blob: 188a2af0115d1743f98af463e5a0a73829ca7ef5 [file] [log] [blame]
// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
// Copyright (c) 2021 Yaqi Chen
//
// Based on tcpsynbl(8) from BCC by Brendan Gregg.
// 19-Dec-2021 Yaqi Chen Created this.
#include <argp.h>
#include <stdio.h>
#include <signal.h>
#include <unistd.h>
#include <time.h>
#include <bpf/libbpf.h>
#include <bpf/bpf.h>
#include "tcpsynbl.h"
#include "tcpsynbl.skel.h"
#include "trace_helpers.h"
static struct env {
bool ipv4;
bool ipv6;
time_t interval;
int times;
bool timestamp;
bool verbose;
} env = {
.interval = 99999999,
.times = 99999999,
};
static volatile sig_atomic_t exiting = 0;
const char *argp_program_version = "tcpsynbl 0.1";
const char *argp_program_bug_address =
"https://github.com/iovisor/bcc/tree/master/libbpf-tools";
const char argp_program_doc[] =
"Summarize TCP SYN backlog as a histogram.\n"
"\n"
"USAGE: tcpsynbl [--help] [-T] [-4] [-6] [interval] [count]\n"
"\n"
"EXAMPLES:\n"
" tcpsynbl # summarize TCP SYN backlog as a histogram\n"
" tcpsynbl 1 10 # print 1 second summaries, 10 times\n"
" tcpsynbl -T 1 # 1s summaries with timestamps\n"
" tcpsynbl -4 # trace IPv4 family only\n"
" tcpsynbl -6 # trace IPv6 family only\n";
static const struct argp_option opts[] = {
{ "timestamp", 'T', NULL, 0, "Include timestamp on output" },
{ "ipv4", '4', NULL, 0, "Trace IPv4 family only" },
{ "ipv6", '6', NULL, 0, "Trace IPv6 family only" },
{ "verbose", 'v', NULL, 0, "Verbose debug output" },
{ NULL, 'h', NULL, OPTION_HIDDEN, "Show the full help" },
{},
};
static error_t parse_arg(int key, char *arg, struct argp_state *state)
{
static int pos_args;
switch (key) {
case 'h':
argp_state_help(state, stderr, ARGP_HELP_STD_HELP);
break;
case 'v':
env.verbose = true;
break;
case 'T':
env.timestamp = true;
break;
case '4':
env.ipv4 = true;
break;
case '6':
env.ipv6 = true;
break;
case ARGP_KEY_ARG:
errno = 0;
if (pos_args == 0) {
env.interval = strtol(arg, NULL, 10);
if (errno) {
fprintf(stderr, "invalid internal\n");
argp_usage(state);
}
} else if (pos_args == 1) {
env.times = strtol(arg, NULL, 10);
if (errno) {
fprintf(stderr, "invalid times\n");
argp_usage(state);
}
} else {
fprintf(stderr,
"unrecognized positional argument: %s\n", arg);
argp_usage(state);
}
pos_args++;
break;
default:
return ARGP_ERR_UNKNOWN;
}
return 0;
}
static int libbpf_print_fn(enum libbpf_print_level level, const char *format, va_list args)
{
if (level == LIBBPF_DEBUG && !env.verbose)
return 0;
return vfprintf(stderr, format, args);
}
static void sig_handler(int sig)
{
exiting = true;
}
static void disable_all_progs(struct tcpsynbl_bpf *obj)
{
bpf_program__set_autoload(obj->progs.tcp_v4_syn_recv_kprobe, false);
bpf_program__set_autoload(obj->progs.tcp_v6_syn_recv_kprobe, false);
bpf_program__set_autoload(obj->progs.tcp_v4_syn_recv, false);
bpf_program__set_autoload(obj->progs.tcp_v6_syn_recv, false);
}
static void set_autoload_prog(struct tcpsynbl_bpf *obj, int version)
{
if (version == 4) {
if (fentry_can_attach("tcp_v4_syn_recv_sock", NULL))
bpf_program__set_autoload(obj->progs.tcp_v4_syn_recv, true);
else
bpf_program__set_autoload(obj->progs.tcp_v4_syn_recv_kprobe, true);
}
if (version == 6){
if (fentry_can_attach("tcp_v6_syn_recv_sock", NULL))
bpf_program__set_autoload(obj->progs.tcp_v6_syn_recv, true);
else
bpf_program__set_autoload(obj->progs.tcp_v6_syn_recv_kprobe, true);
}
}
static int print_log2_hists(int fd)
{
__u64 lookup_key = -1, next_key;
struct hist hist;
int err;
while (!bpf_map_get_next_key(fd, &lookup_key, &next_key)) {
err = bpf_map_lookup_elem(fd, &next_key, &hist);
if (err < 0) {
fprintf(stderr, "failed to lookup hist: %d\n", err);
return -1;
}
printf("backlog_max = %lld\n", next_key);
print_log2_hist(hist.slots, MAX_SLOTS, "backlog");
lookup_key = next_key;
}
lookup_key = -1;
while (!bpf_map_get_next_key(fd, &lookup_key, &next_key)) {
err = bpf_map_delete_elem(fd, &next_key);
if (err < 0) {
fprintf(stderr, "failed to cleanup hist : %d\n", err);
return -1;
}
lookup_key = next_key;
}
return 0;
}
int main(int argc, char **argv)
{
static const struct argp argp = {
.options = opts,
.parser = parse_arg,
.doc = argp_program_doc
};
struct tcpsynbl_bpf *obj;
struct tm *tm;
char ts[32];
time_t t;
int err, map_fd;
err = argp_parse(&argp, argc, argv, 0, NULL, NULL);
if (err)
return err;
libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
libbpf_set_print(libbpf_print_fn);
obj = tcpsynbl_bpf__open();
if (!obj) {
fprintf(stderr, "failed to open BPF object\n");
return 1;
}
disable_all_progs(obj);
if (env.ipv4) {
set_autoload_prog(obj, 4);
} else if (env.ipv6) {
set_autoload_prog(obj, 6);
} else {
set_autoload_prog(obj, 4);
set_autoload_prog(obj, 6);
}
err = tcpsynbl_bpf__load(obj);
if (err) {
fprintf(stderr, "failed to load BPF object: %d\n", err);
goto cleanup;
}
err = tcpsynbl_bpf__attach(obj);
if (err) {
fprintf(stderr, "failed to attach BPF programs\n");
goto cleanup;
}
map_fd= bpf_map__fd(obj->maps.hists);
signal(SIGINT, sig_handler);
printf("Tracing SYN backlog size. Ctrl-C to end.\n");
/* main: poll */
while (1) {
sleep(env.interval);
printf("\n");
if (env.timestamp) {
time(&t);
tm = localtime(&t);
strftime(ts, sizeof(ts), "%H:%M:%S", tm);
printf("%-8s\n", ts);
}
err = print_log2_hists(map_fd);
if (err)
break;
if (exiting || --env.times == 0)
break;
}
cleanup:
tcpsynbl_bpf__destroy(obj);
return err != 0;
}