Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp162829rwp; Wed, 12 Jul 2023 11:12:40 -0700 (PDT) X-Google-Smtp-Source: APBJJlF71NzNTruE1Fwe6NNDe8YmPPEBB+6dIaVliF8fmH+QbJenXexkSbD81Qh+EpfFxAq/omYM X-Received: by 2002:a17:906:224d:b0:994:19:133b with SMTP id 13-20020a170906224d00b009940019133bmr11145614ejr.14.1689185560045; Wed, 12 Jul 2023 11:12:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689185560; cv=none; d=google.com; s=arc-20160816; b=pdQSoHYvrx0Kl+N2m1LHo2gap6uaLXPoyiHG1Eh+9GEMGOl3z40j/uvP+TzX2wCjbj 2t/qjipwBkAg0KZJfrQfu+VUWJsUIzU9WK9jaFSNLdCIjDrT7nBGQVuIn+LbvQG8PREN vcYMiwhW3gLY4vUrVGfxpeYoV1NBGqWAz4FRJCX6+//zHWCTfyO1eOh4HsuVVtw/HQKW uKhhc0orzdfXOVTh9ZYvXMZm2G+hEa9fh89B85dVcyX0SVOfj/YAdnSnPw7I94fmeMgu mwTM33O45qNZg7Rg+azq14Xg9vqxujiBe2zAYwKq5W64yogq0ytZJNCRkV1eT7qmGGPv KNpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=F6Xa76p50rmyn0rz0iCXooHwIlnxMbt4DShA7EqkW84=; fh=T2Mt1RWAkDClZcYsv0iPsR/YFKG56uSYtPtrcZloEuw=; b=fTvVvQnXWOFMVVOMILSrQQwX4WU/canvHji1TdHTLFFhrsrAFtB4iOXB7DFW2Ggo5y 0/ZPRhS53OLPXmRVhl7igO/ElsdmlfR1tbZke4W93UPx0yh9vBoHLJoSwIg6dLCdGRS0 nh1mWECpc1OWpV/wfucZ59WzgNIG/8fZAP3YaD3my32JFCkWW3rcbGpID5Khq6LxvY2Z NWzvSbF0VYLRY+QaN6ubse3AsY8zoW+SzUi7KJCHlBRSxEegRW0WzgvawO4O+lQoCpfR jB/fk9UhHlFlHdR219fX4hGLlUQzlbTUAi83red+1+x4mnEycjoNx5e7zsfs9IrW1rQ+ dYYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=h54a7qPL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l8-20020a1709060e0800b00988b1c57f15si5197865eji.272.2023.07.12.11.12.15; Wed, 12 Jul 2023 11:12:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=h54a7qPL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231641AbjGLRmP (ORCPT + 99 others); Wed, 12 Jul 2023 13:42:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44986 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232117AbjGLRmO (ORCPT ); Wed, 12 Jul 2023 13:42:14 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 06256CF for ; Wed, 12 Jul 2023 10:42:13 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9811B617DF for ; Wed, 12 Jul 2023 17:42:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A3482C433C7; Wed, 12 Jul 2023 17:42:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689183732; bh=wG8UUXNP3lOA9oLQq/E55c0IUNpqh5X988ZONVpNi1w=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=h54a7qPL1C5+e+vdm81szDvXyNSBOWtx1CMu5QnsbncweaA9c6kZobdlNc0bbELxN fYgezlmaI09gWuV2meXrEroaPdAGaDvrH6yBkz6/z1I6nX2k1v/oTEOkoSPnKN8MEB e/Lb31yHKKIOrI7BX2UFWtHmal85yrJH+Qo2WgpA3QXENjfKIkyjYBRAnPm6NpipYM +0x+KtnveYOY5d0Aet1N4/zUElyO26VYyBZ8gJNOCQkiNCnak4b24ZIH1Pky8DAUZe 59VIIshp7XG3aLKahSfkXgzQykXSwGyYENUswAiZHKibY0g10kqwce2SJ9sN27CUrn jO+AielX9JudQ== Date: Wed, 12 Jul 2023 10:42:10 -0700 From: Jakub Kicinski To: Yan Zhai Cc: Ivan Babrou , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-team@cloudflare.com, Eric Dumazet , "David S. Miller" , Paolo Abeni , Steven Rostedt , Masami Hiramatsu , David Ahern Subject: Re: [RFC PATCH net-next] tcp: add a tracepoint for tcp_listen_queue_drop Message-ID: <20230712104210.3b86b779@kernel.org> In-Reply-To: References: <20230711043453.64095-1-ivan@cloudflare.com> <20230711193612.22c9bc04@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 12 Jul 2023 11:42:26 -0500 Yan Zhai wrote: > The issue with kfree_skb is not that it fires too frequently (not in > the 6.x kernel now). Rather, it is unable to locate the socket info > when a SYN is dropped due to the accept queue being full. The sk is > stolen upon inet lookup, e.g. in tcp_v4_rcv. This makes it unable to > tell in kfree_skb which socket a SYN skb is targeting (when TPROXY or > socket lookup are used). A tracepoint with sk information will be more > useful to monitor accurately which service/socket is involved. No doubt that kfree_skb isn't going to solve all our needs, but I'd really like you to clean up the unnecessary callers on your systems first, before adding further tracepoints. That way we'll have a clear picture of which points can be solved by kfree_skb and where we need further work.