Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp514723rwe; Fri, 26 Aug 2022 09:04:13 -0700 (PDT) X-Google-Smtp-Source: AA6agR5ra/h4pOkmOAD6ZTaXSBvZKzuW20XB5omA3S+2cgfGyZAth01ayTkemuXnGhYsB43hwAXv X-Received: by 2002:a17:907:8a07:b0:731:48ba:792e with SMTP id sc7-20020a1709078a0700b0073148ba792emr5901969ejc.397.1661529853350; Fri, 26 Aug 2022 09:04:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661529853; cv=none; d=google.com; s=arc-20160816; b=LsQqdl2cbKCDO2As2YZXgZzDVW9jtuouUV1fhb80B4sT0j3z7PDE7+OVksOdvR3ZbM sMERX+x74jDexxnbwAr4lsDdkmekiwAI4lkmkZZofhcBA8m/Lt5kruLveOgkPOOi80dd 6l+vTBEPMasc7s8Hl39k7mwKkPWvJ30wkyMHm/CAyjBgch5pYVhJ6HBsCT5O+MoAfZwU q5d2VgUOkZ/p6o7oCjo9Nq8LBmNDYqHLIZz7PR1/+lL0kQs9jZ/Jax/71qVNZGQreZuo DbWnkgibTIlDyG3z6eNzvKYxMBgKfMXocD7CFtYiOdvfPTcXQ8gNijiLoMZVKQq6ELER YyYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=GOx9VDj9pQ5veFkcKEMKqs9UCGqeT9EMjFD6y+j9jHU=; b=VJ4hTEQOWNYfGJroXIbr9pi5Y+HR0gvsIo9tcwwRwiXNv6E0Gtmvk8Osto53pDMvbt Q3nCuk++x1qx/3C/OofkqFMxB8O4QtFZGIEfleWVT/KKvmXucS6LYTFx0Ke0PZZWdxuY m/94oc0Q31u7OWVTgz907RHNE5/lUPtC02FIrAsGpLw16Lj3gQhB3sreSsj/zdumijd+ 5DvLht0DTFVf4F9k6rAsgmbduBIXuEjaAKFF0MhrrzGdQmhT9xsaCAydlnfD2ro02nTW +pXjrpwgJ6PlIQi/3OIko2FdrSZ5COATJ49DEXTDdnqxs1BfnS/GwCBwoeL/KMtWUt/o Uouw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=EhLnmTRT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e6-20020a056402190600b00447e34491basi1867995edz.429.2022.08.26.09.03.45; Fri, 26 Aug 2022 09:04:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=EhLnmTRT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344336AbiHZPoT (ORCPT + 99 others); Fri, 26 Aug 2022 11:44:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49708 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343602AbiHZPoR (ORCPT ); Fri, 26 Aug 2022 11:44:17 -0400 Received: from mail-pj1-x1042.google.com (mail-pj1-x1042.google.com [IPv6:2607:f8b0:4864:20::1042]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 289A6AF0CE for ; Fri, 26 Aug 2022 08:44:16 -0700 (PDT) Received: by mail-pj1-x1042.google.com with SMTP id m10-20020a17090a730a00b001fa986fd8eeso8466956pjk.0 for ; Fri, 26 Aug 2022 08:44:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=GOx9VDj9pQ5veFkcKEMKqs9UCGqeT9EMjFD6y+j9jHU=; b=EhLnmTRTI/TlsW305n3H3rn8wgpP77mrFddrWHWMqBxcyXUnE8ftZzmo3NQeSpKkMs xnip1kcG2bXtLIqUWhLfTLqip6ILwt0rvtGkbgygoatRKnHF7I2lYzAOxpMM58PDvFTV 7YThU/gPISCyUExZgmDv+7PeTNsGuaRLisOnn/8lWosY9+A7uOGFbLJn7Nua4PlBoq1S IPMY9t81tyqtd5F0Mo39MDPtkMU/EyuikN9M6+DZMiIhyQ1fRoFlfJat25ns+S4WFZb3 nlbhuQTu+7qBu3xFhTEwgROYIhbOeVCgfkhNmBjSBYMkW6p8haS3BhGyCL1G1nGsPVuI 2ErA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=GOx9VDj9pQ5veFkcKEMKqs9UCGqeT9EMjFD6y+j9jHU=; b=fw4HsVuk30GVAMrAaShPXl5DNZYc+oEGRxtal1ExW0WK8TVRuOZz5GOGCP9MT2T6X3 C1ib1+5SdLgOrbY+15EyOftZn14CdFabIlnlS9A8t3ztivTGu16tnIUbVsbWd2xRuffw 0n3feTlapEzHa5WZgevjgDiqEmPNfKpkyDyLo0D4UO1MPk9OF0JNlskMLG2uUjUBTmvE CwA3oAGOFNoHK9CQ68+uQl0Dguzb076FSoWuipQW1ff3tTDK4N72bdqRbRKBaYXrm96j N8+B5qiiZRhwrdl33dmomob7gi5WTqmYH95G0hHlrcEYckEWYyQ63eAzhtrfdSs0Azzm BPUw== X-Gm-Message-State: ACgBeo1UW1aw+jzaDCyfCRH+LMigkpHLW7Hg/RhgQdc+utGDbTs4Yzbv KS1bd0QJkSuyL5yXu578XqsSSOfieKy9edeP2dY= X-Received: by 2002:a17:902:bb94:b0:172:8fd9:7438 with SMTP id m20-20020a170902bb9400b001728fd97438mr4026889pls.174.1661528655643; Fri, 26 Aug 2022 08:44:15 -0700 (PDT) MIME-Version: 1.0 References: <20220825053738.476903-1-imagedong@tencent.com> In-Reply-To: From: Menglong Dong Date: Fri, 26 Aug 2022 23:44:04 +0800 Message-ID: Subject: Re: [PATCH net-next] net: skb: fix kfree_skb event output error in perf To: Eric Dumazet Cc: Steven Rostedt , Ingo Molnar , David Miller , Menglong Dong , David Ahern , Hao Peng , Dongli Zhang , LKML Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 26, 2022 at 11:07 PM Eric Dumazet wrote: > > > > On Thu, Aug 25, 2022 at 9:47 PM Menglong Dong wrote: >> >> On Thu, Aug 25, 2022 at 11:32 PM Eric Dumazet wrote: >> > >> > On Wed, Aug 24, 2022 at 10:37 PM wrote: >> > > >> > > From: Menglong Dong >> > > >> > > As Eric reported, the 'reason' field is not presented when trace the >> > > kfree_skb event by perf: >> > > >> > > $ perf record -e skb:kfree_skb -a sleep 10 >> > > $ perf script >> > > ip_defrag 14605 [021] 221.614303: skb:kfree_skb: >> > > skbaddr=0xffff9d2851242700 protocol=34525 location=0xffffffffa39346b1 >> > > reason: >> > > >> > > The cause seems to be passing kernel address directly to TP_printk(), >> > > which is not right. >> > >> > Why ? >> > >> >> I think it is because of how perf passes data to the user space. From >> what 'perf_output_sample()' do, we can know that perf passes the data >> of entry (with other data) to the user, and the user generates the output >> string from the format string (which can be obtained from >> /sys/kernel/debug/tracing/event/skb/kfree_skb/format) and the entry data. >> >> Therefore, perf can't get the string of drop reasons from the entry, only >> the enum. >> >> > It seems this adds an expensive copy of a string that should reside in >> > rodata section of vmlinux, thus can not disappear... >> > (Also the ring buffer entry will have a dynamic size ?) >> > >> >> It indeed will add additional cost, but it seems unavoidable. In the old >> version, __print_symbolic() is used, which will loop all the drop reason >> from a array and find corresponding string: >> >> TP_printk("skbaddr=%p protocol=%u location=%p reason: %s", >> __entry->skbaddr, __entry->protocol, __entry->location, >> __print_symbolic(__entry->reason, >> TRACE_SKB_DROP_REASON)) >> >> And I think the cost of coping strings may be less than this loop? as the >> drop reasons are getting more and more. > > > We are back to original feedback about all this stuff. > > Please measure the tax on a workload dropping 5,000,000 packets per second > when/if a "perf -e skb:kfree_skb" is attempted by a clueless admin :) > Okay, I'll do such a test. > If just using an integer instead of a string has a measurable impact, we probably should stick to an integer. > > kfree_skb tracing is really for experts, they probably can have a tool to understand what a particular integer value means. > > Then we can also make sure to only add new values to the end of the enum, to have stable integer values among different kernel versions. > In fact, this is exactly what I wanted to do. Users can get little information from the output of perf or ftrace for the kfree_skb event without a tools, such as dropwatch. I keep adding new values to the end of the enum. And I tried to make the enum as uapi, as user space tools need the enum to understand what the integer values mean. Hmm......that commit was rejected :) I'll do the test to see the impact between integer, string copy and __print_symbolic. Then we can decide the solutions. Thanks! Menglong Dong >> >> > trace_safe_str() is using is_kernel_rodata() which should return true >> > for drop_reasons[X] ? >> > >> > $ grep drop_reasons net/core/dropreason_str.c >> > const char * const drop_reasons[] = { >> > ... >> > >> > >> > >> > > >> > > Therefore, fix this by adding a '__string' field to the TP_STRUCT of >> > > kfree_skb, which is 'reason_str', and passing it to TP_printk(). >> > > >> > > (Not sure if we should still keep the 'reason' field in >> > > TP_STRUCT__entry) >> > >> > Maybe for event/trace filtering purposes ? >> > >> > > >> > > Reported-by: Eric Dumazet >> > > Signed-off-by: Menglong Dong >> > > --- >> > > include/trace/events/skb.h | 4 +++- >> > > 1 file changed, 3 insertions(+), 1 deletion(-) >> > > >> > > diff --git a/include/trace/events/skb.h b/include/trace/events/skb.h >> > > index 45264e4bb254..7235554141c3 100644 >> > > --- a/include/trace/events/skb.h >> > > +++ b/include/trace/events/skb.h >> > > @@ -24,6 +24,7 @@ TRACE_EVENT(kfree_skb, >> > > __field(void *, location) >> > > __field(unsigned short, protocol) >> > > __field(enum skb_drop_reason, reason) >> > > + __string(reason_str, drop_reasons[reason]) >> > > ), >> > > >> > > TP_fast_assign( >> > > @@ -31,11 +32,12 @@ TRACE_EVENT(kfree_skb, >> > > __entry->location = location; >> > > __entry->protocol = ntohs(skb->protocol); >> > > __entry->reason = reason; >> > > + __assign_str(reason_str, drop_reasons[reason]); >> > > ), >> > > >> > > TP_printk("skbaddr=%p protocol=%u location=%p reason: %s", >> > > __entry->skbaddr, __entry->protocol, __entry->location, >> > > - drop_reasons[__entry->reason]) >> > > + __get_str(reason_str)) >> > > ); >> > > >> > > TRACE_EVENT(consume_skb, >> > > -- >> > > 2.37.2 >> > >