1 // SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB 2 3 /** 4 * ibumad BPF sample kernel side 5 * 6 * This program is free software; you can redistribute it and/or 7 * modify it under the terms of version 2 of the GNU General Public 8 * License as published by the Free Software Foundation. 9 * 10 * Copyright(c) 2018 Ira Weiny, Intel Corporation 11 */ 12 13 #define KBUILD_MODNAME "ibumad_count_pkts_by_class" 14 #include <uapi/linux/bpf.h> 15 16 #include "bpf_helpers.h" 17 18 19 struct bpf_map_def SEC("maps") read_count = { 20 .type = BPF_MAP_TYPE_ARRAY, 21 .key_size = sizeof(u32), /* class; u32 required */ 22 .value_size = sizeof(u64), /* count of mads read */ 23 .max_entries = 256, /* Room for all Classes */ 24 }; 25 26 struct bpf_map_def SEC("maps") write_count = { 27 .type = BPF_MAP_TYPE_ARRAY, 28 .key_size = sizeof(u32), /* class; u32 required */ 29 .value_size = sizeof(u64), /* count of mads written */ 30 .max_entries = 256, /* Room for all Classes */ 31 }; 32 33 #undef DEBUG 34 #ifndef DEBUG 35 #undef bpf_printk 36 #define bpf_printk(fmt, ...) 37 #endif 38 39 /* Taken from the current format defined in 40 * include/trace/events/ib_umad.h 41 * and 42 * /sys/kernel/debug/tracing/events/ib_umad/ib_umad_read/format 43 * /sys/kernel/debug/tracing/events/ib_umad/ib_umad_write/format 44 */ 45 struct ib_umad_rw_args { 46 u64 pad; 47 u8 port_num; 48 u8 sl; 49 u8 path_bits; 50 u8 grh_present; 51 u32 id; 52 u32 status; 53 u32 timeout_ms; 54 u32 retires; 55 u32 length; 56 u32 qpn; 57 u32 qkey; 58 u8 gid_index; 59 u8 hop_limit; 60 u16 lid; 61 u16 attr_id; 62 u16 pkey_index; 63 u8 base_version; 64 u8 mgmt_class; 65 u8 class_version; 66 u8 method; 67 u32 flow_label; 68 u16 mad_status; 69 u16 class_specific; 70 u32 attr_mod; 71 u64 tid; 72 u8 gid[16]; 73 u32 dev_index; 74 u8 traffic_class; 75 }; 76 77 SEC("tracepoint/ib_umad/ib_umad_read_recv") 78 int on_ib_umad_read_recv(struct ib_umad_rw_args *ctx) 79 { 80 u64 zero = 0, *val; 81 u8 class = ctx->mgmt_class; 82 83 bpf_printk("ib_umad read recv : class 0x%x\n", class); 84 85 val = bpf_map_lookup_elem(&read_count, &class); 86 if (!val) { 87 bpf_map_update_elem(&read_count, &class, &zero, BPF_NOEXIST); 88 val = bpf_map_lookup_elem(&read_count, &class); 89 if (!val) 90 return 0; 91 } 92 93 (*val) += 1; 94 95 return 0; 96 } 97 SEC("tracepoint/ib_umad/ib_umad_read_send") 98 int on_ib_umad_read_send(struct ib_umad_rw_args *ctx) 99 { 100 u64 zero = 0, *val; 101 u8 class = ctx->mgmt_class; 102 103 bpf_printk("ib_umad read send : class 0x%x\n", class); 104 105 val = bpf_map_lookup_elem(&read_count, &class); 106 if (!val) { 107 bpf_map_update_elem(&read_count, &class, &zero, BPF_NOEXIST); 108 val = bpf_map_lookup_elem(&read_count, &class); 109 if (!val) 110 return 0; 111 } 112 113 (*val) += 1; 114 115 return 0; 116 } 117 SEC("tracepoint/ib_umad/ib_umad_write") 118 int on_ib_umad_write(struct ib_umad_rw_args *ctx) 119 { 120 u64 zero = 0, *val; 121 u8 class = ctx->mgmt_class; 122 123 bpf_printk("ib_umad write : class 0x%x\n", class); 124 125 val = bpf_map_lookup_elem(&write_count, &class); 126 if (!val) { 127 bpf_map_update_elem(&write_count, &class, &zero, BPF_NOEXIST); 128 val = bpf_map_lookup_elem(&write_count, &class); 129 if (!val) 130 return 0; 131 } 132 133 (*val) += 1; 134 135 return 0; 136 } 137 138 char _license[] SEC("license") = "GPL"; 139