Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
B
bcc
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
bcc
Commits
6426cd4e
Commit
6426cd4e
authored
Aug 04, 2017
by
Iago López Galeiras
Committed by
Brenden Blanco
Aug 11, 2017
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
tools/tcptracer: add timestamp option
Similar to other tools from the tcp* family.
parent
10a4af70
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
36 additions
and
0 deletions
+36
-0
tools/tcptracer.py
tools/tcptracer.py
+25
-0
tools/tcptracer_example.txt
tools/tcptracer_example.txt
+11
-0
No files found.
tools/tcptracer.py
View file @
6426cd4e
...
...
@@ -24,6 +24,8 @@ from struct import pack
parser
=
ap
.
ArgumentParser
(
description
=
"Trace TCP connections"
,
formatter_class
=
ap
.
RawDescriptionHelpFormatter
)
parser
.
add_argument
(
"-t"
,
"--timestamp"
,
action
=
"store_true"
,
help
=
"include timestamp on output"
)
parser
.
add_argument
(
"-p"
,
"--pid"
,
default
=
0
,
type
=
int
,
help
=
"trace this PID only"
)
parser
.
add_argument
(
"-N"
,
"--netns"
,
default
=
0
,
type
=
int
,
...
...
@@ -47,6 +49,7 @@ bpf_text = """
#define TCP_EVENT_TYPE_CLOSE 3
struct tcp_ipv4_event_t {
u64 ts_us;
u32 type;
u32 pid;
char comm[TASK_COMM_LEN];
...
...
@@ -60,6 +63,7 @@ struct tcp_ipv4_event_t {
BPF_PERF_OUTPUT(tcp_ipv4_event);
struct tcp_ipv6_event_t {
u64 ts_us;
u32 type;
u32 pid;
char comm[TASK_COMM_LEN];
...
...
@@ -304,6 +308,7 @@ int trace_tcp_set_state_entry(struct pt_regs *ctx, struct sock *sk, int state)
}
struct tcp_ipv4_event_t evt4 = { };
evt4.ts_us = bpf_ktime_get_ns() / 1000;
evt4.type = TCP_EVENT_TYPE_CONNECT;
evt4.pid = p->pid >> 32;
evt4.ip = ipver;
...
...
@@ -339,6 +344,7 @@ int trace_tcp_set_state_entry(struct pt_regs *ctx, struct sock *sk, int state)
}
struct tcp_ipv6_event_t evt6 = { };
evt6.ts_us = bpf_ktime_get_ns() / 1000;
evt6.type = TCP_EVENT_TYPE_CONNECT;
evt6.pid = p->pid >> 32;
evt6.ip = ipver;
...
...
@@ -389,6 +395,7 @@ int trace_close_entry(struct pt_regs *ctx, struct sock *sk)
}
struct tcp_ipv4_event_t evt4 = { };
evt4.ts_us = bpf_ktime_get_ns() / 1000;
evt4.type = TCP_EVENT_TYPE_CLOSE;
evt4.pid = pid >> 32;
evt4.ip = ipver;
...
...
@@ -408,6 +415,7 @@ int trace_close_entry(struct pt_regs *ctx, struct sock *sk)
}
struct tcp_ipv6_event_t evt6 = { };
evt6.ts_us = bpf_ktime_get_ns() / 1000;
evt6.type = TCP_EVENT_TYPE_CLOSE;
evt6.pid = pid >> 32;
evt6.ip = ipver;
...
...
@@ -460,6 +468,7 @@ int trace_accept_return(struct pt_regs *ctx)
struct tcp_ipv4_event_t evt4 = { 0 };
evt4.ts_us = bpf_ktime_get_ns() / 1000;
evt4.type = TCP_EVENT_TYPE_ACCEPT;
evt4.netns = net_ns_inum;
evt4.pid = pid >> 32;
...
...
@@ -484,6 +493,7 @@ int trace_accept_return(struct pt_regs *ctx)
struct tcp_ipv6_event_t evt6 = { 0 };
evt6.ts_us = bpf_ktime_get_ns() / 1000;
evt6.type = TCP_EVENT_TYPE_ACCEPT;
evt6.netns = net_ns_inum;
evt6.pid = pid >> 32;
...
...
@@ -515,6 +525,7 @@ TASK_COMM_LEN = 16 # linux/sched.h
class
TCPIPV4Evt
(
ctypes
.
Structure
):
_fields_
=
[
(
"ts_us"
,
ctypes
.
c_ulonglong
),
(
"type"
,
ctypes
.
c_uint
),
(
"pid"
,
ctypes
.
c_uint
),
(
"comm"
,
ctypes
.
c_char
*
TASK_COMM_LEN
),
...
...
@@ -529,6 +540,7 @@ class TCPIPV4Evt(ctypes.Structure):
class
TCPIPV6Evt
(
ctypes
.
Structure
):
_fields_
=
[
(
"ts_us"
,
ctypes
.
c_ulonglong
),
(
"type"
,
ctypes
.
c_uint
),
(
"pid"
,
ctypes
.
c_uint
),
(
"comm"
,
ctypes
.
c_char
*
TASK_COMM_LEN
),
...
...
@@ -547,6 +559,11 @@ verbose_types = {"C": "connect", "A": "accept",
def
print_ipv4_event
(
cpu
,
data
,
size
):
event
=
ctypes
.
cast
(
data
,
ctypes
.
POINTER
(
TCPIPV4Evt
)).
contents
global
start_ts
if
args
.
timestamp
:
if
start_ts
==
0
:
start_ts
=
event
.
ts_us
print
(
"%-9.3f"
%
((
float
(
event
.
ts_us
)
-
start_ts
)
/
1000000
),
end
=
""
)
if
event
.
type
==
1
:
type_str
=
"C"
elif
event
.
type
==
2
:
...
...
@@ -576,6 +593,11 @@ def print_ipv4_event(cpu, data, size):
def
print_ipv6_event
(
cpu
,
data
,
size
):
event
=
ctypes
.
cast
(
data
,
ctypes
.
POINTER
(
TCPIPV6Evt
)).
contents
global
start_ts
if
args
.
timestamp
:
if
start_ts
==
0
:
start_ts
=
event
.
ts_us
print
(
"%-9.3f"
%
((
float
(
event
.
ts_us
)
-
start_ts
)
/
1000000
),
end
=
""
)
if
event
.
type
==
1
:
type_str
=
"C"
elif
event
.
type
==
2
:
...
...
@@ -627,6 +649,8 @@ b.attach_kretprobe(event="inet_csk_accept", fn_name="trace_accept_return")
print
(
"Tracing TCP established connections. Ctrl-C to end."
)
# header
if
args
.
timestamp
:
print
(
"%-9s"
%
(
"TIME(s)"
),
end
=
""
)
if
args
.
verbose
:
print
(
"%-12s %-6s %-16s %-2s %-16s %-16s %-6s %-7s"
%
(
"TYPE"
,
"PID"
,
"COMM"
,
"IP"
,
"SADDR"
,
"DADDR"
,
"SPORT"
,
"DPORT"
),
end
=
""
)
...
...
@@ -637,6 +661,7 @@ else:
print
(
"%-2s %-6s %-16s %-2s %-16s %-16s %-6s %-6s"
%
(
"T"
,
"PID"
,
"COMM"
,
"IP"
,
"SADDR"
,
"DADDR"
,
"SPORT"
,
"DPORT"
))
start_ts
=
0
def
inet_ntoa
(
addr
):
dq
=
''
...
...
tools/tcptracer_example.txt
View file @
6426cd4e
...
...
@@ -24,3 +24,14 @@ outgoing from "curl" to a local netcat, and one incoming received by the "nc"
process. The output details show the kind of event (C for connection, X for
close and A for accept), PID, IP version, source address, destination address,
source port and destination port.
The -t option prints a timestamp column:
```
# ./tcptracer -t
Tracing TCP established connections. Ctrl-C to end.
TIME(s) T PID COMM IP SADDR DADDR SPORT DPORT
0.000 C 31002 telnet 4 192.168.1.2 192.168.1.1 42590 23
3.546 C 748 curl 6 [::1] [::1] 42592 80
4.294 X 31002 telnet 4 192.168.1.2 192.168.1.1 42590 23
```
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment