blob: 353055d213f34beb073f16b151259b9570e87519 [file] [log] [blame]
Alexey Ivanovcc01a9c2019-01-16 09:50:46 -08001#!/usr/bin/python
Brendan Gregg5a06c2c2016-01-28 23:00:00 -08002#
3# gethostlatency Show latency for getaddrinfo/gethostbyname[2] calls.
4# For Linux, uses BCC, eBPF. Embedded C.
5#
6# This can be useful for identifying DNS latency, by identifying which
7# remote host name lookups were slow, and by how much.
8#
9# This uses dynamic tracing of user-level functions and registers, and may
10# need modifications to match your software and processor architecture.
11#
12# Copyright 2016 Netflix, Inc.
13# Licensed under the Apache License, Version 2.0 (the "License")
14#
15# 28-Jan-2016 Brendan Gregg Created this.
mcaleavyaa9b886c2016-04-02 18:22:37 +010016# 30-Mar-2016 Allan McAleavy updated for BPF_PERF_OUTPUT
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080017
18from __future__ import print_function
19from bcc import BPF
20from time import strftime
Paul Chaignonedca17a2017-01-23 22:43:10 +010021import argparse
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080022
Paul Chaignonedca17a2017-01-23 22:43:10 +010023examples = """examples:
synical6b989db2019-10-13 02:17:44 -040024 ./gethostlatency # time getaddrinfo/gethostbyname[2] calls
Paul Chaignonedca17a2017-01-23 22:43:10 +010025 ./gethostlatency -p 181 # only trace PID 181
26"""
27parser = argparse.ArgumentParser(
28 description="Show latency for getaddrinfo/gethostbyname[2] calls",
29 formatter_class=argparse.RawDescriptionHelpFormatter,
30 epilog=examples)
31parser.add_argument("-p", "--pid", help="trace this PID only", type=int,
32 default=-1)
Nathan Scottcf0792f2018-02-02 16:56:50 +110033parser.add_argument("--ebpf", action="store_true",
34 help=argparse.SUPPRESS)
Paul Chaignonedca17a2017-01-23 22:43:10 +010035args = parser.parse_args()
36
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080037# load BPF program
38bpf_text = """
39#include <uapi/linux/ptrace.h>
mcaleavyaa9b886c2016-04-02 18:22:37 +010040#include <linux/sched.h>
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080041
42struct val_t {
mcaleavyaa9b886c2016-04-02 18:22:37 +010043 u32 pid;
44 char comm[TASK_COMM_LEN];
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080045 char host[80];
46 u64 ts;
47};
mcaleavyaa9b886c2016-04-02 18:22:37 +010048
49struct data_t {
50 u32 pid;
mcaleavyaa9b886c2016-04-02 18:22:37 +010051 u64 delta;
52 char comm[TASK_COMM_LEN];
53 char host[80];
54};
55
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080056BPF_HASH(start, u32, struct val_t);
mcaleavyaa9b886c2016-04-02 18:22:37 +010057BPF_PERF_OUTPUT(events);
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080058
59int do_entry(struct pt_regs *ctx) {
Naveen N. Rao4afa96a2016-05-03 14:54:21 +053060 if (!PT_REGS_PARM1(ctx))
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080061 return 0;
mcaleavyaa9b886c2016-04-02 18:22:37 +010062
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080063 struct val_t val = {};
Hengqi Chen151fe192021-05-16 17:18:27 +080064 u64 pid_tgid = bpf_get_current_pid_tgid();
65 u32 pid = pid_tgid >> 32;
66 u32 tid = (u32)pid_tgid;
mcaleavyaa9b886c2016-04-02 18:22:37 +010067
68 if (bpf_get_current_comm(&val.comm, sizeof(val.comm)) == 0) {
Sumanth Korikkar023154c2020-04-20 05:54:57 -050069 bpf_probe_read_user(&val.host, sizeof(val.host),
Sasha Goldshteinf41ae862016-10-19 01:14:30 +030070 (void *)PT_REGS_PARM1(ctx));
Hengqi Chen151fe192021-05-16 17:18:27 +080071 val.pid = pid;
mcaleavyaa9b886c2016-04-02 18:22:37 +010072 val.ts = bpf_ktime_get_ns();
Hengqi Chen151fe192021-05-16 17:18:27 +080073 start.update(&tid, &val);
mcaleavyaa9b886c2016-04-02 18:22:37 +010074 }
75
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080076 return 0;
77}
78
79int do_return(struct pt_regs *ctx) {
80 struct val_t *valp;
mcaleavyaa9b886c2016-04-02 18:22:37 +010081 struct data_t data = {};
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080082 u64 delta;
Hengqi Chen151fe192021-05-16 17:18:27 +080083 u64 pid_tgid = bpf_get_current_pid_tgid();
84 u32 tid = (u32)pid_tgid;
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080085
mcaleavyaa9b886c2016-04-02 18:22:37 +010086 u64 tsp = bpf_ktime_get_ns();
87
Hengqi Chen151fe192021-05-16 17:18:27 +080088 valp = start.lookup(&tid);
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080089 if (valp == 0)
90 return 0; // missed start
91
Sumanth Korikkar7f6066d2020-05-20 10:49:56 -050092 bpf_probe_read_kernel(&data.comm, sizeof(data.comm), valp->comm);
93 bpf_probe_read_kernel(&data.host, sizeof(data.host), (void *)valp->host);
mcaleavyaa9b886c2016-04-02 18:22:37 +010094 data.pid = valp->pid;
95 data.delta = tsp - valp->ts;
mcaleavyaa9b886c2016-04-02 18:22:37 +010096 events.perf_submit(ctx, &data, sizeof(data));
Hengqi Chen151fe192021-05-16 17:18:27 +080097 start.delete(&tid);
Brendan Gregg5a06c2c2016-01-28 23:00:00 -080098 return 0;
99}
100"""
Nathan Scottcf0792f2018-02-02 16:56:50 +1100101if args.ebpf:
102 print(bpf_text)
103 exit()
104
Brendan Gregg5a06c2c2016-01-28 23:00:00 -0800105b = BPF(text=bpf_text)
Paul Chaignonedca17a2017-01-23 22:43:10 +0100106b.attach_uprobe(name="c", sym="getaddrinfo", fn_name="do_entry", pid=args.pid)
107b.attach_uprobe(name="c", sym="gethostbyname", fn_name="do_entry",
108 pid=args.pid)
109b.attach_uprobe(name="c", sym="gethostbyname2", fn_name="do_entry",
110 pid=args.pid)
111b.attach_uretprobe(name="c", sym="getaddrinfo", fn_name="do_return",
112 pid=args.pid)
113b.attach_uretprobe(name="c", sym="gethostbyname", fn_name="do_return",
114 pid=args.pid)
115b.attach_uretprobe(name="c", sym="gethostbyname2", fn_name="do_return",
116 pid=args.pid)
Brendan Gregg5a06c2c2016-01-28 23:00:00 -0800117
mcaleavyaa9b886c2016-04-02 18:22:37 +0100118# header
Hengqi Chen151fe192021-05-16 17:18:27 +0800119print("%-9s %-7s %-16s %10s %s" % ("TIME", "PID", "COMM", "LATms", "HOST"))
mcaleavyaa9b886c2016-04-02 18:22:37 +0100120
121def print_event(cpu, data, size):
Xiaozhou Liu51d62d32019-02-15 13:03:05 +0800122 event = b["events"].event(data)
Hengqi Chen151fe192021-05-16 17:18:27 +0800123 print("%-9s %-7d %-16s %10.2f %s" % (strftime("%H:%M:%S"), event.pid,
jeromemarchandb96ebcd2018-10-10 01:58:15 +0200124 event.comm.decode('utf-8', 'replace'), (float(event.delta) / 1000000),
125 event.host.decode('utf-8', 'replace')))
mcaleavyaa9b886c2016-04-02 18:22:37 +0100126
mcaleavyaa9b886c2016-04-02 18:22:37 +0100127# loop with callback to print_event
128b["events"].open_perf_buffer(print_event)
Brendan Gregg5a06c2c2016-01-28 23:00:00 -0800129while 1:
Jerome Marchand51671272018-12-19 01:57:24 +0100130 try:
131 b.perf_buffer_poll()
132 except KeyboardInterrupt:
133 exit()