1 // SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note
2 /*
3 *
4 * (C) COPYRIGHT 2020-2022 ARM Limited. All rights reserved.
5 *
6 * This program is free software and is provided to you under the terms of the
7 * GNU General Public License version 2 as published by the Free Software
8 * Foundation, and any use by you of this program is subject to the terms
9 * of such GNU license.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, you can access it online at
18 * http://www.gnu.org/licenses/gpl-2.0.html.
19 *
20 */
21
22 #include <mali_kbase.h>
23 #include "debug/mali_kbase_debug_ktrace_internal.h"
24
kbase_ktrace_init(struct kbase_device * kbdev)25 int kbase_ktrace_init(struct kbase_device *kbdev)
26 {
27 #if KBASE_KTRACE_TARGET_RBUF
28 struct kbase_ktrace_msg *rbuf;
29
30 spin_lock_init(&kbdev->ktrace.lock);
31 rbuf = kmalloc_array(KBASE_KTRACE_SIZE, sizeof(*rbuf), GFP_KERNEL);
32
33 if (!rbuf)
34 return -EINVAL;
35
36 kbdev->ktrace.rbuf = rbuf;
37 #endif /* KBASE_KTRACE_TARGET_RBUF */
38 return 0;
39 }
40
kbase_ktrace_term(struct kbase_device * kbdev)41 void kbase_ktrace_term(struct kbase_device *kbdev)
42 {
43 #if KBASE_KTRACE_TARGET_RBUF
44 kfree(kbdev->ktrace.rbuf);
45 kbdev->ktrace.rbuf = NULL;
46 #endif /* KBASE_KTRACE_TARGET_RBUF */
47 }
48
kbase_ktrace_hook_wrapper(void * param)49 void kbase_ktrace_hook_wrapper(void *param)
50 {
51 struct kbase_device *kbdev = (struct kbase_device *)param;
52
53 KBASE_KTRACE_DUMP(kbdev);
54 }
55
56 #if KBASE_KTRACE_TARGET_RBUF
57
58 static const char * const kbasep_ktrace_code_string[] = {
59 /*
60 * IMPORTANT: USE OF SPECIAL #INCLUDE OF NON-STANDARD HEADER FILE
61 * THIS MUST BE USED AT THE START OF THE ARRAY
62 */
63 #define KBASE_KTRACE_CODE_MAKE_CODE(X) # X
64 #include "debug/mali_kbase_debug_ktrace_codes.h"
65 #undef KBASE_KTRACE_CODE_MAKE_CODE
66 };
67
kbasep_ktrace_format_header(char * buffer,int sz,s32 written)68 static void kbasep_ktrace_format_header(char *buffer, int sz, s32 written)
69 {
70 written += MAX(snprintf(buffer + written, MAX(sz - written, 0),
71 "secs,thread_id,cpu,code,kctx,"), 0);
72
73 kbasep_ktrace_backend_format_header(buffer, sz, &written);
74
75 written += MAX(snprintf(buffer + written, MAX(sz - written, 0),
76 ",info_val,ktrace_version=%u.%u",
77 KBASE_KTRACE_VERSION_MAJOR,
78 KBASE_KTRACE_VERSION_MINOR), 0);
79
80 buffer[sz - 1] = 0;
81 }
82
kbasep_ktrace_format_msg(struct kbase_ktrace_msg * trace_msg,char * buffer,int sz)83 static void kbasep_ktrace_format_msg(struct kbase_ktrace_msg *trace_msg,
84 char *buffer, int sz)
85 {
86 s32 written = 0;
87
88 /* Initial part of message:
89 *
90 * secs,thread_id,cpu,code,
91 */
92 written += MAX(snprintf(buffer + written, MAX(sz - written, 0),
93 "%d.%.6d,%d,%d,%s,",
94 (int)trace_msg->timestamp.tv_sec,
95 (int)(trace_msg->timestamp.tv_nsec / 1000),
96 trace_msg->thread_id, trace_msg->cpu,
97 kbasep_ktrace_code_string[trace_msg->backend.gpu.code]),
98 0);
99
100 /* kctx part: */
101 if (trace_msg->kctx_tgid) {
102 written += MAX(snprintf(buffer + written, MAX(sz - written, 0),
103 "%d_%u",
104 trace_msg->kctx_tgid, trace_msg->kctx_id), 0);
105 }
106 /* Trailing comma */
107 written += MAX(snprintf(buffer + written, MAX(sz - written, 0),
108 ","), 0);
109
110 /* Backend parts */
111 kbasep_ktrace_backend_format_msg(trace_msg, buffer, sz,
112 &written);
113
114 /* Rest of message:
115 *
116 * ,info_val
117 *
118 * Note that the last column is empty, it's simply to hold the ktrace
119 * version in the header
120 */
121 written += MAX(snprintf(buffer + written, MAX(sz - written, 0),
122 ",0x%.16llx",
123 (unsigned long long)trace_msg->info_val), 0);
124 buffer[sz - 1] = 0;
125 }
126
kbasep_ktrace_dump_msg(struct kbase_device * kbdev,struct kbase_ktrace_msg * trace_msg)127 static void kbasep_ktrace_dump_msg(struct kbase_device *kbdev,
128 struct kbase_ktrace_msg *trace_msg)
129 {
130 char buffer[KTRACE_DUMP_MESSAGE_SIZE];
131
132 lockdep_assert_held(&kbdev->ktrace.lock);
133
134 kbasep_ktrace_format_msg(trace_msg, buffer, sizeof(buffer));
135 dev_dbg(kbdev->dev, "%s", buffer);
136 }
137
kbasep_ktrace_reserve(struct kbase_ktrace * ktrace)138 struct kbase_ktrace_msg *kbasep_ktrace_reserve(struct kbase_ktrace *ktrace)
139 {
140 struct kbase_ktrace_msg *trace_msg;
141
142 lockdep_assert_held(&ktrace->lock);
143
144 trace_msg = &ktrace->rbuf[ktrace->next_in];
145
146 /* Update the ringbuffer indices */
147 ktrace->next_in = (ktrace->next_in + 1) & KBASE_KTRACE_MASK;
148 if (ktrace->next_in == ktrace->first_out)
149 ktrace->first_out = (ktrace->first_out + 1) & KBASE_KTRACE_MASK;
150
151 return trace_msg;
152 }
kbasep_ktrace_msg_init(struct kbase_ktrace * ktrace,struct kbase_ktrace_msg * trace_msg,enum kbase_ktrace_code code,struct kbase_context * kctx,kbase_ktrace_flag_t flags,u64 info_val)153 void kbasep_ktrace_msg_init(struct kbase_ktrace *ktrace,
154 struct kbase_ktrace_msg *trace_msg, enum kbase_ktrace_code code,
155 struct kbase_context *kctx, kbase_ktrace_flag_t flags,
156 u64 info_val)
157 {
158 lockdep_assert_held(&ktrace->lock);
159
160 trace_msg->thread_id = task_pid_nr(current);
161 trace_msg->cpu = task_cpu(current);
162
163 ktime_get_real_ts64(&trace_msg->timestamp);
164
165 /* No need to store a flag about whether there was a kctx, tgid==0 is
166 * sufficient
167 */
168 if (kctx) {
169 trace_msg->kctx_tgid = kctx->tgid;
170 trace_msg->kctx_id = kctx->id;
171 } else {
172 trace_msg->kctx_tgid = 0;
173 trace_msg->kctx_id = 0;
174 }
175 trace_msg->info_val = info_val;
176 trace_msg->backend.gpu.code = code;
177 trace_msg->backend.gpu.flags = flags;
178 }
179
kbasep_ktrace_add(struct kbase_device * kbdev,enum kbase_ktrace_code code,struct kbase_context * kctx,kbase_ktrace_flag_t flags,u64 info_val)180 void kbasep_ktrace_add(struct kbase_device *kbdev, enum kbase_ktrace_code code,
181 struct kbase_context *kctx, kbase_ktrace_flag_t flags,
182 u64 info_val)
183 {
184 unsigned long irqflags;
185 struct kbase_ktrace_msg *trace_msg;
186
187 if (unlikely(!kbasep_ktrace_initialized(&kbdev->ktrace)))
188 return;
189
190 WARN_ON((flags & ~KBASE_KTRACE_FLAG_COMMON_ALL));
191
192 spin_lock_irqsave(&kbdev->ktrace.lock, irqflags);
193
194 /* Reserve and update indices */
195 trace_msg = kbasep_ktrace_reserve(&kbdev->ktrace);
196
197 /* Fill the common part of the message (including backend.gpu.flags) */
198 kbasep_ktrace_msg_init(&kbdev->ktrace, trace_msg, code, kctx, flags,
199 info_val);
200
201 /* Done */
202 spin_unlock_irqrestore(&kbdev->ktrace.lock, irqflags);
203 }
204
kbasep_ktrace_clear_locked(struct kbase_device * kbdev)205 static void kbasep_ktrace_clear_locked(struct kbase_device *kbdev)
206 {
207 lockdep_assert_held(&kbdev->ktrace.lock);
208 kbdev->ktrace.first_out = kbdev->ktrace.next_in;
209 }
kbasep_ktrace_clear(struct kbase_device * kbdev)210 void kbasep_ktrace_clear(struct kbase_device *kbdev)
211 {
212 unsigned long flags;
213
214 spin_lock_irqsave(&kbdev->ktrace.lock, flags);
215 kbasep_ktrace_clear_locked(kbdev);
216 spin_unlock_irqrestore(&kbdev->ktrace.lock, flags);
217 }
218
kbasep_ktrace_dump(struct kbase_device * kbdev)219 void kbasep_ktrace_dump(struct kbase_device *kbdev)
220 {
221 unsigned long flags;
222 u32 start;
223 u32 end;
224 char buffer[KTRACE_DUMP_MESSAGE_SIZE] = "Dumping trace:\n";
225
226 kbasep_ktrace_format_header(buffer, sizeof(buffer), strlen(buffer));
227 dev_dbg(kbdev->dev, "%s", buffer);
228
229 spin_lock_irqsave(&kbdev->ktrace.lock, flags);
230 start = kbdev->ktrace.first_out;
231 end = kbdev->ktrace.next_in;
232
233 while (start != end) {
234 struct kbase_ktrace_msg *trace_msg = &kbdev->ktrace.rbuf[start];
235
236 kbasep_ktrace_dump_msg(kbdev, trace_msg);
237
238 start = (start + 1) & KBASE_KTRACE_MASK;
239 }
240 dev_dbg(kbdev->dev, "TRACE_END");
241
242 kbasep_ktrace_clear_locked(kbdev);
243
244 spin_unlock_irqrestore(&kbdev->ktrace.lock, flags);
245 }
246
247 #if IS_ENABLED(CONFIG_DEBUG_FS)
248 struct trace_seq_state {
249 struct kbase_ktrace_msg trace_buf[KBASE_KTRACE_SIZE];
250 u32 start;
251 u32 end;
252 };
253
kbasep_ktrace_seq_start(struct seq_file * s,loff_t * pos)254 static void *kbasep_ktrace_seq_start(struct seq_file *s, loff_t *pos)
255 {
256 struct trace_seq_state *state = s->private;
257 int i;
258
259 if (*pos == 0)
260 /* See Documentation/filesystems/seq_file.txt */
261 return SEQ_START_TOKEN;
262
263 if (*pos > KBASE_KTRACE_SIZE)
264 return NULL;
265 i = state->start + *pos;
266 if ((state->end >= state->start && i >= state->end) ||
267 i >= state->end + KBASE_KTRACE_SIZE)
268 return NULL;
269
270 i &= KBASE_KTRACE_MASK;
271
272 return &state->trace_buf[i];
273 }
274
kbasep_ktrace_seq_stop(struct seq_file * s,void * data)275 static void kbasep_ktrace_seq_stop(struct seq_file *s, void *data)
276 {
277 }
278
kbasep_ktrace_seq_next(struct seq_file * s,void * data,loff_t * pos)279 static void *kbasep_ktrace_seq_next(struct seq_file *s, void *data, loff_t *pos)
280 {
281 struct trace_seq_state *state = s->private;
282 int i;
283
284 if (data != SEQ_START_TOKEN)
285 (*pos)++;
286
287 i = (state->start + *pos) & KBASE_KTRACE_MASK;
288 if (i == state->end)
289 return NULL;
290
291 return &state->trace_buf[i];
292 }
293
kbasep_ktrace_seq_show(struct seq_file * s,void * data)294 static int kbasep_ktrace_seq_show(struct seq_file *s, void *data)
295 {
296 struct kbase_ktrace_msg *trace_msg = data;
297 char buffer[KTRACE_DUMP_MESSAGE_SIZE];
298
299 /* If this is the start, print a header */
300 if (data == SEQ_START_TOKEN)
301 kbasep_ktrace_format_header(buffer, sizeof(buffer), 0);
302 else
303 kbasep_ktrace_format_msg(trace_msg, buffer, sizeof(buffer));
304
305 seq_printf(s, "%s\n", buffer);
306 return 0;
307 }
308
309 static const struct seq_operations kbasep_ktrace_seq_ops = {
310 .start = kbasep_ktrace_seq_start,
311 .next = kbasep_ktrace_seq_next,
312 .stop = kbasep_ktrace_seq_stop,
313 .show = kbasep_ktrace_seq_show,
314 };
315
kbasep_ktrace_debugfs_open(struct inode * inode,struct file * file)316 static int kbasep_ktrace_debugfs_open(struct inode *inode, struct file *file)
317 {
318 struct kbase_device *kbdev = inode->i_private;
319 unsigned long flags;
320
321 struct trace_seq_state *state;
322
323 state = __seq_open_private(file, &kbasep_ktrace_seq_ops,
324 sizeof(*state));
325 if (!state)
326 return -ENOMEM;
327
328 spin_lock_irqsave(&kbdev->ktrace.lock, flags);
329 state->start = kbdev->ktrace.first_out;
330 state->end = kbdev->ktrace.next_in;
331 memcpy(state->trace_buf, kbdev->ktrace.rbuf, sizeof(state->trace_buf));
332 spin_unlock_irqrestore(&kbdev->ktrace.lock, flags);
333
334 return 0;
335 }
336
337 static const struct file_operations kbasep_ktrace_debugfs_fops = {
338 .owner = THIS_MODULE,
339 .open = kbasep_ktrace_debugfs_open,
340 .read = seq_read,
341 .llseek = seq_lseek,
342 .release = seq_release_private,
343 };
344
kbase_ktrace_debugfs_init(struct kbase_device * kbdev)345 void kbase_ktrace_debugfs_init(struct kbase_device *kbdev)
346 {
347 debugfs_create_file("mali_trace", 0444,
348 kbdev->mali_debugfs_directory, kbdev,
349 &kbasep_ktrace_debugfs_fops);
350 }
351 #endif /* CONFIG_DEBUG_FS */
352
353 #else /* KBASE_KTRACE_TARGET_RBUF */
354
355 #if IS_ENABLED(CONFIG_DEBUG_FS)
kbase_ktrace_debugfs_init(struct kbase_device * kbdev)356 void kbase_ktrace_debugfs_init(struct kbase_device *kbdev)
357 {
358 CSTD_UNUSED(kbdev);
359 }
360 #endif /* CONFIG_DEBUG_FS */
361 #endif /* KBASE_KTRACE_TARGET_RBUF */
362