dwatch(1): Add profile for send(2)/recv(2) syscalls

Sponsored by:	Smule, Inc.
This commit is contained in:
Devin Teske 2018-04-22 02:36:06 +00:00
parent bcce9a2b33
commit f3cf700b57
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=332866
2 changed files with 223 additions and 0 deletions

View File

@ -11,6 +11,7 @@ FILES= chmod \
proc \
rw \
sched \
sendrecv \
tcp \
udp \
vop_create \
@ -54,6 +55,12 @@ LINKS+= ${LIBEXECDIR}/dwatch/sched ${LIBEXECDIR}/dwatch/sched-sleep
LINKS+= ${LIBEXECDIR}/dwatch/sched ${LIBEXECDIR}/dwatch/sched-surrender
LINKS+= ${LIBEXECDIR}/dwatch/sched ${LIBEXECDIR}/dwatch/sched-tick
LINKS+= ${LIBEXECDIR}/dwatch/sched ${LIBEXECDIR}/dwatch/sched-wakeup
LINKS+= ${LIBEXECDIR}/dwatch/sendrecv ${LIBEXECDIR}/dwatch/recv
LINKS+= ${LIBEXECDIR}/dwatch/sendrecv ${LIBEXECDIR}/dwatch/recvfrom
LINKS+= ${LIBEXECDIR}/dwatch/sendrecv ${LIBEXECDIR}/dwatch/recvmsg
LINKS+= ${LIBEXECDIR}/dwatch/sendrecv ${LIBEXECDIR}/dwatch/send
LINKS+= ${LIBEXECDIR}/dwatch/sendrecv ${LIBEXECDIR}/dwatch/sendmsg
LINKS+= ${LIBEXECDIR}/dwatch/sendrecv ${LIBEXECDIR}/dwatch/sendto
LINKS+= ${LIBEXECDIR}/dwatch/tcp ${LIBEXECDIR}/dwatch/tcp-accept
LINKS+= ${LIBEXECDIR}/dwatch/tcp ${LIBEXECDIR}/dwatch/tcp-accept-established
LINKS+= ${LIBEXECDIR}/dwatch/tcp ${LIBEXECDIR}/dwatch/tcp-accept-refused

View File

@ -0,0 +1,216 @@
# -*- tab-width: 4 -*- ;; Emacs
# vi: set filetype=sh tabstop=8 shiftwidth=8 noexpandtab :: Vi/ViM
############################################################ IDENT(1)
#
# $Title: dwatch(8) module for send(2)/recv(2) $
# $Copyright: 2014-2018 Devin Teske. All rights reserved. $
# $FreeBSD$
#
############################################################ DESCRIPTION
#
# Print details from send(2)/recv(2)
#
############################################################ PROBE
case "$PROFILE" in
sendrecv)
: ${PROBE:=$( echo \
syscall::recvfrom:return, \
syscall::recvmsg:return, \
syscall::sendmsg:entry, \
syscall::sendto:entry )} ;;
send)
: ${PROBE:=$( echo \
syscall::sendmsg:entry, \
syscall::sendto:entry )} ;;
recv)
: ${PROBE:=$( echo \
syscall::recvfrom:return, \
syscall::recvmsg:return )} ;;
*)
: ${PROBE:=syscall::$PROFILE}
esac
############################################################ EVENT ACTION
#[ "$CUSTOM_TEST" ] || EVENT_TEST="this->from != NULL"
############################################################ ACTIONS
exec 9<<EOF
typedef struct sainfo {
sa_family_t sa_family;
uint16_t port;
string addr;
string family;
} sainfo_t;
/*
* Address families from <sys/socket.h>
*/
#pragma D binding "1.13" address_family_string
inline string address_family_string[sa_family_t af] =
af == AF_UNSPEC ? "AF_UNSPEC" :
af == AF_LOCAL ? "AF_UNIX" :
af == AF_UNIX ? "AF_UNIX" :
af == AF_INET ? "AF_INET" :
af == AF_IMPLINK ? "AF_IMPLINK" :
af == AF_PUP ? "AF_PUP" :
af == AF_CHAOS ? "AF_CHAOS" :
af == AF_NETBIOS ? "AF_NETBIOS" :
af == AF_ISO ? "AF_ISO" :
af == AF_OSI ? "AF_ISO" :
af == AF_ECMA ? "AF_ECMA" :
af == AF_DATAKIT ? "AF_DATAKIT" :
af == AF_CCITT ? "AF_CCITT" :
af == AF_SNA ? "AF_SNA" :
af == AF_DECnet ? "AF_DECnet" :
af == AF_DLI ? "AF_DLI" :
af == AF_LAT ? "AF_LAT" :
af == AF_HYLINK ? "AF_HYLINK" :
af == AF_APPLETALK ? "AF_APPLETALK" :
af == AF_ROUTE ? "AF_ROUTE" :
af == AF_LINK ? "AF_LINK" :
af == pseudo_AF_XTP ? "pseudo_AF_XTP" :
af == AF_COIP ? "AF_COIP" :
af == AF_CNT ? "AF_CNT" :
af == pseudo_AF_RTIP ? "pseudo_AF_RTIP" :
af == AF_IPX ? "AF_IPX" :
af == AF_SIP ? "AF_SIP" :
af == pseudo_AF_PIP ? "pseudo_AF_PIP" :
af == AF_ISDN ? "AF_ISDN" :
af == AF_E164 ? "AF_ISDN" :
af == pseudo_AF_KEY ? "pseudo_AF_KEY" :
af == AF_INET6 ? "AF_INET6" :
af == AF_NATM ? "AF_NATM" :
af == AF_ATM ? "AF_ATM" :
af == pseudo_AF_HDRCMPLT ? "pseudo_AF_HDRCMPLT" :
af == AF_NETGRAPH ? "AF_NETGRAPH" :
af == AF_SLOW ? "AF_SLOW" :
af == AF_SCLUSTER ? "AF_SCLUSTER" :
af == AF_ARP ? "AF_ARP" :
af == AF_BLUETOOTH ? "AF_BLUETOOTH" :
af == AF_IEEE80211 ? "AF_IEEE80211" :
af == AF_INET_SDP ? "AF_INET_SDP" :
af == AF_INET6_SDP ? "AF_INET6_SDP" :
af == AF_MAX ? "AF_MAX" :
strjoin("AF_UNKNOWN(", strjoin(lltostr(af), ")"));
#pragma D binding "1.13" sa_data_size
inline int sa_data_size = 14;
#pragma D binding "1.13" sa_data_addr
inline string sa_data_addr[sa_family_t af, char data[sa_data_size]] =
af == AF_INET ? strjoin(
strjoin(strjoin(lltostr(data[2] & 0xFF), "."),
strjoin(lltostr(data[3] & 0xFF), ".")
),
strjoin(strjoin(lltostr(data[4] & 0xFF), "."),
lltostr(data[5] & 0xFF))
) :
"";
#pragma D binding "1.13" sa_data_port
inline uint16_t sa_data_port[sa_family_t af, char data[sa_data_size]] =
af == AF_INET ? (data[0] << 8) + data[1] :
0;
#pragma D binding "1.13" translator
translator sainfo_t < struct sockaddr *SA > {
sa_family = SA->sa_family;
family = address_family_string[SA->sa_family];
addr = sa_data_addr[SA->sa_family, SA->sa_data];
port = sa_data_port[SA->sa_family, SA->sa_data];
};
this sainfo_t sainfo;
this ssize_t nbytes;
this string details;
this string flow;
this struct msghdr * msghdr;
this struct sockaddr * sa;
inline string probeflow[string func] =
func == "recvfrom" ? "<-" :
func == "recvmsg" ? "<-" :
func == "recvmmsg" ? "<-" :
"->";
inline string af_details[sa_family_t af, string addr, uint16_t port] =
af == AF_INET ? strjoin(addr, strjoin(":", lltostr(port))) :
"";
$PROBE /* probe ID $ID */
{${TRACE:+
printf("<$ID>");}
this->details = "";
this->flow = probeflow[probefunc];
}
syscall::recvfrom:entry /* probe ID $(( $ID + 1 )) */
{${TRACE:+
printf("<$(( $ID + 1 ))>");}
this->sa = args[4] == NULL ?
(struct sockaddr *)alloca(sizeof(struct sockaddr)) :
(struct sockaddr *)copyin(arg4, sizeof(struct sockaddr));
this->sainfo = xlate <sainfo_t> ((struct sockaddr *)this->sa);
printf("missing closing paren\n";
}
syscall::recvfrom:return /* probe ID $(( $ID + 2 )) */
{${TRACE:+
printf("<$(( $ID + 2 ))>");}
this->nbytes = arg0;
this->details = strjoin("from ", strjoin(
strjoin(this->sainfo.family, " "),
af_details[this->sainfo.sa_family,
this->sainfo.addr, this->sainfo.port]));
}
syscall::recvmsg:return /* probe ID $(( $ID + 3 )) */
{${TRACE:+
printf("<$(( $ID + 3 ))>");}
this->nbytes = arg0;
}
syscall::sendmsg:entry /* probe ID $(( $ID + 5 )) */
{${TRACE:+
printf("<$(( $ID + 5 ))>");}
this->nbytes = arg2;
}
syscall::sendto:entry /* probe ID $(( $ID + 4 )) */
{${TRACE:+
printf("<$(( $ID + 4 ))>");}
this->nbytes = arg2;
this->sa = arg4 == NULL ?
(struct sockaddr *)alloca(sizeof(struct sockaddr)) :
(struct sockaddr *)copyin(arg4, sizeof(struct sockaddr));
this->sainfo = xlate <sainfo_t> ((struct sockaddr *)this->sa);
this->details = strjoin("to ", strjoin(
strjoin(this->sainfo.family, " "),
af_details[this->sainfo.sa_family,
this->sainfo.addr, this->sainfo.port]));
}
EOF
ACTIONS=$( cat <&9 )
ID=$(( $ID + 5 ))
############################################################ EVENT DETAILS
exec 9<<EOF
/*
* Print socket details
*/
printf("%s %d byte%s%s%s",
this->flow,
this->nbytes,
this->nbytes != 1 ? "s" : "",
this->details != "" ? " " : "",
this->details);
EOF
EVENT_DETAILS=$( cat <&9 )
################################################################################
# END
################################################################################