1/* SPDX-License-Identifier: GPL-2.0 */
2#undef TRACE_SYSTEM
3#define TRACE_SYSTEM sock
4
5#if !defined(_TRACE_SOCK_H) || defined(TRACE_HEADER_MULTI_READ)
6#define _TRACE_SOCK_H
7
8#include <net/sock.h>
9#include <net/ipv6.h>
10#include <linux/tracepoint.h>
11#include <linux/ipv6.h>
12#include <linux/tcp.h>
13
14#define family_names			\
15		EM(AF_INET)				\
16		EMe(AF_INET6)
17
18/* The protocol traced by inet_sock_set_state */
19#define inet_protocol_names		\
20		EM(IPPROTO_TCP)			\
21		EM(IPPROTO_DCCP)		\
22		EM(IPPROTO_SCTP)		\
23		EMe(IPPROTO_MPTCP)
24
25#define tcp_state_names			\
26		EM(TCP_ESTABLISHED)		\
27		EM(TCP_SYN_SENT)		\
28		EM(TCP_SYN_RECV)		\
29		EM(TCP_FIN_WAIT1)		\
30		EM(TCP_FIN_WAIT2)		\
31		EM(TCP_TIME_WAIT)		\
32		EM(TCP_CLOSE)			\
33		EM(TCP_CLOSE_WAIT)		\
34		EM(TCP_LAST_ACK)		\
35		EM(TCP_LISTEN)			\
36		EM(TCP_CLOSING)			\
37		EMe(TCP_NEW_SYN_RECV)
38
39#define skmem_kind_names			\
40		EM(SK_MEM_SEND)			\
41		EMe(SK_MEM_RECV)
42
43/* enums need to be exported to user space */
44#undef EM
45#undef EMe
46#define EM(a)       TRACE_DEFINE_ENUM(a);
47#define EMe(a)      TRACE_DEFINE_ENUM(a);
48
49family_names
50inet_protocol_names
51tcp_state_names
52skmem_kind_names
53
54#undef EM
55#undef EMe
56#define EM(a)       { a, #a },
57#define EMe(a)      { a, #a }
58
59#define show_family_name(val)			\
60	__print_symbolic(val, family_names)
61
62#define show_inet_protocol_name(val)    \
63	__print_symbolic(val, inet_protocol_names)
64
65#define show_tcp_state_name(val)        \
66	__print_symbolic(val, tcp_state_names)
67
68#define show_skmem_kind_names(val)	\
69	__print_symbolic(val, skmem_kind_names)
70
71TRACE_EVENT(sock_rcvqueue_full,
72
73	TP_PROTO(struct sock *sk, struct sk_buff *skb),
74
75	TP_ARGS(sk, skb),
76
77	TP_STRUCT__entry(
78		__field(int, rmem_alloc)
79		__field(unsigned int, truesize)
80		__field(int, sk_rcvbuf)
81	),
82
83	TP_fast_assign(
84		__entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc);
85		__entry->truesize   = skb->truesize;
86		__entry->sk_rcvbuf  = READ_ONCE(sk->sk_rcvbuf);
87	),
88
89	TP_printk("rmem_alloc=%d truesize=%u sk_rcvbuf=%d",
90		__entry->rmem_alloc, __entry->truesize, __entry->sk_rcvbuf)
91);
92
93TRACE_EVENT(sock_exceed_buf_limit,
94
95	TP_PROTO(struct sock *sk, struct proto *prot, long allocated, int kind),
96
97	TP_ARGS(sk, prot, allocated, kind),
98
99	TP_STRUCT__entry(
100		__array(char, name, 32)
101		__array(long, sysctl_mem, 3)
102		__field(long, allocated)
103		__field(int, sysctl_rmem)
104		__field(int, rmem_alloc)
105		__field(int, sysctl_wmem)
106		__field(int, wmem_alloc)
107		__field(int, wmem_queued)
108		__field(int, kind)
109	),
110
111	TP_fast_assign(
112		strncpy(__entry->name, prot->name, 32);
113		__entry->sysctl_mem[0] = READ_ONCE(prot->sysctl_mem[0]);
114		__entry->sysctl_mem[1] = READ_ONCE(prot->sysctl_mem[1]);
115		__entry->sysctl_mem[2] = READ_ONCE(prot->sysctl_mem[2]);
116		__entry->allocated = allocated;
117		__entry->sysctl_rmem = sk_get_rmem0(sk, prot);
118		__entry->rmem_alloc = atomic_read(&sk->sk_rmem_alloc);
119		__entry->sysctl_wmem = sk_get_wmem0(sk, prot);
120		__entry->wmem_alloc = refcount_read(&sk->sk_wmem_alloc);
121		__entry->wmem_queued = READ_ONCE(sk->sk_wmem_queued);
122		__entry->kind = kind;
123	),
124
125	TP_printk("proto:%s sysctl_mem=%ld,%ld,%ld allocated=%ld sysctl_rmem=%d rmem_alloc=%d sysctl_wmem=%d wmem_alloc=%d wmem_queued=%d kind=%s",
126		__entry->name,
127		__entry->sysctl_mem[0],
128		__entry->sysctl_mem[1],
129		__entry->sysctl_mem[2],
130		__entry->allocated,
131		__entry->sysctl_rmem,
132		__entry->rmem_alloc,
133		__entry->sysctl_wmem,
134		__entry->wmem_alloc,
135		__entry->wmem_queued,
136		show_skmem_kind_names(__entry->kind)
137	)
138);
139
140TRACE_EVENT(inet_sock_set_state,
141
142	TP_PROTO(const struct sock *sk, const int oldstate, const int newstate),
143
144	TP_ARGS(sk, oldstate, newstate),
145
146	TP_STRUCT__entry(
147		__field(const void *, skaddr)
148		__field(int, oldstate)
149		__field(int, newstate)
150		__field(__u16, sport)
151		__field(__u16, dport)
152		__field(__u16, family)
153		__field(__u16, protocol)
154		__array(__u8, saddr, 4)
155		__array(__u8, daddr, 4)
156		__array(__u8, saddr_v6, 16)
157		__array(__u8, daddr_v6, 16)
158	),
159
160	TP_fast_assign(
161		const struct inet_sock *inet = inet_sk(sk);
162		struct in6_addr *pin6;
163		__be32 *p32;
164
165		__entry->skaddr = sk;
166		__entry->oldstate = oldstate;
167		__entry->newstate = newstate;
168
169		__entry->family = sk->sk_family;
170		__entry->protocol = sk->sk_protocol;
171		__entry->sport = ntohs(inet->inet_sport);
172		__entry->dport = ntohs(inet->inet_dport);
173
174		p32 = (__be32 *) __entry->saddr;
175		*p32 = inet->inet_saddr;
176
177		p32 = (__be32 *) __entry->daddr;
178		*p32 =  inet->inet_daddr;
179
180#if IS_ENABLED(CONFIG_IPV6)
181		if (sk->sk_family == AF_INET6) {
182			pin6 = (struct in6_addr *)__entry->saddr_v6;
183			*pin6 = sk->sk_v6_rcv_saddr;
184			pin6 = (struct in6_addr *)__entry->daddr_v6;
185			*pin6 = sk->sk_v6_daddr;
186		} else
187#endif
188		{
189			pin6 = (struct in6_addr *)__entry->saddr_v6;
190			ipv6_addr_set_v4mapped(inet->inet_saddr, pin6);
191			pin6 = (struct in6_addr *)__entry->daddr_v6;
192			ipv6_addr_set_v4mapped(inet->inet_daddr, pin6);
193		}
194	),
195
196	TP_printk("family=%s protocol=%s sport=%hu dport=%hu saddr=%pI4 daddr=%pI4 saddrv6=%pI6c daddrv6=%pI6c oldstate=%s newstate=%s",
197			show_family_name(__entry->family),
198			show_inet_protocol_name(__entry->protocol),
199			__entry->sport, __entry->dport,
200			__entry->saddr, __entry->daddr,
201			__entry->saddr_v6, __entry->daddr_v6,
202			show_tcp_state_name(__entry->oldstate),
203			show_tcp_state_name(__entry->newstate))
204);
205
206TRACE_EVENT(inet_sk_error_report,
207
208	TP_PROTO(const struct sock *sk),
209
210	TP_ARGS(sk),
211
212	TP_STRUCT__entry(
213		__field(int, error)
214		__field(__u16, sport)
215		__field(__u16, dport)
216		__field(__u16, family)
217		__field(__u16, protocol)
218		__array(__u8, saddr, 4)
219		__array(__u8, daddr, 4)
220		__array(__u8, saddr_v6, 16)
221		__array(__u8, daddr_v6, 16)
222	),
223
224	TP_fast_assign(
225		const struct inet_sock *inet = inet_sk(sk);
226		struct in6_addr *pin6;
227		__be32 *p32;
228
229		__entry->error = sk->sk_err;
230		__entry->family = sk->sk_family;
231		__entry->protocol = sk->sk_protocol;
232		__entry->sport = ntohs(inet->inet_sport);
233		__entry->dport = ntohs(inet->inet_dport);
234
235		p32 = (__be32 *) __entry->saddr;
236		*p32 = inet->inet_saddr;
237
238		p32 = (__be32 *) __entry->daddr;
239		*p32 =  inet->inet_daddr;
240
241#if IS_ENABLED(CONFIG_IPV6)
242		if (sk->sk_family == AF_INET6) {
243			pin6 = (struct in6_addr *)__entry->saddr_v6;
244			*pin6 = sk->sk_v6_rcv_saddr;
245			pin6 = (struct in6_addr *)__entry->daddr_v6;
246			*pin6 = sk->sk_v6_daddr;
247		} else
248#endif
249		{
250			pin6 = (struct in6_addr *)__entry->saddr_v6;
251			ipv6_addr_set_v4mapped(inet->inet_saddr, pin6);
252			pin6 = (struct in6_addr *)__entry->daddr_v6;
253			ipv6_addr_set_v4mapped(inet->inet_daddr, pin6);
254		}
255	),
256
257	TP_printk("family=%s protocol=%s sport=%hu dport=%hu saddr=%pI4 daddr=%pI4 saddrv6=%pI6c daddrv6=%pI6c error=%d",
258		  show_family_name(__entry->family),
259		  show_inet_protocol_name(__entry->protocol),
260		  __entry->sport, __entry->dport,
261		  __entry->saddr, __entry->daddr,
262		  __entry->saddr_v6, __entry->daddr_v6,
263		  __entry->error)
264);
265
266TRACE_EVENT(sk_data_ready,
267
268	TP_PROTO(const struct sock *sk),
269
270	TP_ARGS(sk),
271
272	TP_STRUCT__entry(
273		__field(const void *, skaddr)
274		__field(__u16, family)
275		__field(__u16, protocol)
276		__field(unsigned long, ip)
277	),
278
279	TP_fast_assign(
280		__entry->skaddr = sk;
281		__entry->family = sk->sk_family;
282		__entry->protocol = sk->sk_protocol;
283		__entry->ip = _RET_IP_;
284	),
285
286	TP_printk("family=%u protocol=%u func=%ps",
287		  __entry->family, __entry->protocol, (void *)__entry->ip)
288);
289
290/*
291 * sock send/recv msg length
292 */
293DECLARE_EVENT_CLASS(sock_msg_length,
294
295	TP_PROTO(struct sock *sk, int ret, int flags),
296
297	TP_ARGS(sk, ret, flags),
298
299	TP_STRUCT__entry(
300		__field(void *, sk)
301		__field(__u16, family)
302		__field(__u16, protocol)
303		__field(int, ret)
304		__field(int, flags)
305	),
306
307	TP_fast_assign(
308		__entry->sk = sk;
309		__entry->family = sk->sk_family;
310		__entry->protocol = sk->sk_protocol;
311		__entry->ret = ret;
312		__entry->flags = flags;
313	),
314
315	TP_printk("sk address = %p, family = %s protocol = %s, length = %d, error = %d, flags = 0x%x",
316		  __entry->sk, show_family_name(__entry->family),
317		  show_inet_protocol_name(__entry->protocol),
318		  !(__entry->flags & MSG_PEEK) ?
319		  (__entry->ret > 0 ? __entry->ret : 0) : 0,
320		  __entry->ret < 0 ? __entry->ret : 0,
321		  __entry->flags)
322);
323
324DEFINE_EVENT(sock_msg_length, sock_send_length,
325	TP_PROTO(struct sock *sk, int ret, int flags),
326
327	TP_ARGS(sk, ret, flags)
328);
329
330DEFINE_EVENT(sock_msg_length, sock_recv_length,
331	TP_PROTO(struct sock *sk, int ret, int flags),
332
333	TP_ARGS(sk, ret, flags)
334);
335#endif /* _TRACE_SOCK_H */
336
337/* This part must be outside protection */
338#include <trace/define_trace.h>
339