Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | // SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB /* * ibumad BPF sample kernel side * * This program is free software; you can redistribute it and/or * modify it under the terms of version 2 of the GNU General Public * License as published by the Free Software Foundation. * * Copyright(c) 2018 Ira Weiny, Intel Corporation */ #define KBUILD_MODNAME "ibumad_count_pkts_by_class" #include <uapi/linux/bpf.h> #include <bpf/bpf_helpers.h> struct { __uint(type, BPF_MAP_TYPE_ARRAY); __type(key, u32); /* class; u32 required */ __type(value, u64); /* count of mads read */ __uint(max_entries, 256); /* Room for all Classes */ } read_count SEC(".maps"); struct { __uint(type, BPF_MAP_TYPE_ARRAY); __type(key, u32); /* class; u32 required */ __type(value, u64); /* count of mads written */ __uint(max_entries, 256); /* Room for all Classes */ } write_count SEC(".maps"); #undef DEBUG #ifndef DEBUG #undef bpf_printk #define bpf_printk(fmt, ...) #endif /* Taken from the current format defined in * include/trace/events/ib_umad.h * and * /sys/kernel/debug/tracing/events/ib_umad/ib_umad_read/format * /sys/kernel/debug/tracing/events/ib_umad/ib_umad_write/format */ struct ib_umad_rw_args { u64 pad; u8 port_num; u8 sl; u8 path_bits; u8 grh_present; u32 id; u32 status; u32 timeout_ms; u32 retires; u32 length; u32 qpn; u32 qkey; u8 gid_index; u8 hop_limit; u16 lid; u16 attr_id; u16 pkey_index; u8 base_version; u8 mgmt_class; u8 class_version; u8 method; u32 flow_label; u16 mad_status; u16 class_specific; u32 attr_mod; u64 tid; u8 gid[16]; u32 dev_index; u8 traffic_class; }; SEC("tracepoint/ib_umad/ib_umad_read_recv") int on_ib_umad_read_recv(struct ib_umad_rw_args *ctx) { u64 zero = 0, *val; u8 class = ctx->mgmt_class; bpf_printk("ib_umad read recv : class 0x%x\n", class); val = bpf_map_lookup_elem(&read_count, &class); if (!val) { bpf_map_update_elem(&read_count, &class, &zero, BPF_NOEXIST); val = bpf_map_lookup_elem(&read_count, &class); if (!val) return 0; } (*val) += 1; return 0; } SEC("tracepoint/ib_umad/ib_umad_read_send") int on_ib_umad_read_send(struct ib_umad_rw_args *ctx) { u64 zero = 0, *val; u8 class = ctx->mgmt_class; bpf_printk("ib_umad read send : class 0x%x\n", class); val = bpf_map_lookup_elem(&read_count, &class); if (!val) { bpf_map_update_elem(&read_count, &class, &zero, BPF_NOEXIST); val = bpf_map_lookup_elem(&read_count, &class); if (!val) return 0; } (*val) += 1; return 0; } SEC("tracepoint/ib_umad/ib_umad_write") int on_ib_umad_write(struct ib_umad_rw_args *ctx) { u64 zero = 0, *val; u8 class = ctx->mgmt_class; bpf_printk("ib_umad write : class 0x%x\n", class); val = bpf_map_lookup_elem(&write_count, &class); if (!val) { bpf_map_update_elem(&write_count, &class, &zero, BPF_NOEXIST); val = bpf_map_lookup_elem(&write_count, &class); if (!val) return 0; } (*val) += 1; return 0; } char _license[] SEC("license") = "GPL"; |