1 | /* SPDX-License-Identifier: GPL-2.0 */ |
2 | #undef TRACE_SYSTEM |
3 | #define TRACE_SYSTEM sock |
4 | |
5 | #if !defined(_TRACE_SOCK_H) || defined(TRACE_HEADER_MULTI_READ) |
6 | #define _TRACE_SOCK_H |
7 | |
8 | #include <net/sock.h> |
9 | #include <net/ipv6.h> |
10 | #include <linux/tracepoint.h> |
11 | #include <linux/ipv6.h> |
12 | #include <linux/tcp.h> |
13 | |
14 | #define family_names \ |
15 | EM(AF_INET) \ |
16 | EMe(AF_INET6) |
17 | |
18 | /* The protocol traced by inet_sock_set_state */ |
19 | #define inet_protocol_names \ |
20 | EM(IPPROTO_TCP) \ |
21 | EM(IPPROTO_DCCP) \ |
22 | EM(IPPROTO_SCTP) \ |
23 | EMe(IPPROTO_MPTCP) |
24 | |
25 | #define tcp_state_names \ |
26 | EM(TCP_ESTABLISHED) \ |
27 | EM(TCP_SYN_SENT) \ |
28 | EM(TCP_SYN_RECV) \ |
29 | EM(TCP_FIN_WAIT1) \ |
30 | EM(TCP_FIN_WAIT2) \ |
31 | EM(TCP_TIME_WAIT) \ |
32 | EM(TCP_CLOSE) \ |
33 | EM(TCP_CLOSE_WAIT) \ |
34 | EM(TCP_LAST_ACK) \ |
35 | EM(TCP_LISTEN) \ |
36 | EM(TCP_CLOSING) \ |
37 | EMe(TCP_NEW_SYN_RECV) |
38 | |
39 | #define skmem_kind_names \ |
40 | EM(SK_MEM_SEND) \ |
41 | EMe(SK_MEM_RECV) |
42 | |
43 | /* enums need to be exported to user space */ |
44 | #undef EM |
45 | #undef EMe |
46 | #define EM(a) TRACE_DEFINE_ENUM(a); |
47 | #define EMe(a) TRACE_DEFINE_ENUM(a); |
48 | |
49 | family_names |
50 | inet_protocol_names |
51 | tcp_state_names |
52 | skmem_kind_names |
53 | |
54 | #undef EM |
55 | #undef EMe |
56 | #define EM(a) { a, #a }, |
57 | #define EMe(a) { a, #a } |
58 | |
59 | #define show_family_name(val) \ |
60 | __print_symbolic(val, family_names) |
61 | |
62 | #define show_inet_protocol_name(val) \ |
63 | __print_symbolic(val, inet_protocol_names) |
64 | |
65 | #define show_tcp_state_name(val) \ |
66 | __print_symbolic(val, tcp_state_names) |
67 | |
68 | #define show_skmem_kind_names(val) \ |
69 | __print_symbolic(val, skmem_kind_names) |
70 | |
71 | TRACE_EVENT(sock_rcvqueue_full, |
72 | |
73 | TP_PROTO(struct sock *sk, struct sk_buff *skb), |
74 | |
75 | TP_ARGS(sk, skb), |
76 | |
77 | TP_STRUCT__entry( |
78 | __field(int, rmem_alloc) |
79 | __field(unsigned int, truesize) |
80 | __field(int, sk_rcvbuf) |
81 | ), |
82 | |
83 | TP_fast_assign( |
84 | __entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc); |
85 | __entry->truesize = skb->truesize; |
86 | __entry->sk_rcvbuf = READ_ONCE(sk->sk_rcvbuf); |
87 | ), |
88 | |
89 | TP_printk("rmem_alloc=%d truesize=%u sk_rcvbuf=%d" , |
90 | __entry->rmem_alloc, __entry->truesize, __entry->sk_rcvbuf) |
91 | ); |
92 | |
93 | TRACE_EVENT(sock_exceed_buf_limit, |
94 | |
95 | TP_PROTO(struct sock *sk, struct proto *prot, long allocated, int kind), |
96 | |
97 | TP_ARGS(sk, prot, allocated, kind), |
98 | |
99 | TP_STRUCT__entry( |
100 | __array(char, name, 32) |
101 | __array(long, sysctl_mem, 3) |
102 | __field(long, allocated) |
103 | __field(int, sysctl_rmem) |
104 | __field(int, rmem_alloc) |
105 | __field(int, sysctl_wmem) |
106 | __field(int, wmem_alloc) |
107 | __field(int, wmem_queued) |
108 | __field(int, kind) |
109 | ), |
110 | |
111 | TP_fast_assign( |
112 | strncpy(__entry->name, prot->name, 32); |
113 | __entry->sysctl_mem[0] = READ_ONCE(prot->sysctl_mem[0]); |
114 | __entry->sysctl_mem[1] = READ_ONCE(prot->sysctl_mem[1]); |
115 | __entry->sysctl_mem[2] = READ_ONCE(prot->sysctl_mem[2]); |
116 | __entry->allocated = allocated; |
117 | __entry->sysctl_rmem = sk_get_rmem0(sk, prot); |
118 | __entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc); |
119 | __entry->sysctl_wmem = sk_get_wmem0(sk, prot); |
120 | __entry->wmem_alloc = refcount_read(&sk->sk_wmem_alloc); |
121 | __entry->wmem_queued = READ_ONCE(sk->sk_wmem_queued); |
122 | __entry->kind = kind; |
123 | ), |
124 | |
125 | TP_printk("proto:%s sysctl_mem=%ld,%ld,%ld allocated=%ld sysctl_rmem=%d rmem_alloc=%d sysctl_wmem=%d wmem_alloc=%d wmem_queued=%d kind=%s" , |
126 | __entry->name, |
127 | __entry->sysctl_mem[0], |
128 | __entry->sysctl_mem[1], |
129 | __entry->sysctl_mem[2], |
130 | __entry->allocated, |
131 | __entry->sysctl_rmem, |
132 | __entry->rmem_alloc, |
133 | __entry->sysctl_wmem, |
134 | __entry->wmem_alloc, |
135 | __entry->wmem_queued, |
136 | show_skmem_kind_names(__entry->kind) |
137 | ) |
138 | ); |
139 | |
140 | TRACE_EVENT(inet_sock_set_state, |
141 | |
142 | TP_PROTO(const struct sock *sk, const int oldstate, const int newstate), |
143 | |
144 | TP_ARGS(sk, oldstate, newstate), |
145 | |
146 | TP_STRUCT__entry( |
147 | __field(const void *, skaddr) |
148 | __field(int, oldstate) |
149 | __field(int, newstate) |
150 | __field(__u16, sport) |
151 | __field(__u16, dport) |
152 | __field(__u16, family) |
153 | __field(__u16, protocol) |
154 | __array(__u8, saddr, 4) |
155 | __array(__u8, daddr, 4) |
156 | __array(__u8, saddr_v6, 16) |
157 | __array(__u8, daddr_v6, 16) |
158 | ), |
159 | |
160 | TP_fast_assign( |
161 | const struct inet_sock *inet = inet_sk(sk); |
162 | struct in6_addr *pin6; |
163 | __be32 *p32; |
164 | |
165 | __entry->skaddr = sk; |
166 | __entry->oldstate = oldstate; |
167 | __entry->newstate = newstate; |
168 | |
169 | __entry->family = sk->sk_family; |
170 | __entry->protocol = sk->sk_protocol; |
171 | __entry->sport = ntohs(inet->inet_sport); |
172 | __entry->dport = ntohs(inet->inet_dport); |
173 | |
174 | p32 = (__be32 *) __entry->saddr; |
175 | *p32 = inet->inet_saddr; |
176 | |
177 | p32 = (__be32 *) __entry->daddr; |
178 | *p32 = inet->inet_daddr; |
179 | |
180 | #if IS_ENABLED(CONFIG_IPV6) |
181 | if (sk->sk_family == AF_INET6) { |
182 | pin6 = (struct in6_addr *)__entry->saddr_v6; |
183 | *pin6 = sk->sk_v6_rcv_saddr; |
184 | pin6 = (struct in6_addr *)__entry->daddr_v6; |
185 | *pin6 = sk->sk_v6_daddr; |
186 | } else |
187 | #endif |
188 | { |
189 | pin6 = (struct in6_addr *)__entry->saddr_v6; |
190 | ipv6_addr_set_v4mapped(inet->inet_saddr, pin6); |
191 | pin6 = (struct in6_addr *)__entry->daddr_v6; |
192 | ipv6_addr_set_v4mapped(inet->inet_daddr, pin6); |
193 | } |
194 | ), |
195 | |
196 | TP_printk("family=%s protocol=%s sport=%hu dport=%hu saddr=%pI4 daddr=%pI4 saddrv6=%pI6c daddrv6=%pI6c oldstate=%s newstate=%s" , |
197 | show_family_name(__entry->family), |
198 | show_inet_protocol_name(__entry->protocol), |
199 | __entry->sport, __entry->dport, |
200 | __entry->saddr, __entry->daddr, |
201 | __entry->saddr_v6, __entry->daddr_v6, |
202 | show_tcp_state_name(__entry->oldstate), |
203 | show_tcp_state_name(__entry->newstate)) |
204 | ); |
205 | |
206 | TRACE_EVENT(inet_sk_error_report, |
207 | |
208 | TP_PROTO(const struct sock *sk), |
209 | |
210 | TP_ARGS(sk), |
211 | |
212 | TP_STRUCT__entry( |
213 | __field(int, error) |
214 | __field(__u16, sport) |
215 | __field(__u16, dport) |
216 | __field(__u16, family) |
217 | __field(__u16, protocol) |
218 | __array(__u8, saddr, 4) |
219 | __array(__u8, daddr, 4) |
220 | __array(__u8, saddr_v6, 16) |
221 | __array(__u8, daddr_v6, 16) |
222 | ), |
223 | |
224 | TP_fast_assign( |
225 | const struct inet_sock *inet = inet_sk(sk); |
226 | struct in6_addr *pin6; |
227 | __be32 *p32; |
228 | |
229 | __entry->error = sk->sk_err; |
230 | __entry->family = sk->sk_family; |
231 | __entry->protocol = sk->sk_protocol; |
232 | __entry->sport = ntohs(inet->inet_sport); |
233 | __entry->dport = ntohs(inet->inet_dport); |
234 | |
235 | p32 = (__be32 *) __entry->saddr; |
236 | *p32 = inet->inet_saddr; |
237 | |
238 | p32 = (__be32 *) __entry->daddr; |
239 | *p32 = inet->inet_daddr; |
240 | |
241 | #if IS_ENABLED(CONFIG_IPV6) |
242 | if (sk->sk_family == AF_INET6) { |
243 | pin6 = (struct in6_addr *)__entry->saddr_v6; |
244 | *pin6 = sk->sk_v6_rcv_saddr; |
245 | pin6 = (struct in6_addr *)__entry->daddr_v6; |
246 | *pin6 = sk->sk_v6_daddr; |
247 | } else |
248 | #endif |
249 | { |
250 | pin6 = (struct in6_addr *)__entry->saddr_v6; |
251 | ipv6_addr_set_v4mapped(inet->inet_saddr, pin6); |
252 | pin6 = (struct in6_addr *)__entry->daddr_v6; |
253 | ipv6_addr_set_v4mapped(inet->inet_daddr, pin6); |
254 | } |
255 | ), |
256 | |
257 | TP_printk("family=%s protocol=%s sport=%hu dport=%hu saddr=%pI4 daddr=%pI4 saddrv6=%pI6c daddrv6=%pI6c error=%d" , |
258 | show_family_name(__entry->family), |
259 | show_inet_protocol_name(__entry->protocol), |
260 | __entry->sport, __entry->dport, |
261 | __entry->saddr, __entry->daddr, |
262 | __entry->saddr_v6, __entry->daddr_v6, |
263 | __entry->error) |
264 | ); |
265 | |
266 | TRACE_EVENT(sk_data_ready, |
267 | |
268 | TP_PROTO(const struct sock *sk), |
269 | |
270 | TP_ARGS(sk), |
271 | |
272 | TP_STRUCT__entry( |
273 | __field(const void *, skaddr) |
274 | __field(__u16, family) |
275 | __field(__u16, protocol) |
276 | __field(unsigned long, ip) |
277 | ), |
278 | |
279 | TP_fast_assign( |
280 | __entry->skaddr = sk; |
281 | __entry->family = sk->sk_family; |
282 | __entry->protocol = sk->sk_protocol; |
283 | __entry->ip = _RET_IP_; |
284 | ), |
285 | |
286 | TP_printk("family=%u protocol=%u func=%ps" , |
287 | __entry->family, __entry->protocol, (void *)__entry->ip) |
288 | ); |
289 | |
290 | /* |
291 | * sock send/recv msg length |
292 | */ |
293 | DECLARE_EVENT_CLASS(sock_msg_length, |
294 | |
295 | TP_PROTO(struct sock *sk, int ret, int flags), |
296 | |
297 | TP_ARGS(sk, ret, flags), |
298 | |
299 | TP_STRUCT__entry( |
300 | __field(void *, sk) |
301 | __field(__u16, family) |
302 | __field(__u16, protocol) |
303 | __field(int, ret) |
304 | __field(int, flags) |
305 | ), |
306 | |
307 | TP_fast_assign( |
308 | __entry->sk = sk; |
309 | __entry->family = sk->sk_family; |
310 | __entry->protocol = sk->sk_protocol; |
311 | __entry->ret = ret; |
312 | __entry->flags = flags; |
313 | ), |
314 | |
315 | TP_printk("sk address = %p, family = %s protocol = %s, length = %d, error = %d, flags = 0x%x" , |
316 | __entry->sk, show_family_name(__entry->family), |
317 | show_inet_protocol_name(__entry->protocol), |
318 | !(__entry->flags & MSG_PEEK) ? |
319 | (__entry->ret > 0 ? __entry->ret : 0) : 0, |
320 | __entry->ret < 0 ? __entry->ret : 0, |
321 | __entry->flags) |
322 | ); |
323 | |
324 | DEFINE_EVENT(sock_msg_length, sock_send_length, |
325 | TP_PROTO(struct sock *sk, int ret, int flags), |
326 | |
327 | TP_ARGS(sk, ret, flags) |
328 | ); |
329 | |
330 | DEFINE_EVENT(sock_msg_length, sock_recv_length, |
331 | TP_PROTO(struct sock *sk, int ret, int flags), |
332 | |
333 | TP_ARGS(sk, ret, flags) |
334 | ); |
335 | #endif /* _TRACE_SOCK_H */ |
336 | |
337 | /* This part must be outside protection */ |
338 | #include <trace/define_trace.h> |
339 | |