OpenCloudOS-Kernel/include/trace/events/ib_mad.h

386 lines
12 KiB
C
Raw Normal View History

/* SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB */
/*
* Copyright (c) 2018 Intel Corporation. All rights reserved.
*/
#undef TRACE_SYSTEM
#define TRACE_SYSTEM ib_mad
#if !defined(_TRACE_IB_MAD_H) || defined(TRACE_HEADER_MULTI_READ)
#define _TRACE_IB_MAD_H
#include <linux/tracepoint.h>
#include <rdma/ib_mad.h>
#ifdef CONFIG_TRACEPOINTS
struct trace_event_raw_ib_mad_send_template;
static void create_mad_addr_info(struct ib_mad_send_wr_private *mad_send_wr,
struct ib_mad_qp_info *qp_info,
struct trace_event_raw_ib_mad_send_template *entry);
#endif
DECLARE_EVENT_CLASS(ib_mad_send_template,
TP_PROTO(struct ib_mad_send_wr_private *wr,
struct ib_mad_qp_info *qp_info),
TP_ARGS(wr, qp_info),
TP_STRUCT__entry(
__field(u8, base_version)
__field(u8, mgmt_class)
__field(u8, class_version)
__field(u8, port_num)
__field(u32, qp_num)
__field(u8, method)
__field(u8, sl)
__field(u16, attr_id)
__field(u32, attr_mod)
__field(u64, wrtid)
__field(u64, tid)
__field(u16, status)
__field(u16, class_specific)
__field(u32, length)
__field(u32, dlid)
__field(u32, rqpn)
__field(u32, rqkey)
__field(u32, dev_index)
__field(void *, agent_priv)
__field(unsigned long, timeout)
__field(int, retries_left)
__field(int, max_retries)
__field(int, retry)
),
TP_fast_assign(
__entry->dev_index = wr->mad_agent_priv->agent.device->index;
__entry->port_num = wr->mad_agent_priv->agent.port_num;
__entry->qp_num = wr->mad_agent_priv->qp_info->qp->qp_num;
__entry->agent_priv = wr->mad_agent_priv;
__entry->wrtid = wr->tid;
__entry->max_retries = wr->max_retries;
__entry->retries_left = wr->retries_left;
__entry->retry = wr->retry;
__entry->timeout = wr->timeout;
__entry->length = wr->send_buf.hdr_len +
wr->send_buf.data_len;
__entry->base_version =
((struct ib_mad_hdr *)wr->send_buf.mad)->base_version;
__entry->mgmt_class =
((struct ib_mad_hdr *)wr->send_buf.mad)->mgmt_class;
__entry->class_version =
((struct ib_mad_hdr *)wr->send_buf.mad)->class_version;
__entry->method =
((struct ib_mad_hdr *)wr->send_buf.mad)->method;
__entry->status =
((struct ib_mad_hdr *)wr->send_buf.mad)->status;
__entry->class_specific =
((struct ib_mad_hdr *)wr->send_buf.mad)->class_specific;
__entry->tid = ((struct ib_mad_hdr *)wr->send_buf.mad)->tid;
__entry->attr_id =
((struct ib_mad_hdr *)wr->send_buf.mad)->attr_id;
__entry->attr_mod =
((struct ib_mad_hdr *)wr->send_buf.mad)->attr_mod;
create_mad_addr_info(wr, qp_info, __entry);
),
TP_printk("%d:%d QP%d agent %p: " \
"wrtid 0x%llx; %d/%d retries(%d); timeout %lu length %d : " \
"hdr : base_ver 0x%x class 0x%x class_ver 0x%x " \
"method 0x%x status 0x%x class_specific 0x%x tid 0x%llx " \
"attr_id 0x%x attr_mod 0x%x => dlid 0x%08x sl %d "\
IB/mad: Don't call to function that might sleep while in atomic context Tracepoints are not allowed to sleep, as such the following splat is generated due to call to ib_query_pkey() in atomic context. WARNING: CPU: 0 PID: 1888000 at kernel/trace/ring_buffer.c:2492 rb_commit+0xc1/0x220 CPU: 0 PID: 1888000 Comm: kworker/u9:0 Kdump: loaded Tainted: G OE --------- - - 4.18.0-305.3.1.el8.x86_64 #1 Hardware name: Red Hat KVM, BIOS 1.13.0-2.module_el8.3.0+555+a55c8938 04/01/2014 Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core] RIP: 0010:rb_commit+0xc1/0x220 RSP: 0000:ffffa8ac80f9bca0 EFLAGS: 00010202 RAX: ffff8951c7c01300 RBX: ffff8951c7c14a00 RCX: 0000000000000246 RDX: ffff8951c707c000 RSI: ffff8951c707c57c RDI: ffff8951c7c14a00 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: ffff8951c7c01300 R11: 0000000000000001 R12: 0000000000000246 R13: 0000000000000000 R14: ffffffff964c70c0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8951fbc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f20e8f39010 CR3: 000000002ca10005 CR4: 0000000000170ef0 Call Trace: ring_buffer_unlock_commit+0x1d/0xa0 trace_buffer_unlock_commit_regs+0x3b/0x1b0 trace_event_buffer_commit+0x67/0x1d0 trace_event_raw_event_ib_mad_recv_done_handler+0x11c/0x160 [ib_core] ib_mad_recv_done+0x48b/0xc10 [ib_core] ? trace_event_raw_event_cq_poll+0x6f/0xb0 [ib_core] __ib_process_cq+0x91/0x1c0 [ib_core] ib_cq_poll_work+0x26/0x80 [ib_core] process_one_work+0x1a7/0x360 ? create_worker+0x1a0/0x1a0 worker_thread+0x30/0x390 ? create_worker+0x1a0/0x1a0 kthread+0x116/0x130 ? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x35/0x40 ---[ end trace 78ba8509d3830a16 ]--- Fixes: 821bf1de45a1 ("IB/MAD: Add recv path trace point") Signed-off-by: Leonid Ravich <lravich@gmail.com> Link: https://lore.kernel.org/r/Y2t5feomyznrVj7V@leonid-Inspiron-3421 Signed-off-by: Leon Romanovsky <leon@kernel.org>
2022-11-09 17:57:17 +08:00
"rpqn 0x%x rqpkey 0x%x",
__entry->dev_index, __entry->port_num, __entry->qp_num,
__entry->agent_priv, be64_to_cpu(__entry->wrtid),
__entry->retries_left, __entry->max_retries,
__entry->retry, __entry->timeout, __entry->length,
__entry->base_version, __entry->mgmt_class,
__entry->class_version,
__entry->method, be16_to_cpu(__entry->status),
be16_to_cpu(__entry->class_specific),
be64_to_cpu(__entry->tid), be16_to_cpu(__entry->attr_id),
be32_to_cpu(__entry->attr_mod),
IB/mad: Don't call to function that might sleep while in atomic context Tracepoints are not allowed to sleep, as such the following splat is generated due to call to ib_query_pkey() in atomic context. WARNING: CPU: 0 PID: 1888000 at kernel/trace/ring_buffer.c:2492 rb_commit+0xc1/0x220 CPU: 0 PID: 1888000 Comm: kworker/u9:0 Kdump: loaded Tainted: G OE --------- - - 4.18.0-305.3.1.el8.x86_64 #1 Hardware name: Red Hat KVM, BIOS 1.13.0-2.module_el8.3.0+555+a55c8938 04/01/2014 Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core] RIP: 0010:rb_commit+0xc1/0x220 RSP: 0000:ffffa8ac80f9bca0 EFLAGS: 00010202 RAX: ffff8951c7c01300 RBX: ffff8951c7c14a00 RCX: 0000000000000246 RDX: ffff8951c707c000 RSI: ffff8951c707c57c RDI: ffff8951c7c14a00 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: ffff8951c7c01300 R11: 0000000000000001 R12: 0000000000000246 R13: 0000000000000000 R14: ffffffff964c70c0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8951fbc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f20e8f39010 CR3: 000000002ca10005 CR4: 0000000000170ef0 Call Trace: ring_buffer_unlock_commit+0x1d/0xa0 trace_buffer_unlock_commit_regs+0x3b/0x1b0 trace_event_buffer_commit+0x67/0x1d0 trace_event_raw_event_ib_mad_recv_done_handler+0x11c/0x160 [ib_core] ib_mad_recv_done+0x48b/0xc10 [ib_core] ? trace_event_raw_event_cq_poll+0x6f/0xb0 [ib_core] __ib_process_cq+0x91/0x1c0 [ib_core] ib_cq_poll_work+0x26/0x80 [ib_core] process_one_work+0x1a7/0x360 ? create_worker+0x1a0/0x1a0 worker_thread+0x30/0x390 ? create_worker+0x1a0/0x1a0 kthread+0x116/0x130 ? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x35/0x40 ---[ end trace 78ba8509d3830a16 ]--- Fixes: 821bf1de45a1 ("IB/MAD: Add recv path trace point") Signed-off-by: Leonid Ravich <lravich@gmail.com> Link: https://lore.kernel.org/r/Y2t5feomyznrVj7V@leonid-Inspiron-3421 Signed-off-by: Leon Romanovsky <leon@kernel.org>
2022-11-09 17:57:17 +08:00
be32_to_cpu(__entry->dlid), __entry->sl,
__entry->rqpn, __entry->rqkey
)
);
DEFINE_EVENT(ib_mad_send_template, ib_mad_error_handler,
TP_PROTO(struct ib_mad_send_wr_private *wr,
struct ib_mad_qp_info *qp_info),
TP_ARGS(wr, qp_info));
DEFINE_EVENT(ib_mad_send_template, ib_mad_ib_send_mad,
TP_PROTO(struct ib_mad_send_wr_private *wr,
struct ib_mad_qp_info *qp_info),
TP_ARGS(wr, qp_info));
DEFINE_EVENT(ib_mad_send_template, ib_mad_send_done_resend,
TP_PROTO(struct ib_mad_send_wr_private *wr,
struct ib_mad_qp_info *qp_info),
TP_ARGS(wr, qp_info));
TRACE_EVENT(ib_mad_send_done_handler,
TP_PROTO(struct ib_mad_send_wr_private *wr, struct ib_wc *wc),
TP_ARGS(wr, wc),
TP_STRUCT__entry(
__field(u8, port_num)
__field(u8, base_version)
__field(u8, mgmt_class)
__field(u8, class_version)
__field(u32, qp_num)
__field(u64, wrtid)
__field(u16, status)
__field(u16, wc_status)
__field(u32, length)
__field(void *, agent_priv)
__field(unsigned long, timeout)
__field(u32, dev_index)
__field(int, retries_left)
__field(int, max_retries)
__field(int, retry)
__field(u8, method)
),
TP_fast_assign(
__entry->dev_index = wr->mad_agent_priv->agent.device->index;
__entry->port_num = wr->mad_agent_priv->agent.port_num;
__entry->qp_num = wr->mad_agent_priv->qp_info->qp->qp_num;
__entry->agent_priv = wr->mad_agent_priv;
__entry->wrtid = wr->tid;
__entry->max_retries = wr->max_retries;
__entry->retries_left = wr->retries_left;
__entry->retry = wr->retry;
__entry->timeout = wr->timeout;
__entry->base_version =
((struct ib_mad_hdr *)wr->send_buf.mad)->base_version;
__entry->mgmt_class =
((struct ib_mad_hdr *)wr->send_buf.mad)->mgmt_class;
__entry->class_version =
((struct ib_mad_hdr *)wr->send_buf.mad)->class_version;
__entry->method =
((struct ib_mad_hdr *)wr->send_buf.mad)->method;
__entry->status =
((struct ib_mad_hdr *)wr->send_buf.mad)->status;
__entry->wc_status = wc->status;
__entry->length = wc->byte_len;
),
TP_printk("%d:%d QP%d : SEND WC Status %d : agent %p: " \
"wrtid 0x%llx %d/%d retries(%d) timeout %lu length %d: " \
"hdr : base_ver 0x%x class 0x%x class_ver 0x%x " \
"method 0x%x status 0x%x",
__entry->dev_index, __entry->port_num, __entry->qp_num,
__entry->wc_status,
__entry->agent_priv, be64_to_cpu(__entry->wrtid),
__entry->retries_left, __entry->max_retries,
__entry->retry, __entry->timeout,
__entry->length,
__entry->base_version, __entry->mgmt_class,
__entry->class_version, __entry->method,
be16_to_cpu(__entry->status)
)
);
TRACE_EVENT(ib_mad_recv_done_handler,
TP_PROTO(struct ib_mad_qp_info *qp_info, struct ib_wc *wc,
struct ib_mad_hdr *mad_hdr),
TP_ARGS(qp_info, wc, mad_hdr),
TP_STRUCT__entry(
__field(u8, base_version)
__field(u8, mgmt_class)
__field(u8, class_version)
__field(u8, port_num)
__field(u32, qp_num)
__field(u16, status)
__field(u16, class_specific)
__field(u32, length)
__field(u64, tid)
__field(u8, method)
__field(u8, sl)
__field(u16, attr_id)
__field(u32, attr_mod)
__field(u16, src_qp)
__field(u16, wc_status)
__field(u32, slid)
__field(u32, dev_index)
),
TP_fast_assign(
__entry->dev_index = qp_info->port_priv->device->index;
__entry->port_num = qp_info->port_priv->port_num;
__entry->qp_num = qp_info->qp->qp_num;
__entry->length = wc->byte_len;
__entry->base_version = mad_hdr->base_version;
__entry->mgmt_class = mad_hdr->mgmt_class;
__entry->class_version = mad_hdr->class_version;
__entry->method = mad_hdr->method;
__entry->status = mad_hdr->status;
__entry->class_specific = mad_hdr->class_specific;
__entry->tid = mad_hdr->tid;
__entry->attr_id = mad_hdr->attr_id;
__entry->attr_mod = mad_hdr->attr_mod;
__entry->slid = wc->slid;
__entry->src_qp = wc->src_qp;
__entry->sl = wc->sl;
__entry->wc_status = wc->status;
),
TP_printk("%d:%d QP%d : RECV WC Status %d : length %d : hdr : " \
"base_ver 0x%02x class 0x%02x class_ver 0x%02x " \
"method 0x%02x status 0x%04x class_specific 0x%04x " \
"tid 0x%016llx attr_id 0x%04x attr_mod 0x%08x " \
IB/mad: Don't call to function that might sleep while in atomic context Tracepoints are not allowed to sleep, as such the following splat is generated due to call to ib_query_pkey() in atomic context. WARNING: CPU: 0 PID: 1888000 at kernel/trace/ring_buffer.c:2492 rb_commit+0xc1/0x220 CPU: 0 PID: 1888000 Comm: kworker/u9:0 Kdump: loaded Tainted: G OE --------- - - 4.18.0-305.3.1.el8.x86_64 #1 Hardware name: Red Hat KVM, BIOS 1.13.0-2.module_el8.3.0+555+a55c8938 04/01/2014 Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core] RIP: 0010:rb_commit+0xc1/0x220 RSP: 0000:ffffa8ac80f9bca0 EFLAGS: 00010202 RAX: ffff8951c7c01300 RBX: ffff8951c7c14a00 RCX: 0000000000000246 RDX: ffff8951c707c000 RSI: ffff8951c707c57c RDI: ffff8951c7c14a00 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: ffff8951c7c01300 R11: 0000000000000001 R12: 0000000000000246 R13: 0000000000000000 R14: ffffffff964c70c0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8951fbc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f20e8f39010 CR3: 000000002ca10005 CR4: 0000000000170ef0 Call Trace: ring_buffer_unlock_commit+0x1d/0xa0 trace_buffer_unlock_commit_regs+0x3b/0x1b0 trace_event_buffer_commit+0x67/0x1d0 trace_event_raw_event_ib_mad_recv_done_handler+0x11c/0x160 [ib_core] ib_mad_recv_done+0x48b/0xc10 [ib_core] ? trace_event_raw_event_cq_poll+0x6f/0xb0 [ib_core] __ib_process_cq+0x91/0x1c0 [ib_core] ib_cq_poll_work+0x26/0x80 [ib_core] process_one_work+0x1a7/0x360 ? create_worker+0x1a0/0x1a0 worker_thread+0x30/0x390 ? create_worker+0x1a0/0x1a0 kthread+0x116/0x130 ? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x35/0x40 ---[ end trace 78ba8509d3830a16 ]--- Fixes: 821bf1de45a1 ("IB/MAD: Add recv path trace point") Signed-off-by: Leonid Ravich <lravich@gmail.com> Link: https://lore.kernel.org/r/Y2t5feomyznrVj7V@leonid-Inspiron-3421 Signed-off-by: Leon Romanovsky <leon@kernel.org>
2022-11-09 17:57:17 +08:00
"slid 0x%08x src QP%d, sl %d",
__entry->dev_index, __entry->port_num, __entry->qp_num,
__entry->wc_status,
__entry->length,
__entry->base_version, __entry->mgmt_class,
__entry->class_version, __entry->method,
be16_to_cpu(__entry->status),
be16_to_cpu(__entry->class_specific),
be64_to_cpu(__entry->tid), be16_to_cpu(__entry->attr_id),
be32_to_cpu(__entry->attr_mod),
IB/mad: Don't call to function that might sleep while in atomic context Tracepoints are not allowed to sleep, as such the following splat is generated due to call to ib_query_pkey() in atomic context. WARNING: CPU: 0 PID: 1888000 at kernel/trace/ring_buffer.c:2492 rb_commit+0xc1/0x220 CPU: 0 PID: 1888000 Comm: kworker/u9:0 Kdump: loaded Tainted: G OE --------- - - 4.18.0-305.3.1.el8.x86_64 #1 Hardware name: Red Hat KVM, BIOS 1.13.0-2.module_el8.3.0+555+a55c8938 04/01/2014 Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core] RIP: 0010:rb_commit+0xc1/0x220 RSP: 0000:ffffa8ac80f9bca0 EFLAGS: 00010202 RAX: ffff8951c7c01300 RBX: ffff8951c7c14a00 RCX: 0000000000000246 RDX: ffff8951c707c000 RSI: ffff8951c707c57c RDI: ffff8951c7c14a00 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: ffff8951c7c01300 R11: 0000000000000001 R12: 0000000000000246 R13: 0000000000000000 R14: ffffffff964c70c0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8951fbc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f20e8f39010 CR3: 000000002ca10005 CR4: 0000000000170ef0 Call Trace: ring_buffer_unlock_commit+0x1d/0xa0 trace_buffer_unlock_commit_regs+0x3b/0x1b0 trace_event_buffer_commit+0x67/0x1d0 trace_event_raw_event_ib_mad_recv_done_handler+0x11c/0x160 [ib_core] ib_mad_recv_done+0x48b/0xc10 [ib_core] ? trace_event_raw_event_cq_poll+0x6f/0xb0 [ib_core] __ib_process_cq+0x91/0x1c0 [ib_core] ib_cq_poll_work+0x26/0x80 [ib_core] process_one_work+0x1a7/0x360 ? create_worker+0x1a0/0x1a0 worker_thread+0x30/0x390 ? create_worker+0x1a0/0x1a0 kthread+0x116/0x130 ? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x35/0x40 ---[ end trace 78ba8509d3830a16 ]--- Fixes: 821bf1de45a1 ("IB/MAD: Add recv path trace point") Signed-off-by: Leonid Ravich <lravich@gmail.com> Link: https://lore.kernel.org/r/Y2t5feomyznrVj7V@leonid-Inspiron-3421 Signed-off-by: Leon Romanovsky <leon@kernel.org>
2022-11-09 17:57:17 +08:00
__entry->slid, __entry->src_qp, __entry->sl
)
);
DECLARE_EVENT_CLASS(ib_mad_agent_template,
TP_PROTO(struct ib_mad_agent_private *agent),
TP_ARGS(agent),
TP_STRUCT__entry(
__field(u32, dev_index)
__field(u32, hi_tid)
__field(u8, port_num)
__field(u8, mgmt_class)
__field(u8, mgmt_class_version)
),
TP_fast_assign(
__entry->dev_index = agent->agent.device->index;
__entry->port_num = agent->agent.port_num;
__entry->hi_tid = agent->agent.hi_tid;
if (agent->reg_req) {
__entry->mgmt_class = agent->reg_req->mgmt_class;
__entry->mgmt_class_version =
agent->reg_req->mgmt_class_version;
} else {
__entry->mgmt_class = 0;
__entry->mgmt_class_version = 0;
}
),
TP_printk("%d:%d mad agent : hi_tid 0x%08x class 0x%02x class_ver 0x%02x",
__entry->dev_index, __entry->port_num,
__entry->hi_tid, __entry->mgmt_class,
__entry->mgmt_class_version
)
);
DEFINE_EVENT(ib_mad_agent_template, ib_mad_recv_done_agent,
TP_PROTO(struct ib_mad_agent_private *agent),
TP_ARGS(agent));
DEFINE_EVENT(ib_mad_agent_template, ib_mad_send_done_agent,
TP_PROTO(struct ib_mad_agent_private *agent),
TP_ARGS(agent));
DEFINE_EVENT(ib_mad_agent_template, ib_mad_create_agent,
TP_PROTO(struct ib_mad_agent_private *agent),
TP_ARGS(agent));
DEFINE_EVENT(ib_mad_agent_template, ib_mad_unregister_agent,
TP_PROTO(struct ib_mad_agent_private *agent),
TP_ARGS(agent));
DECLARE_EVENT_CLASS(ib_mad_opa_smi_template,
TP_PROTO(struct opa_smp *smp),
TP_ARGS(smp),
TP_STRUCT__entry(
__field(u64, mkey)
__field(u32, dr_slid)
__field(u32, dr_dlid)
__field(u8, hop_ptr)
__field(u8, hop_cnt)
__array(u8, initial_path, OPA_SMP_MAX_PATH_HOPS)
__array(u8, return_path, OPA_SMP_MAX_PATH_HOPS)
),
TP_fast_assign(
__entry->hop_ptr = smp->hop_ptr;
__entry->hop_cnt = smp->hop_cnt;
__entry->mkey = smp->mkey;
__entry->dr_slid = smp->route.dr.dr_slid;
__entry->dr_dlid = smp->route.dr.dr_dlid;
memcpy(__entry->initial_path, smp->route.dr.initial_path,
OPA_SMP_MAX_PATH_HOPS);
memcpy(__entry->return_path, smp->route.dr.return_path,
OPA_SMP_MAX_PATH_HOPS);
),
TP_printk("OPA SMP: hop_ptr %d hop_cnt %d " \
"mkey 0x%016llx dr_slid 0x%08x dr_dlid 0x%08x " \
"initial_path %*ph return_path %*ph ",
__entry->hop_ptr, __entry->hop_cnt,
be64_to_cpu(__entry->mkey), be32_to_cpu(__entry->dr_slid),
be32_to_cpu(__entry->dr_dlid),
OPA_SMP_MAX_PATH_HOPS, __entry->initial_path,
OPA_SMP_MAX_PATH_HOPS, __entry->return_path
)
);
DEFINE_EVENT(ib_mad_opa_smi_template, ib_mad_handle_opa_smi,
TP_PROTO(struct opa_smp *smp),
TP_ARGS(smp));
DEFINE_EVENT(ib_mad_opa_smi_template, ib_mad_handle_out_opa_smi,
TP_PROTO(struct opa_smp *smp),
TP_ARGS(smp));
DECLARE_EVENT_CLASS(ib_mad_opa_ib_template,
TP_PROTO(struct ib_smp *smp),
TP_ARGS(smp),
TP_STRUCT__entry(
__field(u64, mkey)
__field(u32, dr_slid)
__field(u32, dr_dlid)
__field(u8, hop_ptr)
__field(u8, hop_cnt)
__array(u8, initial_path, IB_SMP_MAX_PATH_HOPS)
__array(u8, return_path, IB_SMP_MAX_PATH_HOPS)
),
TP_fast_assign(
__entry->hop_ptr = smp->hop_ptr;
__entry->hop_cnt = smp->hop_cnt;
__entry->mkey = smp->mkey;
__entry->dr_slid = smp->dr_slid;
__entry->dr_dlid = smp->dr_dlid;
memcpy(__entry->initial_path, smp->initial_path,
IB_SMP_MAX_PATH_HOPS);
memcpy(__entry->return_path, smp->return_path,
IB_SMP_MAX_PATH_HOPS);
),
TP_printk("OPA SMP: hop_ptr %d hop_cnt %d " \
"mkey 0x%016llx dr_slid 0x%04x dr_dlid 0x%04x " \
"initial_path %*ph return_path %*ph ",
__entry->hop_ptr, __entry->hop_cnt,
be64_to_cpu(__entry->mkey), be16_to_cpu(__entry->dr_slid),
be16_to_cpu(__entry->dr_dlid),
IB_SMP_MAX_PATH_HOPS, __entry->initial_path,
IB_SMP_MAX_PATH_HOPS, __entry->return_path
)
);
DEFINE_EVENT(ib_mad_opa_ib_template, ib_mad_handle_ib_smi,
TP_PROTO(struct ib_smp *smp),
TP_ARGS(smp));
DEFINE_EVENT(ib_mad_opa_ib_template, ib_mad_handle_out_ib_smi,
TP_PROTO(struct ib_smp *smp),
TP_ARGS(smp));
#endif /* _TRACE_IB_MAD_H */
#include <trace/define_trace.h>