forked from iovisor/bcc
-
Notifications
You must be signed in to change notification settings - Fork 0
/
tcpsynbl.py
executable file
·78 lines (66 loc) · 2.13 KB
/
tcpsynbl.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
#!/usr/bin/python
# @lint-avoid-python-3-compatibility-imports
#
# tcpsynbl Show TCP SYN backlog.
# For Linux, uses BCC, eBPF. Embedded C.
#
# USAGE: tcpsynbl [-4 | -6] [-h]
#
# Copyright (c) 2019 Brendan Gregg.
# Licensed under the Apache License, Version 2.0 (the "License").
# This was originally created for the BPF Performance Tools book
# published by Addison Wesley. ISBN-13: 9780136554820
# When copying or porting, include this comment.
#
# 03-Jul-2019 Brendan Gregg Ported from bpftrace to BCC.
from __future__ import print_function
import argparse
from bcc import BPF
from time import sleep
# load BPF program
bpf_text = """
#include <net/sock.h>
typedef struct backlog_key {
u32 backlog;
u64 slot;
} backlog_key_t;
BPF_HISTOGRAM(dist, backlog_key_t);
int do_entry(struct pt_regs *ctx) {
struct sock *sk = (struct sock *)PT_REGS_PARM1(ctx);
backlog_key_t key = {};
key.backlog = sk->sk_max_ack_backlog;
key.slot = bpf_log2l(sk->sk_ack_backlog);
dist.atomic_increment(key);
return 0;
};
"""
examples = """examples:
./tcpsynbl # trace syn backlog
./tcpsynbl -4 # trace IPv4 family only
./tcpsynbl -6 # trace IPv6 family only
"""
parser = argparse.ArgumentParser(
description="Show TCP SYN backlog.",
formatter_class=argparse.RawDescriptionHelpFormatter,
epilog=examples)
group = parser.add_mutually_exclusive_group()
group.add_argument("-4", "--ipv4", action="store_true",
help="trace IPv4 family only")
group.add_argument("-6", "--ipv6", action="store_true",
help="trace IPv6 family only")
args = parser.parse_args()
b = BPF(text=bpf_text)
if args.ipv4:
b.attach_kprobe(event="tcp_v4_syn_recv_sock", fn_name="do_entry")
elif args.ipv6:
b.attach_kprobe(event="tcp_v6_syn_recv_sock", fn_name="do_entry")
else:
b.attach_kprobe(event="tcp_v4_syn_recv_sock", fn_name="do_entry")
b.attach_kprobe(event="tcp_v6_syn_recv_sock", fn_name="do_entry")
print("Tracing SYN backlog size. Ctrl-C to end.");
try:
sleep(99999999)
except KeyboardInterrupt:
print()
dist = b.get_table("dist")
dist.print_log2_hist("backlog", "backlog_max")