Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type PIDsAccounter ¶ added in v0.3.2
type PIDsAccounter interface { // AllowPID notifies the tracer to accept traces from the process with the // provided PID. Unless system-wide instrumentation, the Tracer should discard // traces from processes whose PID has not been allowed before AllowPID(uint32) // BlockPID notifies the tracer to stop accepting traces from the process // with the provided PID. After receiving them via ringbuffer, it should // discard them. BlockPID(uint32) }
type ProcessTracer ¶
type ProcessTracer struct { Programs []Tracer ELFInfo *exec.FileInfo Goffsets *goexec.Offsets Exe *link.Executable PinPath string SystemWide bool // contains filtered or unexported fields }
ProcessTracer instruments an executable with eBPF and provides the eBPF readers that will forward the traces to later stages in the pipeline
func (*ProcessTracer) AllowPID ¶ added in v0.3.2
func (pt *ProcessTracer) AllowPID(pid uint32)
func (*ProcessTracer) BlockPID ¶ added in v0.3.2
func (pt *ProcessTracer) BlockPID(pid uint32)
type Tracer ¶
type Tracer interface { PIDsAccounter // Load the bpf object that is generated by the bpf2go compiler Load() (*ebpf.CollectionSpec, error) // Constants returns a map of constants to be overriden into the eBPF program. // The key is the constant name and the value is the value to overwrite. Constants(*exec.FileInfo, *goexec.Offsets) map[string]any // BpfObjects that are created by the bpf2go compiler BpfObjects() any // GoProbes returns a map with the name of Go functions that need to be inspected // in the executable, as well as the eBPF programs that optionally need to be // inserted as the Go function start and end probes GoProbes() map[string]ebpfcommon.FunctionPrograms // KProbes returns a map with the name of the kernel probes that need to be // tapped into. Start matches kprobe, End matches kretprobe KProbes() map[string]ebpfcommon.FunctionPrograms // UProbes returns a map with the module name mapping to the uprobes that need to be // tapped into. Start matches uprobe, End matches uretprobe UProbes() map[string]map[string]ebpfcommon.FunctionPrograms // SocketFilters returns a list of programs that need to be loaded as a // generic eBPF socket filter SocketFilters() []*ebpf.Program // Run will do the action of listening for eBPF traces and forward them // periodically to the output channel. // It optionally receives the service svc.ID, to // populate each forwarded span with its value. But some // tracers might ignore it (e.g. system-wide HTTP filter will directly set the // executable name of each request). Run(context.Context, chan<- []request.Span, svc.ID) // AddCloser adds io.Closer instances that need to be invoked when the // Run function ends. AddCloser(c ...io.Closer) }
Tracer is an individual eBPF program (e.g. the net/http or the grpc tracers)
Click to show internal directories.
Click to hide internal directories.