Loading...
1#undef TRACE_SYSTEM
2#define TRACE_SYSTEM sock
3
4#if !defined(_TRACE_SOCK_H) || defined(TRACE_HEADER_MULTI_READ)
5#define _TRACE_SOCK_H
6
7#include <net/sock.h>
8#include <linux/tracepoint.h>
9
10TRACE_EVENT(sock_rcvqueue_full,
11
12 TP_PROTO(struct sock *sk, struct sk_buff *skb),
13
14 TP_ARGS(sk, skb),
15
16 TP_STRUCT__entry(
17 __field(int, rmem_alloc)
18 __field(unsigned int, truesize)
19 __field(int, sk_rcvbuf)
20 ),
21
22 TP_fast_assign(
23 __entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc);
24 __entry->truesize = skb->truesize;
25 __entry->sk_rcvbuf = sk->sk_rcvbuf;
26 ),
27
28 TP_printk("rmem_alloc=%d truesize=%u sk_rcvbuf=%d",
29 __entry->rmem_alloc, __entry->truesize, __entry->sk_rcvbuf)
30);
31
32TRACE_EVENT(sock_exceed_buf_limit,
33
34 TP_PROTO(struct sock *sk, struct proto *prot, long allocated),
35
36 TP_ARGS(sk, prot, allocated),
37
38 TP_STRUCT__entry(
39 __array(char, name, 32)
40 __field(long *, sysctl_mem)
41 __field(long, allocated)
42 __field(int, sysctl_rmem)
43 __field(int, rmem_alloc)
44 ),
45
46 TP_fast_assign(
47 strncpy(__entry->name, prot->name, 32);
48 __entry->sysctl_mem = prot->sysctl_mem;
49 __entry->allocated = allocated;
50 __entry->sysctl_rmem = prot->sysctl_rmem[0];
51 __entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc);
52 ),
53
54 TP_printk("proto:%s sysctl_mem=%ld,%ld,%ld allocated=%ld "
55 "sysctl_rmem=%d rmem_alloc=%d",
56 __entry->name,
57 __entry->sysctl_mem[0],
58 __entry->sysctl_mem[1],
59 __entry->sysctl_mem[2],
60 __entry->allocated,
61 __entry->sysctl_rmem,
62 __entry->rmem_alloc)
63);
64
65#endif /* _TRACE_SOCK_H */
66
67/* This part must be outside protection */
68#include <trace/define_trace.h>
1/* SPDX-License-Identifier: GPL-2.0 */
2#undef TRACE_SYSTEM
3#define TRACE_SYSTEM sock
4
5#if !defined(_TRACE_SOCK_H) || defined(TRACE_HEADER_MULTI_READ)
6#define _TRACE_SOCK_H
7
8#include <net/sock.h>
9#include <net/ipv6.h>
10#include <linux/tracepoint.h>
11#include <linux/ipv6.h>
12#include <linux/tcp.h>
13
14#define family_names \
15 EM(AF_INET) \
16 EMe(AF_INET6)
17
18/* The protocol traced by inet_sock_set_state */
19#define inet_protocol_names \
20 EM(IPPROTO_TCP) \
21 EM(IPPROTO_DCCP) \
22 EM(IPPROTO_SCTP) \
23 EMe(IPPROTO_MPTCP)
24
25#define tcp_state_names \
26 EM(TCP_ESTABLISHED) \
27 EM(TCP_SYN_SENT) \
28 EM(TCP_SYN_RECV) \
29 EM(TCP_FIN_WAIT1) \
30 EM(TCP_FIN_WAIT2) \
31 EM(TCP_TIME_WAIT) \
32 EM(TCP_CLOSE) \
33 EM(TCP_CLOSE_WAIT) \
34 EM(TCP_LAST_ACK) \
35 EM(TCP_LISTEN) \
36 EM(TCP_CLOSING) \
37 EMe(TCP_NEW_SYN_RECV)
38
39#define skmem_kind_names \
40 EM(SK_MEM_SEND) \
41 EMe(SK_MEM_RECV)
42
43/* enums need to be exported to user space */
44#undef EM
45#undef EMe
46#define EM(a) TRACE_DEFINE_ENUM(a);
47#define EMe(a) TRACE_DEFINE_ENUM(a);
48
49family_names
50inet_protocol_names
51tcp_state_names
52skmem_kind_names
53
54#undef EM
55#undef EMe
56#define EM(a) { a, #a },
57#define EMe(a) { a, #a }
58
59#define show_family_name(val) \
60 __print_symbolic(val, family_names)
61
62#define show_inet_protocol_name(val) \
63 __print_symbolic(val, inet_protocol_names)
64
65#define show_tcp_state_name(val) \
66 __print_symbolic(val, tcp_state_names)
67
68#define show_skmem_kind_names(val) \
69 __print_symbolic(val, skmem_kind_names)
70
71TRACE_EVENT(sock_rcvqueue_full,
72
73 TP_PROTO(struct sock *sk, struct sk_buff *skb),
74
75 TP_ARGS(sk, skb),
76
77 TP_STRUCT__entry(
78 __field(int, rmem_alloc)
79 __field(unsigned int, truesize)
80 __field(int, sk_rcvbuf)
81 ),
82
83 TP_fast_assign(
84 __entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc);
85 __entry->truesize = skb->truesize;
86 __entry->sk_rcvbuf = READ_ONCE(sk->sk_rcvbuf);
87 ),
88
89 TP_printk("rmem_alloc=%d truesize=%u sk_rcvbuf=%d",
90 __entry->rmem_alloc, __entry->truesize, __entry->sk_rcvbuf)
91);
92
93TRACE_EVENT(sock_exceed_buf_limit,
94
95 TP_PROTO(struct sock *sk, struct proto *prot, long allocated, int kind),
96
97 TP_ARGS(sk, prot, allocated, kind),
98
99 TP_STRUCT__entry(
100 __array(char, name, 32)
101 __field(long *, sysctl_mem)
102 __field(long, allocated)
103 __field(int, sysctl_rmem)
104 __field(int, rmem_alloc)
105 __field(int, sysctl_wmem)
106 __field(int, wmem_alloc)
107 __field(int, wmem_queued)
108 __field(int, kind)
109 ),
110
111 TP_fast_assign(
112 strncpy(__entry->name, prot->name, 32);
113 __entry->sysctl_mem = prot->sysctl_mem;
114 __entry->allocated = allocated;
115 __entry->sysctl_rmem = sk_get_rmem0(sk, prot);
116 __entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc);
117 __entry->sysctl_wmem = sk_get_wmem0(sk, prot);
118 __entry->wmem_alloc = refcount_read(&sk->sk_wmem_alloc);
119 __entry->wmem_queued = READ_ONCE(sk->sk_wmem_queued);
120 __entry->kind = kind;
121 ),
122
123 TP_printk("proto:%s sysctl_mem=%ld,%ld,%ld allocated=%ld sysctl_rmem=%d rmem_alloc=%d sysctl_wmem=%d wmem_alloc=%d wmem_queued=%d kind=%s",
124 __entry->name,
125 __entry->sysctl_mem[0],
126 __entry->sysctl_mem[1],
127 __entry->sysctl_mem[2],
128 __entry->allocated,
129 __entry->sysctl_rmem,
130 __entry->rmem_alloc,
131 __entry->sysctl_wmem,
132 __entry->wmem_alloc,
133 __entry->wmem_queued,
134 show_skmem_kind_names(__entry->kind)
135 )
136);
137
138TRACE_EVENT(inet_sock_set_state,
139
140 TP_PROTO(const struct sock *sk, const int oldstate, const int newstate),
141
142 TP_ARGS(sk, oldstate, newstate),
143
144 TP_STRUCT__entry(
145 __field(const void *, skaddr)
146 __field(int, oldstate)
147 __field(int, newstate)
148 __field(__u16, sport)
149 __field(__u16, dport)
150 __field(__u16, family)
151 __field(__u16, protocol)
152 __array(__u8, saddr, 4)
153 __array(__u8, daddr, 4)
154 __array(__u8, saddr_v6, 16)
155 __array(__u8, daddr_v6, 16)
156 ),
157
158 TP_fast_assign(
159 struct inet_sock *inet = inet_sk(sk);
160 struct in6_addr *pin6;
161 __be32 *p32;
162
163 __entry->skaddr = sk;
164 __entry->oldstate = oldstate;
165 __entry->newstate = newstate;
166
167 __entry->family = sk->sk_family;
168 __entry->protocol = sk->sk_protocol;
169 __entry->sport = ntohs(inet->inet_sport);
170 __entry->dport = ntohs(inet->inet_dport);
171
172 p32 = (__be32 *) __entry->saddr;
173 *p32 = inet->inet_saddr;
174
175 p32 = (__be32 *) __entry->daddr;
176 *p32 = inet->inet_daddr;
177
178#if IS_ENABLED(CONFIG_IPV6)
179 if (sk->sk_family == AF_INET6) {
180 pin6 = (struct in6_addr *)__entry->saddr_v6;
181 *pin6 = sk->sk_v6_rcv_saddr;
182 pin6 = (struct in6_addr *)__entry->daddr_v6;
183 *pin6 = sk->sk_v6_daddr;
184 } else
185#endif
186 {
187 pin6 = (struct in6_addr *)__entry->saddr_v6;
188 ipv6_addr_set_v4mapped(inet->inet_saddr, pin6);
189 pin6 = (struct in6_addr *)__entry->daddr_v6;
190 ipv6_addr_set_v4mapped(inet->inet_daddr, pin6);
191 }
192 ),
193
194 TP_printk("family=%s protocol=%s sport=%hu dport=%hu saddr=%pI4 daddr=%pI4 saddrv6=%pI6c daddrv6=%pI6c oldstate=%s newstate=%s",
195 show_family_name(__entry->family),
196 show_inet_protocol_name(__entry->protocol),
197 __entry->sport, __entry->dport,
198 __entry->saddr, __entry->daddr,
199 __entry->saddr_v6, __entry->daddr_v6,
200 show_tcp_state_name(__entry->oldstate),
201 show_tcp_state_name(__entry->newstate))
202);
203
204TRACE_EVENT(inet_sk_error_report,
205
206 TP_PROTO(const struct sock *sk),
207
208 TP_ARGS(sk),
209
210 TP_STRUCT__entry(
211 __field(int, error)
212 __field(__u16, sport)
213 __field(__u16, dport)
214 __field(__u16, family)
215 __field(__u16, protocol)
216 __array(__u8, saddr, 4)
217 __array(__u8, daddr, 4)
218 __array(__u8, saddr_v6, 16)
219 __array(__u8, daddr_v6, 16)
220 ),
221
222 TP_fast_assign(
223 struct inet_sock *inet = inet_sk(sk);
224 struct in6_addr *pin6;
225 __be32 *p32;
226
227 __entry->error = sk->sk_err;
228 __entry->family = sk->sk_family;
229 __entry->protocol = sk->sk_protocol;
230 __entry->sport = ntohs(inet->inet_sport);
231 __entry->dport = ntohs(inet->inet_dport);
232
233 p32 = (__be32 *) __entry->saddr;
234 *p32 = inet->inet_saddr;
235
236 p32 = (__be32 *) __entry->daddr;
237 *p32 = inet->inet_daddr;
238
239#if IS_ENABLED(CONFIG_IPV6)
240 if (sk->sk_family == AF_INET6) {
241 pin6 = (struct in6_addr *)__entry->saddr_v6;
242 *pin6 = sk->sk_v6_rcv_saddr;
243 pin6 = (struct in6_addr *)__entry->daddr_v6;
244 *pin6 = sk->sk_v6_daddr;
245 } else
246#endif
247 {
248 pin6 = (struct in6_addr *)__entry->saddr_v6;
249 ipv6_addr_set_v4mapped(inet->inet_saddr, pin6);
250 pin6 = (struct in6_addr *)__entry->daddr_v6;
251 ipv6_addr_set_v4mapped(inet->inet_daddr, pin6);
252 }
253 ),
254
255 TP_printk("family=%s protocol=%s sport=%hu dport=%hu saddr=%pI4 daddr=%pI4 saddrv6=%pI6c daddrv6=%pI6c error=%d",
256 show_family_name(__entry->family),
257 show_inet_protocol_name(__entry->protocol),
258 __entry->sport, __entry->dport,
259 __entry->saddr, __entry->daddr,
260 __entry->saddr_v6, __entry->daddr_v6,
261 __entry->error)
262);
263
264#endif /* _TRACE_SOCK_H */
265
266/* This part must be outside protection */
267#include <trace/define_trace.h>