| // SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) |
| // Copyright (c) 2020 Wenbo Zhang |
| // |
| // Based on tcpconnlat(8) from BCC by Brendan Gregg. |
| // 11-Jul-2020 Wenbo Zhang Created this. |
| #include <argp.h> |
| #include <arpa/inet.h> |
| #include <signal.h> |
| #include <stdio.h> |
| #include <unistd.h> |
| #include <time.h> |
| #include <bpf/libbpf.h> |
| #include <bpf/bpf.h> |
| #include "tcpconnlat.h" |
| #include "tcpconnlat.skel.h" |
| #include "trace_helpers.h" |
| |
| #define PERF_BUFFER_PAGES 16 |
| #define PERF_POLL_TIMEOUT_MS 100 |
| |
| static volatile sig_atomic_t exiting = 0; |
| |
| static struct env { |
| __u64 min_us; |
| pid_t pid; |
| bool timestamp; |
| bool lport; |
| bool verbose; |
| } env; |
| |
| const char *argp_program_version = "tcpconnlat 0.1"; |
| const char *argp_program_bug_address = |
| "https://github.com/iovisor/bcc/tree/master/libbpf-tools"; |
| const char argp_program_doc[] = |
| "\nTrace TCP connects and show connection latency.\n" |
| "\n" |
| "USAGE: tcpconnlat [--help] [-t] [-p PID] [-L]\n" |
| "\n" |
| "EXAMPLES:\n" |
| " tcpconnlat # summarize on-CPU time as a histogram\n" |
| " tcpconnlat 1 # trace connection latency slower than 1 ms\n" |
| " tcpconnlat 0.1 # trace connection latency slower than 100 us\n" |
| " tcpconnlat -t # 1s summaries, milliseconds, and timestamps\n" |
| " tcpconnlat -p 185 # trace PID 185 only\n" |
| " tcpconnlat -L # include LPORT while printing outputs\n"; |
| |
| static const struct argp_option opts[] = { |
| { "timestamp", 't', NULL, 0, "Include timestamp on output" }, |
| { "pid", 'p', "PID", 0, "Trace this PID only" }, |
| { "lport", 'L', NULL, 0, "Include LPORT on output" }, |
| { "verbose", 'v', NULL, 0, "Verbose debug output" }, |
| { NULL, 'h', NULL, OPTION_HIDDEN, "Show the full help" }, |
| {}, |
| }; |
| |
| static error_t parse_arg(int key, char *arg, struct argp_state *state) |
| { |
| static int pos_args; |
| |
| switch (key) { |
| case 'h': |
| argp_state_help(state, stderr, ARGP_HELP_STD_HELP); |
| break; |
| case 'v': |
| env.verbose = true; |
| break; |
| case 'p': |
| errno = 0; |
| env.pid = strtol(arg, NULL, 10); |
| if (errno) { |
| fprintf(stderr, "invalid PID: %s\n", arg); |
| argp_usage(state); |
| } |
| break; |
| case 't': |
| env.timestamp = true; |
| break; |
| case 'L': |
| env.lport = true; |
| break; |
| case ARGP_KEY_ARG: |
| if (pos_args++) { |
| fprintf(stderr, |
| "Unrecognized positional argument: %s\n", arg); |
| argp_usage(state); |
| } |
| errno = 0; |
| env.min_us = strtod(arg, NULL) * 1000; |
| if (errno || env.min_us <= 0) { |
| fprintf(stderr, "Invalid delay (in us): %s\n", arg); |
| argp_usage(state); |
| } |
| break; |
| default: |
| return ARGP_ERR_UNKNOWN; |
| } |
| return 0; |
| } |
| |
| static int libbpf_print_fn(enum libbpf_print_level level, const char *format, va_list args) |
| { |
| if (level == LIBBPF_DEBUG && !env.verbose) |
| return 0; |
| return vfprintf(stderr, format, args); |
| } |
| |
| static void sig_int(int signo) |
| { |
| exiting = 1; |
| } |
| |
| void handle_event(void *ctx, int cpu, void *data, __u32 data_sz) |
| { |
| const struct event *e = data; |
| char src[INET6_ADDRSTRLEN]; |
| char dst[INET6_ADDRSTRLEN]; |
| union { |
| struct in_addr x4; |
| struct in6_addr x6; |
| } s, d; |
| static __u64 start_ts; |
| |
| if (env.timestamp) { |
| if (start_ts == 0) |
| start_ts = e->ts_us; |
| printf("%-9.3f ", (e->ts_us - start_ts) / 1000000.0); |
| } |
| if (e->af == AF_INET) { |
| s.x4.s_addr = e->saddr_v4; |
| d.x4.s_addr = e->daddr_v4; |
| } else if (e->af == AF_INET6) { |
| memcpy(&s.x6.s6_addr, e->saddr_v6, sizeof(s.x6.s6_addr)); |
| memcpy(&d.x6.s6_addr, e->daddr_v6, sizeof(d.x6.s6_addr)); |
| } else { |
| fprintf(stderr, "broken event: event->af=%d", e->af); |
| return; |
| } |
| |
| if (env.lport) { |
| printf("%-6d %-12.12s %-2d %-16s %-6d %-16s %-5d %.2f\n", e->tgid, e->comm, |
| e->af == AF_INET ? 4 : 6, inet_ntop(e->af, &s, src, sizeof(src)), e->lport, |
| inet_ntop(e->af, &d, dst, sizeof(dst)), ntohs(e->dport), |
| e->delta_us / 1000.0); |
| } else { |
| printf("%-6d %-12.12s %-2d %-16s %-16s %-5d %.2f\n", e->tgid, e->comm, |
| e->af == AF_INET ? 4 : 6, inet_ntop(e->af, &s, src, sizeof(src)), |
| inet_ntop(e->af, &d, dst, sizeof(dst)), ntohs(e->dport), |
| e->delta_us / 1000.0); |
| } |
| } |
| |
| void handle_lost_events(void *ctx, int cpu, __u64 lost_cnt) |
| { |
| fprintf(stderr, "lost %llu events on CPU #%d\n", lost_cnt, cpu); |
| } |
| |
| int main(int argc, char **argv) |
| { |
| static const struct argp argp = { |
| .options = opts, |
| .parser = parse_arg, |
| .doc = argp_program_doc, |
| }; |
| struct perf_buffer *pb = NULL; |
| struct tcpconnlat_bpf *obj; |
| int err; |
| |
| err = argp_parse(&argp, argc, argv, 0, NULL, NULL); |
| if (err) |
| return err; |
| |
| libbpf_set_print(libbpf_print_fn); |
| |
| obj = tcpconnlat_bpf__open(); |
| if (!obj) { |
| fprintf(stderr, "failed to open BPF object\n"); |
| return 1; |
| } |
| |
| /* initialize global data (filtering options) */ |
| obj->rodata->targ_min_us = env.min_us; |
| obj->rodata->targ_tgid = env.pid; |
| |
| if (fentry_can_attach("tcp_v4_connect", NULL)) { |
| bpf_program__set_attach_target(obj->progs.fentry_tcp_v4_connect, 0, "tcp_v4_connect"); |
| bpf_program__set_attach_target(obj->progs.fentry_tcp_v6_connect, 0, "tcp_v6_connect"); |
| bpf_program__set_attach_target(obj->progs.fentry_tcp_rcv_state_process, 0, "tcp_rcv_state_process"); |
| bpf_program__set_autoload(obj->progs.tcp_v4_connect, false); |
| bpf_program__set_autoload(obj->progs.tcp_v6_connect, false); |
| bpf_program__set_autoload(obj->progs.tcp_rcv_state_process, false); |
| } else { |
| bpf_program__set_autoload(obj->progs.fentry_tcp_v4_connect, false); |
| bpf_program__set_autoload(obj->progs.fentry_tcp_v6_connect, false); |
| bpf_program__set_autoload(obj->progs.fentry_tcp_rcv_state_process, false); |
| } |
| |
| err = tcpconnlat_bpf__load(obj); |
| if (err) { |
| fprintf(stderr, "failed to load BPF object: %d\n", err); |
| goto cleanup; |
| } |
| |
| err = tcpconnlat_bpf__attach(obj); |
| if (err) { |
| goto cleanup; |
| } |
| |
| pb = perf_buffer__new(bpf_map__fd(obj->maps.events), PERF_BUFFER_PAGES, |
| handle_event, handle_lost_events, NULL, NULL); |
| if (!pb) { |
| fprintf(stderr, "failed to open perf buffer: %d\n", errno); |
| goto cleanup; |
| } |
| |
| /* print header */ |
| if (env.timestamp) |
| printf("%-9s ", ("TIME(s)")); |
| if (env.lport) { |
| printf("%-6s %-12s %-2s %-16s %-6s %-16s %-5s %s\n", |
| "PID", "COMM", "IP", "SADDR", "LPORT", "DADDR", "DPORT", "LAT(ms)"); |
| } else { |
| printf("%-6s %-12s %-2s %-16s %-16s %-5s %s\n", |
| "PID", "COMM", "IP", "SADDR", "DADDR", "DPORT", "LAT(ms)"); |
| } |
| |
| if (signal(SIGINT, sig_int) == SIG_ERR) { |
| fprintf(stderr, "can't set signal handler: %s\n", strerror(errno)); |
| err = 1; |
| goto cleanup; |
| } |
| |
| /* main: poll */ |
| while (!exiting) { |
| err = perf_buffer__poll(pb, PERF_POLL_TIMEOUT_MS); |
| if (err < 0 && err != -EINTR) { |
| fprintf(stderr, "error polling perf buffer: %s\n", strerror(-err)); |
| goto cleanup; |
| } |
| /* reset err to return 0 if exiting */ |
| err = 0; |
| } |
| |
| cleanup: |
| perf_buffer__free(pb); |
| tcpconnlat_bpf__destroy(obj); |
| |
| return err != 0; |
| } |