linux_ac.c 26 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078
  1. /*
  2. * Copyright (c) 2012-2021 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #ifndef REMOVE_PKT_LOG
  19. #ifndef EXPORT_SYMTAB
  20. #define EXPORT_SYMTAB
  21. #endif
  22. #ifndef __KERNEL__
  23. #define __KERNEL__
  24. #endif
  25. /*
  26. * Linux specific implementation of Pktlogs for 802.11ac
  27. */
  28. #include <linux/kernel.h>
  29. #include <linux/init.h>
  30. #include <linux/module.h>
  31. #include <linux/vmalloc.h>
  32. #include <linux/proc_fs.h>
  33. #include <pktlog_ac_i.h>
  34. #include <pktlog_ac_fmt.h>
  35. #include "i_host_diag_core_log.h"
  36. #include "host_diag_core_log.h"
  37. #include "ani_global.h"
  38. #define PKTLOG_DEVNAME_SIZE 32
  39. #define MAX_WLANDEV 1
  40. #ifdef MULTI_IF_NAME
  41. #define PKTLOG_PROC_DIR "ath_pktlog" MULTI_IF_NAME
  42. #else
  43. #define PKTLOG_PROC_DIR "ath_pktlog"
  44. #endif
  45. /* Permissions for creating proc entries */
  46. #define PKTLOG_PROC_PERM 0444
  47. #define PKTLOG_PROCSYS_DIR_PERM 0555
  48. #define PKTLOG_PROCSYS_PERM 0644
  49. #ifndef __MOD_INC_USE_COUNT
  50. #define PKTLOG_MOD_INC_USE_COUNT do { \
  51. if (!try_module_get(THIS_MODULE)) { \
  52. qdf_nofl_info("try_module_get failed"); \
  53. } } while (0)
  54. #define PKTLOG_MOD_DEC_USE_COUNT module_put(THIS_MODULE)
  55. #else
  56. #define PKTLOG_MOD_INC_USE_COUNT MOD_INC_USE_COUNT
  57. #define PKTLOG_MOD_DEC_USE_COUNT MOD_DEC_USE_COUNT
  58. #endif
  59. static struct ath_pktlog_info *g_pktlog_info;
  60. static struct proc_dir_entry *g_pktlog_pde;
  61. static DEFINE_MUTEX(proc_mutex);
  62. static int pktlog_attach(struct hif_opaque_softc *scn);
  63. static void pktlog_detach(struct hif_opaque_softc *scn);
  64. static int pktlog_open(struct inode *i, struct file *f);
  65. static int pktlog_release(struct inode *i, struct file *f);
  66. static ssize_t pktlog_read(struct file *file, char *buf, size_t nbytes,
  67. loff_t *ppos);
  68. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 6, 0))
  69. static const struct proc_ops pktlog_fops = {
  70. .proc_open = pktlog_open,
  71. .proc_release = pktlog_release,
  72. .proc_read = pktlog_read,
  73. };
  74. #else
  75. static struct file_operations pktlog_fops = {
  76. open: pktlog_open,
  77. release:pktlog_release,
  78. read : pktlog_read,
  79. };
  80. #endif
  81. void pktlog_disable_adapter_logging(struct hif_opaque_softc *scn)
  82. {
  83. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  84. if (pl_dev)
  85. pl_dev->pl_info->log_state = 0;
  86. }
  87. int pktlog_alloc_buf(struct hif_opaque_softc *scn)
  88. {
  89. uint32_t page_cnt;
  90. unsigned long vaddr;
  91. struct page *vpg;
  92. struct pktlog_dev_t *pl_dev;
  93. struct ath_pktlog_info *pl_info;
  94. struct ath_pktlog_buf *buffer;
  95. pl_dev = get_pktlog_handle();
  96. if (!pl_dev) {
  97. qdf_info(PKTLOG_TAG "pdev_txrx_handle->pl_dev is null");
  98. return -EINVAL;
  99. }
  100. pl_info = pl_dev->pl_info;
  101. page_cnt = (sizeof(*(pl_info->buf)) + pl_info->buf_size) / PAGE_SIZE;
  102. qdf_spin_lock_bh(&pl_info->log_lock);
  103. if (pl_info->buf) {
  104. qdf_spin_unlock_bh(&pl_info->log_lock);
  105. qdf_nofl_info(PKTLOG_TAG "Buffer is already in use");
  106. return -EINVAL;
  107. }
  108. qdf_spin_unlock_bh(&pl_info->log_lock);
  109. buffer = vmalloc((page_cnt + 2) * PAGE_SIZE);
  110. if (!buffer) {
  111. return -ENOMEM;
  112. }
  113. buffer = (struct ath_pktlog_buf *)
  114. (((unsigned long)(buffer) + PAGE_SIZE - 1)
  115. & PAGE_MASK);
  116. for (vaddr = (unsigned long)(buffer);
  117. vaddr < ((unsigned long)(buffer) + (page_cnt * PAGE_SIZE));
  118. vaddr += PAGE_SIZE) {
  119. vpg = vmalloc_to_page((const void *)vaddr);
  120. SetPageReserved(vpg);
  121. }
  122. qdf_spin_lock_bh(&pl_info->log_lock);
  123. if (pl_info->buf)
  124. pktlog_release_buf(scn);
  125. pl_info->buf = buffer;
  126. qdf_spin_unlock_bh(&pl_info->log_lock);
  127. return 0;
  128. }
  129. void pktlog_release_buf(struct hif_opaque_softc *scn)
  130. {
  131. unsigned long page_cnt;
  132. unsigned long vaddr;
  133. struct page *vpg;
  134. struct pktlog_dev_t *pl_dev;
  135. struct ath_pktlog_info *pl_info;
  136. pl_dev = get_pktlog_handle();
  137. if (!pl_dev) {
  138. qdf_print("Invalid pl_dev handle");
  139. return;
  140. }
  141. if (!pl_dev->pl_info) {
  142. qdf_print("Invalid pl_dev handle");
  143. return;
  144. }
  145. pl_info = pl_dev->pl_info;
  146. page_cnt = ((sizeof(*(pl_info->buf)) + pl_info->buf_size) /
  147. PAGE_SIZE) + 1;
  148. for (vaddr = (unsigned long)(pl_info->buf);
  149. vaddr < (unsigned long)(pl_info->buf) + (page_cnt * PAGE_SIZE);
  150. vaddr += PAGE_SIZE) {
  151. vpg = vmalloc_to_page((const void *)vaddr);
  152. ClearPageReserved(vpg);
  153. }
  154. vfree(pl_info->buf);
  155. pl_info->buf = NULL;
  156. }
  157. static void pktlog_cleanup(struct ath_pktlog_info *pl_info)
  158. {
  159. pl_info->log_state = 0;
  160. PKTLOG_LOCK_DESTROY(pl_info);
  161. mutex_destroy(&pl_info->pktlog_mutex);
  162. }
  163. /* sysctl procfs handler to enable pktlog */
  164. static int
  165. qdf_sysctl_decl(ath_sysctl_pktlog_enable, ctl, write, filp, buffer, lenp, ppos)
  166. {
  167. int ret, enable;
  168. ol_ath_generic_softc_handle scn;
  169. struct pktlog_dev_t *pl_dev;
  170. mutex_lock(&proc_mutex);
  171. scn = (ol_ath_generic_softc_handle) ctl->extra1;
  172. if (!scn) {
  173. mutex_unlock(&proc_mutex);
  174. qdf_info("Invalid scn context");
  175. ASSERT(0);
  176. return -EINVAL;
  177. }
  178. pl_dev = get_pktlog_handle();
  179. if (!pl_dev) {
  180. mutex_unlock(&proc_mutex);
  181. qdf_info("Invalid pktlog context");
  182. ASSERT(0);
  183. return -ENODEV;
  184. }
  185. ctl->data = &enable;
  186. ctl->maxlen = sizeof(enable);
  187. if (write) {
  188. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  189. lenp, ppos);
  190. if (ret == 0) {
  191. ret = pl_dev->pl_funcs->pktlog_enable(
  192. (struct hif_opaque_softc *)scn, enable,
  193. cds_is_packet_log_enabled(), 0, 1);
  194. }
  195. else
  196. QDF_TRACE(QDF_MODULE_ID_SYS, QDF_TRACE_LEVEL_DEBUG,
  197. "Line:%d %s:proc_dointvec failed reason %d",
  198. __LINE__, __func__, ret);
  199. } else {
  200. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  201. lenp, ppos);
  202. if (ret)
  203. QDF_TRACE(QDF_MODULE_ID_SYS, QDF_TRACE_LEVEL_DEBUG,
  204. "Line:%d %s:proc_dointvec failed reason %d",
  205. __LINE__, __func__, ret);
  206. }
  207. ctl->data = NULL;
  208. ctl->maxlen = 0;
  209. mutex_unlock(&proc_mutex);
  210. return ret;
  211. }
  212. static int get_pktlog_bufsize(struct pktlog_dev_t *pl_dev)
  213. {
  214. return pl_dev->pl_info->buf_size;
  215. }
  216. /* sysctl procfs handler to set/get pktlog size */
  217. static int
  218. qdf_sysctl_decl(ath_sysctl_pktlog_size, ctl, write, filp, buffer, lenp, ppos)
  219. {
  220. int ret, size;
  221. ol_ath_generic_softc_handle scn;
  222. struct pktlog_dev_t *pl_dev;
  223. mutex_lock(&proc_mutex);
  224. scn = (ol_ath_generic_softc_handle) ctl->extra1;
  225. if (!scn) {
  226. mutex_unlock(&proc_mutex);
  227. qdf_info("Invalid scn context");
  228. ASSERT(0);
  229. return -EINVAL;
  230. }
  231. pl_dev = get_pktlog_handle();
  232. if (!pl_dev) {
  233. mutex_unlock(&proc_mutex);
  234. qdf_info("Invalid pktlog handle");
  235. ASSERT(0);
  236. return -ENODEV;
  237. }
  238. ctl->data = &size;
  239. ctl->maxlen = sizeof(size);
  240. if (write) {
  241. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  242. lenp, ppos);
  243. if (ret == 0)
  244. ret = pl_dev->pl_funcs->pktlog_setsize(
  245. (struct hif_opaque_softc *)scn, size);
  246. } else {
  247. size = get_pktlog_bufsize(pl_dev);
  248. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  249. lenp, ppos);
  250. }
  251. ctl->data = NULL;
  252. ctl->maxlen = 0;
  253. mutex_unlock(&proc_mutex);
  254. return ret;
  255. }
  256. /* Register sysctl table */
  257. static int pktlog_sysctl_register(struct hif_opaque_softc *scn)
  258. {
  259. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  260. struct ath_pktlog_info_lnx *pl_info_lnx;
  261. char *proc_name;
  262. if (pl_dev) {
  263. pl_info_lnx = PL_INFO_LNX(pl_dev->pl_info);
  264. proc_name = pl_dev->name;
  265. } else {
  266. pl_info_lnx = PL_INFO_LNX(g_pktlog_info);
  267. proc_name = PKTLOG_PROC_SYSTEM;
  268. }
  269. /*
  270. * Setup the sysctl table for creating the following sysctl entries:
  271. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/enable for enabling/disabling
  272. * pktlog
  273. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/size for changing the buffer size
  274. */
  275. memset(pl_info_lnx->sysctls, 0, sizeof(pl_info_lnx->sysctls));
  276. pl_info_lnx->sysctls[0].procname = PKTLOG_PROC_DIR;
  277. pl_info_lnx->sysctls[0].mode = PKTLOG_PROCSYS_DIR_PERM;
  278. pl_info_lnx->sysctls[0].child = &pl_info_lnx->sysctls[2];
  279. /* [1] is NULL terminator */
  280. pl_info_lnx->sysctls[2].procname = proc_name;
  281. pl_info_lnx->sysctls[2].mode = PKTLOG_PROCSYS_DIR_PERM;
  282. pl_info_lnx->sysctls[2].child = &pl_info_lnx->sysctls[4];
  283. /* [3] is NULL terminator */
  284. pl_info_lnx->sysctls[4].procname = "enable";
  285. pl_info_lnx->sysctls[4].mode = PKTLOG_PROCSYS_PERM;
  286. pl_info_lnx->sysctls[4].proc_handler = ath_sysctl_pktlog_enable;
  287. pl_info_lnx->sysctls[4].extra1 = scn;
  288. pl_info_lnx->sysctls[5].procname = "size";
  289. pl_info_lnx->sysctls[5].mode = PKTLOG_PROCSYS_PERM;
  290. pl_info_lnx->sysctls[5].proc_handler = ath_sysctl_pktlog_size;
  291. pl_info_lnx->sysctls[5].extra1 = scn;
  292. pl_info_lnx->sysctls[6].procname = "options";
  293. pl_info_lnx->sysctls[6].mode = PKTLOG_PROCSYS_PERM;
  294. pl_info_lnx->sysctls[6].proc_handler = proc_dointvec;
  295. pl_info_lnx->sysctls[6].data = &pl_info_lnx->info.options;
  296. pl_info_lnx->sysctls[6].maxlen = sizeof(pl_info_lnx->info.options);
  297. pl_info_lnx->sysctls[7].procname = "sack_thr";
  298. pl_info_lnx->sysctls[7].mode = PKTLOG_PROCSYS_PERM;
  299. pl_info_lnx->sysctls[7].proc_handler = proc_dointvec;
  300. pl_info_lnx->sysctls[7].data = &pl_info_lnx->info.sack_thr;
  301. pl_info_lnx->sysctls[7].maxlen = sizeof(pl_info_lnx->info.sack_thr);
  302. pl_info_lnx->sysctls[8].procname = "tail_length";
  303. pl_info_lnx->sysctls[8].mode = PKTLOG_PROCSYS_PERM;
  304. pl_info_lnx->sysctls[8].proc_handler = proc_dointvec;
  305. pl_info_lnx->sysctls[8].data = &pl_info_lnx->info.tail_length;
  306. pl_info_lnx->sysctls[8].maxlen = sizeof(pl_info_lnx->info.tail_length);
  307. pl_info_lnx->sysctls[9].procname = "thruput_thresh";
  308. pl_info_lnx->sysctls[9].mode = PKTLOG_PROCSYS_PERM;
  309. pl_info_lnx->sysctls[9].proc_handler = proc_dointvec;
  310. pl_info_lnx->sysctls[9].data = &pl_info_lnx->info.thruput_thresh;
  311. pl_info_lnx->sysctls[9].maxlen =
  312. sizeof(pl_info_lnx->info.thruput_thresh);
  313. pl_info_lnx->sysctls[10].procname = "phyerr_thresh";
  314. pl_info_lnx->sysctls[10].mode = PKTLOG_PROCSYS_PERM;
  315. pl_info_lnx->sysctls[10].proc_handler = proc_dointvec;
  316. pl_info_lnx->sysctls[10].data = &pl_info_lnx->info.phyerr_thresh;
  317. pl_info_lnx->sysctls[10].maxlen =
  318. sizeof(pl_info_lnx->info.phyerr_thresh);
  319. pl_info_lnx->sysctls[11].procname = "per_thresh";
  320. pl_info_lnx->sysctls[11].mode = PKTLOG_PROCSYS_PERM;
  321. pl_info_lnx->sysctls[11].proc_handler = proc_dointvec;
  322. pl_info_lnx->sysctls[11].data = &pl_info_lnx->info.per_thresh;
  323. pl_info_lnx->sysctls[11].maxlen = sizeof(pl_info_lnx->info.per_thresh);
  324. pl_info_lnx->sysctls[12].procname = "trigger_interval";
  325. pl_info_lnx->sysctls[12].mode = PKTLOG_PROCSYS_PERM;
  326. pl_info_lnx->sysctls[12].proc_handler = proc_dointvec;
  327. pl_info_lnx->sysctls[12].data = &pl_info_lnx->info.trigger_interval;
  328. pl_info_lnx->sysctls[12].maxlen =
  329. sizeof(pl_info_lnx->info.trigger_interval);
  330. /* [13] is NULL terminator */
  331. /* and register everything */
  332. /* register_sysctl_table changed from 2.6.21 onwards */
  333. pl_info_lnx->sysctl_header =
  334. register_sysctl_table(pl_info_lnx->sysctls);
  335. if (!pl_info_lnx->sysctl_header) {
  336. qdf_nofl_info("%s: failed to register sysctls!", proc_name);
  337. return -EINVAL;
  338. }
  339. return 0;
  340. }
  341. /*
  342. * Initialize logging for system or adapter
  343. * Parameter scn should be NULL for system wide logging
  344. */
  345. static int pktlog_attach(struct hif_opaque_softc *scn)
  346. {
  347. struct pktlog_dev_t *pl_dev;
  348. struct ath_pktlog_info_lnx *pl_info_lnx;
  349. char *proc_name;
  350. struct proc_dir_entry *proc_entry;
  351. /* Allocate pktlog dev for later use */
  352. pl_dev = get_pktlog_handle();
  353. if (pl_dev) {
  354. pl_info_lnx = kmalloc(sizeof(*pl_info_lnx), GFP_KERNEL);
  355. if (!pl_info_lnx) {
  356. QDF_TRACE(QDF_MODULE_ID_QDF, QDF_TRACE_LEVEL_ERROR,
  357. "%s: Allocation failed for pl_info",
  358. __func__);
  359. goto attach_fail1;
  360. }
  361. pl_dev->pl_info = &pl_info_lnx->info;
  362. pl_dev->name = WLANDEV_BASENAME;
  363. proc_name = pl_dev->name;
  364. if (!pl_dev->pl_funcs)
  365. pl_dev->pl_funcs = &ol_pl_funcs;
  366. /*
  367. * Valid for both direct attach and offload architecture
  368. */
  369. pl_dev->pl_funcs->pktlog_init(scn);
  370. } else {
  371. return -EINVAL;
  372. }
  373. /*
  374. * initialize log info
  375. * might be good to move to pktlog_init
  376. */
  377. /* pl_dev->tgt_pktlog_alloced = false; */
  378. pl_info_lnx->proc_entry = NULL;
  379. pl_info_lnx->sysctl_header = NULL;
  380. proc_entry = proc_create_data(proc_name, PKTLOG_PROC_PERM,
  381. g_pktlog_pde, &pktlog_fops,
  382. &pl_info_lnx->info);
  383. if (!proc_entry) {
  384. qdf_info(PKTLOG_TAG "create_proc_entry failed for %s", proc_name);
  385. goto attach_fail1;
  386. }
  387. pl_info_lnx->proc_entry = proc_entry;
  388. if (pktlog_sysctl_register(scn)) {
  389. qdf_nofl_info(PKTLOG_TAG "sysctl register failed for %s",
  390. proc_name);
  391. goto attach_fail2;
  392. }
  393. return 0;
  394. attach_fail2:
  395. remove_proc_entry(proc_name, g_pktlog_pde);
  396. attach_fail1:
  397. if (pl_dev)
  398. kfree(pl_dev->pl_info);
  399. return -EINVAL;
  400. }
  401. static void pktlog_sysctl_unregister(struct pktlog_dev_t *pl_dev)
  402. {
  403. struct ath_pktlog_info_lnx *pl_info_lnx;
  404. if (!pl_dev) {
  405. qdf_info("Invalid pktlog context");
  406. ASSERT(0);
  407. return;
  408. }
  409. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  410. PL_INFO_LNX(g_pktlog_info);
  411. if (pl_info_lnx->sysctl_header) {
  412. unregister_sysctl_table(pl_info_lnx->sysctl_header);
  413. pl_info_lnx->sysctl_header = NULL;
  414. }
  415. }
  416. static void pktlog_detach(struct hif_opaque_softc *scn)
  417. {
  418. struct ath_pktlog_info *pl_info;
  419. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  420. if (!pl_dev) {
  421. qdf_info("Invalid pktlog context");
  422. ASSERT(0);
  423. return;
  424. }
  425. pl_info = pl_dev->pl_info;
  426. if (!pl_info) {
  427. qdf_print("Invalid pktlog handle");
  428. ASSERT(0);
  429. return;
  430. }
  431. mutex_lock(&pl_info->pktlog_mutex);
  432. remove_proc_entry(WLANDEV_BASENAME, g_pktlog_pde);
  433. pktlog_sysctl_unregister(pl_dev);
  434. qdf_spin_lock_bh(&pl_info->log_lock);
  435. if (pl_info->buf) {
  436. pktlog_release_buf(scn);
  437. pl_dev->tgt_pktlog_alloced = false;
  438. }
  439. qdf_spin_unlock_bh(&pl_info->log_lock);
  440. mutex_unlock(&pl_info->pktlog_mutex);
  441. pktlog_cleanup(pl_info);
  442. if (pl_dev) {
  443. kfree(pl_info);
  444. pl_dev->pl_info = NULL;
  445. }
  446. }
  447. static int __pktlog_open(struct inode *i, struct file *f)
  448. {
  449. struct hif_opaque_softc *scn;
  450. struct pktlog_dev_t *pl_dev;
  451. struct ath_pktlog_info *pl_info;
  452. struct ath_pktlog_info_lnx *pl_info_lnx;
  453. int ret = 0;
  454. PKTLOG_MOD_INC_USE_COUNT;
  455. scn = cds_get_context(QDF_MODULE_ID_HIF);
  456. if (!scn) {
  457. qdf_print("Invalid scn context");
  458. ASSERT(0);
  459. return -EINVAL;
  460. }
  461. pl_dev = get_pktlog_handle();
  462. if (!pl_dev) {
  463. qdf_print("Invalid pktlog handle");
  464. ASSERT(0);
  465. return -ENODEV;
  466. }
  467. pl_info = pl_dev->pl_info;
  468. if (!pl_info) {
  469. qdf_err("pl_info NULL");
  470. return -EINVAL;
  471. }
  472. mutex_lock(&pl_info->pktlog_mutex);
  473. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  474. PL_INFO_LNX(g_pktlog_info);
  475. if (!pl_info_lnx->sysctl_header) {
  476. mutex_unlock(&pl_info->pktlog_mutex);
  477. qdf_print("pktlog sysctl is unergistered");
  478. ASSERT(0);
  479. return -EINVAL;
  480. }
  481. if (pl_info->curr_pkt_state != PKTLOG_OPR_NOT_IN_PROGRESS) {
  482. mutex_unlock(&pl_info->pktlog_mutex);
  483. qdf_print("plinfo state (%d) != PKTLOG_OPR_NOT_IN_PROGRESS",
  484. pl_info->curr_pkt_state);
  485. return -EBUSY;
  486. }
  487. pl_info->curr_pkt_state = PKTLOG_OPR_IN_PROGRESS_READ_START;
  488. pl_info->init_saved_state = pl_info->log_state;
  489. if (!pl_info->log_state) {
  490. /* Pktlog is already disabled.
  491. * Proceed to read directly.
  492. */
  493. pl_info->curr_pkt_state =
  494. PKTLOG_OPR_IN_PROGRESS_READ_START_PKTLOG_DISABLED;
  495. mutex_unlock(&pl_info->pktlog_mutex);
  496. return ret;
  497. }
  498. /* Disbable the pktlog internally. */
  499. ret = pl_dev->pl_funcs->pktlog_disable(scn);
  500. pl_info->log_state = 0;
  501. pl_info->curr_pkt_state =
  502. PKTLOG_OPR_IN_PROGRESS_READ_START_PKTLOG_DISABLED;
  503. mutex_unlock(&pl_info->pktlog_mutex);
  504. return ret;
  505. }
  506. static int pktlog_open(struct inode *i, struct file *f)
  507. {
  508. struct qdf_op_sync *op_sync;
  509. int errno;
  510. errno = qdf_op_protect(&op_sync);
  511. if (errno)
  512. return errno;
  513. errno = __pktlog_open(i, f);
  514. qdf_op_unprotect(op_sync);
  515. return errno;
  516. }
  517. static int __pktlog_release(struct inode *i, struct file *f)
  518. {
  519. struct hif_opaque_softc *scn;
  520. struct pktlog_dev_t *pl_dev;
  521. struct ath_pktlog_info *pl_info;
  522. struct ath_pktlog_info_lnx *pl_info_lnx;
  523. int ret = 0;
  524. PKTLOG_MOD_DEC_USE_COUNT;
  525. scn = cds_get_context(QDF_MODULE_ID_HIF);
  526. if (!scn) {
  527. qdf_print("Invalid scn context");
  528. ASSERT(0);
  529. return -EINVAL;
  530. }
  531. pl_dev = get_pktlog_handle();
  532. if (!pl_dev) {
  533. qdf_print("Invalid pktlog handle");
  534. ASSERT(0);
  535. return -ENODEV;
  536. }
  537. pl_info = pl_dev->pl_info;
  538. if (!pl_info) {
  539. qdf_print("Invalid pktlog info");
  540. ASSERT(0);
  541. return -EINVAL;
  542. }
  543. mutex_lock(&pl_info->pktlog_mutex);
  544. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  545. PL_INFO_LNX(g_pktlog_info);
  546. if (!pl_info_lnx->sysctl_header) {
  547. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  548. mutex_unlock(&pl_info->pktlog_mutex);
  549. qdf_print("pktlog sysctl is unergistered");
  550. ASSERT(0);
  551. return -EINVAL;
  552. }
  553. pl_info->curr_pkt_state = PKTLOG_OPR_IN_PROGRESS_READ_COMPLETE;
  554. /*clear pktlog buffer.*/
  555. pktlog_clearbuff(scn, true);
  556. pl_info->log_state = pl_info->init_saved_state;
  557. pl_info->init_saved_state = 0;
  558. /*Enable pktlog again*/
  559. ret = __pktlog_enable(
  560. (struct hif_opaque_softc *)scn, pl_info->log_state,
  561. cds_is_packet_log_enabled(), 0, 1);
  562. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  563. mutex_unlock(&pl_info->pktlog_mutex);
  564. if (ret != 0)
  565. qdf_print("pktlog cannot be enabled. ret value %d", ret);
  566. return ret;
  567. }
  568. static int pktlog_release(struct inode *i, struct file *f)
  569. {
  570. struct qdf_op_sync *op_sync;
  571. int errno;
  572. errno = qdf_op_protect(&op_sync);
  573. if (errno)
  574. return errno;
  575. errno = __pktlog_release(i, f);
  576. qdf_op_unprotect(op_sync);
  577. return errno;
  578. }
  579. #ifndef MIN
  580. #define MIN(a, b) (((a) < (b)) ? (a) : (b))
  581. #endif
  582. /**
  583. * pktlog_read_proc_entry() - This function is used to read data from the
  584. * proc entry into the readers buffer
  585. * @buf: Readers buffer
  586. * @nbytes: Number of bytes to read
  587. * @ppos: Offset within the drivers buffer
  588. * @pl_info: Packet log information pointer
  589. * @read_complete: Boolean value indication whether read is complete
  590. *
  591. * This function is used to read data from the proc entry into the readers
  592. * buffer. Its functionality is similar to 'pktlog_read' which does
  593. * copy to user to the user space buffer
  594. *
  595. * Return: Number of bytes read from the buffer
  596. *
  597. */
  598. ssize_t
  599. pktlog_read_proc_entry(char *buf, size_t nbytes, loff_t *ppos,
  600. struct ath_pktlog_info *pl_info, bool *read_complete)
  601. {
  602. size_t bufhdr_size;
  603. size_t count = 0, ret_val = 0;
  604. int rem_len;
  605. int start_offset, end_offset;
  606. int fold_offset, ppos_data, cur_rd_offset, cur_wr_offset;
  607. struct ath_pktlog_buf *log_buf;
  608. qdf_spin_lock_bh(&pl_info->log_lock);
  609. log_buf = pl_info->buf;
  610. *read_complete = false;
  611. if (!log_buf) {
  612. *read_complete = true;
  613. qdf_spin_unlock_bh(&pl_info->log_lock);
  614. return 0;
  615. }
  616. if (*ppos == 0 && pl_info->log_state) {
  617. pl_info->saved_state = pl_info->log_state;
  618. pl_info->log_state = 0;
  619. }
  620. bufhdr_size = sizeof(log_buf->bufhdr);
  621. /* copy valid log entries from circular buffer into user space */
  622. rem_len = nbytes;
  623. count = 0;
  624. if (*ppos < bufhdr_size) {
  625. count = MIN((bufhdr_size - *ppos), rem_len);
  626. qdf_mem_copy(buf, ((char *)&log_buf->bufhdr) + *ppos,
  627. count);
  628. rem_len -= count;
  629. ret_val += count;
  630. }
  631. start_offset = log_buf->rd_offset;
  632. cur_wr_offset = log_buf->wr_offset;
  633. if ((rem_len == 0) || (start_offset < 0))
  634. goto rd_done;
  635. fold_offset = -1;
  636. cur_rd_offset = start_offset;
  637. /* Find the last offset and fold-offset if the buffer is folded */
  638. do {
  639. struct ath_pktlog_hdr *log_hdr;
  640. int log_data_offset;
  641. log_hdr = (struct ath_pktlog_hdr *) (log_buf->log_data +
  642. cur_rd_offset);
  643. log_data_offset = cur_rd_offset + sizeof(struct ath_pktlog_hdr);
  644. if ((fold_offset == -1)
  645. && ((pl_info->buf_size - log_data_offset)
  646. <= log_hdr->size))
  647. fold_offset = log_data_offset - 1;
  648. PKTLOG_MOV_RD_IDX(cur_rd_offset, log_buf, pl_info->buf_size);
  649. if ((fold_offset == -1) && (cur_rd_offset == 0)
  650. && (cur_rd_offset != cur_wr_offset))
  651. fold_offset = log_data_offset + log_hdr->size - 1;
  652. end_offset = log_data_offset + log_hdr->size - 1;
  653. } while (cur_rd_offset != cur_wr_offset);
  654. ppos_data = *ppos + ret_val - bufhdr_size + start_offset;
  655. if (fold_offset == -1) {
  656. if (ppos_data > end_offset)
  657. goto rd_done;
  658. count = MIN(rem_len, (end_offset - ppos_data + 1));
  659. qdf_mem_copy(buf + ret_val,
  660. log_buf->log_data + ppos_data,
  661. count);
  662. ret_val += count;
  663. rem_len -= count;
  664. } else {
  665. if (ppos_data <= fold_offset) {
  666. count = MIN(rem_len, (fold_offset - ppos_data + 1));
  667. qdf_mem_copy(buf + ret_val,
  668. log_buf->log_data + ppos_data,
  669. count);
  670. ret_val += count;
  671. rem_len -= count;
  672. }
  673. if (rem_len == 0)
  674. goto rd_done;
  675. ppos_data =
  676. *ppos + ret_val - (bufhdr_size +
  677. (fold_offset - start_offset + 1));
  678. if (ppos_data <= end_offset) {
  679. count = MIN(rem_len, (end_offset - ppos_data + 1));
  680. qdf_mem_copy(buf + ret_val,
  681. log_buf->log_data + ppos_data,
  682. count);
  683. ret_val += count;
  684. rem_len -= count;
  685. }
  686. }
  687. rd_done:
  688. if ((ret_val < nbytes) && pl_info->saved_state) {
  689. pl_info->log_state = pl_info->saved_state;
  690. pl_info->saved_state = 0;
  691. }
  692. *ppos += ret_val;
  693. if (ret_val == 0) {
  694. /* Write pointer might have been updated during the read.
  695. * So, if some data is written into, lets not reset the pointers
  696. * We can continue to read from the offset position
  697. */
  698. if (cur_wr_offset != log_buf->wr_offset) {
  699. *read_complete = false;
  700. } else {
  701. pl_info->buf->rd_offset = -1;
  702. pl_info->buf->wr_offset = 0;
  703. pl_info->buf->bytes_written = 0;
  704. pl_info->buf->offset = PKTLOG_READ_OFFSET;
  705. *read_complete = true;
  706. }
  707. }
  708. qdf_spin_unlock_bh(&pl_info->log_lock);
  709. return ret_val;
  710. }
  711. static ssize_t
  712. __pktlog_read(struct file *file, char *buf, size_t nbytes, loff_t *ppos)
  713. {
  714. size_t bufhdr_size;
  715. size_t count = 0, ret_val = 0;
  716. int rem_len;
  717. int start_offset, end_offset;
  718. int fold_offset, ppos_data, cur_rd_offset;
  719. struct ath_pktlog_info *pl_info;
  720. struct ath_pktlog_buf *log_buf;
  721. pl_info = PDE_DATA(file->f_path.dentry->d_inode);
  722. if (!pl_info)
  723. return 0;
  724. qdf_spin_lock_bh(&pl_info->log_lock);
  725. log_buf = pl_info->buf;
  726. if (!log_buf) {
  727. qdf_spin_unlock_bh(&pl_info->log_lock);
  728. return 0;
  729. }
  730. if (pl_info->log_state) {
  731. /* Read is not allowed when write is going on
  732. * When issuing cat command, ensure to send
  733. * pktlog disable command first.
  734. */
  735. qdf_spin_unlock_bh(&pl_info->log_lock);
  736. return -EINVAL;
  737. }
  738. if (*ppos == 0 && pl_info->log_state) {
  739. pl_info->saved_state = pl_info->log_state;
  740. pl_info->log_state = 0;
  741. }
  742. bufhdr_size = sizeof(log_buf->bufhdr);
  743. /* copy valid log entries from circular buffer into user space */
  744. rem_len = nbytes;
  745. count = 0;
  746. if (*ppos < bufhdr_size) {
  747. count = QDF_MIN((bufhdr_size - *ppos), rem_len);
  748. qdf_spin_unlock_bh(&pl_info->log_lock);
  749. if (copy_to_user(buf, ((char *)&log_buf->bufhdr) + *ppos,
  750. count)) {
  751. return -EFAULT;
  752. }
  753. rem_len -= count;
  754. ret_val += count;
  755. qdf_spin_lock_bh(&pl_info->log_lock);
  756. }
  757. start_offset = log_buf->rd_offset;
  758. if ((rem_len == 0) || (start_offset < 0))
  759. goto rd_done;
  760. fold_offset = -1;
  761. cur_rd_offset = start_offset;
  762. /* Find the last offset and fold-offset if the buffer is folded */
  763. do {
  764. struct ath_pktlog_hdr *log_hdr;
  765. int log_data_offset;
  766. log_hdr = (struct ath_pktlog_hdr *)(log_buf->log_data +
  767. cur_rd_offset);
  768. log_data_offset = cur_rd_offset + sizeof(struct ath_pktlog_hdr);
  769. if ((fold_offset == -1)
  770. && ((pl_info->buf_size - log_data_offset)
  771. <= log_hdr->size))
  772. fold_offset = log_data_offset - 1;
  773. PKTLOG_MOV_RD_IDX(cur_rd_offset, log_buf, pl_info->buf_size);
  774. if ((fold_offset == -1) && (cur_rd_offset == 0)
  775. && (cur_rd_offset != log_buf->wr_offset))
  776. fold_offset = log_data_offset + log_hdr->size - 1;
  777. end_offset = log_data_offset + log_hdr->size - 1;
  778. } while (cur_rd_offset != log_buf->wr_offset);
  779. ppos_data = *ppos + ret_val - bufhdr_size + start_offset;
  780. if (fold_offset == -1) {
  781. if (ppos_data > end_offset)
  782. goto rd_done;
  783. count = QDF_MIN(rem_len, (end_offset - ppos_data + 1));
  784. qdf_spin_unlock_bh(&pl_info->log_lock);
  785. if (copy_to_user(buf + ret_val,
  786. log_buf->log_data + ppos_data, count)) {
  787. return -EFAULT;
  788. }
  789. ret_val += count;
  790. rem_len -= count;
  791. qdf_spin_lock_bh(&pl_info->log_lock);
  792. } else {
  793. if (ppos_data <= fold_offset) {
  794. count = QDF_MIN(rem_len, (fold_offset - ppos_data + 1));
  795. qdf_spin_unlock_bh(&pl_info->log_lock);
  796. if (copy_to_user(buf + ret_val,
  797. log_buf->log_data + ppos_data,
  798. count)) {
  799. return -EFAULT;
  800. }
  801. ret_val += count;
  802. rem_len -= count;
  803. qdf_spin_lock_bh(&pl_info->log_lock);
  804. }
  805. if (rem_len == 0)
  806. goto rd_done;
  807. ppos_data =
  808. *ppos + ret_val - (bufhdr_size +
  809. (fold_offset - start_offset + 1));
  810. if (ppos_data <= end_offset) {
  811. count = QDF_MIN(rem_len, (end_offset - ppos_data + 1));
  812. qdf_spin_unlock_bh(&pl_info->log_lock);
  813. if (copy_to_user(buf + ret_val,
  814. log_buf->log_data + ppos_data,
  815. count)) {
  816. return -EFAULT;
  817. }
  818. ret_val += count;
  819. rem_len -= count;
  820. qdf_spin_lock_bh(&pl_info->log_lock);
  821. }
  822. }
  823. rd_done:
  824. if ((ret_val < nbytes) && pl_info->saved_state) {
  825. pl_info->log_state = pl_info->saved_state;
  826. pl_info->saved_state = 0;
  827. }
  828. *ppos += ret_val;
  829. qdf_spin_unlock_bh(&pl_info->log_lock);
  830. return ret_val;
  831. }
  832. static ssize_t
  833. pktlog_read(struct file *file, char *buf, size_t nbytes, loff_t *ppos)
  834. {
  835. struct ath_pktlog_info *info = PDE_DATA(file->f_path.dentry->d_inode);
  836. struct qdf_op_sync *op_sync;
  837. ssize_t err_size;
  838. if (!info)
  839. return 0;
  840. err_size = qdf_op_protect(&op_sync);
  841. if (err_size)
  842. return err_size;
  843. mutex_lock(&info->pktlog_mutex);
  844. err_size = __pktlog_read(file, buf, nbytes, ppos);
  845. mutex_unlock(&info->pktlog_mutex);
  846. qdf_op_unprotect(op_sync);
  847. return err_size;
  848. }
  849. int pktlogmod_init(void *context)
  850. {
  851. int ret;
  852. /* create the proc directory entry */
  853. g_pktlog_pde = proc_mkdir(PKTLOG_PROC_DIR, NULL);
  854. if (!g_pktlog_pde) {
  855. qdf_info(PKTLOG_TAG "proc_mkdir failed");
  856. return -EPERM;
  857. }
  858. /* Attach packet log */
  859. ret = pktlog_attach((struct hif_opaque_softc *)context);
  860. /* If packet log init failed */
  861. if (ret)
  862. goto attach_fail;
  863. return ret;
  864. attach_fail:
  865. remove_proc_entry(PKTLOG_PROC_DIR, NULL);
  866. g_pktlog_pde = NULL;
  867. return ret;
  868. }
  869. void pktlogmod_exit(void *context)
  870. {
  871. if (!g_pktlog_pde)
  872. return;
  873. pktlog_detach((struct hif_opaque_softc *)context);
  874. /*
  875. * pdev kill needs to be implemented
  876. */
  877. remove_proc_entry(PKTLOG_PROC_DIR, NULL);
  878. g_pktlog_pde = NULL;
  879. }
  880. #endif