| /* |
| ************************************************************************** |
| * Copyright (c) 2013-2017, The Linux Foundation. All rights reserved. |
| * Permission to use, copy, modify, and/or distribute this software for |
| * any purpose with or without fee is hereby granted, provided that the |
| * above copyright notice and this permission notice appear in all copies. |
| * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
| * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
| * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT |
| * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| ************************************************************************** |
| */ |
| |
| /* |
| * nss_stats.c |
| * NSS stats APIs |
| * |
| */ |
| |
| #include "nss_core.h" |
| #include "nss_dtls_stats.h" |
| #include "nss_gre_tunnel_stats.h" |
| |
| /* |
| * Maximum string length: |
| * This should be equal to maximum string size of any stats |
| * inclusive of stats value |
| */ |
| #define NSS_STATS_MAX_STR_LENGTH 96 |
| |
| extern int32_t nss_tx_rx_virt_if_copy_stats(int32_t if_num, int i, char *line); |
| |
| uint64_t stats_shadow_pppoe_except[NSS_PPPOE_NUM_SESSION_PER_INTERFACE][NSS_PPPOE_EXCEPTION_EVENT_MAX]; |
| |
| /* |
| * Private data for every file descriptor |
| */ |
| struct nss_stats_data { |
| uint32_t if_num; /**< Interface number for stats */ |
| uint32_t index; /**< Index for GRE_REDIR stats */ |
| uint32_t edma_id; /**< EDMA port ID or ring ID */ |
| }; |
| |
| /* |
| * Statistics structures |
| */ |
| |
| /* |
| * nss_stats_str_ipv4 |
| * IPv4 stats strings |
| */ |
| static int8_t *nss_stats_str_ipv4[NSS_STATS_IPV4_MAX] = { |
| "rx_pkts", |
| "rx_bytes", |
| "tx_pkts", |
| "tx_bytes", |
| "create_requests", |
| "create_collisions", |
| "create_invalid_interface", |
| "destroy_requests", |
| "destroy_misses", |
| "hash_hits", |
| "hash_reorders", |
| "flushes", |
| "evictions", |
| "fragmentations", |
| "mc_create_requests", |
| "mc_update_requests", |
| "mc_create_invalid_interface", |
| "mc_destroy_requests", |
| "mc_destroy_misses", |
| "mc_flushes", |
| }; |
| |
| /* |
| * nss_stats_str_ipv4_reasm |
| * IPv4 reassembly stats strings |
| */ |
| static int8_t *nss_stats_str_ipv4_reasm[NSS_STATS_IPV4_REASM_MAX] = { |
| "evictions", |
| "alloc_fails", |
| "timeouts", |
| }; |
| |
| /* |
| * nss_stats_str_ipv6 |
| * IPv6 stats strings |
| */ |
| static int8_t *nss_stats_str_ipv6[NSS_STATS_IPV6_MAX] = { |
| "rx_pkts", |
| "rx_bytes", |
| "tx_pkts", |
| "tx_bytes", |
| "create_requests", |
| "create_collisions", |
| "create_invalid_interface", |
| "destroy_requests", |
| "destroy_misses", |
| "hash_hits", |
| "hash_reorders", |
| "flushes", |
| "evictions", |
| "fragmentations", |
| "frag_fails", |
| "mc_create_requests", |
| "mc_update_requests", |
| "mc_create_invalid_interface", |
| "mc_destroy_requests", |
| "mc_destroy_misses", |
| "mc_flushes", |
| }; |
| |
| /* |
| * nss_stats_str_ipv6_reasm |
| * IPv6 reassembly stats strings |
| */ |
| static int8_t *nss_stats_str_ipv6_reasm[NSS_STATS_IPV6_REASM_MAX] = { |
| "alloc_fails", |
| "timeouts", |
| "discards", |
| }; |
| |
| /* |
| * nss_stats_str_n2h |
| * N2H stats strings |
| */ |
| static int8_t *nss_stats_str_n2h[NSS_STATS_N2H_MAX] = { |
| "queue_dropped", |
| "ticks", |
| "worst_ticks", |
| "iterations", |
| "pbuf_ocm_alloc_fails", |
| "pbuf_ocm_free_count", |
| "pbuf_ocm_total_count", |
| "pbuf_default_alloc_fails", |
| "pbuf_default_free_count", |
| "pbuf_default_total_count", |
| "payload_fails", |
| "payload_free_count", |
| "h2n_control_packets", |
| "h2n_control_bytes", |
| "n2h_control_packets", |
| "n2h_control_bytes", |
| "h2n_data_packets", |
| "h2n_data_bytes", |
| "n2h_data_packets", |
| "n2h_data_bytes", |
| "n2h_tot_payloads", |
| "n2h_data_interface_invalid", |
| }; |
| |
| /* |
| * nss_stats_str_lso_rx |
| * LSO_RX stats strings |
| */ |
| static int8_t *nss_stats_str_lso_rx[NSS_STATS_LSO_RX_MAX] = { |
| "tx_dropped", |
| "dropped", |
| "pbuf_alloc_fail", |
| "pbuf_reference_fail" |
| }; |
| |
| /* |
| * nss_stats_str_drv |
| * Host driver stats strings |
| */ |
| static int8_t *nss_stats_str_drv[NSS_STATS_DRV_MAX] = { |
| "nbuf_alloc_errors", |
| "tx_queue_full[0]", |
| "tx_queue_full[1]", |
| "tx_buffers_empty", |
| "tx_buffers_pkt", |
| "tx_buffers_cmd", |
| "tx_buffers_crypto", |
| "tx_buffers_reuse", |
| "rx_buffers_empty", |
| "rx_buffers_pkt", |
| "rx_buffers_cmd_resp", |
| "rx_buffers_status_sync", |
| "rx_buffers_crypto", |
| "rx_buffers_virtual", |
| "tx_skb_simple", |
| "tx_skb_nr_frags", |
| "tx_skb_fraglist", |
| "rx_skb_simple", |
| "rx_skb_nr_frags", |
| "rx_skb_fraglist", |
| "rx_bad_desciptor", |
| "nss_skb_count", |
| "rx_chain_seg_processed", |
| "rx_frag_seg_processed" |
| }; |
| |
| /* |
| * nss_stats_str_pppoe |
| * PPPoE stats strings |
| */ |
| static int8_t *nss_stats_str_pppoe[NSS_STATS_PPPOE_MAX] = { |
| "create_requests", |
| "create_failures", |
| "destroy_requests", |
| "destroy_misses" |
| }; |
| |
| /* |
| * nss_stats_str_gmac |
| * GMAC stats strings |
| */ |
| static int8_t *nss_stats_str_gmac[NSS_STATS_GMAC_MAX] = { |
| "ticks", |
| "worst_ticks", |
| "iterations" |
| }; |
| |
| /* |
| * nss_stats_str_edma_tx |
| */ |
| static int8_t *nss_stats_str_edma_tx[NSS_STATS_EDMA_TX_MAX] = { |
| "tx_err", |
| "tx_dropped", |
| "desc_cnt" |
| }; |
| |
| /* |
| * nss_stats_str_edma_rx |
| */ |
| static int8_t *nss_stats_str_edma_rx[NSS_STATS_EDMA_RX_MAX] = { |
| "rx_csum_err", |
| "desc_cnt" |
| }; |
| |
| /* |
| * nss_stats_str_edma_txcmpl |
| */ |
| static int8_t *nss_stats_str_edma_txcmpl[NSS_STATS_EDMA_TXCMPL_MAX] = { |
| "desc_cnt" |
| }; |
| |
| /* |
| * nss_stats_str_edma_rxfill |
| */ |
| static int8_t *nss_stats_str_edma_rxfill[NSS_STATS_EDMA_RXFILL_MAX] = { |
| "desc_cnt" |
| }; |
| |
| /* |
| * nss_stats_str_edma_port_type |
| */ |
| static int8_t *nss_stats_str_edma_port_type[NSS_EDMA_PORT_TYPE_MAX] = { |
| "physical_port", |
| "virtual_port" |
| }; |
| |
| /* |
| * nss_stats_str_edma_port_ring_map |
| */ |
| static int8_t *nss_stats_str_edma_port_ring_map[NSS_EDMA_PORT_RING_MAP_MAX] = { |
| "rx_ring", |
| "tx_ring" |
| }; |
| |
| /* |
| * nss_stats_str_node |
| * Interface stats strings per node |
| */ |
| static int8_t *nss_stats_str_node[NSS_STATS_NODE_MAX] = { |
| "rx_packets", |
| "rx_bytes", |
| "rx_dropped", |
| "tx_packets", |
| "tx_bytes" |
| }; |
| |
| /* |
| * nss_stats_str_eth_rx |
| * eth_rx stats strings |
| */ |
| static int8_t *nss_stats_str_eth_rx[NSS_STATS_ETH_RX_MAX] = { |
| "ticks", |
| "worst_ticks", |
| "iterations" |
| }; |
| |
| /* |
| * nss_stats_str_if_exception_unknown |
| * Interface stats strings for unknown exceptions |
| */ |
| static int8_t *nss_stats_str_if_exception_eth_rx[NSS_EXCEPTION_EVENT_ETH_RX_MAX] = { |
| "UNKNOWN_L3_PROTOCOL", |
| "ETH_HDR_MISSING", |
| "VLAN_MISSING", |
| "TRUSTSEC_HDR_MISSING" |
| }; |
| |
| /* |
| * nss_stats_str_if_exception_ipv4 |
| * Interface stats strings for ipv4 exceptions |
| */ |
| static int8_t *nss_stats_str_if_exception_ipv4[NSS_EXCEPTION_EVENT_IPV4_MAX] = { |
| "IPV4_ICMP_HEADER_INCOMPLETE", |
| "IPV4_ICMP_UNHANDLED_TYPE", |
| "IPV4_ICMP_IPV4_HEADER_INCOMPLETE", |
| "IPV4_ICMP_IPV4_UDP_HEADER_INCOMPLETE", |
| "IPV4_ICMP_IPV4_TCP_HEADER_INCOMPLETE", |
| "IPV4_ICMP_IPV4_UNKNOWN_PROTOCOL", |
| "IPV4_ICMP_NO_ICME", |
| "IPV4_ICMP_FLUSH_TO_HOST", |
| "IPV4_TCP_HEADER_INCOMPLETE", |
| "IPV4_TCP_NO_ICME", |
| "IPV4_TCP_IP_OPTION", |
| "IPV4_TCP_IP_FRAGMENT", |
| "IPV4_TCP_SMALL_TTL", |
| "IPV4_TCP_NEEDS_FRAGMENTATION", |
| "IPV4_TCP_FLAGS", |
| "IPV4_TCP_SEQ_EXCEEDS_RIGHT_EDGE", |
| "IPV4_TCP_SMALL_DATA_OFFS", |
| "IPV4_TCP_BAD_SACK", |
| "IPV4_TCP_BIG_DATA_OFFS", |
| "IPV4_TCP_SEQ_BEFORE_LEFT_EDGE", |
| "IPV4_TCP_ACK_EXCEEDS_RIGHT_EDGE", |
| "IPV4_TCP_ACK_BEFORE_LEFT_EDGE", |
| "IPV4_UDP_HEADER_INCOMPLETE", |
| "IPV4_UDP_NO_ICME", |
| "IPV4_UDP_IP_OPTION", |
| "IPV4_UDP_IP_FRAGMENT", |
| "IPV4_UDP_SMALL_TTL", |
| "IPV4_UDP_NEEDS_FRAGMENTATION", |
| "IPV4_WRONG_TARGET_MAC", |
| "IPV4_HEADER_INCOMPLETE", |
| "IPV4_BAD_TOTAL_LENGTH", |
| "IPV4_BAD_CHECKSUM", |
| "IPV4_NON_INITIAL_FRAGMENT", |
| "IPV4_DATAGRAM_INCOMPLETE", |
| "IPV4_OPTIONS_INCOMPLETE", |
| "IPV4_UNKNOWN_PROTOCOL", |
| "IPV4_ESP_HEADER_INCOMPLETE", |
| "IPV4_ESP_NO_ICME", |
| "IPV4_ESP_IP_OPTION", |
| "IPV4_ESP_IP_FRAGMENT", |
| "IPV4_ESP_SMALL_TTL", |
| "IPV4_ESP_NEEDS_FRAGMENTATION", |
| "IPV4_INGRESS_VID_MISMATCH", |
| "IPV4_INGRESS_VID_MISSING", |
| "IPV4_6RD_NO_ICME", |
| "IPV4_6RD_IP_OPTION", |
| "IPV4_6RD_IP_FRAGMENT", |
| "IPV4_6RD_NEEDS_FRAGMENTATION", |
| "IPV4_DSCP_MARKING_MISMATCH", |
| "IPV4_VLAN_MARKING_MISMATCH", |
| "IPV4_DEPRECATED", |
| "IPV4_GRE_HEADER_INCOMPLETE", |
| "IPV4_GRE_NO_ICME", |
| "IPV4_GRE_IP_OPTION", |
| "IPV4_GRE_IP_FRAGMENT", |
| "IPV4_GRE_SMALL_TTL", |
| "IPV4_GRE_NEEDS_FRAGMENTATION", |
| "IPV4_PPTP_GRE_SESSION_MATCH_FAIL", |
| "IPV4_PPTP_GRE_INVALID_PROTO", |
| "IPV4_PPTP_GRE_NO_CME", |
| "IPV4_PPTP_GRE_IP_OPTION", |
| "IPV4_PPTP_GRE_IP_FRAGMENT", |
| "IPV4_PPTP_GRE_SMALL_TTL", |
| "IPV4_PPTP_GRE_NEEDS_FRAGMENTATION", |
| "IPV4_DESTROY", |
| "IPV4_FRAG_DF_SET", |
| "IPV4_FRAG_FAIL", |
| "IPV4_ICMP_IPV4_UDPLITE_HEADER_INCOMPLETE", |
| "IPV4_UDPLITE_HEADER_INCOMPLETE", |
| "IPV4_UDPLITE_NO_ICME", |
| "IPV4_UDPLITE_IP_OPTION", |
| "IPV4_UDPLITE_IP_FRAGMENT", |
| "IPV4_UDPLITE_SMALL_TTL", |
| "IPV4_UDPLITE_NEEDS_FRAGMENTATION", |
| "IPV4_MC_UDP_NO_ICME", |
| "IPV4_MC_MEM_ALLOC_FAILURE", |
| "IPV4_MC_UPDATE_FAILURE", |
| "IPV4_MC_PBUF_ALLOC_FAILURE" |
| }; |
| |
| /* |
| * nss_stats_str_if_exception_ipv6 |
| * Interface stats strings for ipv6 exceptions |
| */ |
| static int8_t *nss_stats_str_if_exception_ipv6[NSS_EXCEPTION_EVENT_IPV6_MAX] = { |
| "IPV6_ICMP_HEADER_INCOMPLETE", |
| "IPV6_ICMP_UNHANDLED_TYPE", |
| "IPV6_ICMP_IPV6_HEADER_INCOMPLETE", |
| "IPV6_ICMP_IPV6_UDP_HEADER_INCOMPLETE", |
| "IPV6_ICMP_IPV6_TCP_HEADER_INCOMPLETE", |
| "IPV6_ICMP_IPV6_UNKNOWN_PROTOCOL", |
| "IPV6_ICMP_NO_ICME", |
| "IPV6_ICMP_FLUSH_TO_HOST", |
| "IPV6_TCP_HEADER_INCOMPLETE", |
| "IPV6_TCP_NO_ICME", |
| "IPV6_TCP_SMALL_HOP_LIMIT", |
| "IPV6_TCP_NEEDS_FRAGMENTATION", |
| "IPV6_TCP_FLAGS", |
| "IPV6_TCP_SEQ_EXCEEDS_RIGHT_EDGE", |
| "IPV6_TCP_SMALL_DATA_OFFS", |
| "IPV6_TCP_BAD_SACK", |
| "IPV6_TCP_BIG_DATA_OFFS", |
| "IPV6_TCP_SEQ_BEFORE_LEFT_EDGE", |
| "IPV6_TCP_ACK_EXCEEDS_RIGHT_EDGE", |
| "IPV6_TCP_ACK_BEFORE_LEFT_EDGE", |
| "IPV6_UDP_HEADER_INCOMPLETE", |
| "IPV6_UDP_NO_ICME", |
| "IPV6_UDP_SMALL_HOP_LIMIT", |
| "IPV6_UDP_NEEDS_FRAGMENTATION", |
| "IPV6_WRONG_TARGET_MAC", |
| "IPV6_HEADER_INCOMPLETE", |
| "IPV6_UNKNOWN_PROTOCOL", |
| "IPV6_INGRESS_VID_MISMATCH", |
| "IPV6_INGRESS_VID_MISSING", |
| "IPV6_DSCP_MARKING_MISMATCH", |
| "IPV6_VLAN_MARKING_MISMATCH", |
| "IPV6_DEPRECATED", |
| "IPV6_GRE_NO_ICME", |
| "IPV6_GRE_NEEDS_FRAGMENTATION", |
| "IPV6_GRE_SMALL_HOP_LIMIT", |
| "IPV6_DESTROY", |
| "IPV6_ICMP_IPV6_UDPLITE_HEADER_INCOMPLETE", |
| "IPV6_UDPLITE_HEADER_INCOMPLETE", |
| "IPV6_UDPLITE_NO_ICME", |
| "IPV6_UDPLITE_SMALL_HOP_LIMIT", |
| "IPV6_UDPLITE_NEEDS_FRAGMENTATION", |
| "IPV6_MC_UDP_NO_ICME", |
| "IPV6_MC_MEM_ALLOC_FAILURE", |
| "IPV6_MC_UPDATE_FAILURE", |
| "IPV6_MC_PBUF_ALLOC_FAILURE", |
| "IPV6_ESP_HEADER_INCOMPLETE", |
| "IPV6_ESP_NO_ICME", |
| "IPV6_ESP_IP_FRAGMENT", |
| "IPV6_ESP_SMALL_HOP_LIMIT", |
| "IPV6_ESP_NEEDS_FRAGMENTATION" |
| }; |
| |
| /* |
| * nss_stats_str_if_exception_pppoe |
| * Interface stats strings for PPPoE exceptions |
| */ |
| static int8_t *nss_stats_str_if_exception_pppoe[NSS_PPPOE_EXCEPTION_EVENT_MAX] = { |
| "PPPOE_WRONG_VERSION_OR_TYPE", |
| "PPPOE_WRONG_CODE", |
| "PPPOE_HEADER_INCOMPLETE", |
| "PPPOE_UNSUPPORTED_PPP_PROTOCOL", |
| "PPPOE_DEPRECATED" |
| }; |
| |
| /* |
| * nss_stats_str_wifi |
| * Wifi statistics strings |
| */ |
| static int8_t *nss_stats_str_wifi[NSS_STATS_WIFI_MAX] = { |
| "RX_PACKETS", |
| "RX_DROPPED", |
| "TX_PACKETS", |
| "TX_DROPPED", |
| "TX_TRANSMIT_COMPLETED", |
| "TX_MGMT_RECEIVED", |
| "TX_MGMT_TRANSMITTED", |
| "TX_MGMT_DROPPED", |
| "TX_MGMT_COMPLETED", |
| "TX_INV_PEER_ENQ_CNT", |
| "RX_INV_PEER_RCV_CNT", |
| "RX_PN_CHECK_FAILED", |
| "RX_PKTS_DELIVERD", |
| "RX_BYTES_DELIVERED", |
| "TX_BYTES_COMPLETED", |
| "RX_DELIVER_UNALIGNED_DROP_CNT", |
| "TIDQ_ENQUEUE_CNT_0", |
| "TIDQ_ENQUEUE_CNT_1", |
| "TIDQ_ENQUEUE_CNT_2", |
| "TIDQ_ENQUEUE_CNT_3", |
| "TIDQ_ENQUEUE_CNT_4", |
| "TIDQ_ENQUEUE_CNT_5", |
| "TIDQ_ENQUEUE_CNT_6", |
| "TIDQ_ENQUEUE_CNT_7", |
| "TIDQ_DEQUEUE_CNT_0", |
| "TIDQ_DEQUEUE_CNT_1", |
| "TIDQ_DEQUEUE_CNT_2", |
| "TIDQ_DEQUEUE_CNT_3", |
| "TIDQ_DEQUEUE_CNT_4", |
| "TIDQ_DEQUEUE_CNT_5", |
| "TIDQ_DEQUEUE_CNT_6", |
| "TIDQ_DEQUEUE_CNT_7", |
| "TIDQ_ENQUEUE_FAIL_CNT_0", |
| "TIDQ_ENQUEUE_FAIL_CNT_1", |
| "TIDQ_ENQUEUE_FAIL_CNT_2", |
| "TIDQ_ENQUEUE_FAIL_CNT_3", |
| "TIDQ_ENQUEUE_FAIL_CNT_4", |
| "TIDQ_ENQUEUE_FAIL_CNT_5", |
| "TIDQ_ENQUEUE_FAIL_CNT_6", |
| "TIDQ_ENQUEUE_FAIL_CNT_7", |
| "TIDQ_TTL_EXPIRE_CNT_0", |
| "TIDQ_TTL_EXPIRE_CNT_1", |
| "TIDQ_TTL_EXPIRE_CNT_2", |
| "TIDQ_TTL_EXPIRE_CNT_3", |
| "TIDQ_TTL_EXPIRE_CNT_4", |
| "TIDQ_TTL_EXPIRE_CNT_5", |
| "TIDQ_TTL_EXPIRE_CNT_6", |
| "TIDQ_TTL_EXPIRE_CNT_7", |
| "TIDQ_DEQUEUE_REQ_CNT_0", |
| "TIDQ_DEQUEUE_REQ_CNT_1", |
| "TIDQ_DEQUEUE_REQ_CNT_2", |
| "TIDQ_DEQUEUE_REQ_CNT_3", |
| "TIDQ_DEQUEUE_REQ_CNT_4", |
| "TIDQ_DEQUEUE_REQ_CNT_5", |
| "TIDQ_DEQUEUE_REQ_CNT_6", |
| "TIDQ_DEQUEUE_REQ_CNT_7", |
| "TOTAL_TIDQ_DEPTH", |
| "RX_HTT_FETCH_CNT", |
| "TOTAL_TIDQ_BYPASS_CNT", |
| "GLOBAL_Q_FULL_CNT", |
| "TIDQ_FULL_CNT", |
| }; |
| |
| /* |
| * nss_stats_str_portid |
| * PortID statistics strings |
| */ |
| static int8_t *nss_stats_str_portid[NSS_STATS_PORTID_MAX] = { |
| "RX_INVALID_HEADER", |
| }; |
| |
| /* |
| * nss_stats_str_dtls_session_stats |
| * DTLS statistics strings for nss session stats |
| */ |
| static int8_t *nss_stats_str_dtls_session_debug_stats[NSS_STATS_DTLS_SESSION_MAX] = { |
| "RX_PKTS", |
| "TX_PKTS", |
| "RX_DROPPED", |
| "RX_AUTH_DONE", |
| "TX_AUTH_DONE", |
| "RX_CIPHER_DONE", |
| "TX_CIPHER_DONE", |
| "RX_CBUF_ALLOC_FAIL", |
| "TX_CBUF_ALLOC_FAIL", |
| "TX_CENQUEUE_FAIL", |
| "RX_CENQUEUE_FAIL", |
| "TX_DROPPED_HROOM", |
| "TX_DROPPED_TROOM", |
| "TX_FORWARD_ENQUEUE_FAIL", |
| "RX_FORWARD_ENQUEUE_FAIL", |
| "RX_INVALID_VERSION", |
| "RX_INVALID_EPOCH", |
| "RX_MALFORMED", |
| "RX_CIPHER_FAIL", |
| "RX_AUTH_FAIL", |
| "RX_CAPWAP_CLASSIFY_FAIL", |
| "RX_SINGLE_REC_DGRAM", |
| "RX_MULTI_REC_DGRAM", |
| "RX_REPLAY_FAIL", |
| "RX_REPLAY_DUPLICATE", |
| "RX_REPLAY_OUT_OF_WINDOW", |
| "OUTFLOW_QUEUE_FULL", |
| "DECAP_QUEUE_FULL", |
| "PBUF_ALLOC_FAIL", |
| "PBUF_COPY_FAIL", |
| "EPOCH", |
| "TX_SEQ_HIGH", |
| "TX_SEQ_LOW", |
| }; |
| |
| /* |
| * nss_stats_str_gre_tunnel_session_stats |
| * GRE Tunnel statistics strings for nss session stats |
| */ |
| static int8_t *nss_stats_str_gre_tunnel_session_debug_stats[NSS_STATS_GRE_TUNNEL_SESSION_MAX] = { |
| "RX_PKTS", |
| "TX_PKTS", |
| "RX_DROPPED", |
| "RX_MALFORMED", |
| "RX_INVALID_PROT", |
| "DECAP_QUEUE_FULL", |
| "RX_SINGLE_REC_DGRAM", |
| "RX_INVALID_REC_DGRAM", |
| "BUFFER_ALLOC_FAIL", |
| "BUFFER_COPY_FAIL", |
| "OUTFLOW_QUEUE_FULL", |
| "TX_DROPPED_HROOM", |
| "RX_CBUFFER_ALLOC_FAIL", |
| "RX_CENQUEUE_FAIL", |
| "RX_DECRYPT_DONE", |
| "RX_FORWARD_ENQUEUE_FAIL", |
| "TX_CBUFFER_ALLOC_FAIL", |
| "TX_CENQUEUE_FAIL", |
| "TX_DROPPED_TROOM", |
| "TX_FORWARD_ENQUEUE_FAIL", |
| "TX_CIPHER_DONE", |
| "CRYPTO_NOSUPP", |
| }; |
| |
| /* |
| * nss_stats_str_l2tpv2_session_stats |
| * l2tpv2 statistics strings for nss session stats |
| */ |
| static int8_t *nss_stats_str_l2tpv2_session_debug_stats[NSS_STATS_L2TPV2_SESSION_MAX] = { |
| "RX_PPP_LCP_PKTS", |
| "RX_EXP_PKTS", |
| "ENCAP_PBUF_ALLOC_FAIL", |
| "DECAP_PBUF_ALLOC_FAIL" |
| }; |
| |
| /* |
| * nss_stats_str_map_t_instance_stats |
| * map_t statistics strings for nss session stats |
| */ |
| static int8_t *nss_stats_str_map_t_instance_debug_stats[NSS_STATS_MAP_T_MAX] = { |
| "MAP_T_V4_TO_V6_PBUF_EXCEPTION_PKTS", |
| "MAP_T_V4_TO_V6_PBUF_NO_MATCHING_RULE", |
| "MAP_T_V4_TO_V6_PBUF_NOT_TCP_OR_UDP", |
| "MAP_T_V4_TO_V6_RULE_ERR_LOCAL_PSID", |
| "MAP_T_V4_TO_V6_RULE_ERR_LOCAL_IPV6", |
| "MAP_T_V4_TO_V6_RULE_ERR_REMOTE_PSID", |
| "MAP_T_V4_TO_V6_RULE_ERR_REMOTE_EA_BITS", |
| "MAP_T_V4_TO_V6_RULE_ERR_REMOTE_IPV6", |
| "MAP_T_V6_TO_V4_PBUF_EXCEPTION_PKTS", |
| "MAP_T_V6_TO_V4_PBUF_NO_MATCHING_RULE", |
| "MAP_T_V6_TO_V4_PBUF_NOT_TCP_OR_UDP", |
| "MAP_T_V6_TO_V4_RULE_ERR_LOCAL_IPV4", |
| "MAP_T_V6_TO_V4_RULE_ERR_REMOTE_IPV4" |
| }; |
| |
| /* |
| * nss_stats_str_ppe_conn |
| * PPE statistics strings for nss flow stats |
| */ |
| static int8_t *nss_stats_str_ppe_conn[NSS_STATS_PPE_CONN_MAX] = { |
| "v4 routed flows", |
| "v4 bridge flows", |
| "v4 conn create req", |
| "v4 conn create fail", |
| "v4 conn destroy req", |
| "v4 conn destroy fail", |
| |
| "v6 routed flows", |
| "v6 bridge flows", |
| "v6 conn create req", |
| "v6 conn create fail", |
| "v6 conn destroy req", |
| "v6 conn destroy fail", |
| |
| "conn fail - nexthop full", |
| "conn fail - flow full", |
| "conn fail - host full", |
| "conn fail - pub-ip full", |
| "conn fail - port not setup", |
| "conn fail - rw fifo full", |
| "conn fail - unknown proto", |
| "conn fail - ppe not responding", |
| "conn fail - fqg full" |
| }; |
| |
| /* |
| * nss_stats_str_ppe_l3 |
| * PPE statistics strings for nss debug stats |
| */ |
| static int8_t *nss_stats_str_ppe_l3[NSS_STATS_PPE_L3_MAX] = { |
| "PPE L3 dbg reg 0", |
| "PPE L3 dbg reg 1", |
| "PPE L3 dbg reg 2", |
| "PPE L3 dbg reg 3", |
| "PPE L3 dbg reg 4", |
| "PPE L3 dbg reg port", |
| }; |
| |
| /* |
| * nss_stats_str_ppe_code |
| * PPE statistics strings for nss debug stats |
| */ |
| static int8_t *nss_stats_str_ppe_code[NSS_STATS_PPE_CODE_MAX] = { |
| "PPE CPU_CODE", |
| "PPE DROP_CODE", |
| }; |
| |
| /* |
| * nss_stats_str_ppt_session_stats |
| * PPTP statistics strings for nss session stats |
| */ |
| static int8_t *nss_stats_str_pptp_session_debug_stats[NSS_STATS_PPTP_SESSION_MAX] = { |
| "ENCAP_RX_PACKETS", |
| "ENCAP_RX_BYTES", |
| "ENCAP_TX_PACKETS", |
| "ENCAP_TX_BYTES", |
| "ENCAP_RX_DROP", |
| "DECAP_RX_PACKETS", |
| "DECAP_RX_BYTES", |
| "DECAP_TX_PACKETS", |
| "DECAP_TX_BYTES", |
| "DECAP_RX_DROP", |
| "ENCAP_HEADROOM_ERR", |
| "ENCAP_SMALL_SIZE", |
| "ENCAP_PNODE_ENQUEUE_FAIL", |
| "DECAP_NO_SEQ_NOR_ACK", |
| "DECAP_INVAL_GRE_FLAGS", |
| "DECAP_INVAL_GRE_PROTO", |
| "DECAP_WRONG_SEQ", |
| "DECAP_INVAL_PPP_HDR", |
| "DECAP_PPP_LCP", |
| "DECAP_UNSUPPORTED_PPP_PROTO", |
| "DECAP_PNODE_ENQUEUE_FAIL", |
| }; |
| |
| /* |
| * nss_stats_str_trustsec_tx |
| * Trustsec TX stats strings |
| */ |
| static int8_t *nss_stats_str_trustsec_tx[NSS_STATS_TRUSTSEC_TX_MAX] = { |
| "INVALID_SRC", |
| "UNCONFIGURED_SRC", |
| "HEADROOM_NOT_ENOUGH", |
| }; |
| |
| /* |
| * nss_stats_ipv4_read() |
| * Read IPV4 stats |
| */ |
| static ssize_t nss_stats_ipv4_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_IPV4_MAX + 3) + (NSS_EXCEPTION_EVENT_IPV4_MAX + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that exception event count is larger than other statistics count for IPv4 |
| */ |
| stats_shadow = kzalloc(NSS_EXCEPTION_EVENT_IPV4_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "ipv4 stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_IPV4_RX_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * IPv4 node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv4 node stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_IPV4_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_ipv4[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_IPV4_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_ipv4[i], stats_shadow[i]); |
| } |
| |
| /* |
| * Exception stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv4 exception stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_EXCEPTION_EVENT_IPV4_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_if_exception_ipv4[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_EXCEPTION_EVENT_IPV4_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_if_exception_ipv4[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv4 stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_ipv4_reasm_read() |
| * Read IPV4 reassembly stats |
| */ |
| static ssize_t nss_stats_ipv4_reasm_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_IPV4_REASM_MAX + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_IPV4_REASM_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "ipv4 reasm stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_IPV4_REASM_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * IPv4 reasm node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv4 reasm node stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_IPV4_REASM_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_ipv4_reasm[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_IPV4_REASM_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_ipv4_reasm[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv4 reasm stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_ipv6_read() |
| * Read IPV6 stats |
| */ |
| static ssize_t nss_stats_ipv6_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_IPV6_MAX + 3) + (NSS_EXCEPTION_EVENT_IPV6_MAX + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that exception event count is larger than other statistics count for IPv4 |
| */ |
| stats_shadow = kzalloc(NSS_EXCEPTION_EVENT_IPV6_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "ipv6 stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_IPV6_RX_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * IPv6 node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv6 node stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_IPV6_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_ipv6[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_IPV6_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_ipv6[i], stats_shadow[i]); |
| } |
| |
| /* |
| * Exception stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv6 exception stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_EXCEPTION_EVENT_IPV6_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_if_exception_ipv6[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_EXCEPTION_EVENT_IPV6_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_if_exception_ipv6[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr,"\nipv6 stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_ipv6_reasm_read() |
| * Read IPV6 reassembly stats |
| */ |
| static ssize_t nss_stats_ipv6_reasm_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_IPV6_REASM_MAX + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_IPV6_REASM_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "ipv6 reasm stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_IPV6_REASM_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * Ipv6 reasm node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv6 reasm node stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_IPV6_REASM_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_ipv6_reasm[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_IPV6_REASM_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_ipv6_reasm[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nipv6 reasm stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_edma_port_stats_read() |
| * Read EDMA port stats |
| */ |
| static ssize_t nss_stats_edma_port_stats_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + 3; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| struct nss_stats_data *data = fp->private_data; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that we do not have more than 64 stats |
| */ |
| stats_shadow = kzalloc(64 * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "edma stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "edma port %d stats:\n\n", data->edma_id); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_edma.port[data->edma_id].port_stats[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nedma stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_edma_port_type_read() |
| * Read EDMA port type |
| */ |
| static ssize_t nss_stats_edma_port_type_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (1 + 2) + 3; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t port_type; |
| struct nss_stats_data *data = fp->private_data; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "edma port type start:\n\n"); |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "edma port %d type:\n\n", data->edma_id); |
| |
| /* |
| * Port type |
| */ |
| spin_lock_bh(&nss_top_main.stats_lock); |
| port_type = nss_top_main.stats_edma.port[data->edma_id].port_type; |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "port_type = %s\n", nss_stats_str_edma_port_type[port_type]); |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nedma stats end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_edma_port_ring_map_read() |
| * Read EDMA port ring map |
| */ |
| static ssize_t nss_stats_edma_port_ring_map_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (4 + 2) + 3; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| struct nss_stats_data *data = fp->private_data; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that we do not have more than 64 stats |
| */ |
| stats_shadow = kzalloc(64 * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "edma port ring map start:\n\n"); |
| |
| /* |
| * Port ring map |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "edma port %d ring map:\n\n", data->edma_id); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; i < NSS_EDMA_PORT_RING_MAP_MAX; i++) { |
| stats_shadow[i] = nss_top_main.stats_edma.port[data->edma_id].port_ring_map[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; i < NSS_EDMA_PORT_RING_MAP_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_edma_port_ring_map[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nedma stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_edma_txring_read() |
| * Read EDMA Tx ring stats |
| */ |
| static ssize_t nss_stats_edma_txring_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_EDMA_TX_MAX + 2) + 3; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| struct nss_stats_data *data = fp->private_data; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that we do not have more than 64 stats |
| */ |
| stats_shadow = kzalloc(64 * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "edma Tx ring stats start:\n\n"); |
| |
| /* |
| * Tx ring stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "Tx ring %d stats:\n\n", data->edma_id); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; i < NSS_STATS_EDMA_TX_MAX; i++) { |
| stats_shadow[i] = nss_top_main.stats_edma.tx_stats[data->edma_id][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; i < NSS_STATS_EDMA_TX_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_edma_tx[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nedma Tx ring stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_edma_rxring_read() |
| * Read EDMA rxring stats |
| */ |
| static ssize_t nss_stats_edma_rxring_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_EDMA_RX_MAX + 2) + 3; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| struct nss_stats_data *data = fp->private_data; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that we do not have more than 64 stats |
| */ |
| stats_shadow = kzalloc(64 * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "edma Rx ring stats start:\n\n"); |
| |
| /* |
| * RX ring stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "Rx ring %d stats:\n\n", data->edma_id); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; i < NSS_STATS_EDMA_RX_MAX; i++) { |
| stats_shadow[i] = nss_top_main.stats_edma.rx_stats[data->edma_id][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; i < NSS_STATS_EDMA_RX_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_edma_rx[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nedma Rx ring stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_edma_txcmplring_read() |
| * Read EDMA txcmplring stats |
| */ |
| static ssize_t nss_stats_edma_txcmplring_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_EDMA_TXCMPL_MAX + 2) + 3; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| struct nss_stats_data *data = fp->private_data; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that we do not have more than 64 stats |
| */ |
| stats_shadow = kzalloc(64 * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "edma Tx cmpl ring stats start:\n\n"); |
| |
| /* |
| * Tx cmpl ring stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "Tx cmpl ring %d stats:\n\n", data->edma_id); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; i < NSS_STATS_EDMA_TXCMPL_MAX; i++) { |
| stats_shadow[i] = nss_top_main.stats_edma.txcmpl_stats[data->edma_id][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; i < NSS_STATS_EDMA_TXCMPL_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_edma_txcmpl[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nedma Tx cmpl ring stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_edma_rxfillring_read() |
| * Read EDMA rxfillring stats |
| */ |
| static ssize_t nss_stats_edma_rxfillring_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_EDMA_RXFILL_MAX + 2) + 3; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| struct nss_stats_data *data = fp->private_data; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that we do not have more than 64 stats |
| */ |
| stats_shadow = kzalloc(64 * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "edma Rx fill ring stats start:\n\n"); |
| |
| /* |
| * Rx fill ring stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "Rx fill ring %d stats:\n\n", data->edma_id); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; i < NSS_STATS_EDMA_RXFILL_MAX; i++) { |
| stats_shadow[i] = nss_top_main.stats_edma.rxfill_stats[data->edma_id][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; i < NSS_STATS_EDMA_RXFILL_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_edma_rxfill[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nedma Rx fill ring stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_eth_rx_read() |
| * Read ETH_RX stats |
| */ |
| static ssize_t nss_stats_eth_rx_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_ETH_RX_MAX + 3) + (NSS_EXCEPTION_EVENT_ETH_RX_MAX + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| /* |
| * Note: The assumption here is that we do not have more than 64 stats |
| */ |
| stats_shadow = kzalloc(64 * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al,"eth_rx stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_ETH_RX_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * eth_rx node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\neth_rx node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_ETH_RX_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_eth_rx[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_ETH_RX_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_eth_rx[i], stats_shadow[i]); |
| } |
| |
| /* |
| * Exception stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\neth_rx exception stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_EXCEPTION_EVENT_ETH_RX_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_if_exception_eth_rx[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_EXCEPTION_EVENT_ETH_RX_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_if_exception_eth_rx[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr,"\neth_rx stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_n2h_read() |
| * Read N2H stats |
| */ |
| static ssize_t nss_stats_n2h_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_N2H_MAX + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| int max = NSS_STATS_N2H_MAX - NSS_STATS_NODE_MAX; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_N2H_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "n2h stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.nss[0].stats_n2h[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * N2H node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nn2h node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = NSS_STATS_NODE_MAX; (i < NSS_STATS_N2H_MAX); i++) { |
| stats_shadow[i] = nss_top_main.nss[0].stats_n2h[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; i < max; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_n2h[i], stats_shadow[i + NSS_STATS_NODE_MAX]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nn2h stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_lso_rx_read() |
| * Read LSO_RX stats |
| */ |
| static ssize_t nss_stats_lso_rx_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_LSO_RX_MAX + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_LSO_RX_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "lso_rx stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_LSO_RX_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * lso_rx node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nlso_rx node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_LSO_RX_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_lso_rx[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; i < NSS_STATS_LSO_RX_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_lso_rx[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nlso_rx stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_drv_read() |
| * Read HLOS driver stats |
| */ |
| static ssize_t nss_stats_drv_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = NSS_STATS_DRV_MAX + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_DRV_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "drv stats start:\n\n"); |
| for (i = 0; (i < NSS_STATS_DRV_MAX); i++) { |
| stats_shadow[i] = NSS_PKT_STATS_READ(&nss_top_main.stats_drv[i]); |
| } |
| |
| for (i = 0; (i < NSS_STATS_DRV_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_drv[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\ndrv stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_pppoe_read() |
| * Read PPPoE stats |
| */ |
| static ssize_t nss_stats_pppoe_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i, j, k; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_PPPOE_MAX + 3) + |
| ((NSS_MAX_PHYSICAL_INTERFACES * NSS_PPPOE_NUM_SESSION_PER_INTERFACE * (NSS_PPPOE_EXCEPTION_EVENT_MAX + 5)) + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(64 * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "pppoe stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_PPPOE_RX_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * PPPoE node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\npppoe node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_PPPOE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_pppoe[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_PPPOE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_pppoe[i], stats_shadow[i]); |
| } |
| |
| /* |
| * Exception stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nException PPPoE:\n\n"); |
| |
| for (j = 1; j <= NSS_MAX_PHYSICAL_INTERFACES; j++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nInterface %d:\n\n", j); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (k = 1; k <= NSS_PPPOE_NUM_SESSION_PER_INTERFACE; k++) { |
| for (i = 0; (i < NSS_PPPOE_EXCEPTION_EVENT_MAX); i++) { |
| stats_shadow_pppoe_except[k - 1][i] = nss_top_main.stats_if_exception_pppoe[j][k][i]; |
| } |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (k = 1; k <= NSS_PPPOE_NUM_SESSION_PER_INTERFACE; k++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "%d. Session\n", k); |
| for (i = 0; (i < NSS_PPPOE_EXCEPTION_EVENT_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", |
| nss_stats_str_if_exception_pppoe[i], |
| stats_shadow_pppoe_except[k - 1][i]); |
| } |
| } |
| |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\npppoe stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_gmac_read() |
| * Read GMAC stats |
| */ |
| static ssize_t nss_stats_gmac_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| uint32_t i, id; |
| |
| /* |
| * max output lines = ((#stats + start tag + one blank) * #GMACs) + start/end tag + 3 blank |
| */ |
| uint32_t max_output_lines = ((NSS_STATS_GMAC_MAX + 2) * NSS_MAX_PHYSICAL_INTERFACES) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_GMAC_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "gmac stats start:\n\n"); |
| |
| for (id = 0; id < NSS_MAX_PHYSICAL_INTERFACES; id++) { |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_GMAC_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_gmac[id][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "GMAC ID: %d\n", id); |
| for (i = 0; (i < NSS_STATS_GMAC_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_gmac[i], stats_shadow[i]); |
| } |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr,"\n"); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\ngmac stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_wifi_read() |
| * Read wifi statistics |
| */ |
| static ssize_t nss_stats_wifi_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| uint32_t i, id; |
| |
| /* |
| * max output lines = ((#stats + start tag + one blank) * #WIFI RADIOs) + start/end tag + 3 blank |
| */ |
| uint32_t max_output_lines = ((NSS_STATS_WIFI_MAX + 2) * NSS_MAX_WIFI_RADIO_INTERFACES) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_WIFI_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "wifi stats start:\n\n"); |
| |
| for (id = 0; id < NSS_MAX_WIFI_RADIO_INTERFACES; id++) { |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_WIFI_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_wifi[id][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "WIFI ID: %d\n", id); |
| for (i = 0; (i < NSS_STATS_WIFI_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_wifi[i], stats_shadow[i]); |
| } |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr,"\n"); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nwifi stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_dtls_read() |
| * Read DTLS session statistics |
| */ |
| static ssize_t nss_stats_dtls_read(struct file *fp, char __user *ubuf, |
| size_t sz, loff_t *ppos) |
| { |
| uint32_t max_output_lines = 2 + (NSS_MAX_DTLS_SESSIONS |
| * (NSS_STATS_DTLS_SESSION_MAX + 2)) + 2; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| struct net_device *dev; |
| int id, i; |
| struct nss_stats_dtls_session_debug *dtls_session_stats = NULL; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| dtls_session_stats = kzalloc((sizeof(struct nss_stats_dtls_session_debug) |
| * NSS_MAX_DTLS_SESSIONS), GFP_KERNEL); |
| if (unlikely(dtls_session_stats == NULL)) { |
| nss_warning("Could not allocate memory for populating DTLS stats"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| /* |
| * Get all stats |
| */ |
| nss_dtls_session_debug_stats_get(dtls_session_stats); |
| |
| /* |
| * Session stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\nDTLS session stats start:\n\n"); |
| |
| for (id = 0; id < NSS_MAX_DTLS_SESSIONS; id++) { |
| if (!dtls_session_stats[id].valid) |
| break; |
| |
| dev = dev_get_by_index(&init_net, dtls_session_stats[id].if_index); |
| if (likely(dev)) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%d. nss interface id=%d, netdevice=%s\n", |
| id, dtls_session_stats[id].if_num, |
| dev->name); |
| dev_put(dev); |
| } else { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%d. nss interface id=%d\n", id, |
| dtls_session_stats[id].if_num); |
| } |
| |
| for (i = 0; i < NSS_STATS_DTLS_SESSION_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\t%s = %llu\n", |
| nss_stats_str_dtls_session_debug_stats[i], |
| dtls_session_stats[id].stats[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\n"); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\nDTLS session stats end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, size_wr); |
| |
| kfree(dtls_session_stats); |
| kfree(lbuf); |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_gre_tunnel_read() |
| * Read GRE Tunnel session statistics |
| */ |
| static ssize_t nss_stats_gre_tunnel_read(struct file *fp, char __user *ubuf, |
| size_t sz, loff_t *ppos) |
| { |
| uint32_t max_output_lines = 2 + (NSS_MAX_GRE_TUNNEL_SESSIONS |
| * (NSS_STATS_GRE_TUNNEL_SESSION_MAX + 2)) + 2; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| struct net_device *dev; |
| int id, i; |
| struct nss_stats_gre_tunnel_session_debug *gre_tunnel_session_stats = NULL; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| gre_tunnel_session_stats = kzalloc((sizeof(struct nss_stats_gre_tunnel_session_debug) |
| * NSS_MAX_GRE_TUNNEL_SESSIONS), GFP_KERNEL); |
| if (unlikely(gre_tunnel_session_stats == NULL)) { |
| nss_warning("Could not allocate memory for populating GRE Tunnel stats"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| /* |
| * Get all stats |
| */ |
| nss_gre_tunnel_session_debug_stats_get(gre_tunnel_session_stats); |
| |
| /* |
| * Session stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\nGRE Tunnel session stats start:\n\n"); |
| |
| for (id = 0; id < NSS_MAX_GRE_TUNNEL_SESSIONS; id++) { |
| if (!gre_tunnel_session_stats[id].valid) |
| break; |
| |
| dev = dev_get_by_index(&init_net, gre_tunnel_session_stats[id].if_index); |
| if (likely(dev)) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%d. nss interface id=%d, netdevice=%s\n", |
| id, gre_tunnel_session_stats[id].if_num, |
| dev->name); |
| dev_put(dev); |
| } else { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%d. nss interface id=%d\n", id, |
| gre_tunnel_session_stats[id].if_num); |
| } |
| |
| for (i = 0; i < NSS_STATS_GRE_TUNNEL_SESSION_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\t%s = %llu\n", |
| nss_stats_str_gre_tunnel_session_debug_stats[i], |
| gre_tunnel_session_stats[id].stats[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\n"); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\nGRE Tunnel session stats end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, size_wr); |
| |
| kfree(gre_tunnel_session_stats); |
| kfree(lbuf); |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_l2tpv2_read() |
| * Read l2tpv2 statistics |
| */ |
| static ssize_t nss_stats_l2tpv2_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| |
| uint32_t max_output_lines = 2 /* header & footer for session stats */ |
| + NSS_MAX_L2TPV2_DYNAMIC_INTERFACES * (NSS_STATS_L2TPV2_SESSION_MAX + 2) /*session stats */ |
| + 2; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines ; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| struct net_device *dev; |
| struct nss_stats_l2tpv2_session_debug l2tpv2_session_stats[NSS_MAX_L2TPV2_DYNAMIC_INTERFACES]; |
| int id, i; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| memset(&l2tpv2_session_stats, 0, sizeof(struct nss_stats_l2tpv2_session_debug) * NSS_MAX_L2TPV2_DYNAMIC_INTERFACES); |
| |
| /* |
| * Get all stats |
| */ |
| nss_l2tpv2_session_debug_stats_get((void *)&l2tpv2_session_stats); |
| |
| /* |
| * Session stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nl2tp v2 session stats start:\n\n"); |
| for (id = 0; id < NSS_MAX_L2TPV2_DYNAMIC_INTERFACES; id++) { |
| |
| if (!l2tpv2_session_stats[id].valid) { |
| break; |
| } |
| |
| dev = dev_get_by_index(&init_net, l2tpv2_session_stats[id].if_index); |
| if (likely(dev)) { |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "%d. nss interface id=%d, netdevice=%s\n", id, |
| l2tpv2_session_stats[id].if_num, dev->name); |
| dev_put(dev); |
| } else { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "%d. nss interface id=%d\n", id, |
| l2tpv2_session_stats[id].if_num); |
| } |
| |
| for (i = 0; i < NSS_STATS_L2TPV2_SESSION_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\t%s = %llu\n", nss_stats_str_l2tpv2_session_debug_stats[i], |
| l2tpv2_session_stats[id].stats[i]); |
| } |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\n"); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nl2tp v2 session stats end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, size_wr); |
| |
| kfree(lbuf); |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_map_t_read() |
| * Read map_t statistics |
| */ |
| static ssize_t nss_stats_map_t_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| |
| uint32_t max_output_lines = 2 /* header & footer for instance stats */ |
| + NSS_MAX_MAP_T_DYNAMIC_INTERFACES * (NSS_STATS_MAP_T_MAX + 2) /*instance stats */ |
| + 2; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| struct net_device *dev; |
| struct nss_stats_map_t_instance_debug map_t_instance_stats[NSS_MAX_MAP_T_DYNAMIC_INTERFACES]; |
| int id, i; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(!lbuf)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| memset(&map_t_instance_stats, 0, sizeof(struct nss_stats_map_t_instance_debug) * NSS_MAX_MAP_T_DYNAMIC_INTERFACES); |
| |
| /* |
| * Get all stats |
| */ |
| nss_map_t_instance_debug_stats_get((void *)&map_t_instance_stats); |
| |
| /* |
| * Session stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nmap_t instance stats start:\n\n"); |
| for (id = 0; id < NSS_MAX_MAP_T_DYNAMIC_INTERFACES; id++) { |
| |
| if (!map_t_instance_stats[id].valid) { |
| break; |
| } |
| |
| dev = dev_get_by_index(&init_net, map_t_instance_stats[id].if_index); |
| if (likely(dev)) { |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "%d. nss interface id=%d, netdevice=%s\n", id, |
| map_t_instance_stats[id].if_num, dev->name); |
| dev_put(dev); |
| } else { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "%d. nss interface id=%d\n", id, |
| map_t_instance_stats[id].if_num); |
| } |
| |
| for (i = 0; i < NSS_STATS_MAP_T_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\t%s = %llu\n", nss_stats_str_map_t_instance_debug_stats[i], |
| map_t_instance_stats[id].stats[i]); |
| } |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\n"); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nmap_t instance stats end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, size_wr); |
| |
| kfree(lbuf); |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_ppe_conn_read() |
| * Read ppe connection stats |
| */ |
| static ssize_t nss_stats_ppe_conn_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| |
| int i; |
| char *lbuf = NULL; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint32_t ppe_stats[NSS_STATS_PPE_CONN_MAX]; |
| uint32_t max_output_lines = 2 /* header & footer for session stats */ |
| + NSS_STATS_PPE_CONN_MAX /* PPE flow counters */ |
| + 2; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| |
| |
| lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| memset(&ppe_stats, 0, sizeof(uint32_t) * NSS_STATS_PPE_CONN_MAX); |
| |
| /* |
| * Get all stats |
| */ |
| nss_ppe_stats_conn_get(ppe_stats); |
| |
| /* |
| * flow stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nppe flow counters start:\n\n"); |
| |
| for (i = 0; i < NSS_STATS_PPE_CONN_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\t%s = %u\n", nss_stats_str_ppe_conn[i], |
| ppe_stats[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\n"); |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nppe flow counters end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, size_wr); |
| |
| kfree(lbuf); |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_ppe_l3_read() |
| * Read ppe L3 debug stats |
| */ |
| static ssize_t nss_stats_ppe_l3_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| |
| int i; |
| char *lbuf = NULL; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint32_t ppe_stats[NSS_STATS_PPE_L3_MAX]; |
| uint32_t max_output_lines = 2 /* header & footer for session stats */ |
| + NSS_STATS_PPE_L3_MAX /* PPE flow counters */ |
| + 2; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| |
| lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(!lbuf)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| memset(ppe_stats, 0, sizeof(uint32_t) * NSS_STATS_PPE_L3_MAX); |
| |
| /* |
| * Get all stats |
| */ |
| nss_ppe_stats_l3_get(ppe_stats); |
| |
| /* |
| * flow stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nppe l3 debug stats start:\n\n"); |
| |
| for (i = 0; i < NSS_STATS_PPE_L3_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\t%s = 0x%x\n", nss_stats_str_ppe_l3[i], |
| ppe_stats[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\n"); |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nppe l3 debug stats end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, size_wr); |
| |
| kfree(lbuf); |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_ppe_code_read() |
| * Read ppe CPU & DROP code |
| */ |
| static ssize_t nss_stats_ppe_code_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| |
| int i; |
| char *lbuf = NULL; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint32_t ppe_stats[NSS_STATS_PPE_CODE_MAX]; |
| uint32_t max_output_lines = 2 /* header & footer for session stats */ |
| + NSS_STATS_PPE_CODE_MAX /* PPE flow counters */ |
| + 2; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| |
| lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(!lbuf)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| memset(ppe_stats, 0, sizeof(uint32_t) * NSS_STATS_PPE_CODE_MAX); |
| |
| /* |
| * Get all stats |
| */ |
| nss_ppe_stats_code_get(ppe_stats); |
| |
| /* |
| * flow stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nppe session stats start:\n\n"); |
| |
| for (i = 0; i < NSS_STATS_PPE_CODE_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\t%s = %u\n", nss_stats_str_ppe_code[i], |
| ppe_stats[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\n"); |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nppe session stats end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, size_wr); |
| |
| kfree(lbuf); |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_pptp_read() |
| * Read pptp statistics |
| */ |
| static ssize_t nss_stats_pptp_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| |
| uint32_t max_output_lines = 2 /* header & footer for session stats */ |
| + NSS_MAX_PPTP_DYNAMIC_INTERFACES * (NSS_STATS_PPTP_SESSION_MAX + 2) /*session stats */ |
| + 2; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines ; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| struct net_device *dev; |
| struct nss_stats_pptp_session_debug pptp_session_stats[NSS_MAX_PPTP_DYNAMIC_INTERFACES]; |
| int id, i; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| memset(&pptp_session_stats, 0, sizeof(struct nss_stats_pptp_session_debug) * NSS_MAX_PPTP_DYNAMIC_INTERFACES); |
| |
| /* |
| * Get all stats |
| */ |
| nss_pptp_session_debug_stats_get((void *)&pptp_session_stats); |
| |
| /* |
| * Session stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\npptp session stats start:\n\n"); |
| for (id = 0; id < NSS_MAX_PPTP_DYNAMIC_INTERFACES; id++) { |
| |
| if (!pptp_session_stats[id].valid) { |
| break; |
| } |
| |
| dev = dev_get_by_index(&init_net, pptp_session_stats[id].if_index); |
| if (likely(dev)) { |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "%d. nss interface id=%d, netdevice=%s\n", id, |
| pptp_session_stats[id].if_num, dev->name); |
| dev_put(dev); |
| } else { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "%d. nss interface id=%d\n", id, |
| pptp_session_stats[id].if_num); |
| } |
| |
| for (i = 0; i < NSS_STATS_PPTP_SESSION_MAX; i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "\t%s = %llu\n", nss_stats_str_pptp_session_debug_stats[i], |
| pptp_session_stats[id].stats[i]); |
| } |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\n"); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\npptp session stats end\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, size_wr); |
| |
| kfree(lbuf); |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_sjack_read() |
| * Read SJACK stats |
| */ |
| static ssize_t nss_stats_sjack_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = NSS_STATS_NODE_MAX + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_NODE_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "sjack stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_SJACK_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nsjack stats end\n\n"); |
| |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_portid_read() |
| * Read PortID stats |
| */ |
| static ssize_t nss_stats_portid_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = NSS_STATS_NODE_MAX + NSS_STATS_PORTID_MAX + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_NODE_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "portid stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_PORTID_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * PortID node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nportid node stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_PORTID_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_portid[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_PORTID_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_portid[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\nportid stats end\n\n"); |
| |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_capwap_encap() |
| * Make a row for CAPWAP encap stats. |
| */ |
| static ssize_t nss_stats_capwap_encap(char *line, int len, int i, struct nss_capwap_tunnel_stats *s) |
| { |
| char *header[] = { "packets", "bytes", "fragments", "drop_ref", "drop_ver", "drop_unalign", |
| "drop_hroom", "drop_dtls", "drop_nwireless", "drop_qfull", "drop_memfail", "unknown" }; |
| uint64_t tcnt = 0; |
| |
| switch (i) { |
| case 0: |
| tcnt = s->pnode_stats.tx_packets; |
| break; |
| case 1: |
| tcnt = s->pnode_stats.tx_bytes; |
| break; |
| case 2: |
| tcnt = s->tx_segments; |
| break; |
| case 3: |
| tcnt = s->tx_dropped_sg_ref; |
| break; |
| case 4: |
| tcnt = s->tx_dropped_ver_mis; |
| break; |
| case 5: |
| tcnt = s->tx_dropped_unalign; |
| break; |
| case 6: |
| tcnt = s->tx_dropped_hroom; |
| break; |
| case 7: |
| tcnt = s->tx_dropped_dtls; |
| break; |
| case 8: |
| tcnt = s->tx_dropped_nwireless; |
| break; |
| case 9: |
| tcnt = s->tx_queue_full_drops; |
| break; |
| case 10: |
| tcnt = s->tx_mem_failure_drops; |
| break; |
| default: |
| return 0; |
| } |
| |
| return (snprintf(line, len, "%s = %llu\n", header[i], tcnt)); |
| } |
| |
| /* |
| * nss_stats_capwap_decap() |
| * Make a row for CAPWAP decap stats. |
| */ |
| static ssize_t nss_stats_capwap_decap(char *line, int len, int i, struct nss_capwap_tunnel_stats *s) |
| { |
| char *header[] = { "packets", "bytes", "DTLS_pkts", "fragments", "rx_dropped", "drop_oversize", |
| "drop_frag_timeout", "drop_frag_dup", "drop_frag_gap", "drop_qfull", "drop_memfail", |
| "drop_csum", "drop_malformed", "unknown" }; |
| uint64_t tcnt = 0; |
| |
| switch(i) { |
| case 0: |
| tcnt = s->pnode_stats.rx_packets; |
| break; |
| case 1: |
| tcnt = s->pnode_stats.rx_bytes; |
| break; |
| case 2: |
| tcnt = s->dtls_pkts; |
| break; |
| case 3: |
| tcnt = s->rx_segments; |
| break; |
| case 4: |
| tcnt = s->pnode_stats.rx_dropped; |
| break; |
| case 5: |
| tcnt = s->rx_oversize_drops; |
| break; |
| case 6: |
| tcnt = s->rx_frag_timeout_drops; |
| break; |
| case 7: |
| tcnt = s->rx_dup_frag; |
| break; |
| case 8: |
| tcnt = s->rx_frag_gap_drops; |
| break; |
| case 9: |
| tcnt = s->rx_queue_full_drops; |
| return (snprintf(line, len, "%s = %llu (n2h = %llu)\n", header[i], tcnt, s->rx_n2h_queue_full_drops)); |
| case 10: |
| tcnt = s->rx_mem_failure_drops; |
| break; |
| case 11: |
| tcnt = s->rx_csum_drops; |
| break; |
| case 12: |
| tcnt = s->rx_malformed; |
| break; |
| default: |
| return 0; |
| } |
| |
| return (snprintf(line, len, "%s = %llu\n", header[i], tcnt)); |
| } |
| |
| /* |
| * nss_stats_capwap_read() |
| * Read CAPWAP stats |
| */ |
| static ssize_t nss_stats_capwap_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos, uint16_t type) |
| { |
| struct nss_stats_data *data = fp->private_data; |
| ssize_t bytes_read = 0; |
| struct nss_capwap_tunnel_stats stats; |
| size_t bytes; |
| char line[80]; |
| int start; |
| uint32_t if_num = NSS_DYNAMIC_IF_START; |
| uint32_t max_if_num = NSS_DYNAMIC_IF_START + NSS_MAX_DYNAMIC_INTERFACES; |
| |
| if (data) { |
| if_num = data->if_num; |
| } |
| |
| /* |
| * If we are done accomodating all the CAPWAP tunnels. |
| */ |
| if (if_num > max_if_num) { |
| return 0; |
| } |
| |
| for (; if_num <= max_if_num; if_num++) { |
| bool isthere; |
| |
| if (nss_is_dynamic_interface(if_num) == false) { |
| continue; |
| } |
| |
| if (nss_dynamic_interface_get_type(if_num) != NSS_DYNAMIC_INTERFACE_TYPE_CAPWAP) { |
| continue; |
| } |
| |
| /* |
| * If CAPWAP tunnel does not exists, then isthere will be false. |
| */ |
| isthere = nss_capwap_get_stats(if_num, &stats); |
| if (!isthere) { |
| continue; |
| } |
| |
| bytes = snprintf(line, sizeof(line), "----if_num : %2d----\n", if_num); |
| if ((bytes_read + bytes) > sz) { |
| break; |
| } |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto fail; |
| } |
| bytes_read += bytes; |
| start = 0; |
| while (bytes_read < sz) { |
| if (type == 1) { |
| bytes = nss_stats_capwap_encap(line, sizeof(line), start, &stats); |
| } else { |
| bytes = nss_stats_capwap_decap(line, sizeof(line), start, &stats); |
| } |
| |
| /* |
| * If we don't have any more lines in decap/encap. |
| */ |
| if (bytes == 0) { |
| break; |
| } |
| |
| if ((bytes_read + bytes) > sz) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto fail; |
| } |
| |
| bytes_read += bytes; |
| start++; |
| } |
| } |
| |
| if (bytes_read > 0) { |
| *ppos = bytes_read; |
| } |
| |
| if (data) { |
| data->if_num = if_num; |
| } |
| fail: |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_capwap_decap_read() |
| * Read CAPWAP decap stats |
| */ |
| static ssize_t nss_stats_capwap_decap_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| return (nss_stats_capwap_read(fp, ubuf, sz, ppos, 0)); |
| } |
| |
| /* |
| * nss_stats_capwap_encap_read() |
| * Read CAPWAP encap stats |
| */ |
| static ssize_t nss_stats_capwap_encap_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| return (nss_stats_capwap_read(fp, ubuf, sz, ppos, 1)); |
| } |
| |
| /* |
| * nss_stats_gre_redir() |
| * Make a row for GRE_REDIR stats. |
| */ |
| static ssize_t nss_stats_gre_redir(char *line, int len, int i, struct nss_gre_redir_tunnel_stats *s) |
| { |
| char *header[] = { "TX Packets", "TX Bytes", "TX Drops", "RX Packets", "RX Bytes", "Rx Drops" }; |
| uint64_t tcnt = 0; |
| |
| switch (i) { |
| case 0: |
| tcnt = s->node_stats.tx_packets; |
| break; |
| case 1: |
| tcnt = s->node_stats.tx_bytes; |
| break; |
| case 2: |
| tcnt = s->tx_dropped; |
| break; |
| case 3: |
| tcnt = s->node_stats.rx_packets; |
| break; |
| case 4: |
| tcnt = s->node_stats.rx_bytes; |
| break; |
| case 5: |
| tcnt = s->node_stats.rx_dropped; |
| break; |
| default: |
| return 0; |
| } |
| |
| return (snprintf(line, len, "%s = %llu\n", header[i], tcnt)); |
| } |
| |
| /* |
| * nss_stats_gre_redir_read() |
| * READ gre_redir tunnel stats. |
| */ |
| static ssize_t nss_stats_gre_redir_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| struct nss_stats_data *data = fp->private_data; |
| ssize_t bytes_read = 0; |
| struct nss_gre_redir_tunnel_stats stats; |
| size_t bytes; |
| char line[80]; |
| int start, end; |
| int index = 0; |
| |
| if (data) { |
| index = data->index; |
| } |
| |
| /* |
| * If we are done accomodating all the GRE_REDIR tunnels. |
| */ |
| if (index >= NSS_GRE_REDIR_MAX_INTERFACES) { |
| return 0; |
| } |
| |
| for (; index < NSS_GRE_REDIR_MAX_INTERFACES; index++) { |
| bool isthere; |
| |
| /* |
| * If gre_redir tunnel does not exists, then isthere will be false. |
| */ |
| isthere = nss_gre_redir_get_stats(index, &stats); |
| if (!isthere) { |
| continue; |
| } |
| |
| bytes = snprintf(line, sizeof(line), "\nTunnel if_num: %2d\n", stats.if_num); |
| if ((bytes_read + bytes) > sz) { |
| break; |
| } |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto fail; |
| } |
| bytes_read += bytes; |
| start = 0; |
| end = 6; |
| while (bytes_read < sz && start < end) { |
| bytes = nss_stats_gre_redir(line, sizeof(line), start, &stats); |
| |
| if ((bytes_read + bytes) > sz) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto fail; |
| } |
| |
| bytes_read += bytes; |
| start++; |
| } |
| } |
| |
| if (bytes_read > 0) { |
| *ppos = bytes_read; |
| } |
| |
| if (data) { |
| data->index = index; |
| } |
| |
| fail: |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_wifi_if_read() |
| * Read wifi_if statistics |
| */ |
| static ssize_t nss_stats_wifi_if_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| struct nss_stats_data *data = fp->private_data; |
| int32_t if_num = NSS_DYNAMIC_IF_START; |
| int32_t max_if_num = if_num + NSS_MAX_DYNAMIC_INTERFACES; |
| size_t bytes = 0; |
| ssize_t bytes_read = 0; |
| char line[80]; |
| int start, end; |
| |
| if (data) { |
| if_num = data->if_num; |
| } |
| |
| if (if_num > max_if_num) { |
| return 0; |
| } |
| |
| for (; if_num < max_if_num; if_num++) { |
| if (nss_dynamic_interface_get_type(if_num) != NSS_DYNAMIC_INTERFACE_TYPE_WIFI) |
| continue; |
| |
| bytes = scnprintf(line, sizeof(line), "if_num %d stats start:\n\n", if_num); |
| if ((bytes_read + bytes) > sz) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| |
| start = 0; |
| end = 7; |
| while (bytes_read < sz && start < end) { |
| bytes = nss_wifi_if_copy_stats(if_num, start, line); |
| if (!bytes) |
| break; |
| |
| if ((bytes_read + bytes) > sz) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| start++; |
| } |
| |
| bytes = scnprintf(line, sizeof(line), "if_num %d stats end:\n\n", if_num); |
| if (bytes_read > (sz - bytes)) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| } |
| |
| if (bytes_read > 0) { |
| *ppos = bytes_read; |
| } |
| |
| if (data) { |
| data->if_num = if_num; |
| } |
| |
| end: |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_virt_if_read() |
| * Read virt_if statistics |
| */ |
| static ssize_t nss_stats_virt_if_read(struct file *fp, char __user *ubuf, |
| size_t sz, loff_t *ppos) |
| { |
| struct nss_stats_data *data = fp->private_data; |
| int32_t if_num = NSS_DYNAMIC_IF_START; |
| int32_t max_if_num = if_num + NSS_MAX_DYNAMIC_INTERFACES; |
| size_t bytes = 0; |
| ssize_t bytes_read = 0; |
| char line[80]; |
| int start, end; |
| |
| if (data) { |
| if_num = data->if_num; |
| } |
| |
| if (if_num > max_if_num) { |
| return 0; |
| } |
| |
| for (; if_num < max_if_num; if_num++) { |
| if (nss_dynamic_interface_get_type(if_num) != NSS_DYNAMIC_INTERFACE_TYPE_802_3_REDIR) |
| continue; |
| |
| bytes = scnprintf(line, sizeof(line), "if_num %d stats start:\n\n", if_num); |
| if ((bytes_read + bytes) > sz) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| |
| start = 0; |
| end = 7; |
| while (bytes_read < sz && start < end) { |
| bytes = nss_virt_if_copy_stats(if_num, start, line); |
| if (!bytes) |
| break; |
| |
| if ((bytes_read + bytes) > sz) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| start++; |
| } |
| |
| bytes = scnprintf(line, sizeof(line), "if_num %d stats end:\n\n", if_num); |
| if (bytes_read > (sz - bytes)) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| } |
| |
| if (bytes_read > 0) { |
| *ppos = bytes_read; |
| } |
| |
| if (data) { |
| data->if_num = if_num; |
| } |
| |
| end: |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_tx_rx_virt_if_read() |
| * Read tx_rx_virt_if statistics |
| */ |
| static ssize_t nss_stats_tx_rx_virt_if_read(struct file *fp, char __user *ubuf, |
| size_t sz, loff_t *ppos) |
| { |
| struct nss_stats_data *data = fp->private_data; |
| int32_t if_num = NSS_DYNAMIC_IF_START; |
| int32_t max_if_num = if_num + NSS_MAX_DYNAMIC_INTERFACES; |
| size_t bytes = 0; |
| ssize_t bytes_read = 0; |
| char line[80]; |
| int start, end; |
| |
| if (data) { |
| if_num = data->if_num; |
| } |
| |
| if (if_num > max_if_num) { |
| return 0; |
| } |
| |
| for (; if_num < max_if_num; if_num++) { |
| if (nss_dynamic_interface_get_type(if_num) != NSS_DYNAMIC_INTERFACE_TYPE_VIRTIF_DEPRECATED) |
| continue; |
| |
| bytes = scnprintf(line, sizeof(line), "if_num %d stats start:\n\n", if_num); |
| if ((bytes_read + bytes) > sz) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| |
| start = 0; |
| end = 7; |
| while (bytes_read < sz && start < end) { |
| bytes = nss_tx_rx_virt_if_copy_stats(if_num, start, line); |
| if (!bytes) |
| break; |
| |
| if ((bytes_read + bytes) > sz) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| start++; |
| } |
| |
| bytes = scnprintf(line, sizeof(line), "if_num %d stats end:\n\n", if_num); |
| if (bytes_read > (sz - bytes)) |
| break; |
| |
| if (copy_to_user(ubuf + bytes_read, line, bytes) != 0) { |
| bytes_read = -EFAULT; |
| goto end; |
| } |
| |
| bytes_read += bytes; |
| } |
| |
| if (bytes_read > 0) { |
| *ppos = bytes_read; |
| } |
| |
| if (data) { |
| data->if_num = if_num; |
| } |
| |
| end: |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_trustsec_tx_read() |
| * Read trustsec_tx stats |
| */ |
| static ssize_t nss_stats_trustsec_tx_read(struct file *fp, char __user *ubuf, size_t sz, loff_t *ppos) |
| { |
| int32_t i; |
| |
| /* |
| * max output lines = #stats + start tag line + end tag line + three blank lines |
| */ |
| uint32_t max_output_lines = (NSS_STATS_NODE_MAX + 2) + (NSS_STATS_TRUSTSEC_TX_MAX + 3) + 5; |
| size_t size_al = NSS_STATS_MAX_STR_LENGTH * max_output_lines; |
| size_t size_wr = 0; |
| ssize_t bytes_read = 0; |
| uint64_t *stats_shadow; |
| |
| char *lbuf = kzalloc(size_al, GFP_KERNEL); |
| if (unlikely(lbuf == NULL)) { |
| nss_warning("Could not allocate memory for local statistics buffer"); |
| return 0; |
| } |
| |
| stats_shadow = kzalloc(NSS_STATS_NODE_MAX * 8, GFP_KERNEL); |
| if (unlikely(stats_shadow == NULL)) { |
| nss_warning("Could not allocate memory for local shadow buffer"); |
| kfree(lbuf); |
| return 0; |
| } |
| |
| size_wr = scnprintf(lbuf, size_al, "trustsec_tx stats start:\n\n"); |
| |
| /* |
| * Common node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "common node stats:\n\n"); |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_node[NSS_TRUSTSEC_TX_INTERFACE][i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_NODE_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_node[i], stats_shadow[i]); |
| } |
| |
| /* |
| * TrustSec TX node stats |
| */ |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\ntrustsec tx node stats:\n\n"); |
| |
| spin_lock_bh(&nss_top_main.stats_lock); |
| for (i = 0; (i < NSS_STATS_TRUSTSEC_TX_MAX); i++) { |
| stats_shadow[i] = nss_top_main.stats_trustsec_tx[i]; |
| } |
| |
| spin_unlock_bh(&nss_top_main.stats_lock); |
| |
| for (i = 0; (i < NSS_STATS_TRUSTSEC_TX_MAX); i++) { |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, |
| "%s = %llu\n", nss_stats_str_trustsec_tx[i], stats_shadow[i]); |
| } |
| |
| size_wr += scnprintf(lbuf + size_wr, size_al - size_wr, "\ntrustsec tx stats end\n\n"); |
| bytes_read = simple_read_from_buffer(ubuf, sz, ppos, lbuf, strlen(lbuf)); |
| kfree(lbuf); |
| kfree(stats_shadow); |
| |
| return bytes_read; |
| } |
| |
| /* |
| * nss_stats_open() |
| */ |
| static int nss_stats_open(struct inode *inode, struct file *filp) |
| { |
| struct nss_stats_data *data = NULL; |
| |
| data = kzalloc(sizeof(struct nss_stats_data), GFP_KERNEL); |
| if (!data) { |
| return -ENOMEM; |
| } |
| memset(data, 0, sizeof (struct nss_stats_data)); |
| data->if_num = NSS_DYNAMIC_IF_START; |
| data->index = 0; |
| data->edma_id = (nss_ptr_t)inode->i_private; |
| filp->private_data = data; |
| |
| return 0; |
| } |
| |
| /* |
| * nss_stats_release() |
| */ |
| static int nss_stats_release(struct inode *inode, struct file *filp) |
| { |
| struct nss_stats_data *data = filp->private_data; |
| |
| if (data) { |
| kfree(data); |
| } |
| |
| return 0; |
| } |
| |
| #define NSS_STATS_DECLARE_FILE_OPERATIONS(name) \ |
| static const struct file_operations nss_stats_##name##_ops = { \ |
| .open = nss_stats_open, \ |
| .read = nss_stats_##name##_read, \ |
| .llseek = generic_file_llseek, \ |
| .release = nss_stats_release, \ |
| }; |
| |
| /* |
| * nss_ipv4_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(ipv4) |
| |
| /* |
| * ipv4_reasm_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(ipv4_reasm) |
| |
| /* |
| * ipv6_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(ipv6) |
| |
| /* |
| * ipv6_reasm_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(ipv6_reasm) |
| |
| /* |
| * n2h_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(n2h) |
| |
| /* |
| * lso_rx_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(lso_rx) |
| |
| /* |
| * drv_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(drv) |
| |
| /* |
| * pppoe_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(pppoe) |
| |
| /* |
| * l2tpv2_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(l2tpv2) |
| |
| /* |
| * map_t_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(map_t) |
| |
| /* |
| * ppe_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(ppe_conn) |
| NSS_STATS_DECLARE_FILE_OPERATIONS(ppe_l3) |
| NSS_STATS_DECLARE_FILE_OPERATIONS(ppe_code) |
| |
| /* |
| * pptp_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(pptp) |
| |
| /* |
| * gmac_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(gmac) |
| |
| /* |
| * capwap_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(capwap_encap) |
| NSS_STATS_DECLARE_FILE_OPERATIONS(capwap_decap) |
| |
| /* |
| * eth_rx_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(eth_rx) |
| |
| /* |
| * edma_port_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(edma_port_stats) |
| |
| /* |
| * edma_port_type_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(edma_port_type) |
| |
| /* |
| * edma_port_ring_map_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(edma_port_ring_map) |
| |
| /* |
| * edma_txring_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(edma_txring) |
| |
| /* |
| * edma_rxring_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(edma_rxring) |
| |
| /* |
| * edma_txcmplring_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(edma_txcmplring) |
| |
| /* |
| * edma_rxfillring_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(edma_rxfillring) |
| |
| /* |
| * gre_redir_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(gre_redir) |
| |
| /* |
| * sjack_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(sjack) |
| |
| /* |
| * portid_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(portid) |
| |
| NSS_STATS_DECLARE_FILE_OPERATIONS(wifi_if) |
| |
| NSS_STATS_DECLARE_FILE_OPERATIONS(virt_if) |
| |
| NSS_STATS_DECLARE_FILE_OPERATIONS(tx_rx_virt_if) |
| |
| /* |
| * wifi_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(wifi) |
| |
| /* |
| * dtls_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(dtls) |
| |
| /* |
| * gre_tunnel_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(gre_tunnel) |
| |
| /* |
| * trustsec_tx_stats_ops |
| */ |
| NSS_STATS_DECLARE_FILE_OPERATIONS(trustsec_tx) |
| |
| /* |
| * nss_stats_init() |
| * Enable NSS statistics |
| */ |
| void nss_stats_init(void) |
| { |
| int i = 0; |
| struct dentry *edma_d = NULL; |
| struct dentry *edma_port_dir_d = NULL; |
| struct dentry *edma_port_d = NULL; |
| struct dentry *edma_port_type_d = NULL; |
| struct dentry *edma_port_stats_d = NULL; |
| struct dentry *edma_port_ring_map_d = NULL; |
| |
| struct dentry *edma_rings_dir_d = NULL; |
| struct dentry *edma_tx_dir_d = NULL; |
| struct dentry *edma_tx_d = NULL; |
| struct dentry *edma_rx_dir_d = NULL; |
| struct dentry *edma_rx_d = NULL; |
| struct dentry *edma_txcmpl_dir_d = NULL; |
| struct dentry *edma_txcmpl_d = NULL; |
| struct dentry *edma_rxfill_dir_d = NULL; |
| struct dentry *edma_rxfill_d = NULL; |
| |
| char file_name[10]; |
| |
| /* |
| * NSS driver entry |
| */ |
| nss_top_main.top_dentry = debugfs_create_dir("qca-nss-drv", NULL); |
| if (unlikely(nss_top_main.top_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv directory in debugfs"); |
| |
| /* |
| * Non availability of debugfs directory is not a catastrophy |
| * We can still go ahead with other initialization |
| */ |
| return; |
| } |
| |
| nss_top_main.stats_dentry = debugfs_create_dir("stats", nss_top_main.top_dentry); |
| if (unlikely(nss_top_main.stats_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv directory in debugfs"); |
| |
| /* |
| * Non availability of debugfs directory is not a catastrophy |
| * We can still go ahead with rest of initialization |
| */ |
| return; |
| } |
| |
| /* |
| * Create files to obtain statistics |
| */ |
| |
| /* |
| * ipv4_stats |
| */ |
| nss_top_main.ipv4_dentry = debugfs_create_file("ipv4", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_ipv4_ops); |
| if (unlikely(nss_top_main.ipv4_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/ipv4 file in debugfs"); |
| return; |
| } |
| |
| /* |
| * ipv4_reasm_stats |
| */ |
| nss_top_main.ipv4_reasm_dentry = debugfs_create_file("ipv4_reasm", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_ipv4_reasm_ops); |
| if (unlikely(nss_top_main.ipv4_reasm_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/ipv4_reasm file in debugfs"); |
| return; |
| } |
| |
| /* |
| * ipv6_stats |
| */ |
| nss_top_main.ipv6_dentry = debugfs_create_file("ipv6", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_ipv6_ops); |
| if (unlikely(nss_top_main.ipv6_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/ipv6 file in debugfs"); |
| return; |
| } |
| |
| /* |
| * ipv6_reasm_stats |
| */ |
| nss_top_main.ipv6_reasm_dentry = debugfs_create_file("ipv6_reasm", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_ipv6_reasm_ops); |
| if (unlikely(nss_top_main.ipv6_reasm_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/ipv6_reasm file in debugfs"); |
| return; |
| } |
| |
| /* |
| * eth_rx__stats |
| */ |
| nss_top_main.eth_rx_dentry = debugfs_create_file("eth_rx", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_eth_rx_ops); |
| if (unlikely(nss_top_main.eth_rx_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/eth_rx file in debugfs"); |
| return; |
| } |
| |
| /* |
| * edma stats |
| */ |
| edma_d = debugfs_create_dir("edma", nss_top_main.stats_dentry); |
| if (unlikely(edma_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma directory in debugfs"); |
| return; |
| } |
| |
| /* |
| * edma port stats |
| */ |
| edma_port_dir_d = debugfs_create_dir("ports", edma_d); |
| if (unlikely(edma_port_dir_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/ports directory in debugfs"); |
| return; |
| } |
| |
| for (i = 0; i < NSS_EDMA_NUM_PORTS_MAX; i++) { |
| memset(file_name, 0, sizeof(file_name)); |
| snprintf(file_name, sizeof(file_name), "%d", i); |
| edma_port_d = NULL; |
| edma_port_stats_d = NULL; |
| edma_port_type_d = NULL; |
| edma_port_ring_map_d = NULL; |
| |
| edma_port_d = debugfs_create_dir(file_name, edma_port_dir_d); |
| if (unlikely(edma_port_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/ports/%d dir in debugfs", i); |
| return; |
| } |
| |
| edma_port_stats_d = debugfs_create_file("stats", 0400, edma_port_d, (void *)(nss_ptr_t)i, &nss_stats_edma_port_stats_ops); |
| if (unlikely(edma_port_stats_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/ports/%d/stats file in debugfs", i); |
| return; |
| } |
| |
| edma_port_type_d = debugfs_create_file("type", 0400, edma_port_d, (void *)(nss_ptr_t)i, &nss_stats_edma_port_type_ops); |
| if (unlikely(edma_port_type_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/ports/%d/type file in debugfs", i); |
| return; |
| } |
| |
| edma_port_ring_map_d = debugfs_create_file("ring_map", 0400, edma_port_d, (void *)(nss_ptr_t)i, &nss_stats_edma_port_ring_map_ops); |
| if (unlikely(edma_port_ring_map_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/ports/%d/ring_map file in debugfs", i); |
| return; |
| } |
| } |
| |
| /* |
| * edma ring stats |
| */ |
| edma_rings_dir_d = debugfs_create_dir("rings", edma_d); |
| if (unlikely(edma_rings_dir_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings directory in debugfs"); |
| return; |
| } |
| |
| /* |
| * edma tx ring stats |
| */ |
| edma_tx_dir_d = debugfs_create_dir("tx", edma_rings_dir_d); |
| if (unlikely(edma_tx_dir_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings/tx directory in debugfs"); |
| return; |
| } |
| |
| for (i = 0; i < NSS_EDMA_NUM_TX_RING_MAX; i++) { |
| memset(file_name, 0, sizeof(file_name)); |
| scnprintf(file_name, sizeof(file_name), "%d", i); |
| edma_tx_d = NULL; |
| edma_tx_d = debugfs_create_file(file_name, 0400, edma_tx_dir_d, (void *)(nss_ptr_t)i, &nss_stats_edma_txring_ops); |
| if (unlikely(edma_tx_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings/tx/%d file in debugfs", i); |
| return; |
| } |
| } |
| |
| /* |
| * edma rx ring stats |
| */ |
| edma_rx_dir_d = debugfs_create_dir("rx", edma_rings_dir_d); |
| if (unlikely(edma_rx_dir_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings/rx directory in debugfs"); |
| return; |
| } |
| |
| for (i = 0; i < NSS_EDMA_NUM_RX_RING_MAX; i++) { |
| memset(file_name, 0, sizeof(file_name)); |
| scnprintf(file_name, sizeof(file_name), "%d", i); |
| edma_rx_d = NULL; |
| edma_rx_d = debugfs_create_file(file_name, 0400, edma_rx_dir_d, (void *)(nss_ptr_t)i, &nss_stats_edma_rxring_ops); |
| if (unlikely(edma_rx_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings/rx/%d file in debugfs", i); |
| return; |
| } |
| } |
| |
| /* |
| * edma tx cmpl ring stats |
| */ |
| edma_txcmpl_dir_d = debugfs_create_dir("txcmpl", edma_rings_dir_d); |
| if (unlikely(edma_txcmpl_dir_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings/txcmpl directory in debugfs"); |
| return; |
| } |
| |
| for (i = 0; i < NSS_EDMA_NUM_TXCMPL_RING_MAX; i++) { |
| memset(file_name, 0, sizeof(file_name)); |
| scnprintf(file_name, sizeof(file_name), "%d", i); |
| edma_txcmpl_d = NULL; |
| edma_txcmpl_d = debugfs_create_file(file_name, 0400, edma_txcmpl_dir_d, (void *)(nss_ptr_t)i, &nss_stats_edma_txcmplring_ops); |
| if (unlikely(edma_txcmpl_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings/txcmpl/%d file in debugfs", i); |
| return; |
| } |
| } |
| |
| /* |
| * edma rx fill ring stats |
| */ |
| edma_rxfill_dir_d = debugfs_create_dir("rxfill", edma_rings_dir_d); |
| if (unlikely(edma_rxfill_dir_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings/rxfill directory in debugfs"); |
| return; |
| } |
| |
| for (i = 0; i < NSS_EDMA_NUM_RXFILL_RING_MAX; i++) { |
| memset(file_name, 0, sizeof(file_name)); |
| scnprintf(file_name, sizeof(file_name), "%d", i); |
| edma_rxfill_d = NULL; |
| edma_rxfill_d = debugfs_create_file(file_name, 0400, edma_rxfill_dir_d, (void *)(nss_ptr_t)i, &nss_stats_edma_rxfillring_ops); |
| if (unlikely(edma_rxfill_d == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/edma/rings/rxfill/%d file in debugfs", i); |
| return; |
| } |
| } |
| |
| /* |
| * n2h_stats |
| */ |
| nss_top_main.n2h_dentry = debugfs_create_file("n2h", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_n2h_ops); |
| if (unlikely(nss_top_main.n2h_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/n2h directory in debugfs"); |
| return; |
| } |
| |
| /* |
| * lso_rx_stats |
| */ |
| nss_top_main.lso_rx_dentry = debugfs_create_file("lso_rx", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_lso_rx_ops); |
| if (unlikely(nss_top_main.lso_rx_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/lso_rx file in debugfs"); |
| return; |
| } |
| |
| /* |
| * drv_stats |
| */ |
| nss_top_main.drv_dentry = debugfs_create_file("drv", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_drv_ops); |
| if (unlikely(nss_top_main.drv_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/drv directory in debugfs"); |
| return; |
| } |
| |
| /* |
| * pppoe_stats |
| */ |
| nss_top_main.pppoe_dentry = debugfs_create_file("pppoe", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_pppoe_ops); |
| if (unlikely(nss_top_main.pppoe_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/pppoe file in debugfs"); |
| return; |
| } |
| |
| /* |
| * gmac_stats |
| */ |
| nss_top_main.gmac_dentry = debugfs_create_file("gmac", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_gmac_ops); |
| if (unlikely(nss_top_main.gmac_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/gmac file in debugfs"); |
| return; |
| } |
| |
| /* |
| * CAPWAP stats. |
| */ |
| nss_top_main.capwap_encap_dentry = debugfs_create_file("capwap_encap", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_capwap_encap_ops); |
| if (unlikely(nss_top_main.capwap_encap_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/capwap_encap file in debugfs"); |
| return; |
| } |
| |
| nss_top_main.capwap_decap_dentry = debugfs_create_file("capwap_decap", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_capwap_decap_ops); |
| if (unlikely(nss_top_main.capwap_decap_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/capwap_decap file in debugfs"); |
| return; |
| } |
| |
| /* |
| * GRE_REDIR stats |
| */ |
| nss_top_main.gre_redir_dentry = debugfs_create_file("gre_redir", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_gre_redir_ops); |
| if (unlikely(nss_top_main.gre_redir_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/gre_redir file in debugfs"); |
| return; |
| } |
| |
| /* |
| * SJACK stats |
| */ |
| nss_top_main.sjack_dentry = debugfs_create_file("sjack", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_sjack_ops); |
| if (unlikely(nss_top_main.sjack_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/sjack file in debugfs"); |
| return; |
| } |
| |
| /* |
| * PORTID stats |
| */ |
| nss_top_main.portid_dentry = debugfs_create_file("portid", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_portid_ops); |
| if (unlikely(nss_top_main.portid_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/portid file in debugfs"); |
| return; |
| } |
| |
| /* |
| * WIFI stats |
| */ |
| nss_top_main.wifi_dentry = debugfs_create_file("wifi", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_wifi_ops); |
| if (unlikely(nss_top_main.wifi_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/wifi file in debugfs"); |
| return; |
| } |
| |
| /* |
| * wifi_if stats |
| */ |
| nss_top_main.wifi_if_dentry = debugfs_create_file("wifi_if", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_wifi_if_ops); |
| if (unlikely(nss_top_main.wifi_if_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/wifi_if file in debugfs"); |
| return; |
| } |
| |
| nss_top_main.virt_if_dentry = debugfs_create_file("virt_if", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_virt_if_ops); |
| if (unlikely(nss_top_main.virt_if_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/virt_if file in debugfs"); |
| return; |
| } |
| |
| nss_top_main.tx_rx_virt_if_dentry = debugfs_create_file("tx_rx_virt_if", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_tx_rx_virt_if_ops); |
| if (unlikely(nss_top_main.virt_if_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/tx_rx_virt_if file in debugfs"); |
| return; |
| } |
| |
| /* |
| * L2TPV2 Stats |
| */ |
| nss_top_main.l2tpv2_dentry = debugfs_create_file("l2tpv2", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_l2tpv2_ops); |
| if (unlikely(nss_top_main.l2tpv2_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/l2tpv2 file in debugfs"); |
| return; |
| } |
| |
| /* |
| * Map-t Stats |
| */ |
| nss_top_main.map_t_dentry = debugfs_create_file("map_t", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_map_t_ops); |
| if (unlikely(nss_top_main.map_t_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/map_t file in debugfs"); |
| return; |
| } |
| |
| /* |
| * PPE Stats |
| */ |
| nss_top_main.ppe_dentry = debugfs_create_dir("ppe", nss_top_main.stats_dentry); |
| if (unlikely(nss_top_main.ppe_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv directory in debugfs"); |
| return; |
| } |
| |
| nss_top_main.ppe_conn_dentry = debugfs_create_file("connection", 0400, |
| nss_top_main.ppe_dentry, &nss_top_main, &nss_stats_ppe_conn_ops); |
| if (unlikely(nss_top_main.ppe_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/ppe/connection file in debugfs"); |
| } |
| |
| nss_top_main.ppe_l3_dentry = debugfs_create_file("l3", 0400, |
| nss_top_main.ppe_dentry, &nss_top_main, &nss_stats_ppe_l3_ops); |
| if (unlikely(nss_top_main.ppe_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/ppe/l3 file in debugfs"); |
| } |
| |
| nss_top_main.ppe_l3_dentry = debugfs_create_file("ppe_code", 0400, |
| nss_top_main.ppe_dentry, &nss_top_main, &nss_stats_ppe_code_ops); |
| if (unlikely(nss_top_main.ppe_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/ppe/ppe_code file in debugfs"); |
| } |
| |
| /* |
| * PPTP Stats |
| */ |
| nss_top_main.pptp_dentry = debugfs_create_file("pptp", 0400, |
| nss_top_main.stats_dentry, &nss_top_main, &nss_stats_pptp_ops); |
| if (unlikely(nss_top_main.pptp_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/pptp file in debugfs"); |
| } |
| |
| /* |
| * DTLS Stats |
| */ |
| nss_top_main.dtls_dentry = debugfs_create_file("dtls", 0400, |
| nss_top_main.stats_dentry, |
| &nss_top_main, |
| &nss_stats_dtls_ops); |
| if (unlikely(nss_top_main.dtls_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/dtls file in debugfs"); |
| return; |
| } |
| |
| /* |
| * GRE Tunnel Stats |
| */ |
| nss_top_main.gre_tunnel_dentry = debugfs_create_file("gre_tunnel", 0400, |
| nss_top_main.stats_dentry, |
| &nss_top_main, |
| &nss_stats_gre_tunnel_ops); |
| if (unlikely(nss_top_main.gre_tunnel_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/gre_tunnel file in debugfs"); |
| return; |
| } |
| |
| /* |
| * TrustSec TX Stats |
| */ |
| nss_top_main.trustsec_tx_dentry = debugfs_create_file("trustsec_tx", 0400, |
| nss_top_main.stats_dentry, |
| &nss_top_main, |
| &nss_stats_trustsec_tx_ops); |
| if (unlikely(nss_top_main.trustsec_tx_dentry == NULL)) { |
| nss_warning("Failed to create qca-nss-drv/stats/trustsec_tx file in debugfs"); |
| return; |
| } |
| |
| nss_log_init(); |
| } |
| |
| /* |
| * nss_stats_clean() |
| * Cleanup NSS statistics files |
| */ |
| void nss_stats_clean(void) |
| { |
| /* |
| * Remove debugfs tree |
| */ |
| if (likely(nss_top_main.top_dentry != NULL)) { |
| debugfs_remove_recursive(nss_top_main.top_dentry); |
| nss_top_main.top_dentry = NULL; |
| } |
| } |