linux_ac.c 30 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192
  1. /*
  2. * Copyright (c) 2012-2021 The Linux Foundation. All rights reserved.
  3. * Copyright (c) 2022-2024 Qualcomm Innovation Center, Inc. All rights reserved.
  4. *
  5. * Permission to use, copy, modify, and/or distribute this software for
  6. * any purpose with or without fee is hereby granted, provided that the
  7. * above copyright notice and this permission notice appear in all
  8. * copies.
  9. *
  10. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  11. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  12. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  13. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  14. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  15. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  16. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  17. * PERFORMANCE OF THIS SOFTWARE.
  18. */
  19. #ifndef REMOVE_PKT_LOG
  20. #ifndef EXPORT_SYMTAB
  21. #define EXPORT_SYMTAB
  22. #endif
  23. #ifndef __KERNEL__
  24. #define __KERNEL__
  25. #endif
  26. /*
  27. * Linux specific implementation of Pktlogs for 802.11ac
  28. */
  29. #include <linux/kernel.h>
  30. #include <linux/init.h>
  31. #include <linux/module.h>
  32. #include <linux/vmalloc.h>
  33. #include <linux/proc_fs.h>
  34. #include <pktlog_ac_i.h>
  35. #include <pktlog_ac_fmt.h>
  36. #include "i_host_diag_core_log.h"
  37. #include "host_diag_core_log.h"
  38. #include "ani_global.h"
  39. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 17, 0))
  40. /*
  41. * Commit 359745d78351 ("proc: remove PDE_DATA() completely")
  42. * Replaced PDE_DATA() with pde_data()
  43. */
  44. #define pde_data(inode) PDE_DATA(inode)
  45. #endif
  46. #define PKTLOG_DEVNAME_SIZE 32
  47. #define MAX_WLANDEV 1
  48. #ifdef MULTI_IF_NAME
  49. #define PKTLOG_PROC_DIR "ath_pktlog" MULTI_IF_NAME
  50. #else
  51. #define PKTLOG_PROC_DIR "ath_pktlog"
  52. #endif
  53. /* Permissions for creating proc entries */
  54. #define PKTLOG_PROC_PERM 0444
  55. #define PKTLOG_PROCSYS_DIR_PERM 0555
  56. #define PKTLOG_PROCSYS_PERM 0644
  57. #ifndef __MOD_INC_USE_COUNT
  58. #define PKTLOG_MOD_INC_USE_COUNT do { \
  59. if (!try_module_get(THIS_MODULE)) { \
  60. qdf_nofl_info("try_module_get failed"); \
  61. } } while (0)
  62. #define PKTLOG_MOD_DEC_USE_COUNT module_put(THIS_MODULE)
  63. #else
  64. #define PKTLOG_MOD_INC_USE_COUNT MOD_INC_USE_COUNT
  65. #define PKTLOG_MOD_DEC_USE_COUNT MOD_DEC_USE_COUNT
  66. #endif
  67. static struct ath_pktlog_info *g_pktlog_info;
  68. static struct proc_dir_entry *g_pktlog_pde;
  69. static DEFINE_MUTEX(proc_mutex);
  70. static int pktlog_attach(struct hif_opaque_softc *scn);
  71. static void pktlog_detach(struct hif_opaque_softc *scn);
  72. static int pktlog_open(struct inode *i, struct file *f);
  73. static int pktlog_release(struct inode *i, struct file *f);
  74. static ssize_t pktlog_read(struct file *file, char *buf, size_t nbytes,
  75. loff_t *ppos);
  76. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 6, 0))
  77. static const struct proc_ops pktlog_fops = {
  78. .proc_open = pktlog_open,
  79. .proc_release = pktlog_release,
  80. .proc_read = pktlog_read,
  81. .proc_lseek = default_llseek,
  82. };
  83. #else
  84. static struct file_operations pktlog_fops = {
  85. open: pktlog_open,
  86. release:pktlog_release,
  87. read : pktlog_read,
  88. };
  89. #endif
  90. void pktlog_disable_adapter_logging(struct hif_opaque_softc *scn)
  91. {
  92. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  93. if (pl_dev)
  94. pl_dev->pl_info->log_state = 0;
  95. }
  96. int pktlog_alloc_buf(struct hif_opaque_softc *scn)
  97. {
  98. uint32_t page_cnt;
  99. unsigned long vaddr;
  100. struct page *vpg;
  101. struct pktlog_dev_t *pl_dev;
  102. struct ath_pktlog_info *pl_info;
  103. struct ath_pktlog_buf *buffer;
  104. pl_dev = get_pktlog_handle();
  105. if (!pl_dev) {
  106. qdf_info(PKTLOG_TAG "pdev_txrx_handle->pl_dev is null");
  107. return -EINVAL;
  108. }
  109. pl_info = pl_dev->pl_info;
  110. page_cnt = (sizeof(*(pl_info->buf)) + pl_info->buf_size) / PAGE_SIZE;
  111. qdf_spin_lock_bh(&pl_info->log_lock);
  112. if (pl_info->buf) {
  113. qdf_spin_unlock_bh(&pl_info->log_lock);
  114. qdf_nofl_info(PKTLOG_TAG "Buffer is already in use");
  115. return -EINVAL;
  116. }
  117. qdf_spin_unlock_bh(&pl_info->log_lock);
  118. buffer = qdf_mem_valloc((page_cnt + 2) * PAGE_SIZE);
  119. if (!buffer) {
  120. return -ENOMEM;
  121. }
  122. buffer = (struct ath_pktlog_buf *)
  123. (((unsigned long)(buffer) + PAGE_SIZE - 1)
  124. & PAGE_MASK);
  125. for (vaddr = (unsigned long)(buffer);
  126. vaddr < ((unsigned long)(buffer) + (page_cnt * PAGE_SIZE));
  127. vaddr += PAGE_SIZE) {
  128. vpg = vmalloc_to_page((const void *)vaddr);
  129. SetPageReserved(vpg);
  130. }
  131. qdf_spin_lock_bh(&pl_info->log_lock);
  132. if (pl_info->buf)
  133. pktlog_release_buf(scn);
  134. pl_info->buf = buffer;
  135. qdf_spin_unlock_bh(&pl_info->log_lock);
  136. return 0;
  137. }
  138. void pktlog_release_buf(struct hif_opaque_softc *scn)
  139. {
  140. unsigned long page_cnt;
  141. unsigned long vaddr;
  142. struct page *vpg;
  143. struct pktlog_dev_t *pl_dev;
  144. struct ath_pktlog_info *pl_info;
  145. pl_dev = get_pktlog_handle();
  146. if (!pl_dev) {
  147. qdf_print("Invalid pl_dev handle");
  148. return;
  149. }
  150. if (!pl_dev->pl_info) {
  151. qdf_print("Invalid pl_dev handle");
  152. return;
  153. }
  154. pl_info = pl_dev->pl_info;
  155. page_cnt = ((sizeof(*(pl_info->buf)) + pl_info->buf_size) /
  156. PAGE_SIZE) + 1;
  157. for (vaddr = (unsigned long)(pl_info->buf);
  158. vaddr < (unsigned long)(pl_info->buf) + (page_cnt * PAGE_SIZE);
  159. vaddr += PAGE_SIZE) {
  160. vpg = vmalloc_to_page((const void *)vaddr);
  161. ClearPageReserved(vpg);
  162. }
  163. qdf_mem_vfree(pl_info->buf);
  164. pl_info->buf = NULL;
  165. }
  166. static void pktlog_cleanup(struct ath_pktlog_info *pl_info)
  167. {
  168. pl_info->log_state = 0;
  169. PKTLOG_LOCK_DESTROY(pl_info);
  170. mutex_destroy(&pl_info->pktlog_mutex);
  171. }
  172. /* sysctl procfs handler to enable pktlog */
  173. static int
  174. qdf_sysctl_decl(ath_sysctl_pktlog_enable, ctl, write, filp, buffer, lenp, ppos)
  175. {
  176. int ret, enable;
  177. ol_ath_generic_softc_handle scn;
  178. struct pktlog_dev_t *pl_dev;
  179. mutex_lock(&proc_mutex);
  180. scn = (ol_ath_generic_softc_handle) ctl->extra1;
  181. if (!scn) {
  182. mutex_unlock(&proc_mutex);
  183. qdf_info("Invalid scn context");
  184. ASSERT(0);
  185. return -EINVAL;
  186. }
  187. pl_dev = get_pktlog_handle();
  188. if (!pl_dev) {
  189. mutex_unlock(&proc_mutex);
  190. qdf_info("Invalid pktlog context");
  191. ASSERT(0);
  192. return -ENODEV;
  193. }
  194. ctl->data = &enable;
  195. ctl->maxlen = sizeof(enable);
  196. if (write) {
  197. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  198. lenp, ppos);
  199. if (ret == 0) {
  200. ret = pl_dev->pl_funcs->pktlog_enable(
  201. (struct hif_opaque_softc *)scn, enable,
  202. cds_is_packet_log_enabled(), 0, 1);
  203. }
  204. else
  205. QDF_TRACE(QDF_MODULE_ID_SYS, QDF_TRACE_LEVEL_DEBUG,
  206. "Line:%d %s:proc_dointvec failed reason %d",
  207. __LINE__, __func__, ret);
  208. } else {
  209. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  210. lenp, ppos);
  211. if (ret)
  212. QDF_TRACE(QDF_MODULE_ID_SYS, QDF_TRACE_LEVEL_DEBUG,
  213. "Line:%d %s:proc_dointvec failed reason %d",
  214. __LINE__, __func__, ret);
  215. }
  216. ctl->data = NULL;
  217. ctl->maxlen = 0;
  218. mutex_unlock(&proc_mutex);
  219. return ret;
  220. }
  221. static int get_pktlog_bufsize(struct pktlog_dev_t *pl_dev)
  222. {
  223. return pl_dev->pl_info->buf_size;
  224. }
  225. /* sysctl procfs handler to set/get pktlog size */
  226. static int
  227. qdf_sysctl_decl(ath_sysctl_pktlog_size, ctl, write, filp, buffer, lenp, ppos)
  228. {
  229. int ret, size;
  230. ol_ath_generic_softc_handle scn;
  231. struct pktlog_dev_t *pl_dev;
  232. mutex_lock(&proc_mutex);
  233. scn = (ol_ath_generic_softc_handle) ctl->extra1;
  234. if (!scn) {
  235. mutex_unlock(&proc_mutex);
  236. qdf_info("Invalid scn context");
  237. ASSERT(0);
  238. return -EINVAL;
  239. }
  240. pl_dev = get_pktlog_handle();
  241. if (!pl_dev) {
  242. mutex_unlock(&proc_mutex);
  243. qdf_info("Invalid pktlog handle");
  244. ASSERT(0);
  245. return -ENODEV;
  246. }
  247. ctl->data = &size;
  248. ctl->maxlen = sizeof(size);
  249. if (write) {
  250. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  251. lenp, ppos);
  252. if (ret == 0)
  253. ret = pl_dev->pl_funcs->pktlog_setsize(
  254. (struct hif_opaque_softc *)scn, size);
  255. } else {
  256. size = get_pktlog_bufsize(pl_dev);
  257. ret = QDF_SYSCTL_PROC_DOINTVEC(ctl, write, filp, buffer,
  258. lenp, ppos);
  259. }
  260. ctl->data = NULL;
  261. ctl->maxlen = 0;
  262. mutex_unlock(&proc_mutex);
  263. return ret;
  264. }
  265. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(6, 6, 0))
  266. static int pktlog_sysctl_register(struct hif_opaque_softc *scn)
  267. {
  268. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  269. struct ath_pktlog_info_lnx *pl_info_lnx;
  270. char *proc_name;
  271. char buf[64] = {0};
  272. if (pl_dev) {
  273. pl_info_lnx = PL_INFO_LNX(pl_dev->pl_info);
  274. proc_name = pl_dev->name;
  275. } else {
  276. pl_info_lnx = PL_INFO_LNX(g_pktlog_info);
  277. proc_name = PKTLOG_PROC_SYSTEM;
  278. }
  279. /*
  280. * Setup the sysctl table for creating the following sysctl entries:
  281. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/enable for enabling/disabling
  282. * pktlog
  283. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/size for changing the buffer size
  284. */
  285. snprintf(buf, sizeof(buf), "%s/%s", PKTLOG_PROC_DIR, proc_name);
  286. memset(pl_info_lnx->sysctls, 0, sizeof(pl_info_lnx->sysctls));
  287. pl_info_lnx->sysctls[0].procname = "enable";
  288. pl_info_lnx->sysctls[0].mode = PKTLOG_PROCSYS_PERM;
  289. pl_info_lnx->sysctls[0].proc_handler = ath_sysctl_pktlog_enable;
  290. pl_info_lnx->sysctls[0].extra1 = scn;
  291. pl_info_lnx->sysctls[1].procname = "size";
  292. pl_info_lnx->sysctls[1].mode = PKTLOG_PROCSYS_PERM;
  293. pl_info_lnx->sysctls[1].proc_handler = ath_sysctl_pktlog_size;
  294. pl_info_lnx->sysctls[1].extra1 = scn;
  295. pl_info_lnx->sysctls[2].procname = "options";
  296. pl_info_lnx->sysctls[2].mode = PKTLOG_PROCSYS_PERM;
  297. pl_info_lnx->sysctls[2].proc_handler = proc_dointvec;
  298. pl_info_lnx->sysctls[2].data = &pl_info_lnx->info.options;
  299. pl_info_lnx->sysctls[2].maxlen = sizeof(pl_info_lnx->info.options);
  300. pl_info_lnx->sysctls[3].procname = "sack_thr";
  301. pl_info_lnx->sysctls[3].mode = PKTLOG_PROCSYS_PERM;
  302. pl_info_lnx->sysctls[3].proc_handler = proc_dointvec;
  303. pl_info_lnx->sysctls[3].data = &pl_info_lnx->info.sack_thr;
  304. pl_info_lnx->sysctls[3].maxlen = sizeof(pl_info_lnx->info.sack_thr);
  305. pl_info_lnx->sysctls[4].procname = "tail_length";
  306. pl_info_lnx->sysctls[4].mode = PKTLOG_PROCSYS_PERM;
  307. pl_info_lnx->sysctls[4].proc_handler = proc_dointvec;
  308. pl_info_lnx->sysctls[4].data = &pl_info_lnx->info.tail_length;
  309. pl_info_lnx->sysctls[4].maxlen = sizeof(pl_info_lnx->info.tail_length);
  310. pl_info_lnx->sysctls[5].procname = "thruput_thresh";
  311. pl_info_lnx->sysctls[5].mode = PKTLOG_PROCSYS_PERM;
  312. pl_info_lnx->sysctls[5].proc_handler = proc_dointvec;
  313. pl_info_lnx->sysctls[5].data = &pl_info_lnx->info.thruput_thresh;
  314. pl_info_lnx->sysctls[5].maxlen =
  315. sizeof(pl_info_lnx->info.thruput_thresh);
  316. pl_info_lnx->sysctls[6].procname = "phyerr_thresh";
  317. pl_info_lnx->sysctls[6].mode = PKTLOG_PROCSYS_PERM;
  318. pl_info_lnx->sysctls[6].proc_handler = proc_dointvec;
  319. pl_info_lnx->sysctls[6].data = &pl_info_lnx->info.phyerr_thresh;
  320. pl_info_lnx->sysctls[6].maxlen =
  321. sizeof(pl_info_lnx->info.phyerr_thresh);
  322. pl_info_lnx->sysctls[7].procname = "per_thresh";
  323. pl_info_lnx->sysctls[7].mode = PKTLOG_PROCSYS_PERM;
  324. pl_info_lnx->sysctls[7].proc_handler = proc_dointvec;
  325. pl_info_lnx->sysctls[7].data = &pl_info_lnx->info.per_thresh;
  326. pl_info_lnx->sysctls[7].maxlen = sizeof(pl_info_lnx->info.per_thresh);
  327. pl_info_lnx->sysctls[8].procname = "trigger_interval";
  328. pl_info_lnx->sysctls[8].mode = PKTLOG_PROCSYS_PERM;
  329. pl_info_lnx->sysctls[8].proc_handler = proc_dointvec;
  330. pl_info_lnx->sysctls[8].data = &pl_info_lnx->info.trigger_interval;
  331. pl_info_lnx->sysctls[8].maxlen =
  332. sizeof(pl_info_lnx->info.trigger_interval);
  333. /* [9] is NULL terminator */
  334. /* and register everything */
  335. /* register_sysctl_table changed from 2.6.21 onwards */
  336. pl_info_lnx->sysctl_header =
  337. register_sysctl(buf, pl_info_lnx->sysctls);
  338. if (!pl_info_lnx->sysctl_header) {
  339. qdf_nofl_info("%s: failed to register sysctls!", proc_name);
  340. return -EINVAL;
  341. }
  342. return 0;
  343. }
  344. #else
  345. /* Register sysctl table */
  346. static int pktlog_sysctl_register(struct hif_opaque_softc *scn)
  347. {
  348. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  349. struct ath_pktlog_info_lnx *pl_info_lnx;
  350. char *proc_name;
  351. if (pl_dev) {
  352. pl_info_lnx = PL_INFO_LNX(pl_dev->pl_info);
  353. proc_name = pl_dev->name;
  354. } else {
  355. pl_info_lnx = PL_INFO_LNX(g_pktlog_info);
  356. proc_name = PKTLOG_PROC_SYSTEM;
  357. }
  358. /*
  359. * Setup the sysctl table for creating the following sysctl entries:
  360. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/enable for enabling/disabling
  361. * pktlog
  362. * /proc/sys/PKTLOG_PROC_DIR/<adapter>/size for changing the buffer size
  363. */
  364. memset(pl_info_lnx->sysctls, 0, sizeof(pl_info_lnx->sysctls));
  365. pl_info_lnx->sysctls[0].procname = PKTLOG_PROC_DIR;
  366. pl_info_lnx->sysctls[0].mode = PKTLOG_PROCSYS_DIR_PERM;
  367. pl_info_lnx->sysctls[0].child = &pl_info_lnx->sysctls[2];
  368. /* [1] is NULL terminator */
  369. pl_info_lnx->sysctls[2].procname = proc_name;
  370. pl_info_lnx->sysctls[2].mode = PKTLOG_PROCSYS_DIR_PERM;
  371. pl_info_lnx->sysctls[2].child = &pl_info_lnx->sysctls[4];
  372. /* [3] is NULL terminator */
  373. pl_info_lnx->sysctls[4].procname = "enable";
  374. pl_info_lnx->sysctls[4].mode = PKTLOG_PROCSYS_PERM;
  375. pl_info_lnx->sysctls[4].proc_handler = ath_sysctl_pktlog_enable;
  376. pl_info_lnx->sysctls[4].extra1 = scn;
  377. pl_info_lnx->sysctls[5].procname = "size";
  378. pl_info_lnx->sysctls[5].mode = PKTLOG_PROCSYS_PERM;
  379. pl_info_lnx->sysctls[5].proc_handler = ath_sysctl_pktlog_size;
  380. pl_info_lnx->sysctls[5].extra1 = scn;
  381. pl_info_lnx->sysctls[6].procname = "options";
  382. pl_info_lnx->sysctls[6].mode = PKTLOG_PROCSYS_PERM;
  383. pl_info_lnx->sysctls[6].proc_handler = proc_dointvec;
  384. pl_info_lnx->sysctls[6].data = &pl_info_lnx->info.options;
  385. pl_info_lnx->sysctls[6].maxlen = sizeof(pl_info_lnx->info.options);
  386. pl_info_lnx->sysctls[7].procname = "sack_thr";
  387. pl_info_lnx->sysctls[7].mode = PKTLOG_PROCSYS_PERM;
  388. pl_info_lnx->sysctls[7].proc_handler = proc_dointvec;
  389. pl_info_lnx->sysctls[7].data = &pl_info_lnx->info.sack_thr;
  390. pl_info_lnx->sysctls[7].maxlen = sizeof(pl_info_lnx->info.sack_thr);
  391. pl_info_lnx->sysctls[8].procname = "tail_length";
  392. pl_info_lnx->sysctls[8].mode = PKTLOG_PROCSYS_PERM;
  393. pl_info_lnx->sysctls[8].proc_handler = proc_dointvec;
  394. pl_info_lnx->sysctls[8].data = &pl_info_lnx->info.tail_length;
  395. pl_info_lnx->sysctls[8].maxlen = sizeof(pl_info_lnx->info.tail_length);
  396. pl_info_lnx->sysctls[9].procname = "thruput_thresh";
  397. pl_info_lnx->sysctls[9].mode = PKTLOG_PROCSYS_PERM;
  398. pl_info_lnx->sysctls[9].proc_handler = proc_dointvec;
  399. pl_info_lnx->sysctls[9].data = &pl_info_lnx->info.thruput_thresh;
  400. pl_info_lnx->sysctls[9].maxlen =
  401. sizeof(pl_info_lnx->info.thruput_thresh);
  402. pl_info_lnx->sysctls[10].procname = "phyerr_thresh";
  403. pl_info_lnx->sysctls[10].mode = PKTLOG_PROCSYS_PERM;
  404. pl_info_lnx->sysctls[10].proc_handler = proc_dointvec;
  405. pl_info_lnx->sysctls[10].data = &pl_info_lnx->info.phyerr_thresh;
  406. pl_info_lnx->sysctls[10].maxlen =
  407. sizeof(pl_info_lnx->info.phyerr_thresh);
  408. pl_info_lnx->sysctls[11].procname = "per_thresh";
  409. pl_info_lnx->sysctls[11].mode = PKTLOG_PROCSYS_PERM;
  410. pl_info_lnx->sysctls[11].proc_handler = proc_dointvec;
  411. pl_info_lnx->sysctls[11].data = &pl_info_lnx->info.per_thresh;
  412. pl_info_lnx->sysctls[11].maxlen = sizeof(pl_info_lnx->info.per_thresh);
  413. pl_info_lnx->sysctls[12].procname = "trigger_interval";
  414. pl_info_lnx->sysctls[12].mode = PKTLOG_PROCSYS_PERM;
  415. pl_info_lnx->sysctls[12].proc_handler = proc_dointvec;
  416. pl_info_lnx->sysctls[12].data = &pl_info_lnx->info.trigger_interval;
  417. pl_info_lnx->sysctls[12].maxlen =
  418. sizeof(pl_info_lnx->info.trigger_interval);
  419. /* [13] is NULL terminator */
  420. /* and register everything */
  421. /* register_sysctl_table changed from 2.6.21 onwards */
  422. pl_info_lnx->sysctl_header =
  423. register_sysctl_table(pl_info_lnx->sysctls);
  424. if (!pl_info_lnx->sysctl_header) {
  425. qdf_nofl_info("%s: failed to register sysctls!", proc_name);
  426. return -EINVAL;
  427. }
  428. return 0;
  429. }
  430. #endif
  431. /*
  432. * Initialize logging for system or adapter
  433. * Parameter scn should be NULL for system wide logging
  434. */
  435. static int pktlog_attach(struct hif_opaque_softc *scn)
  436. {
  437. struct pktlog_dev_t *pl_dev;
  438. struct ath_pktlog_info_lnx *pl_info_lnx;
  439. char *proc_name;
  440. struct proc_dir_entry *proc_entry;
  441. qdf_info("attach pktlog resources");
  442. /* Allocate pktlog dev for later use */
  443. pl_dev = get_pktlog_handle();
  444. if (pl_dev) {
  445. pl_info_lnx = kmalloc(sizeof(*pl_info_lnx), GFP_KERNEL);
  446. if (!pl_info_lnx) {
  447. QDF_TRACE(QDF_MODULE_ID_QDF, QDF_TRACE_LEVEL_ERROR,
  448. "%s: Allocation failed for pl_info",
  449. __func__);
  450. goto attach_fail1;
  451. }
  452. pl_dev->pl_info = &pl_info_lnx->info;
  453. pl_dev->name = WLANDEV_BASENAME;
  454. proc_name = pl_dev->name;
  455. if (!pl_dev->pl_funcs)
  456. pl_dev->pl_funcs = &ol_pl_funcs;
  457. /*
  458. * Valid for both direct attach and offload architecture
  459. */
  460. pl_dev->pl_funcs->pktlog_init(scn);
  461. } else {
  462. qdf_err("pl_dev is NULL");
  463. return -EINVAL;
  464. }
  465. /*
  466. * initialize log info
  467. * might be good to move to pktlog_init
  468. */
  469. /* pl_dev->tgt_pktlog_alloced = false; */
  470. pl_info_lnx->proc_entry = NULL;
  471. pl_info_lnx->sysctl_header = NULL;
  472. proc_entry = proc_create_data(proc_name, PKTLOG_PROC_PERM,
  473. g_pktlog_pde, &pktlog_fops,
  474. &pl_info_lnx->info);
  475. if (!proc_entry) {
  476. qdf_info(PKTLOG_TAG "create_proc_entry failed for %s", proc_name);
  477. goto attach_fail1;
  478. }
  479. pl_info_lnx->proc_entry = proc_entry;
  480. if (pktlog_sysctl_register(scn)) {
  481. qdf_nofl_info(PKTLOG_TAG "sysctl register failed for %s",
  482. proc_name);
  483. goto attach_fail2;
  484. }
  485. return 0;
  486. attach_fail2:
  487. remove_proc_entry(proc_name, g_pktlog_pde);
  488. attach_fail1:
  489. if (pl_dev)
  490. kfree(pl_dev->pl_info);
  491. return -EINVAL;
  492. }
  493. static void pktlog_sysctl_unregister(struct pktlog_dev_t *pl_dev)
  494. {
  495. struct ath_pktlog_info_lnx *pl_info_lnx;
  496. if (!pl_dev) {
  497. qdf_info("Invalid pktlog context");
  498. ASSERT(0);
  499. return;
  500. }
  501. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  502. PL_INFO_LNX(g_pktlog_info);
  503. if (pl_info_lnx->sysctl_header) {
  504. unregister_sysctl_table(pl_info_lnx->sysctl_header);
  505. pl_info_lnx->sysctl_header = NULL;
  506. }
  507. }
  508. static void pktlog_detach(struct hif_opaque_softc *scn)
  509. {
  510. struct ath_pktlog_info *pl_info;
  511. struct pktlog_dev_t *pl_dev = get_pktlog_handle();
  512. qdf_info("detach pktlog resources");
  513. if (!pl_dev) {
  514. qdf_info("Invalid pktlog context");
  515. ASSERT(0);
  516. return;
  517. }
  518. pl_info = pl_dev->pl_info;
  519. if (!pl_info) {
  520. qdf_print("Invalid pktlog handle");
  521. ASSERT(0);
  522. return;
  523. }
  524. mutex_lock(&pl_info->pktlog_mutex);
  525. remove_proc_entry(WLANDEV_BASENAME, g_pktlog_pde);
  526. pktlog_sysctl_unregister(pl_dev);
  527. qdf_spin_lock_bh(&pl_info->log_lock);
  528. if (pl_info->buf) {
  529. pktlog_release_buf(scn);
  530. pl_dev->tgt_pktlog_alloced = false;
  531. }
  532. qdf_spin_unlock_bh(&pl_info->log_lock);
  533. mutex_unlock(&pl_info->pktlog_mutex);
  534. pktlog_cleanup(pl_info);
  535. if (pl_dev) {
  536. kfree(pl_info);
  537. pl_dev->pl_info = NULL;
  538. }
  539. }
  540. static int __pktlog_open(struct inode *i, struct file *f)
  541. {
  542. struct hif_opaque_softc *scn;
  543. struct pktlog_dev_t *pl_dev;
  544. struct ath_pktlog_info *pl_info;
  545. struct ath_pktlog_info_lnx *pl_info_lnx;
  546. int ret = 0;
  547. PKTLOG_MOD_INC_USE_COUNT;
  548. scn = cds_get_context(QDF_MODULE_ID_HIF);
  549. if (!scn) {
  550. qdf_print("Invalid scn context");
  551. ASSERT(0);
  552. return -EINVAL;
  553. }
  554. pl_dev = get_pktlog_handle();
  555. if (!pl_dev) {
  556. qdf_print("Invalid pktlog handle");
  557. ASSERT(0);
  558. return -ENODEV;
  559. }
  560. pl_info = pl_dev->pl_info;
  561. if (!pl_info) {
  562. qdf_err("pl_info NULL");
  563. return -EINVAL;
  564. }
  565. mutex_lock(&pl_info->pktlog_mutex);
  566. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  567. PL_INFO_LNX(g_pktlog_info);
  568. if (!pl_info_lnx->sysctl_header) {
  569. mutex_unlock(&pl_info->pktlog_mutex);
  570. qdf_print("pktlog sysctl is unergistered");
  571. ASSERT(0);
  572. return -EINVAL;
  573. }
  574. if (pl_info->curr_pkt_state != PKTLOG_OPR_NOT_IN_PROGRESS) {
  575. mutex_unlock(&pl_info->pktlog_mutex);
  576. qdf_print("plinfo state (%d) != PKTLOG_OPR_NOT_IN_PROGRESS",
  577. pl_info->curr_pkt_state);
  578. return -EBUSY;
  579. }
  580. pl_info->curr_pkt_state = PKTLOG_OPR_IN_PROGRESS_READ_START;
  581. pl_info->init_saved_state = pl_info->log_state;
  582. if (!pl_info->log_state) {
  583. /* Pktlog is already disabled.
  584. * Proceed to read directly.
  585. */
  586. pl_info->curr_pkt_state =
  587. PKTLOG_OPR_IN_PROGRESS_READ_START_PKTLOG_DISABLED;
  588. mutex_unlock(&pl_info->pktlog_mutex);
  589. return ret;
  590. }
  591. /* Disbable the pktlog internally. */
  592. ret = pl_dev->pl_funcs->pktlog_disable(scn);
  593. pl_info->log_state = 0;
  594. pl_info->curr_pkt_state =
  595. PKTLOG_OPR_IN_PROGRESS_READ_START_PKTLOG_DISABLED;
  596. mutex_unlock(&pl_info->pktlog_mutex);
  597. return ret;
  598. }
  599. static int pktlog_open(struct inode *i, struct file *f)
  600. {
  601. struct qdf_op_sync *op_sync;
  602. int errno;
  603. errno = qdf_op_protect(&op_sync);
  604. if (errno)
  605. return errno;
  606. errno = __pktlog_open(i, f);
  607. qdf_op_unprotect(op_sync);
  608. return errno;
  609. }
  610. static int __pktlog_release(struct inode *i, struct file *f)
  611. {
  612. struct hif_opaque_softc *scn;
  613. struct pktlog_dev_t *pl_dev;
  614. struct ath_pktlog_info *pl_info;
  615. struct ath_pktlog_info_lnx *pl_info_lnx;
  616. int ret = 0;
  617. PKTLOG_MOD_DEC_USE_COUNT;
  618. scn = cds_get_context(QDF_MODULE_ID_HIF);
  619. if (!scn) {
  620. qdf_print("Invalid scn context");
  621. ASSERT(0);
  622. return -EINVAL;
  623. }
  624. pl_dev = get_pktlog_handle();
  625. if (!pl_dev) {
  626. qdf_print("Invalid pktlog handle");
  627. ASSERT(0);
  628. return -ENODEV;
  629. }
  630. pl_info = pl_dev->pl_info;
  631. if (!pl_info) {
  632. qdf_print("Invalid pktlog info");
  633. ASSERT(0);
  634. return -EINVAL;
  635. }
  636. mutex_lock(&pl_info->pktlog_mutex);
  637. pl_info_lnx = (pl_dev) ? PL_INFO_LNX(pl_dev->pl_info) :
  638. PL_INFO_LNX(g_pktlog_info);
  639. if (!pl_info_lnx->sysctl_header) {
  640. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  641. mutex_unlock(&pl_info->pktlog_mutex);
  642. qdf_print("pktlog sysctl is unergistered");
  643. ASSERT(0);
  644. return -EINVAL;
  645. }
  646. pl_info->curr_pkt_state = PKTLOG_OPR_IN_PROGRESS_READ_COMPLETE;
  647. /*clear pktlog buffer.*/
  648. pktlog_clearbuff(scn, true);
  649. pl_info->log_state = pl_info->init_saved_state;
  650. pl_info->init_saved_state = 0;
  651. /*Enable pktlog again*/
  652. ret = __pktlog_enable(
  653. (struct hif_opaque_softc *)scn, pl_info->log_state,
  654. cds_is_packet_log_enabled(), 0, 1);
  655. pl_info->curr_pkt_state = PKTLOG_OPR_NOT_IN_PROGRESS;
  656. mutex_unlock(&pl_info->pktlog_mutex);
  657. if (ret != 0)
  658. qdf_print("pktlog cannot be enabled. ret value %d", ret);
  659. return ret;
  660. }
  661. static int pktlog_release(struct inode *i, struct file *f)
  662. {
  663. struct qdf_op_sync *op_sync;
  664. int errno;
  665. errno = qdf_op_protect(&op_sync);
  666. if (errno)
  667. return errno;
  668. errno = __pktlog_release(i, f);
  669. qdf_op_unprotect(op_sync);
  670. return errno;
  671. }
  672. #ifndef MIN
  673. #define MIN(a, b) (((a) < (b)) ? (a) : (b))
  674. #endif
  675. /**
  676. * pktlog_read_proc_entry() - This function is used to read data from the
  677. * proc entry into the readers buffer
  678. * @buf: Readers buffer
  679. * @nbytes: Number of bytes to read
  680. * @ppos: Offset within the drivers buffer
  681. * @pl_info: Packet log information pointer
  682. * @read_complete: Boolean value indication whether read is complete
  683. *
  684. * This function is used to read data from the proc entry into the readers
  685. * buffer. Its functionality is similar to 'pktlog_read' which does
  686. * copy to user to the user space buffer
  687. *
  688. * Return: Number of bytes read from the buffer
  689. *
  690. */
  691. ssize_t
  692. pktlog_read_proc_entry(char *buf, size_t nbytes, loff_t *ppos,
  693. struct ath_pktlog_info *pl_info, bool *read_complete)
  694. {
  695. size_t bufhdr_size;
  696. size_t count = 0, ret_val = 0;
  697. int rem_len;
  698. int start_offset, end_offset;
  699. int fold_offset, ppos_data, cur_rd_offset, cur_wr_offset;
  700. struct ath_pktlog_buf *log_buf;
  701. qdf_spin_lock_bh(&pl_info->log_lock);
  702. log_buf = pl_info->buf;
  703. *read_complete = false;
  704. if (!log_buf) {
  705. *read_complete = true;
  706. qdf_spin_unlock_bh(&pl_info->log_lock);
  707. return 0;
  708. }
  709. if (*ppos == 0 && pl_info->log_state) {
  710. pl_info->saved_state = pl_info->log_state;
  711. pl_info->log_state = 0;
  712. }
  713. bufhdr_size = sizeof(log_buf->bufhdr);
  714. /* copy valid log entries from circular buffer into user space */
  715. rem_len = nbytes;
  716. count = 0;
  717. if (*ppos < bufhdr_size) {
  718. count = MIN((bufhdr_size - *ppos), rem_len);
  719. qdf_mem_copy(buf, ((char *)&log_buf->bufhdr) + *ppos,
  720. count);
  721. rem_len -= count;
  722. ret_val += count;
  723. }
  724. start_offset = log_buf->rd_offset;
  725. cur_wr_offset = log_buf->wr_offset;
  726. if ((rem_len == 0) || (start_offset < 0))
  727. goto rd_done;
  728. fold_offset = -1;
  729. cur_rd_offset = start_offset;
  730. /* Find the last offset and fold-offset if the buffer is folded */
  731. do {
  732. struct ath_pktlog_hdr *log_hdr;
  733. int log_data_offset;
  734. log_hdr = (struct ath_pktlog_hdr *) (log_buf->log_data +
  735. cur_rd_offset);
  736. log_data_offset = cur_rd_offset + sizeof(struct ath_pktlog_hdr);
  737. if ((fold_offset == -1)
  738. && ((pl_info->buf_size - log_data_offset)
  739. <= log_hdr->size))
  740. fold_offset = log_data_offset - 1;
  741. PKTLOG_MOV_RD_IDX(cur_rd_offset, log_buf, pl_info->buf_size);
  742. if ((fold_offset == -1) && (cur_rd_offset == 0)
  743. && (cur_rd_offset != cur_wr_offset))
  744. fold_offset = log_data_offset + log_hdr->size - 1;
  745. end_offset = log_data_offset + log_hdr->size - 1;
  746. } while (cur_rd_offset != cur_wr_offset);
  747. ppos_data = *ppos + ret_val - bufhdr_size + start_offset;
  748. if (fold_offset == -1) {
  749. if (ppos_data > end_offset)
  750. goto rd_done;
  751. count = MIN(rem_len, (end_offset - ppos_data + 1));
  752. qdf_mem_copy(buf + ret_val,
  753. log_buf->log_data + ppos_data,
  754. count);
  755. ret_val += count;
  756. rem_len -= count;
  757. } else {
  758. if (ppos_data <= fold_offset) {
  759. count = MIN(rem_len, (fold_offset - ppos_data + 1));
  760. qdf_mem_copy(buf + ret_val,
  761. log_buf->log_data + ppos_data,
  762. count);
  763. ret_val += count;
  764. rem_len -= count;
  765. }
  766. if (rem_len == 0)
  767. goto rd_done;
  768. ppos_data =
  769. *ppos + ret_val - (bufhdr_size +
  770. (fold_offset - start_offset + 1));
  771. if (ppos_data <= end_offset) {
  772. count = MIN(rem_len, (end_offset - ppos_data + 1));
  773. qdf_mem_copy(buf + ret_val,
  774. log_buf->log_data + ppos_data,
  775. count);
  776. ret_val += count;
  777. rem_len -= count;
  778. }
  779. }
  780. rd_done:
  781. if ((ret_val < nbytes) && pl_info->saved_state) {
  782. pl_info->log_state = pl_info->saved_state;
  783. pl_info->saved_state = 0;
  784. }
  785. *ppos += ret_val;
  786. if (ret_val == 0) {
  787. /* Write pointer might have been updated during the read.
  788. * So, if some data is written into, lets not reset the pointers
  789. * We can continue to read from the offset position
  790. */
  791. if (cur_wr_offset != log_buf->wr_offset) {
  792. *read_complete = false;
  793. } else {
  794. pl_info->buf->rd_offset = -1;
  795. pl_info->buf->wr_offset = 0;
  796. pl_info->buf->bytes_written = 0;
  797. pl_info->buf->offset = PKTLOG_READ_OFFSET;
  798. *read_complete = true;
  799. }
  800. }
  801. qdf_spin_unlock_bh(&pl_info->log_lock);
  802. return ret_val;
  803. }
  804. static ssize_t
  805. __pktlog_read(struct file *file, char *buf, size_t nbytes, loff_t *ppos)
  806. {
  807. size_t bufhdr_size;
  808. size_t count = 0, ret_val = 0;
  809. int rem_len;
  810. int start_offset, end_offset;
  811. int fold_offset, ppos_data, cur_rd_offset;
  812. struct ath_pktlog_info *pl_info;
  813. struct ath_pktlog_buf *log_buf;
  814. pl_info = pde_data(file->f_path.dentry->d_inode);
  815. if (!pl_info)
  816. return 0;
  817. qdf_spin_lock_bh(&pl_info->log_lock);
  818. log_buf = pl_info->buf;
  819. if (!log_buf) {
  820. qdf_spin_unlock_bh(&pl_info->log_lock);
  821. return 0;
  822. }
  823. if (pl_info->log_state) {
  824. /* Read is not allowed when write is going on
  825. * When issuing cat command, ensure to send
  826. * pktlog disable command first.
  827. */
  828. qdf_spin_unlock_bh(&pl_info->log_lock);
  829. return -EINVAL;
  830. }
  831. if (*ppos == 0 && pl_info->log_state) {
  832. pl_info->saved_state = pl_info->log_state;
  833. pl_info->log_state = 0;
  834. }
  835. bufhdr_size = sizeof(log_buf->bufhdr);
  836. /* copy valid log entries from circular buffer into user space */
  837. rem_len = nbytes;
  838. count = 0;
  839. if (*ppos < bufhdr_size) {
  840. count = QDF_MIN((bufhdr_size - *ppos), rem_len);
  841. qdf_spin_unlock_bh(&pl_info->log_lock);
  842. if (copy_to_user(buf, ((char *)&log_buf->bufhdr) + *ppos,
  843. count)) {
  844. return -EFAULT;
  845. }
  846. rem_len -= count;
  847. ret_val += count;
  848. qdf_spin_lock_bh(&pl_info->log_lock);
  849. }
  850. start_offset = log_buf->rd_offset;
  851. if ((rem_len == 0) || (start_offset < 0))
  852. goto rd_done;
  853. fold_offset = -1;
  854. cur_rd_offset = start_offset;
  855. /* Find the last offset and fold-offset if the buffer is folded */
  856. do {
  857. struct ath_pktlog_hdr *log_hdr;
  858. int log_data_offset;
  859. log_hdr = (struct ath_pktlog_hdr *)(log_buf->log_data +
  860. cur_rd_offset);
  861. log_data_offset = cur_rd_offset + sizeof(struct ath_pktlog_hdr);
  862. if ((fold_offset == -1)
  863. && ((pl_info->buf_size - log_data_offset)
  864. <= log_hdr->size))
  865. fold_offset = log_data_offset - 1;
  866. PKTLOG_MOV_RD_IDX(cur_rd_offset, log_buf, pl_info->buf_size);
  867. if ((fold_offset == -1) && (cur_rd_offset == 0)
  868. && (cur_rd_offset != log_buf->wr_offset))
  869. fold_offset = log_data_offset + log_hdr->size - 1;
  870. end_offset = log_data_offset + log_hdr->size - 1;
  871. } while (cur_rd_offset != log_buf->wr_offset);
  872. ppos_data = *ppos + ret_val - bufhdr_size + start_offset;
  873. if (fold_offset == -1) {
  874. if (ppos_data > end_offset)
  875. goto rd_done;
  876. count = QDF_MIN(rem_len, (end_offset - ppos_data + 1));
  877. qdf_spin_unlock_bh(&pl_info->log_lock);
  878. if (copy_to_user(buf + ret_val,
  879. log_buf->log_data + ppos_data, count)) {
  880. return -EFAULT;
  881. }
  882. ret_val += count;
  883. rem_len -= count;
  884. qdf_spin_lock_bh(&pl_info->log_lock);
  885. } else {
  886. if (ppos_data <= fold_offset) {
  887. count = QDF_MIN(rem_len, (fold_offset - ppos_data + 1));
  888. qdf_spin_unlock_bh(&pl_info->log_lock);
  889. if (copy_to_user(buf + ret_val,
  890. log_buf->log_data + ppos_data,
  891. count)) {
  892. return -EFAULT;
  893. }
  894. ret_val += count;
  895. rem_len -= count;
  896. qdf_spin_lock_bh(&pl_info->log_lock);
  897. }
  898. if (rem_len == 0)
  899. goto rd_done;
  900. ppos_data =
  901. *ppos + ret_val - (bufhdr_size +
  902. (fold_offset - start_offset + 1));
  903. if (ppos_data <= end_offset) {
  904. count = QDF_MIN(rem_len, (end_offset - ppos_data + 1));
  905. qdf_spin_unlock_bh(&pl_info->log_lock);
  906. if (copy_to_user(buf + ret_val,
  907. log_buf->log_data + ppos_data,
  908. count)) {
  909. return -EFAULT;
  910. }
  911. ret_val += count;
  912. rem_len -= count;
  913. qdf_spin_lock_bh(&pl_info->log_lock);
  914. }
  915. }
  916. rd_done:
  917. if ((ret_val < nbytes) && pl_info->saved_state) {
  918. pl_info->log_state = pl_info->saved_state;
  919. pl_info->saved_state = 0;
  920. }
  921. *ppos += ret_val;
  922. qdf_spin_unlock_bh(&pl_info->log_lock);
  923. return ret_val;
  924. }
  925. static ssize_t
  926. pktlog_read(struct file *file, char *buf, size_t nbytes, loff_t *ppos)
  927. {
  928. struct ath_pktlog_info *info = pde_data(file->f_path.dentry->d_inode);
  929. struct qdf_op_sync *op_sync;
  930. ssize_t err_size;
  931. if (!info)
  932. return 0;
  933. err_size = qdf_op_protect(&op_sync);
  934. if (err_size)
  935. return err_size;
  936. mutex_lock(&info->pktlog_mutex);
  937. err_size = __pktlog_read(file, buf, nbytes, ppos);
  938. mutex_unlock(&info->pktlog_mutex);
  939. qdf_op_unprotect(op_sync);
  940. return err_size;
  941. }
  942. int pktlogmod_init(void *context)
  943. {
  944. int ret;
  945. qdf_info("Initialize pkt_log module");
  946. /* create the proc directory entry */
  947. g_pktlog_pde = proc_mkdir(PKTLOG_PROC_DIR, NULL);
  948. if (!g_pktlog_pde) {
  949. qdf_info(PKTLOG_TAG "proc_mkdir failed");
  950. return -EPERM;
  951. }
  952. /* Attach packet log */
  953. ret = pktlog_attach((struct hif_opaque_softc *)context);
  954. /* If packet log init failed */
  955. if (ret) {
  956. qdf_err("pktlog_attach failed");
  957. goto attach_fail;
  958. }
  959. return ret;
  960. attach_fail:
  961. remove_proc_entry(PKTLOG_PROC_DIR, NULL);
  962. g_pktlog_pde = NULL;
  963. return ret;
  964. }
  965. void pktlogmod_exit(void *context)
  966. {
  967. qdf_info("pkt_log module cleanup");
  968. if (!g_pktlog_pde) {
  969. qdf_err("g_pktlog_pde is NULL");
  970. return;
  971. }
  972. pktlog_detach((struct hif_opaque_softc *)context);
  973. /*
  974. * pdev kill needs to be implemented
  975. */
  976. remove_proc_entry(PKTLOG_PROC_DIR, NULL);
  977. g_pktlog_pde = NULL;
  978. }
  979. #endif