ebpf_exporter
63 строки · 1.6 Кб
1#include <vmlinux.h>
2#include <bpf/bpf_tracing.h>
3#include <bpf/bpf_core_read.h>
4#include "maps.bpf.h"
5
6// 27 buckets for latency, max range is 33.6s .. 67.1s
7#define MAX_LATENCY_SLOT 26
8
9// Max number of listening ports we expect to see on the host
10#define MAX_PORTS 1024
11
12struct socket_latency_key_t {
13u16 port;
14u64 bucket;
15};
16
17struct {
18__uint(type, BPF_MAP_TYPE_HASH);
19__uint(max_entries, 10240);
20__type(key, struct request_sock *);
21__type(value, u64);
22} start SEC(".maps");
23
24struct {
25__uint(type, BPF_MAP_TYPE_HASH);
26__uint(max_entries, (MAX_LATENCY_SLOT + 1) * MAX_PORTS);
27__type(key, struct socket_latency_key_t);
28__type(value, u64);
29} accept_latency_seconds SEC(".maps");
30
31SEC("kprobe/inet_csk_reqsk_queue_hash_add")
32int BPF_KPROBE(kprobe__inet_csk_reqsk_queue_hash_add, struct sock *sk, struct request_sock *req)
33{
34u64 ts = bpf_ktime_get_ns();
35bpf_map_update_elem(&start, &req, &ts, BPF_ANY);
36return 0;
37}
38
39SEC("kprobe/inet_csk_accept")
40int BPF_KPROBE(kprobe__inet_csk_accept, struct sock *sk)
41{
42u64 *tsp, delta_us, ts = bpf_ktime_get_ns();
43struct inet_connection_sock *icsk = (struct inet_connection_sock *) sk;
44struct request_sock *req = BPF_CORE_READ(icsk, icsk_accept_queue).rskq_accept_head;
45struct socket_latency_key_t key = {};
46
47tsp = bpf_map_lookup_elem(&start, &req);
48if (!tsp) {
49return 0;
50}
51
52delta_us = (ts - *tsp) / 1000;
53
54key.port = BPF_CORE_READ(sk, __sk_common).skc_num;
55
56increment_exp2_histogram(&accept_latency_seconds, key, delta_us, MAX_LATENCY_SLOT);
57
58bpf_map_delete_elem(&start, &req);
59
60return 0;
61}
62
63char LICENSE[] SEC("license") = "GPL";
64