Received: by 2002:ab2:3c46:0:b0:1f5:f2ab:c469 with SMTP id x6csp133637lqf; Fri, 26 Apr 2024 01:47:58 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUacpknbmRLS+93kE7flUIjgB8oJAH3G0zn7F3qNQyFRF8E5U/la/E0EEXV/Ju5nXTxrl+kqz2IzwAXh6840KlYYaCF9Q7p/GTqSPMdOQ== X-Google-Smtp-Source: AGHT+IFxmXb6CABNkAizUiB0l2kbefC4Ep17ie3xAiDCQByFvp3/spNWoQmuFzKQRqYu9JVknVl5 X-Received: by 2002:a17:906:f597:b0:a55:ac7c:4321 with SMTP id cm23-20020a170906f59700b00a55ac7c4321mr2506329ejd.49.1714121278331; Fri, 26 Apr 2024 01:47:58 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714121278; cv=pass; d=google.com; s=arc-20160816; b=eaFAEuAmtqz6K+rEbsuz45ycvjIh+OrxbuGWA2nrvv6Nt1jojE2a3iVGpk6wG3rAJk /QxLVSviiCqVRqYD+yyUNKt8qr5dNWefn5amxsmqD2PWBpVBeESN657/mijFmJK3giuS xOAk5Uyhept0zDW+UNzddLOoDTYpQKjpnTAVI9QFH2yWI9nYWnXMjYXjSo+j0TAN3I6/ 0vLYKUOGjh7xvBwk7jDg+j4E/uFovGYwAIiaHI1/uhlGUCX4CTVWfeegu/K398JJmWoG DD1LELj8jKszBYU9gyibabuqjTGDnmRyvIlZxURhbnYqkxO/m4JldOWG/B+v1zXK54DG ycbw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=subject:cc:to:from:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:message-id:date; bh=jNGcnlgHFWeUzkjpD40HYPamJ2eUXDRJdrfvROHmeaA=; fh=JtRd6/ST2xb5P7yUq96RAcdeHI5tvl+67+gxAvlvnRM=; b=Jy+G3SArGicwND5VQ1Rxh6smD7MEaf/SlC89JLp+95hieLIv5IHlQ1ctaoWLsJL8Vv vBOVRjfW234htr7n3rc2v+w6JLm+TAMKTF6GZlws073XHugDKRlp3csmorsxK2Cd9CoL opYS2uTSL4pDVRTiZ3tQfHKXpddXWOOaxl1ZeFakbsoqsv8NXFfri0v0jt65f4MRPl6O rT55BPwV6GsXAktMW2GwiJ/x1wekLzuITsL8O3rB4JdWfXbINMoXenCSoMhpUVnqBy++ GrMIZbp1OYJtKB484Xzuhy64XJtDT7q+4EhJzb2SkNBRNEW7MAazdXlJ0BFDb5TgxsL0 7iYA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=zte.com.cn dmarc=pass fromdomain=zte.com.cn); spf=pass (google.com: domain of linux-kernel+bounces-159728-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-159728-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zte.com.cn Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id w2-20020a1709064a0200b00a58c01ff9a9si1229636eju.190.2024.04.26.01.47.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Apr 2024 01:47:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-159728-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=zte.com.cn dmarc=pass fromdomain=zte.com.cn); spf=pass (google.com: domain of linux-kernel+bounces-159728-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-159728-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zte.com.cn Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 9BECE1F22E33 for ; Fri, 26 Apr 2024 08:47:57 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id EF3A313C9DE; Fri, 26 Apr 2024 08:47:46 +0000 (UTC) Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E82DB824BF; Fri, 26 Apr 2024 08:47:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=63.216.63.40 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714121266; cv=none; b=IEWvtSNh2ZuUe6gIjA3FVdd2KfRF9gRZMxmetj/GUWJE11yuSwMluqP228PqImWRe37V3d/QIzH19Ik+4hFTEqJfU3tKibWTpjmCnjTytM4YddrI6/mZKgCuxvqHB+gspKCIpQ8BTx0gxy3ji1sy7Z8qQ+Cp8/rSaHKc3RrJyBw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714121266; c=relaxed/simple; bh=O4/T0KRw5R2JMe0k80iQwjtkniGyjmNE4Eiy0c2NTD8=; h=Date:Message-ID:Mime-Version:From:To:Cc:Subject:Content-Type; b=i7TZudtLJC/9jX7djAORFQDwejGAFbai1FmBBR1i2UFAQGzEZdOtlnWFzH658QvOHrVqay+0gRN0sEgpURhvgrwsXxIbRqX5KHYDWyWYuSZeZ5SZw0XnEqvEdPXtvPXvOvRlNVMSP/YTKQAbn/UfP5JmVAihgr7Uvna6ozqRhhg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zte.com.cn; spf=pass smtp.mailfrom=zte.com.cn; arc=none smtp.client-ip=63.216.63.40 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=zte.com.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zte.com.cn Received: from mse-fl1.zte.com.cn (unknown [10.5.228.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4VQmZL601kz8XrS3; Fri, 26 Apr 2024 16:47:38 +0800 (CST) Received: from xaxapp02.zte.com.cn ([10.88.97.241]) by mse-fl1.zte.com.cn with SMTP id 43Q8lRx3052680; Fri, 26 Apr 2024 16:47:27 +0800 (+08) (envelope-from xu.xin16@zte.com.cn) Received: from mapi (xaxapp01[null]) by mapi (Zmail) with MAPI id mid32; Fri, 26 Apr 2024 16:47:30 +0800 (CST) Date: Fri, 26 Apr 2024 16:47:30 +0800 (CST) X-Zmail-TransId: 2af9662b6a22ffffffffe58-1483b X-Mailer: Zmail v1.0 Message-ID: <20240426164730214uXfxoyj3x703nsAdqnGSr@zte.com.cn> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 From: To: Cc: , , , , , , , , , , , , , , , Subject: =?UTF-8?B?W1BBVENIIG5ldC1uZXh0IHY3XSBuZXQvaXB2NDogYWRkIHRyYWNlcG9pbnQgZm9yIGljbXBfc2VuZA==?= Content-Type: text/plain; charset="UTF-8" X-MAIL:mse-fl1.zte.com.cn 43Q8lRx3052680 X-Fangmail-Anti-Spam-Filtered: true X-Fangmail-MID-QID: 662B6A2A.002/4VQmZL601kz8XrS3 From: Peilin He Introduce a tracepoint for icmp_send, which can help users to get more detail information conveniently when icmp abnormal events happen. 1. Giving an usecase example: ============================= When an application experiences packet loss due to an unreachable UDP destination port, the kernel will send an exception message through the icmp_send function. By adding a trace point for icmp_send, developers or system administrators can obtain detailed information about the UDP packet loss, including the type, code, source address, destination address, source port, and destination port. This facilitates the trouble-shooting of UDP packet loss issues especially for those network-service applications. 2. Operation Instructions: ========================== Switch to the tracing directory. cd /sys/kernel/tracing Filter for destination port unreachable. echo "type==3 && code==3" > events/icmp/icmp_send/filter Enable trace event. echo 1 > events/icmp/icmp_send/enable 3. Result View: ================ udp_client_erro-11370 [002] ...s.12 124.728002: icmp_send: icmp_send: type=3, code=3. From 127.0.0.1:41895 to 127.0.0.1:6666 ulen=23 skbaddr=00000000589b167a Change log: =========== v6->v7: Some fixes according to https://lore.kernel.org/all/20240425081210.720a4cd9@kernel.org/ 1. Fix patch format issues. v5->v6: Some fixes according to https://lore.kernel.org/all/20240413161319.GA853376@kernel.org/ 1.Resubmit patches based on the latest net-next code. v4->v5: Some fixes according to https://lore.kernel.org/all/CAL+tcoDeXXh+zcRk4PHnUk8ELnx=CE2pc Cqs7sFm0y9aK-Eehg@mail.gmail.com/ 1.Adjust the position of trace_icmp_send() to before icmp_push_reply(). v3->v4: Some fixes according to https://lore.kernel.org/all/CANn89i+EFEr7VHXNdOi59Ba_R1nFKSBJz BzkJFVgCTdXBx=YBg@mail.gmail.com/ 1.Add legality check for UDP header in SKB. 2.Target this patch for net-next. v2->v3: Some fixes according to https://lore.kernel.org/all/20240319102549.7f7f6f53@gandalf.local.home/ 1. Change the tracking directory to/sys/kernel/tracking. 2. Adjust the layout of the TP-STRUCT_entry parameter structure. v1->v2: Some fixes according to https://lore.kernel.org/all/CANn89iL-y9e_VFpdw=sZtRnKRu_tnUwqHu FQTJvJsv-nz1xPDw@mail.gmail.com/ 1. adjust the trace_icmp_send() to more protocols than UDP. 2. move the calling of trace_icmp_send after sanity checks in __icmp_send(). Signed-off-by: Peilin He Signed-off-by: xu xin Reviewed-by: Yunkai Zhang Cc: Yang Yang Cc: Liu Chun Cc: Xuexin Jiang --- include/trace/events/icmp.h | 68 +++++++++++++++++++++++++++++++++++++ net/ipv4/icmp.c | 4 +++ 2 files changed, 72 insertions(+) create mode 100644 include/trace/events/icmp.h diff --git a/include/trace/events/icmp.h b/include/trace/events/icmp.h new file mode 100644 index 000000000000..cff33aaee44e --- /dev/null +++ b/include/trace/events/icmp.h @@ -0,0 +1,68 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#undef TRACE_SYSTEM +#define TRACE_SYSTEM icmp + +#if !defined(_TRACE_ICMP_H) || defined(TRACE_HEADER_MULTI_READ) +#define _TRACE_ICMP_H + +#include +#include + +TRACE_EVENT(icmp_send, + + TP_PROTO(const struct sk_buff *skb, int type, int code), + + TP_ARGS(skb, type, code), + + TP_STRUCT__entry( + __field(const void *, skbaddr) + __field(int, type) + __field(int, code) + __array(__u8, saddr, 4) + __array(__u8, daddr, 4) + __field(__u16, sport) + __field(__u16, dport) + __field(unsigned short, ulen) + ), + + TP_fast_assign( + struct iphdr *iph = ip_hdr(skb); + int proto_4 = iph->protocol; + __be32 *p32; + + __entry->skbaddr = skb; + __entry->type = type; + __entry->code = code; + + struct udphdr *uh = udp_hdr(skb); + + if (proto_4 != IPPROTO_UDP || (u8 *)uh < skb->head || + (u8 *)uh + sizeof(struct udphdr) + > skb_tail_pointer(skb)) { + __entry->sport = 0; + __entry->dport = 0; + __entry->ulen = 0; + } else { + __entry->sport = ntohs(uh->source); + __entry->dport = ntohs(uh->dest); + __entry->ulen = ntohs(uh->len); + } + + p32 = (__be32 *) __entry->saddr; + *p32 = iph->saddr; + + p32 = (__be32 *) __entry->daddr; + *p32 = iph->daddr; + ), + + TP_printk("icmp_send: type=%d, code=%d. From %pI4:%u to %pI4:%u ulen=%d skbaddr=%p", + __entry->type, __entry->code, + __entry->saddr, __entry->sport, __entry->daddr, + __entry->dport, __entry->ulen, __entry->skbaddr) +); + +#endif /* _TRACE_ICMP_H */ + +/* This part must be outside protection */ +#include + diff --git a/net/ipv4/icmp.c b/net/ipv4/icmp.c index 8cebb476b3ab..30b302492613 100644 --- a/net/ipv4/icmp.c +++ b/net/ipv4/icmp.c @@ -92,6 +92,8 @@ #include #include #include +#define CREATE_TRACE_POINTS +#include /* * Build xmit assembly blocks @@ -762,6 +764,8 @@ void __icmp_send(struct sk_buff *skb_in, int type, int code, __be32 info, if (!fl4.saddr) fl4.saddr = htonl(INADDR_DUMMY); + trace_icmp_send(skb_in, type, code); + icmp_push_reply(sk, &icmp_param, &fl4, &ipc, &rt); ende: ip_rt_put(rt); -- 2.17.1