Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1564788ybh; Thu, 16 Jul 2020 16:13:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOVGHIOHJ++U+8DNgZJGjkOcHC2XmyE/zpivhdGPcjyGeozcCG0KB7GbUuwD9R3Z4fAFdS X-Received: by 2002:a17:906:488b:: with SMTP id v11mr6182028ejq.173.1594941223166; Thu, 16 Jul 2020 16:13:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594941223; cv=none; d=google.com; s=arc-20160816; b=DoDMcXHmTnvojROfDG1M1qt03B654yHbSBA+RAo2WoP13+szalp8WuINYvjCijaJnK 3HF+wJupXvz7Wxvz37M6OBH9ZNBpFC+QW/jWwrvFYP3A1SlASKxuxS41mPQ/qV7JKs7w xQfPssBXz9HyLOKOvjFe7A6fuUMW/tlQQFat958vrN0+a2bOfsEOsuNhKry9iQkEHOSB h6ZgXujNg3WNPNX267ng0nxU1UmP5QLiCuBuKSEYttYuCzYmDyigVljQvLjClXPEx31V NJIlTMA/i4oXfuGLQxzhQojAlHVyOnqG9963BI2uuKhYemyYIRBITyvaQ9zSMigUuiE3 gF1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dmarc-filter:dkim-signature; bh=yVFhqYf6S+LqM5MCX7zG8HUHhA6kdtso70taiaLJkTg=; b=fJ6X/AlpxINHLgm5ovrSBmqozRXvmgCh3fDFSWaZPclziE0AOy04vQ5APdR96nHVxd IT18ygqRMQo4H/HSTkHkezg8OtqMzXzr3gbgzbqI+/z+GkRkmtdzWt2TDBCVEyYzXPhT DO06AD0UUkMzujR9fKqzhVDus9tCQqAC1ZqhkH/GfAibzCXgOxyunm1dO+pNgmY+jOZ5 kufx2diEzEKRIBdGMKcbU4rMYmZmawgOQitZpSPoZk7mvaUhMz4uMJstfLVHlPNJoeKk XeItDERLoANn/B9JwKONEEZnOgg62B5njId8gZd/ch5zgHtLd1OkftW7gUvJ3IPUkBdl uiZA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=wtdK5+OT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c10si4089668ejs.1.2020.07.16.16.13.20; Thu, 16 Jul 2020 16:13:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=wtdK5+OT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728209AbgGPXKO (ORCPT + 99 others); Thu, 16 Jul 2020 19:10:14 -0400 Received: from m43-7.mailgun.net ([69.72.43.7]:38121 "EHLO m43-7.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727879AbgGPXKB (ORCPT ); Thu, 16 Jul 2020 19:10:01 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1594941000; h=References: In-Reply-To: Message-Id: Date: Subject: Cc: To: From: Sender; bh=yVFhqYf6S+LqM5MCX7zG8HUHhA6kdtso70taiaLJkTg=; b=wtdK5+OTWgVyXvKK7Hkq02P2xuf9LGashi1xRsmDkc2q9HSPutf6s3QehbOVFkhtlAZCd5gO Cf5wTxXFd0/6jyXXXudge2QO07wtyw2Kucqz3V38OAAB7LxgqgV14X9G1Fy5jSdaX1gfs2bX O3ayRXfzMqTyUQ6QfBMxrQOu5hM= X-Mailgun-Sending-Ip: 69.72.43.7 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n12.prod.us-west-2.postgun.com with SMTP id 5f10d320512812c070d20135 (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Thu, 16 Jul 2020 22:22:24 GMT Received: by smtp.codeaurora.org (Postfix, from userid 1001) id 1FBB1C433C9; Thu, 16 Jul 2020 22:22:24 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=2.0 tests=ALL_TRUSTED,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.0 Received: from rishabhb-linux.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: rishabhb) by smtp.codeaurora.org (Postfix) with ESMTPSA id 552B6C43449; Thu, 16 Jul 2020 22:22:22 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 552B6C43449 Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=none smtp.mailfrom=rishabhb@codeaurora.org From: Rishabh Bhatnagar To: linux-remoteproc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: bjorn.andersson@linaro.org, mathieu.poirier@linaro.org, sibis@codearora.org, tsoni@codeaurora.org, psodagud@codeaurora.org, sidgup@codeaurora.org, Rishabh Bhatnagar Subject: [PATCH v8 5/5] remoteproc: Add coredump debugfs entry Date: Thu, 16 Jul 2020 15:20:35 -0700 Message-Id: <1594938035-7327-6-git-send-email-rishabhb@codeaurora.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1594938035-7327-1-git-send-email-rishabhb@codeaurora.org> References: <1594938035-7327-1-git-send-email-rishabhb@codeaurora.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add coredump debugfs entry to configure the type of dump that will be collected during recovery. User can select between default or inline coredump functionality. Also coredump collection can be disabled through this interface. This functionality can be configured differently for different remote processors. Signed-off-by: Rishabh Bhatnagar Reviewed-by: Bjorn Andersson Reviewed-by: Mathieu Poirier Tested-by: Sibi Sankar Reviewed-by: Sibi Sankar --- drivers/remoteproc/remoteproc_debugfs.c | 90 +++++++++++++++++++++++++++++++++ 1 file changed, 90 insertions(+) diff --git a/drivers/remoteproc/remoteproc_debugfs.c b/drivers/remoteproc/remoteproc_debugfs.c index 732770e..2e3b3e2 100644 --- a/drivers/remoteproc/remoteproc_debugfs.c +++ b/drivers/remoteproc/remoteproc_debugfs.c @@ -28,6 +28,94 @@ static struct dentry *rproc_dbg; /* + * A coredump-configuration-to-string lookup table, for exposing a + * human readable configuration via debugfs. Always keep in sync with + * enum rproc_coredump_mechanism + */ +static const char * const rproc_coredump_str[] = { + [RPROC_COREDUMP_DEFAULT] = "default", + [RPROC_COREDUMP_INLINE] = "inline", + [RPROC_COREDUMP_DISABLED] = "disabled", +}; + +/* Expose the current coredump configuration via debugfs */ +static ssize_t rproc_coredump_read(struct file *filp, char __user *userbuf, + size_t count, loff_t *ppos) +{ + struct rproc *rproc = filp->private_data; + char buf[20]; + int len; + + len = scnprintf(buf, sizeof(buf), "%s\n", + rproc_coredump_str[rproc->dump_conf]); + + return simple_read_from_buffer(userbuf, count, ppos, buf, len); +} + +/* + * By writing to the 'coredump' debugfs entry, we control the behavior of the + * coredump mechanism dynamically. The default value of this entry is "default". + * + * The 'coredump' debugfs entry supports these commands: + * + * default: This is the default coredump mechanism. When the remoteproc + * crashes the entire coredump will be copied to a separate buffer + * and exposed to userspace. + * + * inline: The coredump will not be copied to a separate buffer and the + * recovery process will have to wait until data is read by + * userspace. But this avoid usage of extra memory. + * + * disabled: This will disable coredump. Recovery will proceed without + * collecting any dump. + */ +static ssize_t rproc_coredump_write(struct file *filp, + const char __user *user_buf, size_t count, + loff_t *ppos) +{ + struct rproc *rproc = filp->private_data; + int ret, err = 0; + char buf[20]; + + if (count > sizeof(buf)) + return -EINVAL; + + ret = copy_from_user(buf, user_buf, count); + if (ret) + return -EFAULT; + + /* remove end of line */ + if (buf[count - 1] == '\n') + buf[count - 1] = '\0'; + + if (rproc->state == RPROC_CRASHED) { + dev_err(&rproc->dev, "can't change coredump configuration\n"); + err = -EBUSY; + goto out; + } + + if (!strncmp(buf, "disable", count)) { + rproc->dump_conf = RPROC_COREDUMP_DISABLED; + } else if (!strncmp(buf, "inline", count)) { + rproc->dump_conf = RPROC_COREDUMP_INLINE; + } else if (!strncmp(buf, "default", count)) { + rproc->dump_conf = RPROC_COREDUMP_DEFAULT; + } else { + dev_err(&rproc->dev, "Invalid coredump configuration\n"); + err = -EINVAL; + } +out: + return err ? err : count; +} + +static const struct file_operations rproc_coredump_fops = { + .read = rproc_coredump_read, + .write = rproc_coredump_write, + .open = simple_open, + .llseek = generic_file_llseek, +}; + +/* * Some remote processors may support dumping trace logs into a shared * memory buffer. We expose this trace buffer using debugfs, so users * can easily tell what's going on remotely. @@ -337,6 +425,8 @@ void rproc_create_debug_dir(struct rproc *rproc) rproc, &rproc_rsc_table_fops); debugfs_create_file("carveout_memories", 0400, rproc->dbg_dir, rproc, &rproc_carveouts_fops); + debugfs_create_file("coredump", 0600, rproc->dbg_dir, + rproc, &rproc_coredump_fops); } void __init rproc_init_debugfs(void) -- The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project