blob: 884b0c517f39151c0d9e70b3e8c329d45b70710b [file] [log] [blame]
Brendan Gregg052f89c2015-10-13 15:35:58 -07001#!/usr/bin/python
Alexei Starovoitovbdf07732016-01-14 10:09:20 -08002# @lint-avoid-python-3-compatibility-imports
Brendan Gregg052f89c2015-10-13 15:35:58 -07003#
Alexei Starovoitovbdf07732016-01-14 10:09:20 -08004# tcpaccept Trace TCP accept()s.
5# For Linux, uses BCC, eBPF. Embedded C.
Brendan Gregg052f89c2015-10-13 15:35:58 -07006#
7# USAGE: tcpaccept [-h] [-t] [-p PID]
8#
9# This uses dynamic tracing of the kernel inet_csk_accept() socket function
10# (from tcp_prot.accept), and will need to be modified to match kernel changes.
Brendan Gregg052f89c2015-10-13 15:35:58 -070011#
Brendan Gregg052f89c2015-10-13 15:35:58 -070012# Copyright (c) 2015 Brendan Gregg.
13# Licensed under the Apache License, Version 2.0 (the "License")
14#
Alexei Starovoitovbdf07732016-01-14 10:09:20 -080015# 13-Oct-2015 Brendan Gregg Created this.
Brendan Gregg24825522016-02-14 16:32:29 -080016# 14-Feb-2016 " " Switch to bpf_perf_output.
Brendan Gregg052f89c2015-10-13 15:35:58 -070017
18from __future__ import print_function
19from bcc import BPF
Mark Drayton11de2982016-06-26 21:14:44 +010020from socket import inet_ntop, AF_INET, AF_INET6
21from struct import pack
Brendan Gregg052f89c2015-10-13 15:35:58 -070022import argparse
Brendan Gregg24825522016-02-14 16:32:29 -080023import ctypes as ct
Brendan Gregg052f89c2015-10-13 15:35:58 -070024
25# arguments
26examples = """examples:
Brendan Gregg000a4e62015-10-13 15:41:46 -070027 ./tcpaccept # trace all TCP accept()s
Brendan Gregg052f89c2015-10-13 15:35:58 -070028 ./tcpaccept -t # include timestamps
29 ./tcpaccept -p 181 # only trace PID 181
30"""
31parser = argparse.ArgumentParser(
Alexei Starovoitovbdf07732016-01-14 10:09:20 -080032 description="Trace TCP accepts",
33 formatter_class=argparse.RawDescriptionHelpFormatter,
34 epilog=examples)
Brendan Gregg052f89c2015-10-13 15:35:58 -070035parser.add_argument("-t", "--timestamp", action="store_true",
Alexei Starovoitovbdf07732016-01-14 10:09:20 -080036 help="include timestamp on output")
Brendan Gregg052f89c2015-10-13 15:35:58 -070037parser.add_argument("-p", "--pid",
Alexei Starovoitovbdf07732016-01-14 10:09:20 -080038 help="trace this PID only")
Nathan Scottcf0792f2018-02-02 16:56:50 +110039parser.add_argument("--ebpf", action="store_true",
40 help=argparse.SUPPRESS)
Brendan Gregg052f89c2015-10-13 15:35:58 -070041args = parser.parse_args()
42debug = 0
43
44# define BPF program
45bpf_text = """
46#include <uapi/linux/ptrace.h>
47#include <net/sock.h>
48#include <bcc/proto.h>
49
Brendan Gregg24825522016-02-14 16:32:29 -080050// separate data structs for ipv4 and ipv6
51struct ipv4_data_t {
Brendan Gregg24825522016-02-14 16:32:29 -080052 u64 ts_us;
Joe Yin36ce1122018-08-17 06:04:00 +080053 u32 pid;
Joe Yin365eade2018-06-21 13:41:03 +080054 u32 saddr;
55 u32 daddr;
Mark Drayton11de2982016-06-26 21:14:44 +010056 u64 ip;
Joe Yin36ce1122018-08-17 06:04:00 +080057 u16 lport;
Brendan Gregg24825522016-02-14 16:32:29 -080058 char task[TASK_COMM_LEN];
59};
60BPF_PERF_OUTPUT(ipv4_events);
61
62struct ipv6_data_t {
Brendan Gregg24825522016-02-14 16:32:29 -080063 u64 ts_us;
Joe Yin36ce1122018-08-17 06:04:00 +080064 u32 pid;
Mark Drayton11de2982016-06-26 21:14:44 +010065 unsigned __int128 saddr;
66 unsigned __int128 daddr;
Brendan Gregg24825522016-02-14 16:32:29 -080067 u64 ip;
Joe Yin36ce1122018-08-17 06:04:00 +080068 u16 lport;
Brendan Gregg24825522016-02-14 16:32:29 -080069 char task[TASK_COMM_LEN];
70};
71BPF_PERF_OUTPUT(ipv6_events);
Joe Yin365eade2018-06-21 13:41:03 +080072"""
Brendan Gregg24825522016-02-14 16:32:29 -080073
Joe Yin365eade2018-06-21 13:41:03 +080074#
75# The following is the code for older kernels(Linux pre-4.16).
76# It uses kprobes to instrument inet_csk_accept(). On Linux 4.16 and
77# later, the sock:inet_sock_set_state tracepoint should be used instead, as
78# is done by the code that follows this.
79#
80bpf_text_kprobe = """
Brendan Gregg052f89c2015-10-13 15:35:58 -070081int kretprobe__inet_csk_accept(struct pt_regs *ctx)
82{
Naveen N. Rao4afa96a2016-05-03 14:54:21 +053083 struct sock *newsk = (struct sock *)PT_REGS_RC(ctx);
Alexei Starovoitovbdf07732016-01-14 10:09:20 -080084 u32 pid = bpf_get_current_pid_tgid();
Brendan Gregg052f89c2015-10-13 15:35:58 -070085
Alexei Starovoitovbdf07732016-01-14 10:09:20 -080086 if (newsk == NULL)
87 return 0;
Brendan Gregg052f89c2015-10-13 15:35:58 -070088
Alexei Starovoitovbdf07732016-01-14 10:09:20 -080089 // check this is TCP
90 u8 protocol = 0;
91 // workaround for reading the sk_protocol bitfield:
Joe Yin116bb402018-06-18 23:34:52 +080092
93 // Following comments add by Joe Yin:
94 // Unfortunately,it can not work since Linux 4.10,
95 // because the sk_wmem_queued is not following the bitfield of sk_protocol.
96 // And the following member is sk_gso_max_segs.
97 // So, we can use this:
98 // bpf_probe_read(&protocol, 1, (void *)((u64)&newsk->sk_gso_max_segs) - 3);
99 // In order to diff the pre-4.10 and 4.10+ ,introduce the variables gso_max_segs_offset,sk_lingertime,
100 // sk_lingertime is closed to the gso_max_segs_offset,and
101 // the offset between the two members is 4
102
103 int gso_max_segs_offset = offsetof(struct sock, sk_gso_max_segs);
104 int sk_lingertime_offset = offsetof(struct sock, sk_lingertime);
105
106 if (sk_lingertime_offset - gso_max_segs_offset == 4)
107 // 4.10+ with little endian
108#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
Paul Chaignon8d78edd2018-06-29 07:47:44 +0200109 protocol = *(u8 *)((u64)&newsk->sk_gso_max_segs - 3);
Joe Yin116bb402018-06-18 23:34:52 +0800110 else
111 // pre-4.10 with little endian
Paul Chaignon8d78edd2018-06-29 07:47:44 +0200112 protocol = *(u8 *)((u64)&newsk->sk_wmem_queued - 3);
Joe Yin116bb402018-06-18 23:34:52 +0800113#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
114 // 4.10+ with big endian
Paul Chaignon8d78edd2018-06-29 07:47:44 +0200115 protocol = *(u8 *)((u64)&newsk->sk_gso_max_segs - 1);
Joe Yin116bb402018-06-18 23:34:52 +0800116 else
117 // pre-4.10 with big endian
Paul Chaignon8d78edd2018-06-29 07:47:44 +0200118 protocol = *(u8 *)((u64)&newsk->sk_wmem_queued - 1);
Joe Yin116bb402018-06-18 23:34:52 +0800119#else
120# error "Fix your compiler's __BYTE_ORDER__?!"
121#endif
122
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800123 if (protocol != IPPROTO_TCP)
124 return 0;
Brendan Gregg10e1b142015-10-13 16:35:25 -0700125
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800126 // pull in details
127 u16 family = 0, lport = 0;
Paul Chaignona9f96c02018-06-15 00:27:08 +0200128 family = newsk->__sk_common.skc_family;
129 lport = newsk->__sk_common.skc_num;
Brendan Gregg052f89c2015-10-13 15:35:58 -0700130
Brendan Gregg24825522016-02-14 16:32:29 -0800131 if (family == AF_INET) {
132 struct ipv4_data_t data4 = {.pid = pid, .ip = 4};
133 data4.ts_us = bpf_ktime_get_ns() / 1000;
Paul Chaignona9f96c02018-06-15 00:27:08 +0200134 data4.saddr = newsk->__sk_common.skc_rcv_saddr;
135 data4.daddr = newsk->__sk_common.skc_daddr;
Brendan Gregg24825522016-02-14 16:32:29 -0800136 data4.lport = lport;
137 bpf_get_current_comm(&data4.task, sizeof(data4.task));
138 ipv4_events.perf_submit(ctx, &data4, sizeof(data4));
139
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800140 } else if (family == AF_INET6) {
Brendan Gregg24825522016-02-14 16:32:29 -0800141 struct ipv6_data_t data6 = {.pid = pid, .ip = 6};
142 data6.ts_us = bpf_ktime_get_ns() / 1000;
Mark Drayton11de2982016-06-26 21:14:44 +0100143 bpf_probe_read(&data6.saddr, sizeof(data6.saddr),
144 &newsk->__sk_common.skc_v6_rcv_saddr.in6_u.u6_addr32);
145 bpf_probe_read(&data6.daddr, sizeof(data6.daddr),
146 &newsk->__sk_common.skc_v6_daddr.in6_u.u6_addr32);
Brendan Gregg24825522016-02-14 16:32:29 -0800147 data6.lport = lport;
148 bpf_get_current_comm(&data6.task, sizeof(data6.task));
149 ipv6_events.perf_submit(ctx, &data6, sizeof(data6));
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800150 }
151 // else drop
Brendan Gregg052f89c2015-10-13 15:35:58 -0700152
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800153 return 0;
Brendan Gregg052f89c2015-10-13 15:35:58 -0700154}
155"""
156
Joe Yin365eade2018-06-21 13:41:03 +0800157bpf_text_tracepoint = """
158TRACEPOINT_PROBE(sock, inet_sock_set_state)
159{
160 if (args->protocol != IPPROTO_TCP)
161 return 0;
162 u32 pid = bpf_get_current_pid_tgid();
163 // pull in details
164 u16 family = 0, lport = 0;
165 family = args->family;
166 lport = args->sport;
167
168 if (family == AF_INET) {
169 struct ipv4_data_t data4 = {.pid = pid, .ip = 4};
170 data4.ts_us = bpf_ktime_get_ns() / 1000;
171 __builtin_memcpy(&data4.saddr, args->saddr, sizeof(data4.saddr));
172 __builtin_memcpy(&data4.daddr, args->daddr, sizeof(data4.daddr));
173 data4.lport = lport;
174 bpf_get_current_comm(&data4.task, sizeof(data4.task));
175 ipv4_events.perf_submit(args, &data4, sizeof(data4));
176 } else if (family == AF_INET6) {
177 struct ipv6_data_t data6 = {.pid = pid, .ip = 6};
178 data6.ts_us = bpf_ktime_get_ns() / 1000;
179 __builtin_memcpy(&data6.saddr, args->saddr, sizeof(data6.saddr));
180 __builtin_memcpy(&data6.daddr, args->daddr, sizeof(data6.daddr));
181 data6.lport = lport;
182 bpf_get_current_comm(&data6.task, sizeof(data6.task));
183 ipv6_events.perf_submit(args, &data6, sizeof(data6));
184 }
185 // else drop
186
187 return 0;
188}
189"""
190
191if (BPF.tracepoint_exists("sock", "inet_sock_set_state")):
192 bpf_text += bpf_text_tracepoint
193else:
194 bpf_text += bpf_text_kprobe
195
196
Brendan Gregg052f89c2015-10-13 15:35:58 -0700197# code substitutions
198if args.pid:
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800199 bpf_text = bpf_text.replace('FILTER',
200 'if (pid != %s) { return 0; }' % args.pid)
Brendan Gregg052f89c2015-10-13 15:35:58 -0700201else:
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800202 bpf_text = bpf_text.replace('FILTER', '')
Nathan Scottcf0792f2018-02-02 16:56:50 +1100203if debug or args.ebpf:
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800204 print(bpf_text)
Nathan Scottcf0792f2018-02-02 16:56:50 +1100205 if args.ebpf:
206 exit()
Brendan Gregg052f89c2015-10-13 15:35:58 -0700207
Brendan Gregg24825522016-02-14 16:32:29 -0800208# event data
209TASK_COMM_LEN = 16 # linux/sched.h
Mark Drayton11de2982016-06-26 21:14:44 +0100210
Brendan Gregg24825522016-02-14 16:32:29 -0800211class Data_ipv4(ct.Structure):
212 _fields_ = [
213 ("ts_us", ct.c_ulonglong),
Joe Yin36ce1122018-08-17 06:04:00 +0800214 ("pid", ct.c_uint),
Joe Yin365eade2018-06-21 13:41:03 +0800215 ("saddr", ct.c_uint),
216 ("daddr", ct.c_uint),
Mark Drayton11de2982016-06-26 21:14:44 +0100217 ("ip", ct.c_ulonglong),
Joe Yin36ce1122018-08-17 06:04:00 +0800218 ("lport", ct.c_ushort),
Brendan Gregg24825522016-02-14 16:32:29 -0800219 ("task", ct.c_char * TASK_COMM_LEN)
220 ]
Mark Drayton11de2982016-06-26 21:14:44 +0100221
Brendan Gregg24825522016-02-14 16:32:29 -0800222class Data_ipv6(ct.Structure):
223 _fields_ = [
224 ("ts_us", ct.c_ulonglong),
Joe Yin36ce1122018-08-17 06:04:00 +0800225 ("pid", ct.c_uint),
Mark Drayton11de2982016-06-26 21:14:44 +0100226 ("saddr", (ct.c_ulonglong * 2)),
227 ("daddr", (ct.c_ulonglong * 2)),
Brendan Gregg24825522016-02-14 16:32:29 -0800228 ("ip", ct.c_ulonglong),
Joe Yin36ce1122018-08-17 06:04:00 +0800229 ("lport", ct.c_ushort),
Brendan Gregg24825522016-02-14 16:32:29 -0800230 ("task", ct.c_char * TASK_COMM_LEN)
231 ]
232
233# process event
234def print_ipv4_event(cpu, data, size):
235 event = ct.cast(data, ct.POINTER(Data_ipv4)).contents
Mark Drayton11de2982016-06-26 21:14:44 +0100236 global start_ts
Brendan Gregg24825522016-02-14 16:32:29 -0800237 if args.timestamp:
238 if start_ts == 0:
239 start_ts = event.ts_us
Mark Drayton11de2982016-06-26 21:14:44 +0100240 print("%-9.3f" % ((float(event.ts_us) - start_ts) / 1000000), end="")
Rafael F78948e42017-03-26 14:54:25 +0200241 print("%-6d %-12.12s %-2d %-16s %-16s %-4d" % (event.pid,
jeromemarchandb96ebcd2018-10-10 01:58:15 +0200242 event.task.decode('utf-8', 'replace'), event.ip,
Rafael F78948e42017-03-26 14:54:25 +0200243 inet_ntop(AF_INET, pack("I", event.daddr)),
Mark Drayton11de2982016-06-26 21:14:44 +0100244 inet_ntop(AF_INET, pack("I", event.saddr)), event.lport))
245
Brendan Gregg24825522016-02-14 16:32:29 -0800246def print_ipv6_event(cpu, data, size):
247 event = ct.cast(data, ct.POINTER(Data_ipv6)).contents
Mark Drayton11de2982016-06-26 21:14:44 +0100248 global start_ts
Brendan Gregg24825522016-02-14 16:32:29 -0800249 if args.timestamp:
250 if start_ts == 0:
251 start_ts = event.ts_us
Mark Drayton11de2982016-06-26 21:14:44 +0100252 print("%-9.3f" % ((float(event.ts_us) - start_ts) / 1000000), end="")
Rafael F78948e42017-03-26 14:54:25 +0200253 print("%-6d %-12.12s %-2d %-16s %-16s %-4d" % (event.pid,
jeromemarchandb96ebcd2018-10-10 01:58:15 +0200254 event.task.decode('utf-8', 'replace'), event.ip,
255 inet_ntop(AF_INET6, event.daddr),inet_ntop(AF_INET6, event.saddr),
256 event.lport))
Brendan Gregg24825522016-02-14 16:32:29 -0800257
Brendan Gregg052f89c2015-10-13 15:35:58 -0700258# initialize BPF
259b = BPF(text=bpf_text)
260
261# header
262if args.timestamp:
Alexei Starovoitovbdf07732016-01-14 10:09:20 -0800263 print("%-9s" % ("TIME(s)"), end="")
Brendan Gregg052f89c2015-10-13 15:35:58 -0700264print("%-6s %-12s %-2s %-16s %-16s %-4s" % ("PID", "COMM", "IP", "RADDR",
265 "LADDR", "LPORT"))
266
267start_ts = 0
268
Brendan Gregg24825522016-02-14 16:32:29 -0800269# read events
270b["ipv4_events"].open_perf_buffer(print_ipv4_event)
271b["ipv6_events"].open_perf_buffer(print_ipv6_event)
Brendan Gregg052f89c2015-10-13 15:35:58 -0700272while 1:
Teng Qindbf00292018-02-28 21:47:50 -0800273 b.perf_buffer_poll()