1 /* SPDX-License-Identifier: GPL-2.0 */ 2 #undef TRACE_SYSTEM 3 #define TRACE_SYSTEM sock 4 5 #if !defined(_TRACE_SOCK_H) || defined(TRACE_HEADER_MULTI_READ) 6 #define _TRACE_SOCK_H 7 8 #include <net/sock.h> 9 #include <net/ipv6.h> 10 #include <linux/tracepoint.h> 11 #include <linux/ipv6.h> 12 #include <linux/tcp.h> 13 14 #define family_names \ 15 EM(AF_INET) \ 16 EMe(AF_INET6) 17 18 /* The protocol traced by inet_sock_set_state */ 19 #define inet_protocol_names \ 20 EM(IPPROTO_TCP) \ 21 EM(IPPROTO_DCCP) \ 22 EM(IPPROTO_SCTP) \ 23 EMe(IPPROTO_MPTCP) 24 25 #define tcp_state_names \ 26 EM(TCP_ESTABLISHED) \ 27 EM(TCP_SYN_SENT) \ 28 EM(TCP_SYN_RECV) \ 29 EM(TCP_FIN_WAIT1) \ 30 EM(TCP_FIN_WAIT2) \ 31 EM(TCP_TIME_WAIT) \ 32 EM(TCP_CLOSE) \ 33 EM(TCP_CLOSE_WAIT) \ 34 EM(TCP_LAST_ACK) \ 35 EM(TCP_LISTEN) \ 36 EM(TCP_CLOSING) \ 37 EMe(TCP_NEW_SYN_RECV) 38 39 #define skmem_kind_names \ 40 EM(SK_MEM_SEND) \ 41 EMe(SK_MEM_RECV) 42 43 /* enums need to be exported to user space */ 44 #undef EM 45 #undef EMe 46 #define EM(a) TRACE_DEFINE_ENUM(a); 47 #define EMe(a) TRACE_DEFINE_ENUM(a); 48 49 family_names 50 inet_protocol_names 51 tcp_state_names 52 skmem_kind_names 53 54 #undef EM 55 #undef EMe 56 #define EM(a) { a, #a }, 57 #define EMe(a) { a, #a } 58 59 #define show_family_name(val) \ 60 __print_symbolic(val, family_names) 61 62 #define show_inet_protocol_name(val) \ 63 __print_symbolic(val, inet_protocol_names) 64 65 #define show_tcp_state_name(val) \ 66 __print_symbolic(val, tcp_state_names) 67 68 #define show_skmem_kind_names(val) \ 69 __print_symbolic(val, skmem_kind_names) 70 71 TRACE_EVENT(sock_rcvqueue_full, 72 73 TP_PROTO(struct sock *sk, struct sk_buff *skb), 74 75 TP_ARGS(sk, skb), 76 77 TP_STRUCT__entry( 78 __field(int, rmem_alloc) 79 __field(unsigned int, truesize) 80 __field(int, sk_rcvbuf) 81 ), 82 83 TP_fast_assign( 84 __entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc); 85 __entry->truesize = skb->truesize; 86 __entry->sk_rcvbuf = READ_ONCE(sk->sk_rcvbuf); 87 ), 88 89 TP_printk("rmem_alloc=%d truesize=%u sk_rcvbuf=%d", 90 __entry->rmem_alloc, __entry->truesize, __entry->sk_rcvbuf) 91 ); 92 93 TRACE_EVENT(sock_exceed_buf_limit, 94 95 TP_PROTO(struct sock *sk, struct proto *prot, long allocated, int kind), 96 97 TP_ARGS(sk, prot, allocated, kind), 98 99 TP_STRUCT__entry( 100 __array(char, name, 32) 101 __array(long, sysctl_mem, 3) 102 __field(long, allocated) 103 __field(int, sysctl_rmem) 104 __field(int, rmem_alloc) 105 __field(int, sysctl_wmem) 106 __field(int, wmem_alloc) 107 __field(int, wmem_queued) 108 __field(int, kind) 109 ), 110 111 TP_fast_assign( 112 strncpy(__entry->name, prot->name, 32); 113 __entry->sysctl_mem[0] = READ_ONCE(prot->sysctl_mem[0]); 114 __entry->sysctl_mem[1] = READ_ONCE(prot->sysctl_mem[1]); 115 __entry->sysctl_mem[2] = READ_ONCE(prot->sysctl_mem[2]); 116 __entry->allocated = allocated; 117 __entry->sysctl_rmem = sk_get_rmem0(sk, prot); 118 __entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc); 119 __entry->sysctl_wmem = sk_get_wmem0(sk, prot); 120 __entry->wmem_alloc = refcount_read(&sk->sk_wmem_alloc); 121 __entry->wmem_queued = READ_ONCE(sk->sk_wmem_queued); 122 __entry->kind = kind; 123 ), 124 125 TP_printk("proto:%s sysctl_mem=%ld,%ld,%ld allocated=%ld sysctl_rmem=%d rmem_alloc=%d sysctl_wmem=%d wmem_alloc=%d wmem_queued=%d kind=%s", 126 __entry->name, 127 __entry->sysctl_mem[0], 128 __entry->sysctl_mem[1], 129 __entry->sysctl_mem[2], 130 __entry->allocated, 131 __entry->sysctl_rmem, 132 __entry->rmem_alloc, 133 __entry->sysctl_wmem, 134 __entry->wmem_alloc, 135 __entry->wmem_queued, 136 show_skmem_kind_names(__entry->kind) 137 ) 138 ); 139 140 TRACE_EVENT(inet_sock_set_state, 141 142 TP_PROTO(const struct sock *sk, const int oldstate, const int newstate), 143 144 TP_ARGS(sk, oldstate, newstate), 145 146 TP_STRUCT__entry( 147 __field(const void *, skaddr) 148 __field(int, oldstate) 149 __field(int, newstate) 150 __field(__u16, sport) 151 __field(__u16, dport) 152 __field(__u16, family) 153 __field(__u16, protocol) 154 __array(__u8, saddr, 4) 155 __array(__u8, daddr, 4) 156 __array(__u8, saddr_v6, 16) 157 __array(__u8, daddr_v6, 16) 158 ), 159 160 TP_fast_assign( 161 struct inet_sock *inet = inet_sk(sk); 162 struct in6_addr *pin6; 163 __be32 *p32; 164 165 __entry->skaddr = sk; 166 __entry->oldstate = oldstate; 167 __entry->newstate = newstate; 168 169 __entry->family = sk->sk_family; 170 __entry->protocol = sk->sk_protocol; 171 __entry->sport = ntohs(inet->inet_sport); 172 __entry->dport = ntohs(inet->inet_dport); 173 174 p32 = (__be32 *) __entry->saddr; 175 *p32 = inet->inet_saddr; 176 177 p32 = (__be32 *) __entry->daddr; 178 *p32 = inet->inet_daddr; 179 180 #if IS_ENABLED(CONFIG_IPV6) 181 if (sk->sk_family == AF_INET6) { 182 pin6 = (struct in6_addr *)__entry->saddr_v6; 183 *pin6 = sk->sk_v6_rcv_saddr; 184 pin6 = (struct in6_addr *)__entry->daddr_v6; 185 *pin6 = sk->sk_v6_daddr; 186 } else 187 #endif 188 { 189 pin6 = (struct in6_addr *)__entry->saddr_v6; 190 ipv6_addr_set_v4mapped(inet->inet_saddr, pin6); 191 pin6 = (struct in6_addr *)__entry->daddr_v6; 192 ipv6_addr_set_v4mapped(inet->inet_daddr, pin6); 193 } 194 ), 195 196 TP_printk("family=%s protocol=%s sport=%hu dport=%hu saddr=%pI4 daddr=%pI4 saddrv6=%pI6c daddrv6=%pI6c oldstate=%s newstate=%s", 197 show_family_name(__entry->family), 198 show_inet_protocol_name(__entry->protocol), 199 __entry->sport, __entry->dport, 200 __entry->saddr, __entry->daddr, 201 __entry->saddr_v6, __entry->daddr_v6, 202 show_tcp_state_name(__entry->oldstate), 203 show_tcp_state_name(__entry->newstate)) 204 ); 205 206 TRACE_EVENT(inet_sk_error_report, 207 208 TP_PROTO(const struct sock *sk), 209 210 TP_ARGS(sk), 211 212 TP_STRUCT__entry( 213 __field(int, error) 214 __field(__u16, sport) 215 __field(__u16, dport) 216 __field(__u16, family) 217 __field(__u16, protocol) 218 __array(__u8, saddr, 4) 219 __array(__u8, daddr, 4) 220 __array(__u8, saddr_v6, 16) 221 __array(__u8, daddr_v6, 16) 222 ), 223 224 TP_fast_assign( 225 struct inet_sock *inet = inet_sk(sk); 226 struct in6_addr *pin6; 227 __be32 *p32; 228 229 __entry->error = sk->sk_err; 230 __entry->family = sk->sk_family; 231 __entry->protocol = sk->sk_protocol; 232 __entry->sport = ntohs(inet->inet_sport); 233 __entry->dport = ntohs(inet->inet_dport); 234 235 p32 = (__be32 *) __entry->saddr; 236 *p32 = inet->inet_saddr; 237 238 p32 = (__be32 *) __entry->daddr; 239 *p32 = inet->inet_daddr; 240 241 #if IS_ENABLED(CONFIG_IPV6) 242 if (sk->sk_family == AF_INET6) { 243 pin6 = (struct in6_addr *)__entry->saddr_v6; 244 *pin6 = sk->sk_v6_rcv_saddr; 245 pin6 = (struct in6_addr *)__entry->daddr_v6; 246 *pin6 = sk->sk_v6_daddr; 247 } else 248 #endif 249 { 250 pin6 = (struct in6_addr *)__entry->saddr_v6; 251 ipv6_addr_set_v4mapped(inet->inet_saddr, pin6); 252 pin6 = (struct in6_addr *)__entry->daddr_v6; 253 ipv6_addr_set_v4mapped(inet->inet_daddr, pin6); 254 } 255 ), 256 257 TP_printk("family=%s protocol=%s sport=%hu dport=%hu saddr=%pI4 daddr=%pI4 saddrv6=%pI6c daddrv6=%pI6c error=%d", 258 show_family_name(__entry->family), 259 show_inet_protocol_name(__entry->protocol), 260 __entry->sport, __entry->dport, 261 __entry->saddr, __entry->daddr, 262 __entry->saddr_v6, __entry->daddr_v6, 263 __entry->error) 264 ); 265 266 TRACE_EVENT(sk_data_ready, 267 268 TP_PROTO(const struct sock *sk), 269 270 TP_ARGS(sk), 271 272 TP_STRUCT__entry( 273 __field(const void *, skaddr) 274 __field(__u16, family) 275 __field(__u16, protocol) 276 __field(unsigned long, ip) 277 ), 278 279 TP_fast_assign( 280 __entry->skaddr = sk; 281 __entry->family = sk->sk_family; 282 __entry->protocol = sk->sk_protocol; 283 __entry->ip = _RET_IP_; 284 ), 285 286 TP_printk("family=%u protocol=%u func=%ps", 287 __entry->family, __entry->protocol, (void *)__entry->ip) 288 ); 289 290 /* 291 * sock send/recv msg length 292 */ 293 DECLARE_EVENT_CLASS(sock_msg_length, 294 295 TP_PROTO(struct sock *sk, int ret, int flags), 296 297 TP_ARGS(sk, ret, flags), 298 299 TP_STRUCT__entry( 300 __field(void *, sk) 301 __field(__u16, family) 302 __field(__u16, protocol) 303 __field(int, ret) 304 __field(int, flags) 305 ), 306 307 TP_fast_assign( 308 __entry->sk = sk; 309 __entry->family = sk->sk_family; 310 __entry->protocol = sk->sk_protocol; 311 __entry->ret = ret; 312 __entry->flags = flags; 313 ), 314 315 TP_printk("sk address = %p, family = %s protocol = %s, length = %d, error = %d, flags = 0x%x", 316 __entry->sk, show_family_name(__entry->family), 317 show_inet_protocol_name(__entry->protocol), 318 !(__entry->flags & MSG_PEEK) ? 319 (__entry->ret > 0 ? __entry->ret : 0) : 0, 320 __entry->ret < 0 ? __entry->ret : 0, 321 __entry->flags) 322 ); 323 324 DEFINE_EVENT(sock_msg_length, sock_send_length, 325 TP_PROTO(struct sock *sk, int ret, int flags), 326 327 TP_ARGS(sk, ret, flags) 328 ); 329 330 DEFINE_EVENT(sock_msg_length, sock_recv_length, 331 TP_PROTO(struct sock *sk, int ret, int flags), 332 333 TP_ARGS(sk, ret, flags) 334 ); 335 #endif /* _TRACE_SOCK_H */ 336 337 /* This part must be outside protection */ 338 #include <trace/define_trace.h> 339