linux_ac.c 26 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072
  1. /*
  2. * Copyright (c) 2012-2019 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #ifndef REMOVE_PKT_LOG
  19. #ifndef EXPORT_SYMTAB
  20. #define EXPORT_SYMTAB
  21. #endif
  22. #ifndef __KERNEL__
  23. #define __KERNEL__
  24. #endif
  25. /*
  26. * Linux specific implementation of Pktlogs for 802.11ac
  27. */
  28. #include <linux/kernel.h>
  29. #include <linux/init.h>
  30. #include <linux/module.h>
  31. #include <linux/vmalloc.h>
  32. #include <linux/proc_fs.h>
  33. #include <pktlog_ac_i.h>
  34. #include <pktlog_ac_fmt.h>
  35. #include "i_host_diag_core_log.h"
  36. #include "host_diag_core_log.h"
  37. #include "ani_global.h"
  38. #define PKTLOG_DEVNAME_SIZE 32
  39. #define MAX_WLANDEV 1
  40. #ifdef MULTI_IF_NAME
  41. #define PKTLOG_PROC_DIR "ath_pktlog" MULTI_IF_NAME
  42. #else
  43. #define PKTLOG_PROC_DIR "ath_pktlog"
  44. #endif
  45. /* Permissions for creating proc entries */
  46. #define PKTLOG_PROC_PERM 0444
  47. #define PKTLOG_PROCSYS_DIR_PERM 0555
  48. #define PKTLOG_PROCSYS_PERM 0644
  49. #ifndef __MOD_INC_USE_COUNT
  50. #define PKTLOG_MOD_INC_USE_COUNT do { \
  51. if (!try_module_get(THIS_MODULE)) { \
  52. qdf_nofl_info("try_module_get failed"); \
  53. } } while (0)
  54. #define PKTLOG_MOD_DEC_USE_COUNT module_put(THIS_MODULE)
  55. #else
  56. #define PKTLOG_MOD_INC_USE_COUNT MOD_INC_USE_COUNT
  57. #define PKTLOG_MOD_DEC_USE_COUNT MOD_DEC_USE_COUNT
  58. #endif
  59. static struct ath_pktlog_info *g_pktlog_info;
  60. static struct proc_dir_entry *g_pktlog_pde;
  61. static DEFINE_MUTEX(proc_mutex);
  62. static int pktlog_attach(struct hif_opaque_softc *scn);
  63. static void pktlog_detach(struct hif_opaque_softc *scn);
  64. static int pktlog_open(struct inode *i, struct file *f);
  65. static int pktlog_release(struct inode *i, struct file *f);
  66. static ssize_t pktlog_read(struct file *file, char *buf, size_t nbytes,
  67. loff_t *ppos);
  68. static struct file_operations pktlog_fops = {
  69. open: pktlog_open,
  70. release:pktlog_release,
  71. read : pktlog_read,
  72. };
  73. void pktlog_disable_adapter_logging(struct hif_opaque_softc *scn)
  74. {
  75. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  76. if (pl_dev)
  77. pl_dev->pl_info->log_state = 0;
  78. }
  79. int pktlog_alloc_buf(struct hif_opaque_softc *scn)
  80. {
  81. uint32_t page_cnt;
  82. unsigned long vaddr;
  83. struct page *vpg;
  84. struct pktlog_dev_t *pl_dev;
  85. struct ath_pktlog_info *pl_info;
  86. struct ath_pktlog_buf *buffer;
  87. pl_dev = get_pktlog_handle();
  88. if (!pl_dev) {
  89. qdf_nofl_info(PKTLOG_TAG
  90. "%s: pdev_txrx_handle->pl_dev is null", __func__);
  91. return -EINVAL;
  92. }
  93. pl_info = pl_dev->pl_info;
  94. page_cnt = (sizeof(*(pl_info->buf)) + pl_info->buf_size) / PAGE_SIZE;
  95. qdf_spin_lock_bh(&pl_info->log_lock);
  96. if (pl_info->buf) {
  97. qdf_spin_unlock_bh(&pl_info->log_lock);
  98. qdf_nofl_info(PKTLOG_TAG "Buffer is already in use");
  99. return -EINVAL;
  100. }
  101. qdf_spin_unlock_bh(&pl_info->log_lock);
  102. buffer = vmalloc((page_cnt + 2) * PAGE_SIZE);
  103. if (!buffer) {
  104. return -ENOMEM;
  105. }
  106. buffer = (struct ath_pktlog_buf *)
  107. (((unsigned long)(buffer) + PAGE_SIZE - 1)
  108. & PAGE_MASK);
  109. for (vaddr = (unsigned long)(buffer);
  110. vaddr < ((unsigned long)(buffer) + (page_cnt * PAGE_SIZE));
  111. vaddr += PAGE_SIZE) {
  112. vpg = vmalloc_to_page((const void *)vaddr);
  113. SetPageReserved(vpg);
  114. }
  115. qdf_spin_lock_bh(&pl_info->log_lock);
  116. if (pl_info->buf)
  117. pktlog_release_buf(scn);
  118. pl_info->buf = buffer;
  119. qdf_spin_unlock_bh(&pl_info->log_lock);
  120. return 0;
  121. }
  122. void pktlog_release_buf(struct hif_opaque_softc *scn)
  123. {
  124. unsigned long page_cnt;
  125. unsigned long vaddr;
  126. struct page *vpg;
  127. struct pktlog_dev_t *pl_dev;
  128. struct ath_pktlog_info *pl_info;
  129. pl_dev = get_pktlog_handle();
  130. if (!pl_dev) {
  131. qdf_print("%s: invalid pl_dev handle", __func__);
  132. return;
  133. }
  134. if (!pl_dev->pl_info) {
  135. qdf_print("%s: invalid pl_dev handle", __func__);
  136. return;
  137. }
  138. pl_info = pl_dev->pl_info;
  139. page_cnt = ((sizeof(*(pl_info->buf)) + pl_info->buf_size) /
  140. PAGE_SIZE) + 1;
  141. for (vaddr = (unsigned long)(pl_info->buf);
  142. vaddr < (unsigned long)(pl_info->buf) + (page_cnt * PAGE_SIZE);
  143. vaddr += PAGE_SIZE) {
  144. vpg = vmalloc_to_page((const void *)vaddr);
  145. ClearPageReserved(vpg);
  146. }
  147. vfree(pl_info->buf);
  148. pl_info->buf = NULL;
  149. }
  150. static void pktlog_cleanup(struct ath_pktlog_info *pl_info)
  151. {
  152. pl_info->log_state = 0;
  153. PKTLOG_LOCK_DESTROY(pl_info);
  154. mutex_destroy(&pl_info->pktlog_mutex);
  155. }
  156. /* sysctl procfs handler to enable pktlog */
  157. static int
  158. qdf_sysctl_decl(ath_sysctl_pktlog_enable, ctl, write, filp, buffer, lenp, ppos)
  159. {
  160. int ret, enable;
  161. ol_ath_generic_softc_handle scn;
  162. struct pktlog_dev_t *pl_dev;
  163. mutex_lock(&proc_mutex);
  164. scn = (ol_ath_generic_softc_handle) ctl->extra1;
  165. if (!scn) {
  166. mutex_unlock(&proc_mutex);
  167. qdf_nofl_info("%s: Invalid scn context", __func__);
  168. ASSERT(0);
  169. return -EINVAL;
  170. }
  171. pl_dev = get_pktlog_handle();
  172. if (!pl_dev) {
  173. mutex_unlock(&proc_mutex);
  174. qdf_nofl_info("%s: Invalid pktlog context", __func__);
  175. ASSERT(0);
  176. return -ENODEV;
  177. }
  178. ctl->data = &enable;
  179. ctl->maxlen = sizeof(enable);
  180. if (write) {
  181. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  182. lenp, ppos);
  183. if (ret == 0) {
  184. ret = pl_dev->pl_funcs->pktlog_enable(
  185. (struct hif_opaque_softc *)scn, enable,
  186. cds_is_packet_log_enabled(), 0, 1);
  187. }
  188. else
  189. QDF_TRACE(QDF_MODULE_ID_SYS, QDF_TRACE_LEVEL_DEBUG,
  190. "Line:%d %s:proc_dointvec failed reason %d",
  191. __LINE__, __func__, ret);
  192. } else {
  193. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  194. lenp, ppos);
  195. if (ret)
  196. QDF_TRACE(QDF_MODULE_ID_SYS, QDF_TRACE_LEVEL_DEBUG,
  197. "Line:%d %s:proc_dointvec failed reason %d",
  198. __LINE__, __func__, ret);
  199. }
  200. ctl->data = NULL;
  201. ctl->maxlen = 0;
  202. mutex_unlock(&proc_mutex);
  203. return ret;
  204. }
  205. static int get_pktlog_bufsize(struct pktlog_dev_t *pl_dev)
  206. {
  207. return pl_dev->pl_info->buf_size;
  208. }
  209. /* sysctl procfs handler to set/get pktlog size */
  210. static int
  211. qdf_sysctl_decl(ath_sysctl_pktlog_size, ctl, write, filp, buffer, lenp, ppos)
  212. {
  213. int ret, size;
  214. ol_ath_generic_softc_handle scn;
  215. struct pktlog_dev_t *pl_dev;
  216. mutex_lock(&proc_mutex);
  217. scn = (ol_ath_generic_softc_handle) ctl->extra1;
  218. if (!scn) {
  219. mutex_unlock(&proc_mutex);
  220. qdf_nofl_info("%s: Invalid scn context", __func__);
  221. ASSERT(0);
  222. return -EINVAL;
  223. }
  224. pl_dev = get_pktlog_handle();
  225. if (!pl_dev) {
  226. mutex_unlock(&proc_mutex);
  227. qdf_nofl_info("%s: Invalid pktlog handle", __func__);
  228. ASSERT(0);
  229. return -ENODEV;
  230. }
  231. ctl->data = &size;
  232. ctl->maxlen = sizeof(size);
  233. if (write) {
  234. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  235. lenp, ppos);
  236. if (ret == 0)
  237. ret = pl_dev->pl_funcs->pktlog_setsize(
  238. (struct hif_opaque_softc *)scn, size);
  239. } else {
  240. size = get_pktlog_bufsize(pl_dev);
  241. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  242. lenp, ppos);
  243. }
  244. ctl->data = NULL;
  245. ctl->maxlen = 0;
  246. mutex_unlock(&proc_mutex);
  247. return ret;
  248. }
  249. /* Register sysctl table */
  250. static int pktlog_sysctl_register(struct hif_opaque_softc *scn)
  251. {
  252. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  253. struct ath_pktlog_info_lnx *pl_info_lnx;
  254. char *proc_name;
  255. if (pl_dev) {
  256. pl_info_lnx = PL_INFO_LNX(pl_dev->pl_info);
  257. proc_name = pl_dev->name;
  258. } else {
  259. pl_info_lnx = PL_INFO_LNX(g_pktlog_info);
  260. proc_name = PKTLOG_PROC_SYSTEM;
  261. }
  262. /*
  263. * Setup the sysctl table for creating the following sysctl entries:
  264. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/enable for enabling/disabling
  265. * pktlog
  266. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/size for changing the buffer size
  267. */
  268. memset(pl_info_lnx->sysctls, 0, sizeof(pl_info_lnx->sysctls));
  269. pl_info_lnx->sysctls[0].procname = PKTLOG_PROC_DIR;
  270. pl_info_lnx->sysctls[0].mode = PKTLOG_PROCSYS_DIR_PERM;
  271. pl_info_lnx->sysctls[0].child = &pl_info_lnx->sysctls[2];
  272. /* [1] is NULL terminator */
  273. pl_info_lnx->sysctls[2].procname = proc_name;
  274. pl_info_lnx->sysctls[2].mode = PKTLOG_PROCSYS_DIR_PERM;
  275. pl_info_lnx->sysctls[2].child = &pl_info_lnx->sysctls[4];
  276. /* [3] is NULL terminator */
  277. pl_info_lnx->sysctls[4].procname = "enable";
  278. pl_info_lnx->sysctls[4].mode = PKTLOG_PROCSYS_PERM;
  279. pl_info_lnx->sysctls[4].proc_handler = ath_sysctl_pktlog_enable;
  280. pl_info_lnx->sysctls[4].extra1 = scn;
  281. pl_info_lnx->sysctls[5].procname = "size";
  282. pl_info_lnx->sysctls[5].mode = PKTLOG_PROCSYS_PERM;
  283. pl_info_lnx->sysctls[5].proc_handler = ath_sysctl_pktlog_size;
  284. pl_info_lnx->sysctls[5].extra1 = scn;
  285. pl_info_lnx->sysctls[6].procname = "options";
  286. pl_info_lnx->sysctls[6].mode = PKTLOG_PROCSYS_PERM;
  287. pl_info_lnx->sysctls[6].proc_handler = proc_dointvec;
  288. pl_info_lnx->sysctls[6].data = &pl_info_lnx->info.options;
  289. pl_info_lnx->sysctls[6].maxlen = sizeof(pl_info_lnx->info.options);
  290. pl_info_lnx->sysctls[7].procname = "sack_thr";
  291. pl_info_lnx->sysctls[7].mode = PKTLOG_PROCSYS_PERM;
  292. pl_info_lnx->sysctls[7].proc_handler = proc_dointvec;
  293. pl_info_lnx->sysctls[7].data = &pl_info_lnx->info.sack_thr;
  294. pl_info_lnx->sysctls[7].maxlen = sizeof(pl_info_lnx->info.sack_thr);
  295. pl_info_lnx->sysctls[8].procname = "tail_length";
  296. pl_info_lnx->sysctls[8].mode = PKTLOG_PROCSYS_PERM;
  297. pl_info_lnx->sysctls[8].proc_handler = proc_dointvec;
  298. pl_info_lnx->sysctls[8].data = &pl_info_lnx->info.tail_length;
  299. pl_info_lnx->sysctls[8].maxlen = sizeof(pl_info_lnx->info.tail_length);
  300. pl_info_lnx->sysctls[9].procname = "thruput_thresh";
  301. pl_info_lnx->sysctls[9].mode = PKTLOG_PROCSYS_PERM;
  302. pl_info_lnx->sysctls[9].proc_handler = proc_dointvec;
  303. pl_info_lnx->sysctls[9].data = &pl_info_lnx->info.thruput_thresh;
  304. pl_info_lnx->sysctls[9].maxlen =
  305. sizeof(pl_info_lnx->info.thruput_thresh);
  306. pl_info_lnx->sysctls[10].procname = "phyerr_thresh";
  307. pl_info_lnx->sysctls[10].mode = PKTLOG_PROCSYS_PERM;
  308. pl_info_lnx->sysctls[10].proc_handler = proc_dointvec;
  309. pl_info_lnx->sysctls[10].data = &pl_info_lnx->info.phyerr_thresh;
  310. pl_info_lnx->sysctls[10].maxlen =
  311. sizeof(pl_info_lnx->info.phyerr_thresh);
  312. pl_info_lnx->sysctls[11].procname = "per_thresh";
  313. pl_info_lnx->sysctls[11].mode = PKTLOG_PROCSYS_PERM;
  314. pl_info_lnx->sysctls[11].proc_handler = proc_dointvec;
  315. pl_info_lnx->sysctls[11].data = &pl_info_lnx->info.per_thresh;
  316. pl_info_lnx->sysctls[11].maxlen = sizeof(pl_info_lnx->info.per_thresh);
  317. pl_info_lnx->sysctls[12].procname = "trigger_interval";
  318. pl_info_lnx->sysctls[12].mode = PKTLOG_PROCSYS_PERM;
  319. pl_info_lnx->sysctls[12].proc_handler = proc_dointvec;
  320. pl_info_lnx->sysctls[12].data = &pl_info_lnx->info.trigger_interval;
  321. pl_info_lnx->sysctls[12].maxlen =
  322. sizeof(pl_info_lnx->info.trigger_interval);
  323. /* [13] is NULL terminator */
  324. /* and register everything */
  325. /* register_sysctl_table changed from 2.6.21 onwards */
  326. pl_info_lnx->sysctl_header =
  327. register_sysctl_table(pl_info_lnx->sysctls);
  328. if (!pl_info_lnx->sysctl_header) {
  329. qdf_nofl_info("%s: failed to register sysctls!", proc_name);
  330. return -EINVAL;
  331. }
  332. return 0;
  333. }
  334. /*
  335. * Initialize logging for system or adapter
  336. * Parameter scn should be NULL for system wide logging
  337. */
  338. static int pktlog_attach(struct hif_opaque_softc *scn)
  339. {
  340. struct pktlog_dev_t *pl_dev;
  341. struct ath_pktlog_info_lnx *pl_info_lnx;
  342. char *proc_name;
  343. struct proc_dir_entry *proc_entry;
  344. /* Allocate pktlog dev for later use */
  345. pl_dev = get_pktlog_handle();
  346. if (pl_dev) {
  347. pl_info_lnx = kmalloc(sizeof(*pl_info_lnx), GFP_KERNEL);
  348. if (!pl_info_lnx) {
  349. QDF_TRACE(QDF_MODULE_ID_QDF, QDF_TRACE_LEVEL_ERROR,
  350. "%s: Allocation failed for pl_info",
  351. __func__);
  352. goto attach_fail1;
  353. }
  354. pl_dev->pl_info = &pl_info_lnx->info;
  355. pl_dev->name = WLANDEV_BASENAME;
  356. proc_name = pl_dev->name;
  357. if (!pl_dev->pl_funcs)
  358. pl_dev->pl_funcs = &ol_pl_funcs;
  359. /*
  360. * Valid for both direct attach and offload architecture
  361. */
  362. pl_dev->pl_funcs->pktlog_init(scn);
  363. } else {
  364. return -EINVAL;
  365. }
  366. /*
  367. * initialize log info
  368. * might be good to move to pktlog_init
  369. */
  370. /* pl_dev->tgt_pktlog_alloced = false; */
  371. pl_info_lnx->proc_entry = NULL;
  372. pl_info_lnx->sysctl_header = NULL;
  373. proc_entry = proc_create_data(proc_name, PKTLOG_PROC_PERM,
  374. g_pktlog_pde, &pktlog_fops,
  375. &pl_info_lnx->info);
  376. if (!proc_entry) {
  377. qdf_nofl_info(PKTLOG_TAG "%s: create_proc_entry failed for %s",
  378. __func__, proc_name);
  379. goto attach_fail1;
  380. }
  381. pl_info_lnx->proc_entry = proc_entry;
  382. if (pktlog_sysctl_register(scn)) {
  383. qdf_nofl_info(PKTLOG_TAG "%s: sysctl register failed for %s",
  384. __func__, proc_name);
  385. goto attach_fail2;
  386. }
  387. return 0;
  388. attach_fail2:
  389. remove_proc_entry(proc_name, g_pktlog_pde);
  390. attach_fail1:
  391. if (pl_dev)
  392. kfree(pl_dev->pl_info);
  393. return -EINVAL;
  394. }
  395. static void pktlog_sysctl_unregister(struct pktlog_dev_t *pl_dev)
  396. {
  397. struct ath_pktlog_info_lnx *pl_info_lnx;
  398. if (!pl_dev) {
  399. qdf_nofl_info("%s: Invalid pktlog context", __func__);
  400. ASSERT(0);
  401. return;
  402. }
  403. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  404. PL_INFO_LNX(g_pktlog_info);
  405. if (pl_info_lnx->sysctl_header) {
  406. unregister_sysctl_table(pl_info_lnx->sysctl_header);
  407. pl_info_lnx->sysctl_header = NULL;
  408. }
  409. }
  410. static void pktlog_detach(struct hif_opaque_softc *scn)
  411. {
  412. struct ath_pktlog_info *pl_info;
  413. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  414. if (!pl_dev) {
  415. qdf_nofl_info("%s: Invalid pktlog context", __func__);
  416. ASSERT(0);
  417. return;
  418. }
  419. pl_info = pl_dev->pl_info;
  420. if (!pl_info) {
  421. qdf_print("%s: Invalid pktlog handle", __func__);
  422. ASSERT(0);
  423. return;
  424. }
  425. mutex_lock(&pl_info->pktlog_mutex);
  426. remove_proc_entry(WLANDEV_BASENAME, g_pktlog_pde);
  427. pktlog_sysctl_unregister(pl_dev);
  428. qdf_spin_lock_bh(&pl_info->log_lock);
  429. if (pl_info->buf) {
  430. pktlog_release_buf(scn);
  431. pl_dev->tgt_pktlog_alloced = false;
  432. }
  433. qdf_spin_unlock_bh(&pl_info->log_lock);
  434. mutex_unlock(&pl_info->pktlog_mutex);
  435. pktlog_cleanup(pl_info);
  436. if (pl_dev) {
  437. kfree(pl_info);
  438. pl_dev->pl_info = NULL;
  439. }
  440. }
  441. static int __pktlog_open(struct inode *i, struct file *f)
  442. {
  443. struct hif_opaque_softc *scn;
  444. struct pktlog_dev_t *pl_dev;
  445. struct ath_pktlog_info *pl_info;
  446. struct ath_pktlog_info_lnx *pl_info_lnx;
  447. int ret = 0;
  448. PKTLOG_MOD_INC_USE_COUNT;
  449. scn = cds_get_context(QDF_MODULE_ID_HIF);
  450. if (!scn) {
  451. qdf_print("%s: Invalid scn context", __func__);
  452. ASSERT(0);
  453. return -EINVAL;
  454. }
  455. pl_dev = get_pktlog_handle();
  456. if (!pl_dev) {
  457. qdf_print("%s: Invalid pktlog handle", __func__);
  458. ASSERT(0);
  459. return -ENODEV;
  460. }
  461. pl_info = pl_dev->pl_info;
  462. if (!pl_info) {
  463. qdf_nofl_err("%s: pl_info NULL", __func__);
  464. return -EINVAL;
  465. }
  466. mutex_lock(&pl_info->pktlog_mutex);
  467. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  468. PL_INFO_LNX(g_pktlog_info);
  469. if (!pl_info_lnx->sysctl_header) {
  470. mutex_unlock(&pl_info->pktlog_mutex);
  471. qdf_print("%s: pktlog sysctl is unergistered.", __func__);
  472. ASSERT(0);
  473. return -EINVAL;
  474. }
  475. if (pl_info->curr_pkt_state != PKTLOG_OPR_NOT_IN_PROGRESS) {
  476. mutex_unlock(&pl_info->pktlog_mutex);
  477. qdf_print("%s: plinfo state (%d) != PKTLOG_OPR_NOT_IN_PROGRESS",
  478. __func__, pl_info->curr_pkt_state);
  479. return -EBUSY;
  480. }
  481. pl_info->curr_pkt_state = PKTLOG_OPR_IN_PROGRESS_READ_START;
  482. pl_info->init_saved_state = pl_info->log_state;
  483. if (!pl_info->log_state) {
  484. /* Pktlog is already disabled.
  485. * Proceed to read directly.
  486. */
  487. pl_info->curr_pkt_state =
  488. PKTLOG_OPR_IN_PROGRESS_READ_START_PKTLOG_DISABLED;
  489. mutex_unlock(&pl_info->pktlog_mutex);
  490. return ret;
  491. }
  492. /* Disbable the pktlog internally. */
  493. ret = pl_dev->pl_funcs->pktlog_disable(scn);
  494. pl_info->log_state = 0;
  495. pl_info->curr_pkt_state =
  496. PKTLOG_OPR_IN_PROGRESS_READ_START_PKTLOG_DISABLED;
  497. mutex_unlock(&pl_info->pktlog_mutex);
  498. return ret;
  499. }
  500. static int pktlog_open(struct inode *i, struct file *f)
  501. {
  502. struct qdf_op_sync *op_sync;
  503. int errno;
  504. errno = qdf_op_protect(&op_sync);
  505. if (errno)
  506. return errno;
  507. errno = __pktlog_open(i, f);
  508. qdf_op_unprotect(op_sync);
  509. return errno;
  510. }
  511. static int __pktlog_release(struct inode *i, struct file *f)
  512. {
  513. struct hif_opaque_softc *scn;
  514. struct pktlog_dev_t *pl_dev;
  515. struct ath_pktlog_info *pl_info;
  516. struct ath_pktlog_info_lnx *pl_info_lnx;
  517. int ret = 0;
  518. PKTLOG_MOD_DEC_USE_COUNT;
  519. scn = cds_get_context(QDF_MODULE_ID_HIF);
  520. if (!scn) {
  521. qdf_print("%s: Invalid scn context", __func__);
  522. ASSERT(0);
  523. return -EINVAL;
  524. }
  525. pl_dev = get_pktlog_handle();
  526. if (!pl_dev) {
  527. qdf_print("%s: Invalid pktlog handle", __func__);
  528. ASSERT(0);
  529. return -ENODEV;
  530. }
  531. pl_info = pl_dev->pl_info;
  532. if (!pl_info) {
  533. qdf_print("%s: Invalid pktlog info", __func__);
  534. ASSERT(0);
  535. return -EINVAL;
  536. }
  537. mutex_lock(&pl_info->pktlog_mutex);
  538. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  539. PL_INFO_LNX(g_pktlog_info);
  540. if (!pl_info_lnx->sysctl_header) {
  541. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  542. mutex_unlock(&pl_info->pktlog_mutex);
  543. qdf_print("%s: pktlog sysctl is unergistered.", __func__);
  544. ASSERT(0);
  545. return -EINVAL;
  546. }
  547. pl_info->curr_pkt_state = PKTLOG_OPR_IN_PROGRESS_READ_COMPLETE;
  548. /*clear pktlog buffer.*/
  549. pktlog_clearbuff(scn, true);
  550. pl_info->log_state = pl_info->init_saved_state;
  551. pl_info->init_saved_state = 0;
  552. /*Enable pktlog again*/
  553. ret = __pktlog_enable(
  554. (struct hif_opaque_softc *)scn, pl_info->log_state,
  555. cds_is_packet_log_enabled(), 0, 1);
  556. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  557. mutex_unlock(&pl_info->pktlog_mutex);
  558. if (ret != 0)
  559. qdf_print("%s: pktlog cannot be enabled. ret value %d",
  560. __func__, ret);
  561. return ret;
  562. }
  563. static int pktlog_release(struct inode *i, struct file *f)
  564. {
  565. struct qdf_op_sync *op_sync;
  566. int errno;
  567. errno = qdf_op_protect(&op_sync);
  568. if (errno)
  569. return errno;
  570. errno = __pktlog_release(i, f);
  571. qdf_op_unprotect(op_sync);
  572. return errno;
  573. }
  574. #ifndef MIN
  575. #define MIN(a, b) (((a) < (b)) ? (a) : (b))
  576. #endif
  577. /**
  578. * pktlog_read_proc_entry() - This function is used to read data from the
  579. * proc entry into the readers buffer
  580. * @buf: Readers buffer
  581. * @nbytes: Number of bytes to read
  582. * @ppos: Offset within the drivers buffer
  583. * @pl_info: Packet log information pointer
  584. * @read_complete: Boolean value indication whether read is complete
  585. *
  586. * This function is used to read data from the proc entry into the readers
  587. * buffer. Its functionality is similar to 'pktlog_read' which does
  588. * copy to user to the user space buffer
  589. *
  590. * Return: Number of bytes read from the buffer
  591. *
  592. */
  593. ssize_t
  594. pktlog_read_proc_entry(char *buf, size_t nbytes, loff_t *ppos,
  595. struct ath_pktlog_info *pl_info, bool *read_complete)
  596. {
  597. size_t bufhdr_size;
  598. size_t count = 0, ret_val = 0;
  599. int rem_len;
  600. int start_offset, end_offset;
  601. int fold_offset, ppos_data, cur_rd_offset, cur_wr_offset;
  602. struct ath_pktlog_buf *log_buf;
  603. qdf_spin_lock_bh(&pl_info->log_lock);
  604. log_buf = pl_info->buf;
  605. *read_complete = false;
  606. if (!log_buf) {
  607. *read_complete = true;
  608. qdf_spin_unlock_bh(&pl_info->log_lock);
  609. return 0;
  610. }
  611. if (*ppos == 0 && pl_info->log_state) {
  612. pl_info->saved_state = pl_info->log_state;
  613. pl_info->log_state = 0;
  614. }
  615. bufhdr_size = sizeof(log_buf->bufhdr);
  616. /* copy valid log entries from circular buffer into user space */
  617. rem_len = nbytes;
  618. count = 0;
  619. if (*ppos < bufhdr_size) {
  620. count = MIN((bufhdr_size - *ppos), rem_len);
  621. qdf_mem_copy(buf, ((char *)&log_buf->bufhdr) + *ppos,
  622. count);
  623. rem_len -= count;
  624. ret_val += count;
  625. }
  626. start_offset = log_buf->rd_offset;
  627. cur_wr_offset = log_buf->wr_offset;
  628. if ((rem_len == 0) || (start_offset < 0))
  629. goto rd_done;
  630. fold_offset = -1;
  631. cur_rd_offset = start_offset;
  632. /* Find the last offset and fold-offset if the buffer is folded */
  633. do {
  634. struct ath_pktlog_hdr *log_hdr;
  635. int log_data_offset;
  636. log_hdr = (struct ath_pktlog_hdr *) (log_buf->log_data +
  637. cur_rd_offset);
  638. log_data_offset = cur_rd_offset + sizeof(struct ath_pktlog_hdr);
  639. if ((fold_offset == -1)
  640. && ((pl_info->buf_size - log_data_offset)
  641. <= log_hdr->size))
  642. fold_offset = log_data_offset - 1;
  643. PKTLOG_MOV_RD_IDX(cur_rd_offset, log_buf, pl_info->buf_size);
  644. if ((fold_offset == -1) && (cur_rd_offset == 0)
  645. && (cur_rd_offset != cur_wr_offset))
  646. fold_offset = log_data_offset + log_hdr->size - 1;
  647. end_offset = log_data_offset + log_hdr->size - 1;
  648. } while (cur_rd_offset != cur_wr_offset);
  649. ppos_data = *ppos + ret_val - bufhdr_size + start_offset;
  650. if (fold_offset == -1) {
  651. if (ppos_data > end_offset)
  652. goto rd_done;
  653. count = MIN(rem_len, (end_offset - ppos_data + 1));
  654. qdf_mem_copy(buf + ret_val,
  655. log_buf->log_data + ppos_data,
  656. count);
  657. ret_val += count;
  658. rem_len -= count;
  659. } else {
  660. if (ppos_data <= fold_offset) {
  661. count = MIN(rem_len, (fold_offset - ppos_data + 1));
  662. qdf_mem_copy(buf + ret_val,
  663. log_buf->log_data + ppos_data,
  664. count);
  665. ret_val += count;
  666. rem_len -= count;
  667. }
  668. if (rem_len == 0)
  669. goto rd_done;
  670. ppos_data =
  671. *ppos + ret_val - (bufhdr_size +
  672. (fold_offset - start_offset + 1));
  673. if (ppos_data <= end_offset) {
  674. count = MIN(rem_len, (end_offset - ppos_data + 1));
  675. qdf_mem_copy(buf + ret_val,
  676. log_buf->log_data + ppos_data,
  677. count);
  678. ret_val += count;
  679. rem_len -= count;
  680. }
  681. }
  682. rd_done:
  683. if ((ret_val < nbytes) && pl_info->saved_state) {
  684. pl_info->log_state = pl_info->saved_state;
  685. pl_info->saved_state = 0;
  686. }
  687. *ppos += ret_val;
  688. if (ret_val == 0) {
  689. /* Write pointer might have been updated during the read.
  690. * So, if some data is written into, lets not reset the pointers
  691. * We can continue to read from the offset position
  692. */
  693. if (cur_wr_offset != log_buf->wr_offset) {
  694. *read_complete = false;
  695. } else {
  696. pl_info->buf->rd_offset = -1;
  697. pl_info->buf->wr_offset = 0;
  698. pl_info->buf->bytes_written = 0;
  699. pl_info->buf->offset = PKTLOG_READ_OFFSET;
  700. *read_complete = true;
  701. }
  702. }
  703. qdf_spin_unlock_bh(&pl_info->log_lock);
  704. return ret_val;
  705. }
  706. static ssize_t
  707. __pktlog_read(struct file *file, char *buf, size_t nbytes, loff_t *ppos)
  708. {
  709. size_t bufhdr_size;
  710. size_t count = 0, ret_val = 0;
  711. int rem_len;
  712. int start_offset, end_offset;
  713. int fold_offset, ppos_data, cur_rd_offset;
  714. struct ath_pktlog_info *pl_info;
  715. struct ath_pktlog_buf *log_buf;
  716. pl_info = PDE_DATA(file->f_path.dentry->d_inode);
  717. if (!pl_info)
  718. return 0;
  719. qdf_spin_lock_bh(&pl_info->log_lock);
  720. log_buf = pl_info->buf;
  721. if (!log_buf) {
  722. qdf_spin_unlock_bh(&pl_info->log_lock);
  723. return 0;
  724. }
  725. if (pl_info->log_state) {
  726. /* Read is not allowed when write is going on
  727. * When issuing cat command, ensure to send
  728. * pktlog disable command first.
  729. */
  730. qdf_spin_unlock_bh(&pl_info->log_lock);
  731. return -EINVAL;
  732. }
  733. if (*ppos == 0 && pl_info->log_state) {
  734. pl_info->saved_state = pl_info->log_state;
  735. pl_info->log_state = 0;
  736. }
  737. bufhdr_size = sizeof(log_buf->bufhdr);
  738. /* copy valid log entries from circular buffer into user space */
  739. rem_len = nbytes;
  740. count = 0;
  741. if (*ppos < bufhdr_size) {
  742. count = QDF_MIN((bufhdr_size - *ppos), rem_len);
  743. qdf_spin_unlock_bh(&pl_info->log_lock);
  744. if (copy_to_user(buf, ((char *)&log_buf->bufhdr) + *ppos,
  745. count)) {
  746. return -EFAULT;
  747. }
  748. rem_len -= count;
  749. ret_val += count;
  750. qdf_spin_lock_bh(&pl_info->log_lock);
  751. }
  752. start_offset = log_buf->rd_offset;
  753. if ((rem_len == 0) || (start_offset < 0))
  754. goto rd_done;
  755. fold_offset = -1;
  756. cur_rd_offset = start_offset;
  757. /* Find the last offset and fold-offset if the buffer is folded */
  758. do {
  759. struct ath_pktlog_hdr *log_hdr;
  760. int log_data_offset;
  761. log_hdr = (struct ath_pktlog_hdr *)(log_buf->log_data +
  762. cur_rd_offset);
  763. log_data_offset = cur_rd_offset + sizeof(struct ath_pktlog_hdr);
  764. if ((fold_offset == -1)
  765. && ((pl_info->buf_size - log_data_offset)
  766. <= log_hdr->size))
  767. fold_offset = log_data_offset - 1;
  768. PKTLOG_MOV_RD_IDX(cur_rd_offset, log_buf, pl_info->buf_size);
  769. if ((fold_offset == -1) && (cur_rd_offset == 0)
  770. && (cur_rd_offset != log_buf->wr_offset))
  771. fold_offset = log_data_offset + log_hdr->size - 1;
  772. end_offset = log_data_offset + log_hdr->size - 1;
  773. } while (cur_rd_offset != log_buf->wr_offset);
  774. ppos_data = *ppos + ret_val - bufhdr_size + start_offset;
  775. if (fold_offset == -1) {
  776. if (ppos_data > end_offset)
  777. goto rd_done;
  778. count = QDF_MIN(rem_len, (end_offset - ppos_data + 1));
  779. qdf_spin_unlock_bh(&pl_info->log_lock);
  780. if (copy_to_user(buf + ret_val,
  781. log_buf->log_data + ppos_data, count)) {
  782. return -EFAULT;
  783. }
  784. ret_val += count;
  785. rem_len -= count;
  786. qdf_spin_lock_bh(&pl_info->log_lock);
  787. } else {
  788. if (ppos_data <= fold_offset) {
  789. count = QDF_MIN(rem_len, (fold_offset - ppos_data + 1));
  790. qdf_spin_unlock_bh(&pl_info->log_lock);
  791. if (copy_to_user(buf + ret_val,
  792. log_buf->log_data + ppos_data,
  793. count)) {
  794. return -EFAULT;
  795. }
  796. ret_val += count;
  797. rem_len -= count;
  798. qdf_spin_lock_bh(&pl_info->log_lock);
  799. }
  800. if (rem_len == 0)
  801. goto rd_done;
  802. ppos_data =
  803. *ppos + ret_val - (bufhdr_size +
  804. (fold_offset - start_offset + 1));
  805. if (ppos_data <= end_offset) {
  806. count = QDF_MIN(rem_len, (end_offset - ppos_data + 1));
  807. qdf_spin_unlock_bh(&pl_info->log_lock);
  808. if (copy_to_user(buf + ret_val,
  809. log_buf->log_data + ppos_data,
  810. count)) {
  811. return -EFAULT;
  812. }
  813. ret_val += count;
  814. rem_len -= count;
  815. qdf_spin_lock_bh(&pl_info->log_lock);
  816. }
  817. }
  818. rd_done:
  819. if ((ret_val < nbytes) && pl_info->saved_state) {
  820. pl_info->log_state = pl_info->saved_state;
  821. pl_info->saved_state = 0;
  822. }
  823. *ppos += ret_val;
  824. qdf_spin_unlock_bh(&pl_info->log_lock);
  825. return ret_val;
  826. }
  827. static ssize_t
  828. pktlog_read(struct file *file, char *buf, size_t nbytes, loff_t *ppos)
  829. {
  830. struct ath_pktlog_info *info = PDE_DATA(file->f_path.dentry->d_inode);
  831. struct qdf_op_sync *op_sync;
  832. ssize_t err_size;
  833. if (!info)
  834. return 0;
  835. err_size = qdf_op_protect(&op_sync);
  836. if (err_size)
  837. return err_size;
  838. mutex_lock(&info->pktlog_mutex);
  839. err_size = __pktlog_read(file, buf, nbytes, ppos);
  840. mutex_unlock(&info->pktlog_mutex);
  841. qdf_op_unprotect(op_sync);
  842. return err_size;
  843. }
  844. int pktlogmod_init(void *context)
  845. {
  846. int ret;
  847. /* create the proc directory entry */
  848. g_pktlog_pde = proc_mkdir(PKTLOG_PROC_DIR, NULL);
  849. if (!g_pktlog_pde) {
  850. qdf_nofl_info(PKTLOG_TAG "%s: proc_mkdir failed", __func__);
  851. return -EPERM;
  852. }
  853. /* Attach packet log */
  854. ret = pktlog_attach((struct hif_opaque_softc *)context);
  855. /* If packet log init failed */
  856. if (ret)
  857. goto attach_fail;
  858. return ret;
  859. attach_fail:
  860. remove_proc_entry(PKTLOG_PROC_DIR, NULL);
  861. g_pktlog_pde = NULL;
  862. return ret;
  863. }
  864. void pktlogmod_exit(void *context)
  865. {
  866. if (!g_pktlog_pde)
  867. return;
  868. pktlog_detach((struct hif_opaque_softc *)context);
  869. /*
  870. * pdev kill needs to be implemented
  871. */
  872. remove_proc_entry(PKTLOG_PROC_DIR, NULL);
  873. }
  874. #endif