.comm.decode('utf-8', 'replace'), (float(event.delta) / 1000000),
        event.af,
        event.host.decode('utf-8', 'replace')))

# loop with callback to print_event
b["events"].open_perf_buffer(print_event)
while 1:
    try:
        b.perf_buffer_poll()
    except KeyboardInterrupt:
        exit()
于 2019-07-28T20:28:57.800 回答