Libbpf eBPF fails to attach, bpftrace succeeds

261 Views Asked by At

I am currently experimenting with BPF, both by libbpf and bpftrace. So far I've found some differences that I need help understanding.

For this specific case I am trying to instrument, authelia authentication and authorization server written in go. I've followed their build instructions to build the binary, with debug symbols. Then, trying to instrument a verifyAuth function:

$ readelf -s --wide ./authelia | rg verifyAuth
 32794: 00000000010a5d80  2263 FUNC    LOCAL  DEFAULT   16 github.com/authelia/authelia/v4/internal/handlers.verifyAuth

With the following bpftrace command I am able to attach, and trigger on invocations:

$ sudo bpftrace -e 'uprobe:/home/nela/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth { printf("%s\n", probe); }'
Attaching 1 probe...
uprobe:/home/nela/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth

Trying to do the same with the following libbpf code

#include "vmlinux.h"
// #include <bpf/bpf_core_read.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>

char LICENSE[] SEC("license") = "Dual BSD/GPL";

SEC("uprobe//home/nela/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth")
int BPF_KPROBE(handle_auth) {

  bpf_printk("Triggered handle_auth\n");

  return 0;
}

Produces the following error:

$ sudo ./auth
libbpf: loading object 'auth_bpf' from buffer
libbpf: elf: section(3) uprobe//home/nela/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth, size 48, link 0, flags 6, type=1
libbpf: sec 'uprobe//home/nela/master/authelia-test/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth': found program 'handle_auth' at insn offset 0 (0 bytes), code size 6 insns (48 bytes)
libbpf: elf: section(4) .reluprobe//home/nela/master/authelia-test/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth, size 16, link 12, flags 40, type=9
libbpf: elf: section(5) license, size 13, link 0, flags 3, type=1
libbpf: license of auth_bpf is Dual BSD/GPL
libbpf: elf: section(6) .rodata, size 23, link 0, flags 2, type=1
libbpf: elf: section(7) .BTF, size 965, link 0, flags 0, type=1
libbpf: elf: section(9) .BTF.ext, size 96, link 0, flags 0, type=1
libbpf: elf: section(12) .symtab, size 144, link 1, flags 0, type=2
libbpf: looking for externs among 6 symbols...
libbpf: collected 0 externs total
libbpf: map 'auth_bpf.rodata' (global data): at sec_idx 6, offset 0, flags 480.
libbpf: map 0 is "auth_bpf.rodata"
libbpf: sec '.reluprobe//home/nela/master/authelia-test/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth': collecting relocation for section(3) 'uprobe//home/nela/master/authelia-test/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth'
libbpf: sec '.reluprobe//home/nela/master/authelia-test/authelia/authelia:github.com/authelia/authelia/v4/internal/handlers.verifyAuth': relo #0: insn #0 against '.rodata'
libbpf: prog 'handle_auth': found data map 0 (auth_bpf.rodata, sec 6, off 0) for insn 0
libbpf: map 'auth_bpf.rodata': created successfully, fd=4
libbpf: elf: failed to find symbol 'github.com' in '/home/nela/master/authelia-test/authelia/authelia'
libbpf: prog 'handle_auth': failed to auto-attach: -2
Failed to attach BPF skeleton

Additional info

$ uname -a
Linux nelasus 5.19.0-40-generic #41~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Mar 31 16:00:14 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:    Ubuntu 22.04.1 LTS
Release:    22.04
Codename:   jammy

Why is libbpf unable to find the function symbol? Is there a better way to go about instrumenting go binaries?

0

There are 0 best solutions below