linux_ac.c 26 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036
  1. /*
  2. * Copyright (c) 2012-2019 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #ifndef REMOVE_PKT_LOG
  19. #ifndef EXPORT_SYMTAB
  20. #define EXPORT_SYMTAB
  21. #endif
  22. #ifndef __KERNEL__
  23. #define __KERNEL__
  24. #endif
  25. /*
  26. * Linux specific implementation of Pktlogs for 802.11ac
  27. */
  28. #include <linux/kernel.h>
  29. #include <linux/init.h>
  30. #include <linux/module.h>
  31. #include <linux/vmalloc.h>
  32. #include <linux/proc_fs.h>
  33. #include <pktlog_ac_i.h>
  34. #include <pktlog_ac_fmt.h>
  35. #include "i_host_diag_core_log.h"
  36. #include "host_diag_core_log.h"
  37. #include "ani_global.h"
  38. #define PKTLOG_DEVNAME_SIZE 32
  39. #define MAX_WLANDEV 1
  40. #ifdef MULTI_IF_NAME
  41. #define PKTLOG_PROC_DIR "ath_pktlog" MULTI_IF_NAME
  42. #else
  43. #define PKTLOG_PROC_DIR "ath_pktlog"
  44. #endif
  45. /* Permissions for creating proc entries */
  46. #define PKTLOG_PROC_PERM 0444
  47. #define PKTLOG_PROCSYS_DIR_PERM 0555
  48. #define PKTLOG_PROCSYS_PERM 0644
  49. #ifndef __MOD_INC_USE_COUNT
  50. #define PKTLOG_MOD_INC_USE_COUNT do { \
  51. if (!try_module_get(THIS_MODULE)) { \
  52. qdf_nofl_info("try_module_get failed"); \
  53. } } while (0)
  54. #define PKTLOG_MOD_DEC_USE_COUNT module_put(THIS_MODULE)
  55. #else
  56. #define PKTLOG_MOD_INC_USE_COUNT MOD_INC_USE_COUNT
  57. #define PKTLOG_MOD_DEC_USE_COUNT MOD_DEC_USE_COUNT
  58. #endif
  59. static struct ath_pktlog_info *g_pktlog_info;
  60. static struct proc_dir_entry *g_pktlog_pde;
  61. static DEFINE_MUTEX(proc_mutex);
  62. static int pktlog_attach(struct hif_opaque_softc *scn);
  63. static void pktlog_detach(struct hif_opaque_softc *scn);
  64. static int pktlog_open(struct inode *i, struct file *f);
  65. static int pktlog_release(struct inode *i, struct file *f);
  66. static ssize_t pktlog_read(struct file *file, char *buf, size_t nbytes,
  67. loff_t *ppos);
  68. static struct file_operations pktlog_fops = {
  69. open: pktlog_open,
  70. release:pktlog_release,
  71. read : pktlog_read,
  72. };
  73. void pktlog_disable_adapter_logging(struct hif_opaque_softc *scn)
  74. {
  75. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  76. if (pl_dev)
  77. pl_dev->pl_info->log_state = 0;
  78. }
  79. int pktlog_alloc_buf(struct hif_opaque_softc *scn)
  80. {
  81. uint32_t page_cnt;
  82. unsigned long vaddr;
  83. struct page *vpg;
  84. struct pktlog_dev_t *pl_dev;
  85. struct ath_pktlog_info *pl_info;
  86. struct ath_pktlog_buf *buffer;
  87. pl_dev = get_pktlog_handle();
  88. if (!pl_dev) {
  89. qdf_nofl_info(PKTLOG_TAG
  90. "%s: pdev_txrx_handle->pl_dev is null", __func__);
  91. return -EINVAL;
  92. }
  93. pl_info = pl_dev->pl_info;
  94. page_cnt = (sizeof(*(pl_info->buf)) + pl_info->buf_size) / PAGE_SIZE;
  95. qdf_spin_lock_bh(&pl_info->log_lock);
  96. if (pl_info->buf) {
  97. qdf_spin_unlock_bh(&pl_info->log_lock);
  98. qdf_nofl_info(PKTLOG_TAG "Buffer is already in use");
  99. return -EINVAL;
  100. }
  101. qdf_spin_unlock_bh(&pl_info->log_lock);
  102. buffer = vmalloc((page_cnt + 2) * PAGE_SIZE);
  103. if (!buffer) {
  104. return -ENOMEM;
  105. }
  106. buffer = (struct ath_pktlog_buf *)
  107. (((unsigned long)(buffer) + PAGE_SIZE - 1)
  108. & PAGE_MASK);
  109. for (vaddr = (unsigned long)(buffer);
  110. vaddr < ((unsigned long)(buffer) + (page_cnt * PAGE_SIZE));
  111. vaddr += PAGE_SIZE) {
  112. vpg = vmalloc_to_page((const void *)vaddr);
  113. SetPageReserved(vpg);
  114. }
  115. qdf_spin_lock_bh(&pl_info->log_lock);
  116. if (pl_info->buf)
  117. pktlog_release_buf(scn);
  118. pl_info->buf = buffer;
  119. qdf_spin_unlock_bh(&pl_info->log_lock);
  120. return 0;
  121. }
  122. void pktlog_release_buf(struct hif_opaque_softc *scn)
  123. {
  124. unsigned long page_cnt;
  125. unsigned long vaddr;
  126. struct page *vpg;
  127. struct pktlog_dev_t *pl_dev;
  128. struct ath_pktlog_info *pl_info;
  129. pl_dev = get_pktlog_handle();
  130. if (!pl_dev) {
  131. qdf_print("%s: invalid pl_dev handle", __func__);
  132. return;
  133. }
  134. if (!pl_dev->pl_info) {
  135. qdf_print("%s: invalid pl_dev handle", __func__);
  136. return;
  137. }
  138. pl_info = pl_dev->pl_info;
  139. page_cnt = ((sizeof(*(pl_info->buf)) + pl_info->buf_size) /
  140. PAGE_SIZE) + 1;
  141. for (vaddr = (unsigned long)(pl_info->buf);
  142. vaddr < (unsigned long)(pl_info->buf) + (page_cnt * PAGE_SIZE);
  143. vaddr += PAGE_SIZE) {
  144. vpg = vmalloc_to_page((const void *)vaddr);
  145. ClearPageReserved(vpg);
  146. }
  147. vfree(pl_info->buf);
  148. pl_info->buf = NULL;
  149. }
  150. static void pktlog_cleanup(struct ath_pktlog_info *pl_info)
  151. {
  152. pl_info->log_state = 0;
  153. PKTLOG_LOCK_DESTROY(pl_info);
  154. mutex_destroy(&pl_info->pktlog_mutex);
  155. }
  156. /* sysctl procfs handler to enable pktlog */
  157. static int
  158. qdf_sysctl_decl(ath_sysctl_pktlog_enable, ctl, write, filp, buffer, lenp, ppos)
  159. {
  160. int ret, enable;
  161. ol_ath_generic_softc_handle scn;
  162. struct pktlog_dev_t *pl_dev;
  163. mutex_lock(&proc_mutex);
  164. scn = (ol_ath_generic_softc_handle) ctl->extra1;
  165. if (!scn) {
  166. mutex_unlock(&proc_mutex);
  167. qdf_nofl_info("%s: Invalid scn context", __func__);
  168. ASSERT(0);
  169. return -EINVAL;
  170. }
  171. pl_dev = get_pktlog_handle();
  172. if (!pl_dev) {
  173. mutex_unlock(&proc_mutex);
  174. qdf_nofl_info("%s: Invalid pktlog context", __func__);
  175. ASSERT(0);
  176. return -ENODEV;
  177. }
  178. ctl->data = &enable;
  179. ctl->maxlen = sizeof(enable);
  180. if (write) {
  181. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  182. lenp, ppos);
  183. if (ret == 0) {
  184. ret = pl_dev->pl_funcs->pktlog_enable(
  185. (struct hif_opaque_softc *)scn, enable,
  186. cds_is_packet_log_enabled(), 0, 1);
  187. }
  188. else
  189. QDF_TRACE(QDF_MODULE_ID_SYS, QDF_TRACE_LEVEL_DEBUG,
  190. "Line:%d %s:proc_dointvec failed reason %d",
  191. __LINE__, __func__, ret);
  192. } else {
  193. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  194. lenp, ppos);
  195. if (ret)
  196. QDF_TRACE(QDF_MODULE_ID_SYS, QDF_TRACE_LEVEL_DEBUG,
  197. "Line:%d %s:proc_dointvec failed reason %d",
  198. __LINE__, __func__, ret);
  199. }
  200. ctl->data = NULL;
  201. ctl->maxlen = 0;
  202. mutex_unlock(&proc_mutex);
  203. return ret;
  204. }
  205. static int get_pktlog_bufsize(struct pktlog_dev_t *pl_dev)
  206. {
  207. return pl_dev->pl_info->buf_size;
  208. }
  209. /* sysctl procfs handler to set/get pktlog size */
  210. static int
  211. qdf_sysctl_decl(ath_sysctl_pktlog_size, ctl, write, filp, buffer, lenp, ppos)
  212. {
  213. int ret, size;
  214. ol_ath_generic_softc_handle scn;
  215. struct pktlog_dev_t *pl_dev;
  216. mutex_lock(&proc_mutex);
  217. scn = (ol_ath_generic_softc_handle) ctl->extra1;
  218. if (!scn) {
  219. mutex_unlock(&proc_mutex);
  220. qdf_nofl_info("%s: Invalid scn context", __func__);
  221. ASSERT(0);
  222. return -EINVAL;
  223. }
  224. pl_dev = get_pktlog_handle();
  225. if (!pl_dev) {
  226. mutex_unlock(&proc_mutex);
  227. qdf_nofl_info("%s: Invalid pktlog handle", __func__);
  228. ASSERT(0);
  229. return -ENODEV;
  230. }
  231. ctl->data = &size;
  232. ctl->maxlen = sizeof(size);
  233. if (write) {
  234. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  235. lenp, ppos);
  236. if (ret == 0)
  237. ret = pl_dev->pl_funcs->pktlog_setsize(
  238. (struct hif_opaque_softc *)scn, size);
  239. } else {
  240. size = get_pktlog_bufsize(pl_dev);
  241. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  242. lenp, ppos);
  243. }
  244. ctl->data = NULL;
  245. ctl->maxlen = 0;
  246. mutex_unlock(&proc_mutex);
  247. return ret;
  248. }
  249. /* Register sysctl table */
  250. static int pktlog_sysctl_register(struct hif_opaque_softc *scn)
  251. {
  252. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  253. struct ath_pktlog_info_lnx *pl_info_lnx;
  254. char *proc_name;
  255. if (pl_dev) {
  256. pl_info_lnx = PL_INFO_LNX(pl_dev->pl_info);
  257. proc_name = pl_dev->name;
  258. } else {
  259. pl_info_lnx = PL_INFO_LNX(g_pktlog_info);
  260. proc_name = PKTLOG_PROC_SYSTEM;
  261. }
  262. /*
  263. * Setup the sysctl table for creating the following sysctl entries:
  264. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/enable for enabling/disabling
  265. * pktlog
  266. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/size for changing the buffer size
  267. */
  268. memset(pl_info_lnx->sysctls, 0, sizeof(pl_info_lnx->sysctls));
  269. pl_info_lnx->sysctls[0].procname = PKTLOG_PROC_DIR;
  270. pl_info_lnx->sysctls[0].mode = PKTLOG_PROCSYS_DIR_PERM;
  271. pl_info_lnx->sysctls[0].child = &pl_info_lnx->sysctls[2];
  272. /* [1] is NULL terminator */
  273. pl_info_lnx->sysctls[2].procname = proc_name;
  274. pl_info_lnx->sysctls[2].mode = PKTLOG_PROCSYS_DIR_PERM;
  275. pl_info_lnx->sysctls[2].child = &pl_info_lnx->sysctls[4];
  276. /* [3] is NULL terminator */
  277. pl_info_lnx->sysctls[4].procname = "enable";
  278. pl_info_lnx->sysctls[4].mode = PKTLOG_PROCSYS_PERM;
  279. pl_info_lnx->sysctls[4].proc_handler = ath_sysctl_pktlog_enable;
  280. pl_info_lnx->sysctls[4].extra1 = scn;
  281. pl_info_lnx->sysctls[5].procname = "size";
  282. pl_info_lnx->sysctls[5].mode = PKTLOG_PROCSYS_PERM;
  283. pl_info_lnx->sysctls[5].proc_handler = ath_sysctl_pktlog_size;
  284. pl_info_lnx->sysctls[5].extra1 = scn;
  285. pl_info_lnx->sysctls[6].procname = "options";
  286. pl_info_lnx->sysctls[6].mode = PKTLOG_PROCSYS_PERM;
  287. pl_info_lnx->sysctls[6].proc_handler = proc_dointvec;
  288. pl_info_lnx->sysctls[6].data = &pl_info_lnx->info.options;
  289. pl_info_lnx->sysctls[6].maxlen = sizeof(pl_info_lnx->info.options);
  290. pl_info_lnx->sysctls[7].procname = "sack_thr";
  291. pl_info_lnx->sysctls[7].mode = PKTLOG_PROCSYS_PERM;
  292. pl_info_lnx->sysctls[7].proc_handler = proc_dointvec;
  293. pl_info_lnx->sysctls[7].data = &pl_info_lnx->info.sack_thr;
  294. pl_info_lnx->sysctls[7].maxlen = sizeof(pl_info_lnx->info.sack_thr);
  295. pl_info_lnx->sysctls[8].procname = "tail_length";
  296. pl_info_lnx->sysctls[8].mode = PKTLOG_PROCSYS_PERM;
  297. pl_info_lnx->sysctls[8].proc_handler = proc_dointvec;
  298. pl_info_lnx->sysctls[8].data = &pl_info_lnx->info.tail_length;
  299. pl_info_lnx->sysctls[8].maxlen = sizeof(pl_info_lnx->info.tail_length);
  300. pl_info_lnx->sysctls[9].procname = "thruput_thresh";
  301. pl_info_lnx->sysctls[9].mode = PKTLOG_PROCSYS_PERM;
  302. pl_info_lnx->sysctls[9].proc_handler = proc_dointvec;
  303. pl_info_lnx->sysctls[9].data = &pl_info_lnx->info.thruput_thresh;
  304. pl_info_lnx->sysctls[9].maxlen =
  305. sizeof(pl_info_lnx->info.thruput_thresh);
  306. pl_info_lnx->sysctls[10].procname = "phyerr_thresh";
  307. pl_info_lnx->sysctls[10].mode = PKTLOG_PROCSYS_PERM;
  308. pl_info_lnx->sysctls[10].proc_handler = proc_dointvec;
  309. pl_info_lnx->sysctls[10].data = &pl_info_lnx->info.phyerr_thresh;
  310. pl_info_lnx->sysctls[10].maxlen =
  311. sizeof(pl_info_lnx->info.phyerr_thresh);
  312. pl_info_lnx->sysctls[11].procname = "per_thresh";
  313. pl_info_lnx->sysctls[11].mode = PKTLOG_PROCSYS_PERM;
  314. pl_info_lnx->sysctls[11].proc_handler = proc_dointvec;
  315. pl_info_lnx->sysctls[11].data = &pl_info_lnx->info.per_thresh;
  316. pl_info_lnx->sysctls[11].maxlen = sizeof(pl_info_lnx->info.per_thresh);
  317. pl_info_lnx->sysctls[12].procname = "trigger_interval";
  318. pl_info_lnx->sysctls[12].mode = PKTLOG_PROCSYS_PERM;
  319. pl_info_lnx->sysctls[12].proc_handler = proc_dointvec;
  320. pl_info_lnx->sysctls[12].data = &pl_info_lnx->info.trigger_interval;
  321. pl_info_lnx->sysctls[12].maxlen =
  322. sizeof(pl_info_lnx->info.trigger_interval);
  323. /* [13] is NULL terminator */
  324. /* and register everything */
  325. /* register_sysctl_table changed from 2.6.21 onwards */
  326. pl_info_lnx->sysctl_header =
  327. register_sysctl_table(pl_info_lnx->sysctls);
  328. if (!pl_info_lnx->sysctl_header) {
  329. qdf_nofl_info("%s: failed to register sysctls!", proc_name);
  330. return -EINVAL;
  331. }
  332. return 0;
  333. }
  334. /*
  335. * Initialize logging for system or adapter
  336. * Parameter scn should be NULL for system wide logging
  337. */
  338. static int pktlog_attach(struct hif_opaque_softc *scn)
  339. {
  340. struct pktlog_dev_t *pl_dev;
  341. struct ath_pktlog_info_lnx *pl_info_lnx;
  342. char *proc_name;
  343. struct proc_dir_entry *proc_entry;
  344. /* Allocate pktlog dev for later use */
  345. pl_dev = get_pktlog_handle();
  346. if (pl_dev) {
  347. pl_info_lnx = kmalloc(sizeof(*pl_info_lnx), GFP_KERNEL);
  348. if (!pl_info_lnx) {
  349. QDF_TRACE(QDF_MODULE_ID_QDF, QDF_TRACE_LEVEL_ERROR,
  350. "%s: Allocation failed for pl_info",
  351. __func__);
  352. goto attach_fail1;
  353. }
  354. pl_dev->pl_info = &pl_info_lnx->info;
  355. pl_dev->name = WLANDEV_BASENAME;
  356. proc_name = pl_dev->name;
  357. if (!pl_dev->pl_funcs)
  358. pl_dev->pl_funcs = &ol_pl_funcs;
  359. /*
  360. * Valid for both direct attach and offload architecture
  361. */
  362. pl_dev->pl_funcs->pktlog_init(scn);
  363. } else {
  364. return -EINVAL;
  365. }
  366. /*
  367. * initialize log info
  368. * might be good to move to pktlog_init
  369. */
  370. /* pl_dev->tgt_pktlog_alloced = false; */
  371. pl_info_lnx->proc_entry = NULL;
  372. pl_info_lnx->sysctl_header = NULL;
  373. proc_entry = proc_create_data(proc_name, PKTLOG_PROC_PERM,
  374. g_pktlog_pde, &pktlog_fops,
  375. &pl_info_lnx->info);
  376. if (!proc_entry) {
  377. qdf_nofl_info(PKTLOG_TAG "%s: create_proc_entry failed for %s",
  378. __func__, proc_name);
  379. goto attach_fail1;
  380. }
  381. pl_info_lnx->proc_entry = proc_entry;
  382. if (pktlog_sysctl_register(scn)) {
  383. qdf_nofl_info(PKTLOG_TAG "%s: sysctl register failed for %s",
  384. __func__, proc_name);
  385. goto attach_fail2;
  386. }
  387. return 0;
  388. attach_fail2:
  389. remove_proc_entry(proc_name, g_pktlog_pde);
  390. attach_fail1:
  391. if (pl_dev)
  392. kfree(pl_dev->pl_info);
  393. return -EINVAL;
  394. }
  395. static void pktlog_sysctl_unregister(struct pktlog_dev_t *pl_dev)
  396. {
  397. struct ath_pktlog_info_lnx *pl_info_lnx;
  398. if (!pl_dev) {
  399. qdf_nofl_info("%s: Invalid pktlog context", __func__);
  400. ASSERT(0);
  401. return;
  402. }
  403. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  404. PL_INFO_LNX(g_pktlog_info);
  405. if (pl_info_lnx->sysctl_header) {
  406. unregister_sysctl_table(pl_info_lnx->sysctl_header);
  407. pl_info_lnx->sysctl_header = NULL;
  408. }
  409. }
  410. static void pktlog_detach(struct hif_opaque_softc *scn)
  411. {
  412. struct ath_pktlog_info *pl_info;
  413. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  414. if (!pl_dev) {
  415. qdf_nofl_info("%s: Invalid pktlog context", __func__);
  416. ASSERT(0);
  417. return;
  418. }
  419. pl_info = pl_dev->pl_info;
  420. remove_proc_entry(WLANDEV_BASENAME, g_pktlog_pde);
  421. pktlog_sysctl_unregister(pl_dev);
  422. qdf_spin_lock_bh(&pl_info->log_lock);
  423. if (pl_info->buf) {
  424. pktlog_release_buf(scn);
  425. pl_dev->tgt_pktlog_alloced = false;
  426. }
  427. qdf_spin_unlock_bh(&pl_info->log_lock);
  428. pktlog_cleanup(pl_info);
  429. if (pl_dev) {
  430. kfree(pl_info);
  431. pl_dev->pl_info = NULL;
  432. }
  433. }
  434. static int __pktlog_open(struct inode *i, struct file *f)
  435. {
  436. struct hif_opaque_softc *scn;
  437. struct pktlog_dev_t *pl_dev;
  438. struct ath_pktlog_info *pl_info;
  439. int ret = 0;
  440. PKTLOG_MOD_INC_USE_COUNT;
  441. pl_info = PDE_DATA(f->f_path.dentry->d_inode);
  442. if (!pl_info) {
  443. qdf_nofl_err("%s: pl_info NULL", __func__);
  444. return -EINVAL;
  445. }
  446. if (pl_info->curr_pkt_state != PKTLOG_OPR_NOT_IN_PROGRESS) {
  447. qdf_nofl_info("%s: plinfo state (%d) != PKTLOG_OPR_NOT_IN_PROGRESS",
  448. __func__, pl_info->curr_pkt_state);
  449. return -EBUSY;
  450. }
  451. pl_info->curr_pkt_state = PKTLOG_OPR_IN_PROGRESS_READ_START;
  452. scn = cds_get_context(QDF_MODULE_ID_HIF);
  453. if (!scn) {
  454. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  455. qdf_print("%s: Invalid scn context", __func__);
  456. ASSERT(0);
  457. return -EINVAL;
  458. }
  459. pl_dev = get_pktlog_handle();
  460. if (!pl_dev) {
  461. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  462. qdf_print("%s: Invalid pktlog handle", __func__);
  463. ASSERT(0);
  464. return -ENODEV;
  465. }
  466. pl_info->init_saved_state = pl_info->log_state;
  467. if (!pl_info->log_state) {
  468. /* Pktlog is already disabled.
  469. * Proceed to read directly.
  470. */
  471. pl_info->curr_pkt_state =
  472. PKTLOG_OPR_IN_PROGRESS_READ_START_PKTLOG_DISABLED;
  473. return ret;
  474. }
  475. /* Disbable the pktlog internally. */
  476. ret = pl_dev->pl_funcs->pktlog_disable(scn);
  477. pl_info->log_state = 0;
  478. pl_info->curr_pkt_state =
  479. PKTLOG_OPR_IN_PROGRESS_READ_START_PKTLOG_DISABLED;
  480. return ret;
  481. }
  482. static int pktlog_open(struct inode *i, struct file *f)
  483. {
  484. struct qdf_op_sync *op_sync;
  485. int errno;
  486. errno = qdf_op_protect(&op_sync);
  487. if (errno)
  488. return errno;
  489. errno = __pktlog_open(i, f);
  490. qdf_op_unprotect(op_sync);
  491. return errno;
  492. }
  493. static int __pktlog_release(struct inode *i, struct file *f)
  494. {
  495. struct hif_opaque_softc *scn;
  496. struct pktlog_dev_t *pl_dev;
  497. struct ath_pktlog_info *pl_info;
  498. int ret = 0;
  499. PKTLOG_MOD_DEC_USE_COUNT;
  500. pl_info = PDE_DATA(f->f_path.dentry->d_inode);
  501. if (!pl_info)
  502. return -EINVAL;
  503. scn = cds_get_context(QDF_MODULE_ID_HIF);
  504. if (!scn) {
  505. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  506. qdf_print("%s: Invalid scn context", __func__);
  507. ASSERT(0);
  508. return -EINVAL;
  509. }
  510. pl_dev = get_pktlog_handle();
  511. if (!pl_dev) {
  512. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  513. qdf_print("%s: Invalid pktlog handle", __func__);
  514. ASSERT(0);
  515. return -ENODEV;
  516. }
  517. pl_info->curr_pkt_state = PKTLOG_OPR_IN_PROGRESS_READ_COMPLETE;
  518. /*clear pktlog buffer.*/
  519. pktlog_clearbuff(scn, true);
  520. pl_info->log_state = pl_info->init_saved_state;
  521. pl_info->init_saved_state = 0;
  522. /*Enable pktlog again*/
  523. ret = pl_dev->pl_funcs->pktlog_enable(
  524. (struct hif_opaque_softc *)scn, pl_info->log_state,
  525. cds_is_packet_log_enabled(), 0, 1);
  526. if (ret != 0)
  527. qdf_nofl_warn("%s: pktlog cannot be enabled. ret value %d",
  528. __func__, ret);
  529. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  530. return ret;
  531. }
  532. static int pktlog_release(struct inode *i, struct file *f)
  533. {
  534. struct qdf_op_sync *op_sync;
  535. int errno;
  536. errno = qdf_op_protect(&op_sync);
  537. if (errno)
  538. return errno;
  539. errno = __pktlog_release(i, f);
  540. qdf_op_unprotect(op_sync);
  541. return errno;
  542. }
  543. #ifndef MIN
  544. #define MIN(a, b) (((a) < (b)) ? (a) : (b))
  545. #endif
  546. /**
  547. * pktlog_read_proc_entry() - This function is used to read data from the
  548. * proc entry into the readers buffer
  549. * @buf: Readers buffer
  550. * @nbytes: Number of bytes to read
  551. * @ppos: Offset within the drivers buffer
  552. * @pl_info: Packet log information pointer
  553. * @read_complete: Boolean value indication whether read is complete
  554. *
  555. * This function is used to read data from the proc entry into the readers
  556. * buffer. Its functionality is similar to 'pktlog_read' which does
  557. * copy to user to the user space buffer
  558. *
  559. * Return: Number of bytes read from the buffer
  560. *
  561. */
  562. ssize_t
  563. pktlog_read_proc_entry(char *buf, size_t nbytes, loff_t *ppos,
  564. struct ath_pktlog_info *pl_info, bool *read_complete)
  565. {
  566. size_t bufhdr_size;
  567. size_t count = 0, ret_val = 0;
  568. int rem_len;
  569. int start_offset, end_offset;
  570. int fold_offset, ppos_data, cur_rd_offset, cur_wr_offset;
  571. struct ath_pktlog_buf *log_buf;
  572. qdf_spin_lock_bh(&pl_info->log_lock);
  573. log_buf = pl_info->buf;
  574. *read_complete = false;
  575. if (!log_buf) {
  576. *read_complete = true;
  577. qdf_spin_unlock_bh(&pl_info->log_lock);
  578. return 0;
  579. }
  580. if (*ppos == 0 && pl_info->log_state) {
  581. pl_info->saved_state = pl_info->log_state;
  582. pl_info->log_state = 0;
  583. }
  584. bufhdr_size = sizeof(log_buf->bufhdr);
  585. /* copy valid log entries from circular buffer into user space */
  586. rem_len = nbytes;
  587. count = 0;
  588. if (*ppos < bufhdr_size) {
  589. count = MIN((bufhdr_size - *ppos), rem_len);
  590. qdf_mem_copy(buf, ((char *)&log_buf->bufhdr) + *ppos,
  591. count);
  592. rem_len -= count;
  593. ret_val += count;
  594. }
  595. start_offset = log_buf->rd_offset;
  596. cur_wr_offset = log_buf->wr_offset;
  597. if ((rem_len == 0) || (start_offset < 0))
  598. goto rd_done;
  599. fold_offset = -1;
  600. cur_rd_offset = start_offset;
  601. /* Find the last offset and fold-offset if the buffer is folded */
  602. do {
  603. struct ath_pktlog_hdr *log_hdr;
  604. int log_data_offset;
  605. log_hdr = (struct ath_pktlog_hdr *) (log_buf->log_data +
  606. cur_rd_offset);
  607. log_data_offset = cur_rd_offset + sizeof(struct ath_pktlog_hdr);
  608. if ((fold_offset == -1)
  609. && ((pl_info->buf_size - log_data_offset)
  610. <= log_hdr->size))
  611. fold_offset = log_data_offset - 1;
  612. PKTLOG_MOV_RD_IDX(cur_rd_offset, log_buf, pl_info->buf_size);
  613. if ((fold_offset == -1) && (cur_rd_offset == 0)
  614. && (cur_rd_offset != cur_wr_offset))
  615. fold_offset = log_data_offset + log_hdr->size - 1;
  616. end_offset = log_data_offset + log_hdr->size - 1;
  617. } while (cur_rd_offset != cur_wr_offset);
  618. ppos_data = *ppos + ret_val - bufhdr_size + start_offset;
  619. if (fold_offset == -1) {
  620. if (ppos_data > end_offset)
  621. goto rd_done;
  622. count = MIN(rem_len, (end_offset - ppos_data + 1));
  623. qdf_mem_copy(buf + ret_val,
  624. log_buf->log_data + ppos_data,
  625. count);
  626. ret_val += count;
  627. rem_len -= count;
  628. } else {
  629. if (ppos_data <= fold_offset) {
  630. count = MIN(rem_len, (fold_offset - ppos_data + 1));
  631. qdf_mem_copy(buf + ret_val,
  632. log_buf->log_data + ppos_data,
  633. count);
  634. ret_val += count;
  635. rem_len -= count;
  636. }
  637. if (rem_len == 0)
  638. goto rd_done;
  639. ppos_data =
  640. *ppos + ret_val - (bufhdr_size +
  641. (fold_offset - start_offset + 1));
  642. if (ppos_data <= end_offset) {
  643. count = MIN(rem_len, (end_offset - ppos_data + 1));
  644. qdf_mem_copy(buf + ret_val,
  645. log_buf->log_data + ppos_data,
  646. count);
  647. ret_val += count;
  648. rem_len -= count;
  649. }
  650. }
  651. rd_done:
  652. if ((ret_val < nbytes) && pl_info->saved_state) {
  653. pl_info->log_state = pl_info->saved_state;
  654. pl_info->saved_state = 0;
  655. }
  656. *ppos += ret_val;
  657. if (ret_val == 0) {
  658. /* Write pointer might have been updated during the read.
  659. * So, if some data is written into, lets not reset the pointers
  660. * We can continue to read from the offset position
  661. */
  662. if (cur_wr_offset != log_buf->wr_offset) {
  663. *read_complete = false;
  664. } else {
  665. pl_info->buf->rd_offset = -1;
  666. pl_info->buf->wr_offset = 0;
  667. pl_info->buf->bytes_written = 0;
  668. pl_info->buf->offset = PKTLOG_READ_OFFSET;
  669. *read_complete = true;
  670. }
  671. }
  672. qdf_spin_unlock_bh(&pl_info->log_lock);
  673. return ret_val;
  674. }
  675. static ssize_t
  676. __pktlog_read(struct file *file, char *buf, size_t nbytes, loff_t *ppos)
  677. {
  678. size_t bufhdr_size;
  679. size_t count = 0, ret_val = 0;
  680. int rem_len;
  681. int start_offset, end_offset;
  682. int fold_offset, ppos_data, cur_rd_offset;
  683. struct ath_pktlog_info *pl_info;
  684. struct ath_pktlog_buf *log_buf;
  685. pl_info = PDE_DATA(file->f_path.dentry->d_inode);
  686. if (!pl_info)
  687. return 0;
  688. qdf_spin_lock_bh(&pl_info->log_lock);
  689. log_buf = pl_info->buf;
  690. if (!log_buf) {
  691. qdf_spin_unlock_bh(&pl_info->log_lock);
  692. return 0;
  693. }
  694. if (pl_info->log_state) {
  695. /* Read is not allowed when write is going on
  696. * When issuing cat command, ensure to send
  697. * pktlog disable command first.
  698. */
  699. qdf_spin_unlock_bh(&pl_info->log_lock);
  700. return -EINVAL;
  701. }
  702. if (*ppos == 0 && pl_info->log_state) {
  703. pl_info->saved_state = pl_info->log_state;
  704. pl_info->log_state = 0;
  705. }
  706. bufhdr_size = sizeof(log_buf->bufhdr);
  707. /* copy valid log entries from circular buffer into user space */
  708. rem_len = nbytes;
  709. count = 0;
  710. if (*ppos < bufhdr_size) {
  711. count = QDF_MIN((bufhdr_size - *ppos), rem_len);
  712. qdf_spin_unlock_bh(&pl_info->log_lock);
  713. if (copy_to_user(buf, ((char *)&log_buf->bufhdr) + *ppos,
  714. count)) {
  715. return -EFAULT;
  716. }
  717. rem_len -= count;
  718. ret_val += count;
  719. qdf_spin_lock_bh(&pl_info->log_lock);
  720. }
  721. start_offset = log_buf->rd_offset;
  722. if ((rem_len == 0) || (start_offset < 0))
  723. goto rd_done;
  724. fold_offset = -1;
  725. cur_rd_offset = start_offset;
  726. /* Find the last offset and fold-offset if the buffer is folded */
  727. do {
  728. struct ath_pktlog_hdr *log_hdr;
  729. int log_data_offset;
  730. log_hdr = (struct ath_pktlog_hdr *)(log_buf->log_data +
  731. cur_rd_offset);
  732. log_data_offset = cur_rd_offset + sizeof(struct ath_pktlog_hdr);
  733. if ((fold_offset == -1)
  734. && ((pl_info->buf_size - log_data_offset)
  735. <= log_hdr->size))
  736. fold_offset = log_data_offset - 1;
  737. PKTLOG_MOV_RD_IDX(cur_rd_offset, log_buf, pl_info->buf_size);
  738. if ((fold_offset == -1) && (cur_rd_offset == 0)
  739. && (cur_rd_offset != log_buf->wr_offset))
  740. fold_offset = log_data_offset + log_hdr->size - 1;
  741. end_offset = log_data_offset + log_hdr->size - 1;
  742. } while (cur_rd_offset != log_buf->wr_offset);
  743. ppos_data = *ppos + ret_val - bufhdr_size + start_offset;
  744. if (fold_offset == -1) {
  745. if (ppos_data > end_offset)
  746. goto rd_done;
  747. count = QDF_MIN(rem_len, (end_offset - ppos_data + 1));
  748. qdf_spin_unlock_bh(&pl_info->log_lock);
  749. if (copy_to_user(buf + ret_val,
  750. log_buf->log_data + ppos_data, count)) {
  751. return -EFAULT;
  752. }
  753. ret_val += count;
  754. rem_len -= count;
  755. qdf_spin_lock_bh(&pl_info->log_lock);
  756. } else {
  757. if (ppos_data <= fold_offset) {
  758. count = QDF_MIN(rem_len, (fold_offset - ppos_data + 1));
  759. qdf_spin_unlock_bh(&pl_info->log_lock);
  760. if (copy_to_user(buf + ret_val,
  761. log_buf->log_data + ppos_data,
  762. count)) {
  763. return -EFAULT;
  764. }
  765. ret_val += count;
  766. rem_len -= count;
  767. qdf_spin_lock_bh(&pl_info->log_lock);
  768. }
  769. if (rem_len == 0)
  770. goto rd_done;
  771. ppos_data =
  772. *ppos + ret_val - (bufhdr_size +
  773. (fold_offset - start_offset + 1));
  774. if (ppos_data <= end_offset) {
  775. count = QDF_MIN(rem_len, (end_offset - ppos_data + 1));
  776. qdf_spin_unlock_bh(&pl_info->log_lock);
  777. if (copy_to_user(buf + ret_val,
  778. log_buf->log_data + ppos_data,
  779. count)) {
  780. return -EFAULT;
  781. }
  782. ret_val += count;
  783. rem_len -= count;
  784. qdf_spin_lock_bh(&pl_info->log_lock);
  785. }
  786. }
  787. rd_done:
  788. if ((ret_val < nbytes) && pl_info->saved_state) {
  789. pl_info->log_state = pl_info->saved_state;
  790. pl_info->saved_state = 0;
  791. }
  792. *ppos += ret_val;
  793. qdf_spin_unlock_bh(&pl_info->log_lock);
  794. return ret_val;
  795. }
  796. static ssize_t
  797. pktlog_read(struct file *file, char *buf, size_t nbytes, loff_t *ppos)
  798. {
  799. struct ath_pktlog_info *info = PDE_DATA(file->f_path.dentry->d_inode);
  800. struct qdf_op_sync *op_sync;
  801. ssize_t err_size;
  802. if (!info)
  803. return 0;
  804. err_size = qdf_op_protect(&op_sync);
  805. if (err_size)
  806. return err_size;
  807. mutex_lock(&info->pktlog_mutex);
  808. err_size = __pktlog_read(file, buf, nbytes, ppos);
  809. mutex_unlock(&info->pktlog_mutex);
  810. qdf_op_unprotect(op_sync);
  811. return err_size;
  812. }
  813. int pktlogmod_init(void *context)
  814. {
  815. int ret;
  816. /* create the proc directory entry */
  817. g_pktlog_pde = proc_mkdir(PKTLOG_PROC_DIR, NULL);
  818. if (!g_pktlog_pde) {
  819. qdf_nofl_info(PKTLOG_TAG "%s: proc_mkdir failed", __func__);
  820. return -EPERM;
  821. }
  822. /* Attach packet log */
  823. ret = pktlog_attach((struct hif_opaque_softc *)context);
  824. /* If packet log init failed */
  825. if (ret)
  826. goto attach_fail;
  827. return ret;
  828. attach_fail:
  829. remove_proc_entry(PKTLOG_PROC_DIR, NULL);
  830. g_pktlog_pde = NULL;
  831. return ret;
  832. }
  833. void pktlogmod_exit(void *context)
  834. {
  835. if (!g_pktlog_pde)
  836. return;
  837. pktlog_detach((struct hif_opaque_softc *)context);
  838. /*
  839. * pdev kill needs to be implemented
  840. */
  841. remove_proc_entry(PKTLOG_PROC_DIR, NULL);
  842. }
  843. #endif