From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5EC3EC433E0 for ; Tue, 26 Jan 2021 19:45:31 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2DEE32223D for ; Tue, 26 Jan 2021 19:45:31 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727300AbhAZFfi (ORCPT ); Tue, 26 Jan 2021 00:35:38 -0500 Received: from mga09.intel.com ([134.134.136.24]:41202 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726595AbhAYJig (ORCPT ); Mon, 25 Jan 2021 04:38:36 -0500 IronPort-SDR: ASoREU6ukpVF7wfocjwxtsTVudg6TolpaW93z00mK576Dk+BvnAcB0APJSuZpNIY058dMjp+DS wXqyyCIYD0pw== X-IronPort-AV: E=McAfee;i="6000,8403,9874"; a="179844612" X-IronPort-AV: E=Sophos;i="5.79,373,1602572400"; d="scan'208";a="179844612" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Jan 2021 01:37:15 -0800 IronPort-SDR: 4Fvt0DGGKPJu5JpC2pAWxs4YEZDmcehtCE/wRF8RGgJ8JjsWrd0V+8Ui6dOinxVsPv9RRmP1vq 0Dmz6yR8P0SQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.79,373,1602572400"; d="scan'208";a="577320988" Received: from silpixa00399839.ir.intel.com (HELO localhost.localdomain) ([10.237.222.142]) by fmsmga005.fm.intel.com with ESMTP; 25 Jan 2021 01:37:14 -0800 From: Ciara Loftus To: netdev@vger.kernel.org, bpf@vger.kernel.org, magnus.karlsson@intel.com, bjorn@kernel.org, weqaar.a.janjua@intel.com Cc: Ciara Loftus Subject: [PATCH bpf-next 0/6] AF_XDP Packet Drop Tracing Date: Mon, 25 Jan 2021 09:07:33 +0000 Message-Id: <20210125090739.1045-1-ciara.loftus@intel.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org This series introduces tracing infrastructure for AF_XDP sockets (xsks). A trace event 'xsk_packet_drop' is created which can be enabled by toggling /sys/kernel/debug/tracing/events/xsk/xsk_packet_drop/enable When enabled and packets are dropped in the kernel, traces are generated which describe the reason for the packet drop as well as the netdev and qid information of the xsk which encountered the drop. Example traces: 507.588563: xsk_packet_drop: netdev: eth0 qid 0 reason: rxq full 507.588567: xsk_packet_drop: netdev: eth0 qid 0 reason: packet too big 507.588568: xsk_packet_drop: netdev: eth0 qid 0 reason: fq empty The event can also be monitored using perf: perf stat -a -e xsk:xsk_packet_drop Three selftests are added which each ensure the appropriate traces are generated for the following scenarios: * rx queue full * packet too big * fill queue empty Ciara Loftus (6): xsk: add tracepoints for packet drops selftests/bpf: restructure setting the packet count selftests/bpf: add framework for xsk selftests selftests/bpf: XSK_TRACE_DROP_RXQ_FULL test selftests/bpf: XSK_TRACE_DROP_PKT_TOO_BIG test selftests/bpf: XSK_TRACE_DROP_FQ_EMPTY test MAINTAINERS | 1 + include/linux/bpf_trace.h | 1 + include/trace/events/xsk.h | 45 +++++ include/uapi/linux/if_xdp.h | 8 + kernel/bpf/core.c | 1 + net/xdp/xsk.c | 5 + net/xdp/xsk_buff_pool.c | 8 +- tools/include/uapi/linux/if_xdp.h | 8 + tools/testing/selftests/bpf/test_xsk.sh | 90 +++++++++- tools/testing/selftests/bpf/xdpxceiver.c | 186 +++++++++++++++++++-- tools/testing/selftests/bpf/xdpxceiver.h | 10 ++ tools/testing/selftests/bpf/xsk_prereqs.sh | 3 +- 12 files changed, 344 insertions(+), 22 deletions(-) create mode 100644 include/trace/events/xsk.h -- 2.17.1