237 lines
5.8 KiB
C
237 lines
5.8 KiB
C
// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
|
// Copyright (c) 2020 Wenbo Zhang
|
|
//
|
|
// Based on tcpconnlat(8) from BCC by Brendan Gregg.
|
|
// 11-Jul-2020 Wenbo Zhang Created this.
|
|
#include <argp.h>
|
|
#include <arpa/inet.h>
|
|
#include <signal.h>
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <time.h>
|
|
#include <bpf/libbpf.h>
|
|
#include <bpf/bpf.h>
|
|
#include "tcpconnlat.h"
|
|
#include "tcpconnlat.skel.h"
|
|
#include "trace_helpers.h"
|
|
|
|
#define PERF_BUFFER_PAGES 16
|
|
#define PERF_POLL_TIMEOUT_MS 100
|
|
|
|
static volatile sig_atomic_t exiting = 0;
|
|
|
|
static struct env {
|
|
__u64 min_us;
|
|
pid_t pid;
|
|
bool timestamp;
|
|
bool lport;
|
|
bool verbose;
|
|
} env;
|
|
|
|
const char *argp_program_version = "tcpconnlat 0.1";
|
|
const char *argp_program_bug_address =
|
|
"https://github.com/iovisor/bcc/tree/master/libbpf-tools";
|
|
const char argp_program_doc[] =
|
|
"\nTrace TCP connects and show connection latency.\n"
|
|
"\n"
|
|
"USAGE: tcpconnlat [--help] [-t] [-p PID] [-L]\n"
|
|
"\n"
|
|
"EXAMPLES:\n"
|
|
" tcpconnlat # summarize on-CPU time as a histogram\n"
|
|
" tcpconnlat 1 # trace connection latency slower than 1 ms\n"
|
|
" tcpconnlat 0.1 # trace connection latency slower than 100 us\n"
|
|
" tcpconnlat -t # 1s summaries, milliseconds, and timestamps\n"
|
|
" tcpconnlat -p 185 # trace PID 185 only\n"
|
|
" tcpconnlat -L # include LPORT while printing outputs\n";
|
|
|
|
static const struct argp_option opts[] = {
|
|
{ "timestamp", 't', NULL, 0, "Include timestamp on output" },
|
|
{ "pid", 'p', "PID", 0, "Trace this PID only" },
|
|
{ "lport", 'L', NULL, 0, "Include LPORT on output" },
|
|
{ "verbose", 'v', NULL, 0, "Verbose debug output" },
|
|
{ NULL, 'h', NULL, OPTION_HIDDEN, "Show the full help" },
|
|
{},
|
|
};
|
|
|
|
static error_t parse_arg(int key, char *arg, struct argp_state *state)
|
|
{
|
|
static int pos_args;
|
|
|
|
switch (key) {
|
|
case 'h':
|
|
argp_state_help(state, stderr, ARGP_HELP_STD_HELP);
|
|
break;
|
|
case 'v':
|
|
env.verbose = true;
|
|
break;
|
|
case 'p':
|
|
errno = 0;
|
|
env.pid = strtol(arg, NULL, 10);
|
|
if (errno) {
|
|
fprintf(stderr, "invalid PID: %s\n", arg);
|
|
argp_usage(state);
|
|
}
|
|
break;
|
|
case 't':
|
|
env.timestamp = true;
|
|
break;
|
|
case 'L':
|
|
env.lport = true;
|
|
break;
|
|
case ARGP_KEY_ARG:
|
|
if (pos_args++) {
|
|
fprintf(stderr,
|
|
"Unrecognized positional argument: %s\n", arg);
|
|
argp_usage(state);
|
|
}
|
|
errno = 0;
|
|
env.min_us = strtod(arg, NULL) * 1000;
|
|
if (errno || env.min_us <= 0) {
|
|
fprintf(stderr, "Invalid delay (in us): %s\n", arg);
|
|
argp_usage(state);
|
|
}
|
|
break;
|
|
default:
|
|
return ARGP_ERR_UNKNOWN;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int libbpf_print_fn(enum libbpf_print_level level, const char *format, va_list args)
|
|
{
|
|
if (level == LIBBPF_DEBUG && !env.verbose)
|
|
return 0;
|
|
return vfprintf(stderr, format, args);
|
|
}
|
|
|
|
static void sig_int(int signo)
|
|
{
|
|
exiting = 1;
|
|
}
|
|
|
|
void handle_event(void *ctx, int cpu, void *data, __u32 data_sz)
|
|
{
|
|
const struct event *e = data;
|
|
char src[INET6_ADDRSTRLEN];
|
|
char dst[INET6_ADDRSTRLEN];
|
|
union {
|
|
struct in_addr x4;
|
|
struct in6_addr x6;
|
|
} s, d;
|
|
static __u64 start_ts;
|
|
|
|
if (env.timestamp) {
|
|
if (start_ts == 0)
|
|
start_ts = e->ts_us;
|
|
printf("%-9.3f ", (e->ts_us - start_ts) / 1000000.0);
|
|
}
|
|
if (e->af == AF_INET) {
|
|
s.x4.s_addr = e->saddr_v4;
|
|
d.x4.s_addr = e->daddr_v4;
|
|
} else if (e->af == AF_INET6) {
|
|
memcpy(&s.x6.s6_addr, e->saddr_v6, sizeof(s.x6.s6_addr));
|
|
memcpy(&d.x6.s6_addr, e->daddr_v6, sizeof(d.x6.s6_addr));
|
|
} else {
|
|
fprintf(stderr, "broken event: event->af=%d", e->af);
|
|
return;
|
|
}
|
|
|
|
if (env.lport) {
|
|
printf("%-6d %-12.12s %-2d %-16s %-6d %-16s %-5d %.2f\n", e->tgid, e->comm,
|
|
e->af == AF_INET ? 4 : 6, inet_ntop(e->af, &s, src, sizeof(src)), e->lport,
|
|
inet_ntop(e->af, &d, dst, sizeof(dst)), ntohs(e->dport),
|
|
e->delta_us / 1000.0);
|
|
} else {
|
|
printf("%-6d %-12.12s %-2d %-16s %-16s %-5d %.2f\n", e->tgid, e->comm,
|
|
e->af == AF_INET ? 4 : 6, inet_ntop(e->af, &s, src, sizeof(src)),
|
|
inet_ntop(e->af, &d, dst, sizeof(dst)), ntohs(e->dport),
|
|
e->delta_us / 1000.0);
|
|
}
|
|
}
|
|
|
|
void handle_lost_events(void *ctx, int cpu, __u64 lost_cnt)
|
|
{
|
|
fprintf(stderr, "lost %llu events on CPU #%d\n", lost_cnt, cpu);
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
static const struct argp argp = {
|
|
.options = opts,
|
|
.parser = parse_arg,
|
|
.doc = argp_program_doc,
|
|
};
|
|
struct perf_buffer *pb = NULL;
|
|
struct tcpconnlat_bpf *obj;
|
|
int err;
|
|
|
|
err = argp_parse(&argp, argc, argv, 0, NULL, NULL);
|
|
if (err)
|
|
return err;
|
|
|
|
libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
|
|
libbpf_set_print(libbpf_print_fn);
|
|
|
|
obj = tcpconnlat_bpf__open();
|
|
if (!obj) {
|
|
fprintf(stderr, "failed to open BPF object\n");
|
|
return 1;
|
|
}
|
|
|
|
/* initialize global data (filtering options) */
|
|
obj->rodata->targ_min_us = env.min_us;
|
|
obj->rodata->targ_tgid = env.pid;
|
|
|
|
err = tcpconnlat_bpf__load(obj);
|
|
if (err) {
|
|
fprintf(stderr, "failed to load BPF object: %d\n", err);
|
|
goto cleanup;
|
|
}
|
|
|
|
err = tcpconnlat_bpf__attach(obj);
|
|
if (err) {
|
|
goto cleanup;
|
|
}
|
|
|
|
pb = perf_buffer__new(bpf_map__fd(obj->maps.events), PERF_BUFFER_PAGES,
|
|
handle_event, handle_lost_events, NULL, NULL);
|
|
if (!pb) {
|
|
fprintf(stderr, "failed to open perf buffer: %d\n", errno);
|
|
goto cleanup;
|
|
}
|
|
|
|
/* print header */
|
|
if (env.timestamp)
|
|
printf("%-9s ", ("TIME(s)"));
|
|
if (env.lport) {
|
|
printf("%-6s %-12s %-2s %-16s %-6s %-16s %-5s %s\n",
|
|
"PID", "COMM", "IP", "SADDR", "LPORT", "DADDR", "DPORT", "LAT(ms)");
|
|
} else {
|
|
printf("%-6s %-12s %-2s %-16s %-16s %-5s %s\n",
|
|
"PID", "COMM", "IP", "SADDR", "DADDR", "DPORT", "LAT(ms)");
|
|
}
|
|
|
|
if (signal(SIGINT, sig_int) == SIG_ERR) {
|
|
fprintf(stderr, "can't set signal handler: %s\n", strerror(errno));
|
|
err = 1;
|
|
goto cleanup;
|
|
}
|
|
|
|
/* main: poll */
|
|
while (!exiting) {
|
|
err = perf_buffer__poll(pb, PERF_POLL_TIMEOUT_MS);
|
|
if (err < 0 && err != -EINTR) {
|
|
fprintf(stderr, "error polling perf buffer: %s\n", strerror(-err));
|
|
goto cleanup;
|
|
}
|
|
/* reset err to return 0 if exiting */
|
|
err = 0;
|
|
}
|
|
|
|
cleanup:
|
|
perf_buffer__free(pb);
|
|
tcpconnlat_bpf__destroy(obj);
|
|
|
|
return err != 0;
|
|
}
|