perfmon.c 167 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782
  1. /*
  2. * This file implements the perfmon-2 subsystem which is used
  3. * to program the IA-64 Performance Monitoring Unit (PMU).
  4. *
  5. * The initial version of perfmon.c was written by
  6. * Ganesh Venkitachalam, IBM Corp.
  7. *
  8. * Then it was modified for perfmon-1.x by Stephane Eranian and
  9. * David Mosberger, Hewlett Packard Co.
  10. *
  11. * Version Perfmon-2.x is a rewrite of perfmon-1.x
  12. * by Stephane Eranian, Hewlett Packard Co.
  13. *
  14. * Copyright (C) 1999-2005 Hewlett Packard Co
  15. * Stephane Eranian <eranian@hpl.hp.com>
  16. * David Mosberger-Tang <davidm@hpl.hp.com>
  17. *
  18. * More information about perfmon available at:
  19. * http://www.hpl.hp.com/research/linux/perfmon
  20. */
  21. #include <linux/module.h>
  22. #include <linux/kernel.h>
  23. #include <linux/sched.h>
  24. #include <linux/interrupt.h>
  25. #include <linux/proc_fs.h>
  26. #include <linux/seq_file.h>
  27. #include <linux/init.h>
  28. #include <linux/vmalloc.h>
  29. #include <linux/mm.h>
  30. #include <linux/sysctl.h>
  31. #include <linux/list.h>
  32. #include <linux/file.h>
  33. #include <linux/poll.h>
  34. #include <linux/vfs.h>
  35. #include <linux/smp.h>
  36. #include <linux/pagemap.h>
  37. #include <linux/mount.h>
  38. #include <linux/bitops.h>
  39. #include <linux/capability.h>
  40. #include <linux/rcupdate.h>
  41. #include <linux/completion.h>
  42. #include <linux/tracehook.h>
  43. #include <linux/slab.h>
  44. #include <linux/cpu.h>
  45. #include <asm/errno.h>
  46. #include <asm/intrinsics.h>
  47. #include <asm/page.h>
  48. #include <asm/perfmon.h>
  49. #include <asm/processor.h>
  50. #include <asm/signal.h>
  51. #include <asm/uaccess.h>
  52. #include <asm/delay.h>
  53. #ifdef CONFIG_PERFMON
  54. /*
  55. * perfmon context state
  56. */
  57. #define PFM_CTX_UNLOADED 1 /* context is not loaded onto any task */
  58. #define PFM_CTX_LOADED 2 /* context is loaded onto a task */
  59. #define PFM_CTX_MASKED 3 /* context is loaded but monitoring is masked due to overflow */
  60. #define PFM_CTX_ZOMBIE 4 /* owner of the context is closing it */
  61. #define PFM_INVALID_ACTIVATION (~0UL)
  62. #define PFM_NUM_PMC_REGS 64 /* PMC save area for ctxsw */
  63. #define PFM_NUM_PMD_REGS 64 /* PMD save area for ctxsw */
  64. /*
  65. * depth of message queue
  66. */
  67. #define PFM_MAX_MSGS 32
  68. #define PFM_CTXQ_EMPTY(g) ((g)->ctx_msgq_head == (g)->ctx_msgq_tail)
  69. /*
  70. * type of a PMU register (bitmask).
  71. * bitmask structure:
  72. * bit0 : register implemented
  73. * bit1 : end marker
  74. * bit2-3 : reserved
  75. * bit4 : pmc has pmc.pm
  76. * bit5 : pmc controls a counter (has pmc.oi), pmd is used as counter
  77. * bit6-7 : register type
  78. * bit8-31: reserved
  79. */
  80. #define PFM_REG_NOTIMPL 0x0 /* not implemented at all */
  81. #define PFM_REG_IMPL 0x1 /* register implemented */
  82. #define PFM_REG_END 0x2 /* end marker */
  83. #define PFM_REG_MONITOR (0x1<<4|PFM_REG_IMPL) /* a PMC with a pmc.pm field only */
  84. #define PFM_REG_COUNTING (0x2<<4|PFM_REG_MONITOR) /* a monitor + pmc.oi+ PMD used as a counter */
  85. #define PFM_REG_CONTROL (0x4<<4|PFM_REG_IMPL) /* PMU control register */
  86. #define PFM_REG_CONFIG (0x8<<4|PFM_REG_IMPL) /* configuration register */
  87. #define PFM_REG_BUFFER (0xc<<4|PFM_REG_IMPL) /* PMD used as buffer */
  88. #define PMC_IS_LAST(i) (pmu_conf->pmc_desc[i].type & PFM_REG_END)
  89. #define PMD_IS_LAST(i) (pmu_conf->pmd_desc[i].type & PFM_REG_END)
  90. #define PMC_OVFL_NOTIFY(ctx, i) ((ctx)->ctx_pmds[i].flags & PFM_REGFL_OVFL_NOTIFY)
  91. /* i assumed unsigned */
  92. #define PMC_IS_IMPL(i) (i< PMU_MAX_PMCS && (pmu_conf->pmc_desc[i].type & PFM_REG_IMPL))
  93. #define PMD_IS_IMPL(i) (i< PMU_MAX_PMDS && (pmu_conf->pmd_desc[i].type & PFM_REG_IMPL))
  94. /* XXX: these assume that register i is implemented */
  95. #define PMD_IS_COUNTING(i) ((pmu_conf->pmd_desc[i].type & PFM_REG_COUNTING) == PFM_REG_COUNTING)
  96. #define PMC_IS_COUNTING(i) ((pmu_conf->pmc_desc[i].type & PFM_REG_COUNTING) == PFM_REG_COUNTING)
  97. #define PMC_IS_MONITOR(i) ((pmu_conf->pmc_desc[i].type & PFM_REG_MONITOR) == PFM_REG_MONITOR)
  98. #define PMC_IS_CONTROL(i) ((pmu_conf->pmc_desc[i].type & PFM_REG_CONTROL) == PFM_REG_CONTROL)
  99. #define PMC_DFL_VAL(i) pmu_conf->pmc_desc[i].default_value
  100. #define PMC_RSVD_MASK(i) pmu_conf->pmc_desc[i].reserved_mask
  101. #define PMD_PMD_DEP(i) pmu_conf->pmd_desc[i].dep_pmd[0]
  102. #define PMC_PMD_DEP(i) pmu_conf->pmc_desc[i].dep_pmd[0]
  103. #define PFM_NUM_IBRS IA64_NUM_DBG_REGS
  104. #define PFM_NUM_DBRS IA64_NUM_DBG_REGS
  105. #define CTX_OVFL_NOBLOCK(c) ((c)->ctx_fl_block == 0)
  106. #define CTX_HAS_SMPL(c) ((c)->ctx_fl_is_sampling)
  107. #define PFM_CTX_TASK(h) (h)->ctx_task
  108. #define PMU_PMC_OI 5 /* position of pmc.oi bit */
  109. /* XXX: does not support more than 64 PMDs */
  110. #define CTX_USED_PMD(ctx, mask) (ctx)->ctx_used_pmds[0] |= (mask)
  111. #define CTX_IS_USED_PMD(ctx, c) (((ctx)->ctx_used_pmds[0] & (1UL << (c))) != 0UL)
  112. #define CTX_USED_MONITOR(ctx, mask) (ctx)->ctx_used_monitors[0] |= (mask)
  113. #define CTX_USED_IBR(ctx,n) (ctx)->ctx_used_ibrs[(n)>>6] |= 1UL<< ((n) % 64)
  114. #define CTX_USED_DBR(ctx,n) (ctx)->ctx_used_dbrs[(n)>>6] |= 1UL<< ((n) % 64)
  115. #define CTX_USES_DBREGS(ctx) (((pfm_context_t *)(ctx))->ctx_fl_using_dbreg==1)
  116. #define PFM_CODE_RR 0 /* requesting code range restriction */
  117. #define PFM_DATA_RR 1 /* requestion data range restriction */
  118. #define PFM_CPUINFO_CLEAR(v) pfm_get_cpu_var(pfm_syst_info) &= ~(v)
  119. #define PFM_CPUINFO_SET(v) pfm_get_cpu_var(pfm_syst_info) |= (v)
  120. #define PFM_CPUINFO_GET() pfm_get_cpu_var(pfm_syst_info)
  121. #define RDEP(x) (1UL<<(x))
  122. /*
  123. * context protection macros
  124. * in SMP:
  125. * - we need to protect against CPU concurrency (spin_lock)
  126. * - we need to protect against PMU overflow interrupts (local_irq_disable)
  127. * in UP:
  128. * - we need to protect against PMU overflow interrupts (local_irq_disable)
  129. *
  130. * spin_lock_irqsave()/spin_unlock_irqrestore():
  131. * in SMP: local_irq_disable + spin_lock
  132. * in UP : local_irq_disable
  133. *
  134. * spin_lock()/spin_lock():
  135. * in UP : removed automatically
  136. * in SMP: protect against context accesses from other CPU. interrupts
  137. * are not masked. This is useful for the PMU interrupt handler
  138. * because we know we will not get PMU concurrency in that code.
  139. */
  140. #define PROTECT_CTX(c, f) \
  141. do { \
  142. DPRINT(("spinlock_irq_save ctx %p by [%d]\n", c, task_pid_nr(current))); \
  143. spin_lock_irqsave(&(c)->ctx_lock, f); \
  144. DPRINT(("spinlocked ctx %p by [%d]\n", c, task_pid_nr(current))); \
  145. } while(0)
  146. #define UNPROTECT_CTX(c, f) \
  147. do { \
  148. DPRINT(("spinlock_irq_restore ctx %p by [%d]\n", c, task_pid_nr(current))); \
  149. spin_unlock_irqrestore(&(c)->ctx_lock, f); \
  150. } while(0)
  151. #define PROTECT_CTX_NOPRINT(c, f) \
  152. do { \
  153. spin_lock_irqsave(&(c)->ctx_lock, f); \
  154. } while(0)
  155. #define UNPROTECT_CTX_NOPRINT(c, f) \
  156. do { \
  157. spin_unlock_irqrestore(&(c)->ctx_lock, f); \
  158. } while(0)
  159. #define PROTECT_CTX_NOIRQ(c) \
  160. do { \
  161. spin_lock(&(c)->ctx_lock); \
  162. } while(0)
  163. #define UNPROTECT_CTX_NOIRQ(c) \
  164. do { \
  165. spin_unlock(&(c)->ctx_lock); \
  166. } while(0)
  167. #ifdef CONFIG_SMP
  168. #define GET_ACTIVATION() pfm_get_cpu_var(pmu_activation_number)
  169. #define INC_ACTIVATION() pfm_get_cpu_var(pmu_activation_number)++
  170. #define SET_ACTIVATION(c) (c)->ctx_last_activation = GET_ACTIVATION()
  171. #else /* !CONFIG_SMP */
  172. #define SET_ACTIVATION(t) do {} while(0)
  173. #define GET_ACTIVATION(t) do {} while(0)
  174. #define INC_ACTIVATION(t) do {} while(0)
  175. #endif /* CONFIG_SMP */
  176. #define SET_PMU_OWNER(t, c) do { pfm_get_cpu_var(pmu_owner) = (t); pfm_get_cpu_var(pmu_ctx) = (c); } while(0)
  177. #define GET_PMU_OWNER() pfm_get_cpu_var(pmu_owner)
  178. #define GET_PMU_CTX() pfm_get_cpu_var(pmu_ctx)
  179. #define LOCK_PFS(g) spin_lock_irqsave(&pfm_sessions.pfs_lock, g)
  180. #define UNLOCK_PFS(g) spin_unlock_irqrestore(&pfm_sessions.pfs_lock, g)
  181. #define PFM_REG_RETFLAG_SET(flags, val) do { flags &= ~PFM_REG_RETFL_MASK; flags |= (val); } while(0)
  182. /*
  183. * cmp0 must be the value of pmc0
  184. */
  185. #define PMC0_HAS_OVFL(cmp0) (cmp0 & ~0x1UL)
  186. #define PFMFS_MAGIC 0xa0b4d889
  187. /*
  188. * debugging
  189. */
  190. #define PFM_DEBUGGING 1
  191. #ifdef PFM_DEBUGGING
  192. #define DPRINT(a) \
  193. do { \
  194. if (unlikely(pfm_sysctl.debug >0)) { printk("%s.%d: CPU%d [%d] ", __func__, __LINE__, smp_processor_id(), task_pid_nr(current)); printk a; } \
  195. } while (0)
  196. #define DPRINT_ovfl(a) \
  197. do { \
  198. if (unlikely(pfm_sysctl.debug > 0 && pfm_sysctl.debug_ovfl >0)) { printk("%s.%d: CPU%d [%d] ", __func__, __LINE__, smp_processor_id(), task_pid_nr(current)); printk a; } \
  199. } while (0)
  200. #endif
  201. /*
  202. * 64-bit software counter structure
  203. *
  204. * the next_reset_type is applied to the next call to pfm_reset_regs()
  205. */
  206. typedef struct {
  207. unsigned long val; /* virtual 64bit counter value */
  208. unsigned long lval; /* last reset value */
  209. unsigned long long_reset; /* reset value on sampling overflow */
  210. unsigned long short_reset; /* reset value on overflow */
  211. unsigned long reset_pmds[4]; /* which other pmds to reset when this counter overflows */
  212. unsigned long smpl_pmds[4]; /* which pmds are accessed when counter overflow */
  213. unsigned long seed; /* seed for random-number generator */
  214. unsigned long mask; /* mask for random-number generator */
  215. unsigned int flags; /* notify/do not notify */
  216. unsigned long eventid; /* overflow event identifier */
  217. } pfm_counter_t;
  218. /*
  219. * context flags
  220. */
  221. typedef struct {
  222. unsigned int block:1; /* when 1, task will blocked on user notifications */
  223. unsigned int system:1; /* do system wide monitoring */
  224. unsigned int using_dbreg:1; /* using range restrictions (debug registers) */
  225. unsigned int is_sampling:1; /* true if using a custom format */
  226. unsigned int excl_idle:1; /* exclude idle task in system wide session */
  227. unsigned int going_zombie:1; /* context is zombie (MASKED+blocking) */
  228. unsigned int trap_reason:2; /* reason for going into pfm_handle_work() */
  229. unsigned int no_msg:1; /* no message sent on overflow */
  230. unsigned int can_restart:1; /* allowed to issue a PFM_RESTART */
  231. unsigned int reserved:22;
  232. } pfm_context_flags_t;
  233. #define PFM_TRAP_REASON_NONE 0x0 /* default value */
  234. #define PFM_TRAP_REASON_BLOCK 0x1 /* we need to block on overflow */
  235. #define PFM_TRAP_REASON_RESET 0x2 /* we need to reset PMDs */
  236. /*
  237. * perfmon context: encapsulates all the state of a monitoring session
  238. */
  239. typedef struct pfm_context {
  240. spinlock_t ctx_lock; /* context protection */
  241. pfm_context_flags_t ctx_flags; /* bitmask of flags (block reason incl.) */
  242. unsigned int ctx_state; /* state: active/inactive (no bitfield) */
  243. struct task_struct *ctx_task; /* task to which context is attached */
  244. unsigned long ctx_ovfl_regs[4]; /* which registers overflowed (notification) */
  245. struct completion ctx_restart_done; /* use for blocking notification mode */
  246. unsigned long ctx_used_pmds[4]; /* bitmask of PMD used */
  247. unsigned long ctx_all_pmds[4]; /* bitmask of all accessible PMDs */
  248. unsigned long ctx_reload_pmds[4]; /* bitmask of force reload PMD on ctxsw in */
  249. unsigned long ctx_all_pmcs[4]; /* bitmask of all accessible PMCs */
  250. unsigned long ctx_reload_pmcs[4]; /* bitmask of force reload PMC on ctxsw in */
  251. unsigned long ctx_used_monitors[4]; /* bitmask of monitor PMC being used */
  252. unsigned long ctx_pmcs[PFM_NUM_PMC_REGS]; /* saved copies of PMC values */
  253. unsigned int ctx_used_ibrs[1]; /* bitmask of used IBR (speedup ctxsw in) */
  254. unsigned int ctx_used_dbrs[1]; /* bitmask of used DBR (speedup ctxsw in) */
  255. unsigned long ctx_dbrs[IA64_NUM_DBG_REGS]; /* DBR values (cache) when not loaded */
  256. unsigned long ctx_ibrs[IA64_NUM_DBG_REGS]; /* IBR values (cache) when not loaded */
  257. pfm_counter_t ctx_pmds[PFM_NUM_PMD_REGS]; /* software state for PMDS */
  258. unsigned long th_pmcs[PFM_NUM_PMC_REGS]; /* PMC thread save state */
  259. unsigned long th_pmds[PFM_NUM_PMD_REGS]; /* PMD thread save state */
  260. unsigned long ctx_saved_psr_up; /* only contains psr.up value */
  261. unsigned long ctx_last_activation; /* context last activation number for last_cpu */
  262. unsigned int ctx_last_cpu; /* CPU id of current or last CPU used (SMP only) */
  263. unsigned int ctx_cpu; /* cpu to which perfmon is applied (system wide) */
  264. int ctx_fd; /* file descriptor used my this context */
  265. pfm_ovfl_arg_t ctx_ovfl_arg; /* argument to custom buffer format handler */
  266. pfm_buffer_fmt_t *ctx_buf_fmt; /* buffer format callbacks */
  267. void *ctx_smpl_hdr; /* points to sampling buffer header kernel vaddr */
  268. unsigned long ctx_smpl_size; /* size of sampling buffer */
  269. void *ctx_smpl_vaddr; /* user level virtual address of smpl buffer */
  270. wait_queue_head_t ctx_msgq_wait;
  271. pfm_msg_t ctx_msgq[PFM_MAX_MSGS];
  272. int ctx_msgq_head;
  273. int ctx_msgq_tail;
  274. struct fasync_struct *ctx_async_queue;
  275. wait_queue_head_t ctx_zombieq; /* termination cleanup wait queue */
  276. } pfm_context_t;
  277. /*
  278. * magic number used to verify that structure is really
  279. * a perfmon context
  280. */
  281. #define PFM_IS_FILE(f) ((f)->f_op == &pfm_file_ops)
  282. #define PFM_GET_CTX(t) ((pfm_context_t *)(t)->thread.pfm_context)
  283. #ifdef CONFIG_SMP
  284. #define SET_LAST_CPU(ctx, v) (ctx)->ctx_last_cpu = (v)
  285. #define GET_LAST_CPU(ctx) (ctx)->ctx_last_cpu
  286. #else
  287. #define SET_LAST_CPU(ctx, v) do {} while(0)
  288. #define GET_LAST_CPU(ctx) do {} while(0)
  289. #endif
  290. #define ctx_fl_block ctx_flags.block
  291. #define ctx_fl_system ctx_flags.system
  292. #define ctx_fl_using_dbreg ctx_flags.using_dbreg
  293. #define ctx_fl_is_sampling ctx_flags.is_sampling
  294. #define ctx_fl_excl_idle ctx_flags.excl_idle
  295. #define ctx_fl_going_zombie ctx_flags.going_zombie
  296. #define ctx_fl_trap_reason ctx_flags.trap_reason
  297. #define ctx_fl_no_msg ctx_flags.no_msg
  298. #define ctx_fl_can_restart ctx_flags.can_restart
  299. #define PFM_SET_WORK_PENDING(t, v) do { (t)->thread.pfm_needs_checking = v; } while(0);
  300. #define PFM_GET_WORK_PENDING(t) (t)->thread.pfm_needs_checking
  301. /*
  302. * global information about all sessions
  303. * mostly used to synchronize between system wide and per-process
  304. */
  305. typedef struct {
  306. spinlock_t pfs_lock; /* lock the structure */
  307. unsigned int pfs_task_sessions; /* number of per task sessions */
  308. unsigned int pfs_sys_sessions; /* number of per system wide sessions */
  309. unsigned int pfs_sys_use_dbregs; /* incremented when a system wide session uses debug regs */
  310. unsigned int pfs_ptrace_use_dbregs; /* incremented when a process uses debug regs */
  311. struct task_struct *pfs_sys_session[NR_CPUS]; /* point to task owning a system-wide session */
  312. } pfm_session_t;
  313. /*
  314. * information about a PMC or PMD.
  315. * dep_pmd[]: a bitmask of dependent PMD registers
  316. * dep_pmc[]: a bitmask of dependent PMC registers
  317. */
  318. typedef int (*pfm_reg_check_t)(struct task_struct *task, pfm_context_t *ctx, unsigned int cnum, unsigned long *val, struct pt_regs *regs);
  319. typedef struct {
  320. unsigned int type;
  321. int pm_pos;
  322. unsigned long default_value; /* power-on default value */
  323. unsigned long reserved_mask; /* bitmask of reserved bits */
  324. pfm_reg_check_t read_check;
  325. pfm_reg_check_t write_check;
  326. unsigned long dep_pmd[4];
  327. unsigned long dep_pmc[4];
  328. } pfm_reg_desc_t;
  329. /* assume cnum is a valid monitor */
  330. #define PMC_PM(cnum, val) (((val) >> (pmu_conf->pmc_desc[cnum].pm_pos)) & 0x1)
  331. /*
  332. * This structure is initialized at boot time and contains
  333. * a description of the PMU main characteristics.
  334. *
  335. * If the probe function is defined, detection is based
  336. * on its return value:
  337. * - 0 means recognized PMU
  338. * - anything else means not supported
  339. * When the probe function is not defined, then the pmu_family field
  340. * is used and it must match the host CPU family such that:
  341. * - cpu->family & config->pmu_family != 0
  342. */
  343. typedef struct {
  344. unsigned long ovfl_val; /* overflow value for counters */
  345. pfm_reg_desc_t *pmc_desc; /* detailed PMC register dependencies descriptions */
  346. pfm_reg_desc_t *pmd_desc; /* detailed PMD register dependencies descriptions */
  347. unsigned int num_pmcs; /* number of PMCS: computed at init time */
  348. unsigned int num_pmds; /* number of PMDS: computed at init time */
  349. unsigned long impl_pmcs[4]; /* bitmask of implemented PMCS */
  350. unsigned long impl_pmds[4]; /* bitmask of implemented PMDS */
  351. char *pmu_name; /* PMU family name */
  352. unsigned int pmu_family; /* cpuid family pattern used to identify pmu */
  353. unsigned int flags; /* pmu specific flags */
  354. unsigned int num_ibrs; /* number of IBRS: computed at init time */
  355. unsigned int num_dbrs; /* number of DBRS: computed at init time */
  356. unsigned int num_counters; /* PMC/PMD counting pairs : computed at init time */
  357. int (*probe)(void); /* customized probe routine */
  358. unsigned int use_rr_dbregs:1; /* set if debug registers used for range restriction */
  359. } pmu_config_t;
  360. /*
  361. * PMU specific flags
  362. */
  363. #define PFM_PMU_IRQ_RESEND 1 /* PMU needs explicit IRQ resend */
  364. /*
  365. * debug register related type definitions
  366. */
  367. typedef struct {
  368. unsigned long ibr_mask:56;
  369. unsigned long ibr_plm:4;
  370. unsigned long ibr_ig:3;
  371. unsigned long ibr_x:1;
  372. } ibr_mask_reg_t;
  373. typedef struct {
  374. unsigned long dbr_mask:56;
  375. unsigned long dbr_plm:4;
  376. unsigned long dbr_ig:2;
  377. unsigned long dbr_w:1;
  378. unsigned long dbr_r:1;
  379. } dbr_mask_reg_t;
  380. typedef union {
  381. unsigned long val;
  382. ibr_mask_reg_t ibr;
  383. dbr_mask_reg_t dbr;
  384. } dbreg_t;
  385. /*
  386. * perfmon command descriptions
  387. */
  388. typedef struct {
  389. int (*cmd_func)(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs);
  390. char *cmd_name;
  391. int cmd_flags;
  392. unsigned int cmd_narg;
  393. size_t cmd_argsize;
  394. int (*cmd_getsize)(void *arg, size_t *sz);
  395. } pfm_cmd_desc_t;
  396. #define PFM_CMD_FD 0x01 /* command requires a file descriptor */
  397. #define PFM_CMD_ARG_READ 0x02 /* command must read argument(s) */
  398. #define PFM_CMD_ARG_RW 0x04 /* command must read/write argument(s) */
  399. #define PFM_CMD_STOP 0x08 /* command does not work on zombie context */
  400. #define PFM_CMD_NAME(cmd) pfm_cmd_tab[(cmd)].cmd_name
  401. #define PFM_CMD_READ_ARG(cmd) (pfm_cmd_tab[(cmd)].cmd_flags & PFM_CMD_ARG_READ)
  402. #define PFM_CMD_RW_ARG(cmd) (pfm_cmd_tab[(cmd)].cmd_flags & PFM_CMD_ARG_RW)
  403. #define PFM_CMD_USE_FD(cmd) (pfm_cmd_tab[(cmd)].cmd_flags & PFM_CMD_FD)
  404. #define PFM_CMD_STOPPED(cmd) (pfm_cmd_tab[(cmd)].cmd_flags & PFM_CMD_STOP)
  405. #define PFM_CMD_ARG_MANY -1 /* cannot be zero */
  406. typedef struct {
  407. unsigned long pfm_spurious_ovfl_intr_count; /* keep track of spurious ovfl interrupts */
  408. unsigned long pfm_replay_ovfl_intr_count; /* keep track of replayed ovfl interrupts */
  409. unsigned long pfm_ovfl_intr_count; /* keep track of ovfl interrupts */
  410. unsigned long pfm_ovfl_intr_cycles; /* cycles spent processing ovfl interrupts */
  411. unsigned long pfm_ovfl_intr_cycles_min; /* min cycles spent processing ovfl interrupts */
  412. unsigned long pfm_ovfl_intr_cycles_max; /* max cycles spent processing ovfl interrupts */
  413. unsigned long pfm_smpl_handler_calls;
  414. unsigned long pfm_smpl_handler_cycles;
  415. char pad[SMP_CACHE_BYTES] ____cacheline_aligned;
  416. } pfm_stats_t;
  417. /*
  418. * perfmon internal variables
  419. */
  420. static pfm_stats_t pfm_stats[NR_CPUS];
  421. static pfm_session_t pfm_sessions; /* global sessions information */
  422. static DEFINE_SPINLOCK(pfm_alt_install_check);
  423. static pfm_intr_handler_desc_t *pfm_alt_intr_handler;
  424. static struct proc_dir_entry *perfmon_dir;
  425. static pfm_uuid_t pfm_null_uuid = {0,};
  426. static spinlock_t pfm_buffer_fmt_lock;
  427. static LIST_HEAD(pfm_buffer_fmt_list);
  428. static pmu_config_t *pmu_conf;
  429. /* sysctl() controls */
  430. pfm_sysctl_t pfm_sysctl;
  431. EXPORT_SYMBOL(pfm_sysctl);
  432. static struct ctl_table pfm_ctl_table[] = {
  433. {
  434. .procname = "debug",
  435. .data = &pfm_sysctl.debug,
  436. .maxlen = sizeof(int),
  437. .mode = 0666,
  438. .proc_handler = proc_dointvec,
  439. },
  440. {
  441. .procname = "debug_ovfl",
  442. .data = &pfm_sysctl.debug_ovfl,
  443. .maxlen = sizeof(int),
  444. .mode = 0666,
  445. .proc_handler = proc_dointvec,
  446. },
  447. {
  448. .procname = "fastctxsw",
  449. .data = &pfm_sysctl.fastctxsw,
  450. .maxlen = sizeof(int),
  451. .mode = 0600,
  452. .proc_handler = proc_dointvec,
  453. },
  454. {
  455. .procname = "expert_mode",
  456. .data = &pfm_sysctl.expert_mode,
  457. .maxlen = sizeof(int),
  458. .mode = 0600,
  459. .proc_handler = proc_dointvec,
  460. },
  461. {}
  462. };
  463. static struct ctl_table pfm_sysctl_dir[] = {
  464. {
  465. .procname = "perfmon",
  466. .mode = 0555,
  467. .child = pfm_ctl_table,
  468. },
  469. {}
  470. };
  471. static struct ctl_table pfm_sysctl_root[] = {
  472. {
  473. .procname = "kernel",
  474. .mode = 0555,
  475. .child = pfm_sysctl_dir,
  476. },
  477. {}
  478. };
  479. static struct ctl_table_header *pfm_sysctl_header;
  480. static int pfm_context_unload(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs);
  481. #define pfm_get_cpu_var(v) __ia64_per_cpu_var(v)
  482. #define pfm_get_cpu_data(a,b) per_cpu(a, b)
  483. static inline void
  484. pfm_put_task(struct task_struct *task)
  485. {
  486. if (task != current) put_task_struct(task);
  487. }
  488. static inline void
  489. pfm_reserve_page(unsigned long a)
  490. {
  491. SetPageReserved(vmalloc_to_page((void *)a));
  492. }
  493. static inline void
  494. pfm_unreserve_page(unsigned long a)
  495. {
  496. ClearPageReserved(vmalloc_to_page((void*)a));
  497. }
  498. static inline unsigned long
  499. pfm_protect_ctx_ctxsw(pfm_context_t *x)
  500. {
  501. spin_lock(&(x)->ctx_lock);
  502. return 0UL;
  503. }
  504. static inline void
  505. pfm_unprotect_ctx_ctxsw(pfm_context_t *x, unsigned long f)
  506. {
  507. spin_unlock(&(x)->ctx_lock);
  508. }
  509. /* forward declaration */
  510. static const struct dentry_operations pfmfs_dentry_operations;
  511. static struct dentry *
  512. pfmfs_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data)
  513. {
  514. return mount_pseudo(fs_type, "pfm:", NULL, &pfmfs_dentry_operations,
  515. PFMFS_MAGIC);
  516. }
  517. static struct file_system_type pfm_fs_type = {
  518. .name = "pfmfs",
  519. .mount = pfmfs_mount,
  520. .kill_sb = kill_anon_super,
  521. };
  522. MODULE_ALIAS_FS("pfmfs");
  523. DEFINE_PER_CPU(unsigned long, pfm_syst_info);
  524. DEFINE_PER_CPU(struct task_struct *, pmu_owner);
  525. DEFINE_PER_CPU(pfm_context_t *, pmu_ctx);
  526. DEFINE_PER_CPU(unsigned long, pmu_activation_number);
  527. EXPORT_PER_CPU_SYMBOL_GPL(pfm_syst_info);
  528. /* forward declaration */
  529. static const struct file_operations pfm_file_ops;
  530. /*
  531. * forward declarations
  532. */
  533. #ifndef CONFIG_SMP
  534. static void pfm_lazy_save_regs (struct task_struct *ta);
  535. #endif
  536. void dump_pmu_state(const char *);
  537. static int pfm_write_ibr_dbr(int mode, pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs);
  538. #include "perfmon_itanium.h"
  539. #include "perfmon_mckinley.h"
  540. #include "perfmon_montecito.h"
  541. #include "perfmon_generic.h"
  542. static pmu_config_t *pmu_confs[]={
  543. &pmu_conf_mont,
  544. &pmu_conf_mck,
  545. &pmu_conf_ita,
  546. &pmu_conf_gen, /* must be last */
  547. NULL
  548. };
  549. static int pfm_end_notify_user(pfm_context_t *ctx);
  550. static inline void
  551. pfm_clear_psr_pp(void)
  552. {
  553. ia64_rsm(IA64_PSR_PP);
  554. ia64_srlz_i();
  555. }
  556. static inline void
  557. pfm_set_psr_pp(void)
  558. {
  559. ia64_ssm(IA64_PSR_PP);
  560. ia64_srlz_i();
  561. }
  562. static inline void
  563. pfm_clear_psr_up(void)
  564. {
  565. ia64_rsm(IA64_PSR_UP);
  566. ia64_srlz_i();
  567. }
  568. static inline void
  569. pfm_set_psr_up(void)
  570. {
  571. ia64_ssm(IA64_PSR_UP);
  572. ia64_srlz_i();
  573. }
  574. static inline unsigned long
  575. pfm_get_psr(void)
  576. {
  577. unsigned long tmp;
  578. tmp = ia64_getreg(_IA64_REG_PSR);
  579. ia64_srlz_i();
  580. return tmp;
  581. }
  582. static inline void
  583. pfm_set_psr_l(unsigned long val)
  584. {
  585. ia64_setreg(_IA64_REG_PSR_L, val);
  586. ia64_srlz_i();
  587. }
  588. static inline void
  589. pfm_freeze_pmu(void)
  590. {
  591. ia64_set_pmc(0,1UL);
  592. ia64_srlz_d();
  593. }
  594. static inline void
  595. pfm_unfreeze_pmu(void)
  596. {
  597. ia64_set_pmc(0,0UL);
  598. ia64_srlz_d();
  599. }
  600. static inline void
  601. pfm_restore_ibrs(unsigned long *ibrs, unsigned int nibrs)
  602. {
  603. int i;
  604. for (i=0; i < nibrs; i++) {
  605. ia64_set_ibr(i, ibrs[i]);
  606. ia64_dv_serialize_instruction();
  607. }
  608. ia64_srlz_i();
  609. }
  610. static inline void
  611. pfm_restore_dbrs(unsigned long *dbrs, unsigned int ndbrs)
  612. {
  613. int i;
  614. for (i=0; i < ndbrs; i++) {
  615. ia64_set_dbr(i, dbrs[i]);
  616. ia64_dv_serialize_data();
  617. }
  618. ia64_srlz_d();
  619. }
  620. /*
  621. * PMD[i] must be a counter. no check is made
  622. */
  623. static inline unsigned long
  624. pfm_read_soft_counter(pfm_context_t *ctx, int i)
  625. {
  626. return ctx->ctx_pmds[i].val + (ia64_get_pmd(i) & pmu_conf->ovfl_val);
  627. }
  628. /*
  629. * PMD[i] must be a counter. no check is made
  630. */
  631. static inline void
  632. pfm_write_soft_counter(pfm_context_t *ctx, int i, unsigned long val)
  633. {
  634. unsigned long ovfl_val = pmu_conf->ovfl_val;
  635. ctx->ctx_pmds[i].val = val & ~ovfl_val;
  636. /*
  637. * writing to unimplemented part is ignore, so we do not need to
  638. * mask off top part
  639. */
  640. ia64_set_pmd(i, val & ovfl_val);
  641. }
  642. static pfm_msg_t *
  643. pfm_get_new_msg(pfm_context_t *ctx)
  644. {
  645. int idx, next;
  646. next = (ctx->ctx_msgq_tail+1) % PFM_MAX_MSGS;
  647. DPRINT(("ctx_fd=%p head=%d tail=%d\n", ctx, ctx->ctx_msgq_head, ctx->ctx_msgq_tail));
  648. if (next == ctx->ctx_msgq_head) return NULL;
  649. idx = ctx->ctx_msgq_tail;
  650. ctx->ctx_msgq_tail = next;
  651. DPRINT(("ctx=%p head=%d tail=%d msg=%d\n", ctx, ctx->ctx_msgq_head, ctx->ctx_msgq_tail, idx));
  652. return ctx->ctx_msgq+idx;
  653. }
  654. static pfm_msg_t *
  655. pfm_get_next_msg(pfm_context_t *ctx)
  656. {
  657. pfm_msg_t *msg;
  658. DPRINT(("ctx=%p head=%d tail=%d\n", ctx, ctx->ctx_msgq_head, ctx->ctx_msgq_tail));
  659. if (PFM_CTXQ_EMPTY(ctx)) return NULL;
  660. /*
  661. * get oldest message
  662. */
  663. msg = ctx->ctx_msgq+ctx->ctx_msgq_head;
  664. /*
  665. * and move forward
  666. */
  667. ctx->ctx_msgq_head = (ctx->ctx_msgq_head+1) % PFM_MAX_MSGS;
  668. DPRINT(("ctx=%p head=%d tail=%d type=%d\n", ctx, ctx->ctx_msgq_head, ctx->ctx_msgq_tail, msg->pfm_gen_msg.msg_type));
  669. return msg;
  670. }
  671. static void
  672. pfm_reset_msgq(pfm_context_t *ctx)
  673. {
  674. ctx->ctx_msgq_head = ctx->ctx_msgq_tail = 0;
  675. DPRINT(("ctx=%p msgq reset\n", ctx));
  676. }
  677. static void *
  678. pfm_rvmalloc(unsigned long size)
  679. {
  680. void *mem;
  681. unsigned long addr;
  682. size = PAGE_ALIGN(size);
  683. mem = vzalloc(size);
  684. if (mem) {
  685. //printk("perfmon: CPU%d pfm_rvmalloc(%ld)=%p\n", smp_processor_id(), size, mem);
  686. addr = (unsigned long)mem;
  687. while (size > 0) {
  688. pfm_reserve_page(addr);
  689. addr+=PAGE_SIZE;
  690. size-=PAGE_SIZE;
  691. }
  692. }
  693. return mem;
  694. }
  695. static void
  696. pfm_rvfree(void *mem, unsigned long size)
  697. {
  698. unsigned long addr;
  699. if (mem) {
  700. DPRINT(("freeing physical buffer @%p size=%lu\n", mem, size));
  701. addr = (unsigned long) mem;
  702. while ((long) size > 0) {
  703. pfm_unreserve_page(addr);
  704. addr+=PAGE_SIZE;
  705. size-=PAGE_SIZE;
  706. }
  707. vfree(mem);
  708. }
  709. return;
  710. }
  711. static pfm_context_t *
  712. pfm_context_alloc(int ctx_flags)
  713. {
  714. pfm_context_t *ctx;
  715. /*
  716. * allocate context descriptor
  717. * must be able to free with interrupts disabled
  718. */
  719. ctx = kzalloc(sizeof(pfm_context_t), GFP_KERNEL);
  720. if (ctx) {
  721. DPRINT(("alloc ctx @%p\n", ctx));
  722. /*
  723. * init context protection lock
  724. */
  725. spin_lock_init(&ctx->ctx_lock);
  726. /*
  727. * context is unloaded
  728. */
  729. ctx->ctx_state = PFM_CTX_UNLOADED;
  730. /*
  731. * initialization of context's flags
  732. */
  733. ctx->ctx_fl_block = (ctx_flags & PFM_FL_NOTIFY_BLOCK) ? 1 : 0;
  734. ctx->ctx_fl_system = (ctx_flags & PFM_FL_SYSTEM_WIDE) ? 1: 0;
  735. ctx->ctx_fl_no_msg = (ctx_flags & PFM_FL_OVFL_NO_MSG) ? 1: 0;
  736. /*
  737. * will move to set properties
  738. * ctx->ctx_fl_excl_idle = (ctx_flags & PFM_FL_EXCL_IDLE) ? 1: 0;
  739. */
  740. /*
  741. * init restart semaphore to locked
  742. */
  743. init_completion(&ctx->ctx_restart_done);
  744. /*
  745. * activation is used in SMP only
  746. */
  747. ctx->ctx_last_activation = PFM_INVALID_ACTIVATION;
  748. SET_LAST_CPU(ctx, -1);
  749. /*
  750. * initialize notification message queue
  751. */
  752. ctx->ctx_msgq_head = ctx->ctx_msgq_tail = 0;
  753. init_waitqueue_head(&ctx->ctx_msgq_wait);
  754. init_waitqueue_head(&ctx->ctx_zombieq);
  755. }
  756. return ctx;
  757. }
  758. static void
  759. pfm_context_free(pfm_context_t *ctx)
  760. {
  761. if (ctx) {
  762. DPRINT(("free ctx @%p\n", ctx));
  763. kfree(ctx);
  764. }
  765. }
  766. static void
  767. pfm_mask_monitoring(struct task_struct *task)
  768. {
  769. pfm_context_t *ctx = PFM_GET_CTX(task);
  770. unsigned long mask, val, ovfl_mask;
  771. int i;
  772. DPRINT_ovfl(("masking monitoring for [%d]\n", task_pid_nr(task)));
  773. ovfl_mask = pmu_conf->ovfl_val;
  774. /*
  775. * monitoring can only be masked as a result of a valid
  776. * counter overflow. In UP, it means that the PMU still
  777. * has an owner. Note that the owner can be different
  778. * from the current task. However the PMU state belongs
  779. * to the owner.
  780. * In SMP, a valid overflow only happens when task is
  781. * current. Therefore if we come here, we know that
  782. * the PMU state belongs to the current task, therefore
  783. * we can access the live registers.
  784. *
  785. * So in both cases, the live register contains the owner's
  786. * state. We can ONLY touch the PMU registers and NOT the PSR.
  787. *
  788. * As a consequence to this call, the ctx->th_pmds[] array
  789. * contains stale information which must be ignored
  790. * when context is reloaded AND monitoring is active (see
  791. * pfm_restart).
  792. */
  793. mask = ctx->ctx_used_pmds[0];
  794. for (i = 0; mask; i++, mask>>=1) {
  795. /* skip non used pmds */
  796. if ((mask & 0x1) == 0) continue;
  797. val = ia64_get_pmd(i);
  798. if (PMD_IS_COUNTING(i)) {
  799. /*
  800. * we rebuild the full 64 bit value of the counter
  801. */
  802. ctx->ctx_pmds[i].val += (val & ovfl_mask);
  803. } else {
  804. ctx->ctx_pmds[i].val = val;
  805. }
  806. DPRINT_ovfl(("pmd[%d]=0x%lx hw_pmd=0x%lx\n",
  807. i,
  808. ctx->ctx_pmds[i].val,
  809. val & ovfl_mask));
  810. }
  811. /*
  812. * mask monitoring by setting the privilege level to 0
  813. * we cannot use psr.pp/psr.up for this, it is controlled by
  814. * the user
  815. *
  816. * if task is current, modify actual registers, otherwise modify
  817. * thread save state, i.e., what will be restored in pfm_load_regs()
  818. */
  819. mask = ctx->ctx_used_monitors[0] >> PMU_FIRST_COUNTER;
  820. for(i= PMU_FIRST_COUNTER; mask; i++, mask>>=1) {
  821. if ((mask & 0x1) == 0UL) continue;
  822. ia64_set_pmc(i, ctx->th_pmcs[i] & ~0xfUL);
  823. ctx->th_pmcs[i] &= ~0xfUL;
  824. DPRINT_ovfl(("pmc[%d]=0x%lx\n", i, ctx->th_pmcs[i]));
  825. }
  826. /*
  827. * make all of this visible
  828. */
  829. ia64_srlz_d();
  830. }
  831. /*
  832. * must always be done with task == current
  833. *
  834. * context must be in MASKED state when calling
  835. */
  836. static void
  837. pfm_restore_monitoring(struct task_struct *task)
  838. {
  839. pfm_context_t *ctx = PFM_GET_CTX(task);
  840. unsigned long mask, ovfl_mask;
  841. unsigned long psr, val;
  842. int i, is_system;
  843. is_system = ctx->ctx_fl_system;
  844. ovfl_mask = pmu_conf->ovfl_val;
  845. if (task != current) {
  846. printk(KERN_ERR "perfmon.%d: invalid task[%d] current[%d]\n", __LINE__, task_pid_nr(task), task_pid_nr(current));
  847. return;
  848. }
  849. if (ctx->ctx_state != PFM_CTX_MASKED) {
  850. printk(KERN_ERR "perfmon.%d: task[%d] current[%d] invalid state=%d\n", __LINE__,
  851. task_pid_nr(task), task_pid_nr(current), ctx->ctx_state);
  852. return;
  853. }
  854. psr = pfm_get_psr();
  855. /*
  856. * monitoring is masked via the PMC.
  857. * As we restore their value, we do not want each counter to
  858. * restart right away. We stop monitoring using the PSR,
  859. * restore the PMC (and PMD) and then re-establish the psr
  860. * as it was. Note that there can be no pending overflow at
  861. * this point, because monitoring was MASKED.
  862. *
  863. * system-wide session are pinned and self-monitoring
  864. */
  865. if (is_system && (PFM_CPUINFO_GET() & PFM_CPUINFO_DCR_PP)) {
  866. /* disable dcr pp */
  867. ia64_setreg(_IA64_REG_CR_DCR, ia64_getreg(_IA64_REG_CR_DCR) & ~IA64_DCR_PP);
  868. pfm_clear_psr_pp();
  869. } else {
  870. pfm_clear_psr_up();
  871. }
  872. /*
  873. * first, we restore the PMD
  874. */
  875. mask = ctx->ctx_used_pmds[0];
  876. for (i = 0; mask; i++, mask>>=1) {
  877. /* skip non used pmds */
  878. if ((mask & 0x1) == 0) continue;
  879. if (PMD_IS_COUNTING(i)) {
  880. /*
  881. * we split the 64bit value according to
  882. * counter width
  883. */
  884. val = ctx->ctx_pmds[i].val & ovfl_mask;
  885. ctx->ctx_pmds[i].val &= ~ovfl_mask;
  886. } else {
  887. val = ctx->ctx_pmds[i].val;
  888. }
  889. ia64_set_pmd(i, val);
  890. DPRINT(("pmd[%d]=0x%lx hw_pmd=0x%lx\n",
  891. i,
  892. ctx->ctx_pmds[i].val,
  893. val));
  894. }
  895. /*
  896. * restore the PMCs
  897. */
  898. mask = ctx->ctx_used_monitors[0] >> PMU_FIRST_COUNTER;
  899. for(i= PMU_FIRST_COUNTER; mask; i++, mask>>=1) {
  900. if ((mask & 0x1) == 0UL) continue;
  901. ctx->th_pmcs[i] = ctx->ctx_pmcs[i];
  902. ia64_set_pmc(i, ctx->th_pmcs[i]);
  903. DPRINT(("[%d] pmc[%d]=0x%lx\n",
  904. task_pid_nr(task), i, ctx->th_pmcs[i]));
  905. }
  906. ia64_srlz_d();
  907. /*
  908. * must restore DBR/IBR because could be modified while masked
  909. * XXX: need to optimize
  910. */
  911. if (ctx->ctx_fl_using_dbreg) {
  912. pfm_restore_ibrs(ctx->ctx_ibrs, pmu_conf->num_ibrs);
  913. pfm_restore_dbrs(ctx->ctx_dbrs, pmu_conf->num_dbrs);
  914. }
  915. /*
  916. * now restore PSR
  917. */
  918. if (is_system && (PFM_CPUINFO_GET() & PFM_CPUINFO_DCR_PP)) {
  919. /* enable dcr pp */
  920. ia64_setreg(_IA64_REG_CR_DCR, ia64_getreg(_IA64_REG_CR_DCR) | IA64_DCR_PP);
  921. ia64_srlz_i();
  922. }
  923. pfm_set_psr_l(psr);
  924. }
  925. static inline void
  926. pfm_save_pmds(unsigned long *pmds, unsigned long mask)
  927. {
  928. int i;
  929. ia64_srlz_d();
  930. for (i=0; mask; i++, mask>>=1) {
  931. if (mask & 0x1) pmds[i] = ia64_get_pmd(i);
  932. }
  933. }
  934. /*
  935. * reload from thread state (used for ctxw only)
  936. */
  937. static inline void
  938. pfm_restore_pmds(unsigned long *pmds, unsigned long mask)
  939. {
  940. int i;
  941. unsigned long val, ovfl_val = pmu_conf->ovfl_val;
  942. for (i=0; mask; i++, mask>>=1) {
  943. if ((mask & 0x1) == 0) continue;
  944. val = PMD_IS_COUNTING(i) ? pmds[i] & ovfl_val : pmds[i];
  945. ia64_set_pmd(i, val);
  946. }
  947. ia64_srlz_d();
  948. }
  949. /*
  950. * propagate PMD from context to thread-state
  951. */
  952. static inline void
  953. pfm_copy_pmds(struct task_struct *task, pfm_context_t *ctx)
  954. {
  955. unsigned long ovfl_val = pmu_conf->ovfl_val;
  956. unsigned long mask = ctx->ctx_all_pmds[0];
  957. unsigned long val;
  958. int i;
  959. DPRINT(("mask=0x%lx\n", mask));
  960. for (i=0; mask; i++, mask>>=1) {
  961. val = ctx->ctx_pmds[i].val;
  962. /*
  963. * We break up the 64 bit value into 2 pieces
  964. * the lower bits go to the machine state in the
  965. * thread (will be reloaded on ctxsw in).
  966. * The upper part stays in the soft-counter.
  967. */
  968. if (PMD_IS_COUNTING(i)) {
  969. ctx->ctx_pmds[i].val = val & ~ovfl_val;
  970. val &= ovfl_val;
  971. }
  972. ctx->th_pmds[i] = val;
  973. DPRINT(("pmd[%d]=0x%lx soft_val=0x%lx\n",
  974. i,
  975. ctx->th_pmds[i],
  976. ctx->ctx_pmds[i].val));
  977. }
  978. }
  979. /*
  980. * propagate PMC from context to thread-state
  981. */
  982. static inline void
  983. pfm_copy_pmcs(struct task_struct *task, pfm_context_t *ctx)
  984. {
  985. unsigned long mask = ctx->ctx_all_pmcs[0];
  986. int i;
  987. DPRINT(("mask=0x%lx\n", mask));
  988. for (i=0; mask; i++, mask>>=1) {
  989. /* masking 0 with ovfl_val yields 0 */
  990. ctx->th_pmcs[i] = ctx->ctx_pmcs[i];
  991. DPRINT(("pmc[%d]=0x%lx\n", i, ctx->th_pmcs[i]));
  992. }
  993. }
  994. static inline void
  995. pfm_restore_pmcs(unsigned long *pmcs, unsigned long mask)
  996. {
  997. int i;
  998. for (i=0; mask; i++, mask>>=1) {
  999. if ((mask & 0x1) == 0) continue;
  1000. ia64_set_pmc(i, pmcs[i]);
  1001. }
  1002. ia64_srlz_d();
  1003. }
  1004. static inline int
  1005. pfm_uuid_cmp(pfm_uuid_t a, pfm_uuid_t b)
  1006. {
  1007. return memcmp(a, b, sizeof(pfm_uuid_t));
  1008. }
  1009. static inline int
  1010. pfm_buf_fmt_exit(pfm_buffer_fmt_t *fmt, struct task_struct *task, void *buf, struct pt_regs *regs)
  1011. {
  1012. int ret = 0;
  1013. if (fmt->fmt_exit) ret = (*fmt->fmt_exit)(task, buf, regs);
  1014. return ret;
  1015. }
  1016. static inline int
  1017. pfm_buf_fmt_getsize(pfm_buffer_fmt_t *fmt, struct task_struct *task, unsigned int flags, int cpu, void *arg, unsigned long *size)
  1018. {
  1019. int ret = 0;
  1020. if (fmt->fmt_getsize) ret = (*fmt->fmt_getsize)(task, flags, cpu, arg, size);
  1021. return ret;
  1022. }
  1023. static inline int
  1024. pfm_buf_fmt_validate(pfm_buffer_fmt_t *fmt, struct task_struct *task, unsigned int flags,
  1025. int cpu, void *arg)
  1026. {
  1027. int ret = 0;
  1028. if (fmt->fmt_validate) ret = (*fmt->fmt_validate)(task, flags, cpu, arg);
  1029. return ret;
  1030. }
  1031. static inline int
  1032. pfm_buf_fmt_init(pfm_buffer_fmt_t *fmt, struct task_struct *task, void *buf, unsigned int flags,
  1033. int cpu, void *arg)
  1034. {
  1035. int ret = 0;
  1036. if (fmt->fmt_init) ret = (*fmt->fmt_init)(task, buf, flags, cpu, arg);
  1037. return ret;
  1038. }
  1039. static inline int
  1040. pfm_buf_fmt_restart(pfm_buffer_fmt_t *fmt, struct task_struct *task, pfm_ovfl_ctrl_t *ctrl, void *buf, struct pt_regs *regs)
  1041. {
  1042. int ret = 0;
  1043. if (fmt->fmt_restart) ret = (*fmt->fmt_restart)(task, ctrl, buf, regs);
  1044. return ret;
  1045. }
  1046. static inline int
  1047. pfm_buf_fmt_restart_active(pfm_buffer_fmt_t *fmt, struct task_struct *task, pfm_ovfl_ctrl_t *ctrl, void *buf, struct pt_regs *regs)
  1048. {
  1049. int ret = 0;
  1050. if (fmt->fmt_restart_active) ret = (*fmt->fmt_restart_active)(task, ctrl, buf, regs);
  1051. return ret;
  1052. }
  1053. static pfm_buffer_fmt_t *
  1054. __pfm_find_buffer_fmt(pfm_uuid_t uuid)
  1055. {
  1056. struct list_head * pos;
  1057. pfm_buffer_fmt_t * entry;
  1058. list_for_each(pos, &pfm_buffer_fmt_list) {
  1059. entry = list_entry(pos, pfm_buffer_fmt_t, fmt_list);
  1060. if (pfm_uuid_cmp(uuid, entry->fmt_uuid) == 0)
  1061. return entry;
  1062. }
  1063. return NULL;
  1064. }
  1065. /*
  1066. * find a buffer format based on its uuid
  1067. */
  1068. static pfm_buffer_fmt_t *
  1069. pfm_find_buffer_fmt(pfm_uuid_t uuid)
  1070. {
  1071. pfm_buffer_fmt_t * fmt;
  1072. spin_lock(&pfm_buffer_fmt_lock);
  1073. fmt = __pfm_find_buffer_fmt(uuid);
  1074. spin_unlock(&pfm_buffer_fmt_lock);
  1075. return fmt;
  1076. }
  1077. int
  1078. pfm_register_buffer_fmt(pfm_buffer_fmt_t *fmt)
  1079. {
  1080. int ret = 0;
  1081. /* some sanity checks */
  1082. if (fmt == NULL || fmt->fmt_name == NULL) return -EINVAL;
  1083. /* we need at least a handler */
  1084. if (fmt->fmt_handler == NULL) return -EINVAL;
  1085. /*
  1086. * XXX: need check validity of fmt_arg_size
  1087. */
  1088. spin_lock(&pfm_buffer_fmt_lock);
  1089. if (__pfm_find_buffer_fmt(fmt->fmt_uuid)) {
  1090. printk(KERN_ERR "perfmon: duplicate sampling format: %s\n", fmt->fmt_name);
  1091. ret = -EBUSY;
  1092. goto out;
  1093. }
  1094. list_add(&fmt->fmt_list, &pfm_buffer_fmt_list);
  1095. printk(KERN_INFO "perfmon: added sampling format %s\n", fmt->fmt_name);
  1096. out:
  1097. spin_unlock(&pfm_buffer_fmt_lock);
  1098. return ret;
  1099. }
  1100. EXPORT_SYMBOL(pfm_register_buffer_fmt);
  1101. int
  1102. pfm_unregister_buffer_fmt(pfm_uuid_t uuid)
  1103. {
  1104. pfm_buffer_fmt_t *fmt;
  1105. int ret = 0;
  1106. spin_lock(&pfm_buffer_fmt_lock);
  1107. fmt = __pfm_find_buffer_fmt(uuid);
  1108. if (!fmt) {
  1109. printk(KERN_ERR "perfmon: cannot unregister format, not found\n");
  1110. ret = -EINVAL;
  1111. goto out;
  1112. }
  1113. list_del_init(&fmt->fmt_list);
  1114. printk(KERN_INFO "perfmon: removed sampling format: %s\n", fmt->fmt_name);
  1115. out:
  1116. spin_unlock(&pfm_buffer_fmt_lock);
  1117. return ret;
  1118. }
  1119. EXPORT_SYMBOL(pfm_unregister_buffer_fmt);
  1120. static int
  1121. pfm_reserve_session(struct task_struct *task, int is_syswide, unsigned int cpu)
  1122. {
  1123. unsigned long flags;
  1124. /*
  1125. * validity checks on cpu_mask have been done upstream
  1126. */
  1127. LOCK_PFS(flags);
  1128. DPRINT(("in sys_sessions=%u task_sessions=%u dbregs=%u syswide=%d cpu=%u\n",
  1129. pfm_sessions.pfs_sys_sessions,
  1130. pfm_sessions.pfs_task_sessions,
  1131. pfm_sessions.pfs_sys_use_dbregs,
  1132. is_syswide,
  1133. cpu));
  1134. if (is_syswide) {
  1135. /*
  1136. * cannot mix system wide and per-task sessions
  1137. */
  1138. if (pfm_sessions.pfs_task_sessions > 0UL) {
  1139. DPRINT(("system wide not possible, %u conflicting task_sessions\n",
  1140. pfm_sessions.pfs_task_sessions));
  1141. goto abort;
  1142. }
  1143. if (pfm_sessions.pfs_sys_session[cpu]) goto error_conflict;
  1144. DPRINT(("reserving system wide session on CPU%u currently on CPU%u\n", cpu, smp_processor_id()));
  1145. pfm_sessions.pfs_sys_session[cpu] = task;
  1146. pfm_sessions.pfs_sys_sessions++ ;
  1147. } else {
  1148. if (pfm_sessions.pfs_sys_sessions) goto abort;
  1149. pfm_sessions.pfs_task_sessions++;
  1150. }
  1151. DPRINT(("out sys_sessions=%u task_sessions=%u dbregs=%u syswide=%d cpu=%u\n",
  1152. pfm_sessions.pfs_sys_sessions,
  1153. pfm_sessions.pfs_task_sessions,
  1154. pfm_sessions.pfs_sys_use_dbregs,
  1155. is_syswide,
  1156. cpu));
  1157. /*
  1158. * Force idle() into poll mode
  1159. */
  1160. cpu_idle_poll_ctrl(true);
  1161. UNLOCK_PFS(flags);
  1162. return 0;
  1163. error_conflict:
  1164. DPRINT(("system wide not possible, conflicting session [%d] on CPU%d\n",
  1165. task_pid_nr(pfm_sessions.pfs_sys_session[cpu]),
  1166. cpu));
  1167. abort:
  1168. UNLOCK_PFS(flags);
  1169. return -EBUSY;
  1170. }
  1171. static int
  1172. pfm_unreserve_session(pfm_context_t *ctx, int is_syswide, unsigned int cpu)
  1173. {
  1174. unsigned long flags;
  1175. /*
  1176. * validity checks on cpu_mask have been done upstream
  1177. */
  1178. LOCK_PFS(flags);
  1179. DPRINT(("in sys_sessions=%u task_sessions=%u dbregs=%u syswide=%d cpu=%u\n",
  1180. pfm_sessions.pfs_sys_sessions,
  1181. pfm_sessions.pfs_task_sessions,
  1182. pfm_sessions.pfs_sys_use_dbregs,
  1183. is_syswide,
  1184. cpu));
  1185. if (is_syswide) {
  1186. pfm_sessions.pfs_sys_session[cpu] = NULL;
  1187. /*
  1188. * would not work with perfmon+more than one bit in cpu_mask
  1189. */
  1190. if (ctx && ctx->ctx_fl_using_dbreg) {
  1191. if (pfm_sessions.pfs_sys_use_dbregs == 0) {
  1192. printk(KERN_ERR "perfmon: invalid release for ctx %p sys_use_dbregs=0\n", ctx);
  1193. } else {
  1194. pfm_sessions.pfs_sys_use_dbregs--;
  1195. }
  1196. }
  1197. pfm_sessions.pfs_sys_sessions--;
  1198. } else {
  1199. pfm_sessions.pfs_task_sessions--;
  1200. }
  1201. DPRINT(("out sys_sessions=%u task_sessions=%u dbregs=%u syswide=%d cpu=%u\n",
  1202. pfm_sessions.pfs_sys_sessions,
  1203. pfm_sessions.pfs_task_sessions,
  1204. pfm_sessions.pfs_sys_use_dbregs,
  1205. is_syswide,
  1206. cpu));
  1207. /* Undo forced polling. Last session reenables pal_halt */
  1208. cpu_idle_poll_ctrl(false);
  1209. UNLOCK_PFS(flags);
  1210. return 0;
  1211. }
  1212. /*
  1213. * removes virtual mapping of the sampling buffer.
  1214. * IMPORTANT: cannot be called with interrupts disable, e.g. inside
  1215. * a PROTECT_CTX() section.
  1216. */
  1217. static int
  1218. pfm_remove_smpl_mapping(void *vaddr, unsigned long size)
  1219. {
  1220. struct task_struct *task = current;
  1221. int r;
  1222. /* sanity checks */
  1223. if (task->mm == NULL || size == 0UL || vaddr == NULL) {
  1224. printk(KERN_ERR "perfmon: pfm_remove_smpl_mapping [%d] invalid context mm=%p\n", task_pid_nr(task), task->mm);
  1225. return -EINVAL;
  1226. }
  1227. DPRINT(("smpl_vaddr=%p size=%lu\n", vaddr, size));
  1228. /*
  1229. * does the actual unmapping
  1230. */
  1231. r = vm_munmap((unsigned long)vaddr, size);
  1232. if (r !=0) {
  1233. printk(KERN_ERR "perfmon: [%d] unable to unmap sampling buffer @%p size=%lu\n", task_pid_nr(task), vaddr, size);
  1234. }
  1235. DPRINT(("do_unmap(%p, %lu)=%d\n", vaddr, size, r));
  1236. return 0;
  1237. }
  1238. /*
  1239. * free actual physical storage used by sampling buffer
  1240. */
  1241. #if 0
  1242. static int
  1243. pfm_free_smpl_buffer(pfm_context_t *ctx)
  1244. {
  1245. pfm_buffer_fmt_t *fmt;
  1246. if (ctx->ctx_smpl_hdr == NULL) goto invalid_free;
  1247. /*
  1248. * we won't use the buffer format anymore
  1249. */
  1250. fmt = ctx->ctx_buf_fmt;
  1251. DPRINT(("sampling buffer @%p size %lu vaddr=%p\n",
  1252. ctx->ctx_smpl_hdr,
  1253. ctx->ctx_smpl_size,
  1254. ctx->ctx_smpl_vaddr));
  1255. pfm_buf_fmt_exit(fmt, current, NULL, NULL);
  1256. /*
  1257. * free the buffer
  1258. */
  1259. pfm_rvfree(ctx->ctx_smpl_hdr, ctx->ctx_smpl_size);
  1260. ctx->ctx_smpl_hdr = NULL;
  1261. ctx->ctx_smpl_size = 0UL;
  1262. return 0;
  1263. invalid_free:
  1264. printk(KERN_ERR "perfmon: pfm_free_smpl_buffer [%d] no buffer\n", task_pid_nr(current));
  1265. return -EINVAL;
  1266. }
  1267. #endif
  1268. static inline void
  1269. pfm_exit_smpl_buffer(pfm_buffer_fmt_t *fmt)
  1270. {
  1271. if (fmt == NULL) return;
  1272. pfm_buf_fmt_exit(fmt, current, NULL, NULL);
  1273. }
  1274. /*
  1275. * pfmfs should _never_ be mounted by userland - too much of security hassle,
  1276. * no real gain from having the whole whorehouse mounted. So we don't need
  1277. * any operations on the root directory. However, we need a non-trivial
  1278. * d_name - pfm: will go nicely and kill the special-casing in procfs.
  1279. */
  1280. static struct vfsmount *pfmfs_mnt __read_mostly;
  1281. static int __init
  1282. init_pfm_fs(void)
  1283. {
  1284. int err = register_filesystem(&pfm_fs_type);
  1285. if (!err) {
  1286. pfmfs_mnt = kern_mount(&pfm_fs_type);
  1287. err = PTR_ERR(pfmfs_mnt);
  1288. if (IS_ERR(pfmfs_mnt))
  1289. unregister_filesystem(&pfm_fs_type);
  1290. else
  1291. err = 0;
  1292. }
  1293. return err;
  1294. }
  1295. static ssize_t
  1296. pfm_read(struct file *filp, char __user *buf, size_t size, loff_t *ppos)
  1297. {
  1298. pfm_context_t *ctx;
  1299. pfm_msg_t *msg;
  1300. ssize_t ret;
  1301. unsigned long flags;
  1302. DECLARE_WAITQUEUE(wait, current);
  1303. if (PFM_IS_FILE(filp) == 0) {
  1304. printk(KERN_ERR "perfmon: pfm_poll: bad magic [%d]\n", task_pid_nr(current));
  1305. return -EINVAL;
  1306. }
  1307. ctx = filp->private_data;
  1308. if (ctx == NULL) {
  1309. printk(KERN_ERR "perfmon: pfm_read: NULL ctx [%d]\n", task_pid_nr(current));
  1310. return -EINVAL;
  1311. }
  1312. /*
  1313. * check even when there is no message
  1314. */
  1315. if (size < sizeof(pfm_msg_t)) {
  1316. DPRINT(("message is too small ctx=%p (>=%ld)\n", ctx, sizeof(pfm_msg_t)));
  1317. return -EINVAL;
  1318. }
  1319. PROTECT_CTX(ctx, flags);
  1320. /*
  1321. * put ourselves on the wait queue
  1322. */
  1323. add_wait_queue(&ctx->ctx_msgq_wait, &wait);
  1324. for(;;) {
  1325. /*
  1326. * check wait queue
  1327. */
  1328. set_current_state(TASK_INTERRUPTIBLE);
  1329. DPRINT(("head=%d tail=%d\n", ctx->ctx_msgq_head, ctx->ctx_msgq_tail));
  1330. ret = 0;
  1331. if(PFM_CTXQ_EMPTY(ctx) == 0) break;
  1332. UNPROTECT_CTX(ctx, flags);
  1333. /*
  1334. * check non-blocking read
  1335. */
  1336. ret = -EAGAIN;
  1337. if(filp->f_flags & O_NONBLOCK) break;
  1338. /*
  1339. * check pending signals
  1340. */
  1341. if(signal_pending(current)) {
  1342. ret = -EINTR;
  1343. break;
  1344. }
  1345. /*
  1346. * no message, so wait
  1347. */
  1348. schedule();
  1349. PROTECT_CTX(ctx, flags);
  1350. }
  1351. DPRINT(("[%d] back to running ret=%ld\n", task_pid_nr(current), ret));
  1352. set_current_state(TASK_RUNNING);
  1353. remove_wait_queue(&ctx->ctx_msgq_wait, &wait);
  1354. if (ret < 0) goto abort;
  1355. ret = -EINVAL;
  1356. msg = pfm_get_next_msg(ctx);
  1357. if (msg == NULL) {
  1358. printk(KERN_ERR "perfmon: pfm_read no msg for ctx=%p [%d]\n", ctx, task_pid_nr(current));
  1359. goto abort_locked;
  1360. }
  1361. DPRINT(("fd=%d type=%d\n", msg->pfm_gen_msg.msg_ctx_fd, msg->pfm_gen_msg.msg_type));
  1362. ret = -EFAULT;
  1363. if(copy_to_user(buf, msg, sizeof(pfm_msg_t)) == 0) ret = sizeof(pfm_msg_t);
  1364. abort_locked:
  1365. UNPROTECT_CTX(ctx, flags);
  1366. abort:
  1367. return ret;
  1368. }
  1369. static ssize_t
  1370. pfm_write(struct file *file, const char __user *ubuf,
  1371. size_t size, loff_t *ppos)
  1372. {
  1373. DPRINT(("pfm_write called\n"));
  1374. return -EINVAL;
  1375. }
  1376. static unsigned int
  1377. pfm_poll(struct file *filp, poll_table * wait)
  1378. {
  1379. pfm_context_t *ctx;
  1380. unsigned long flags;
  1381. unsigned int mask = 0;
  1382. if (PFM_IS_FILE(filp) == 0) {
  1383. printk(KERN_ERR "perfmon: pfm_poll: bad magic [%d]\n", task_pid_nr(current));
  1384. return 0;
  1385. }
  1386. ctx = filp->private_data;
  1387. if (ctx == NULL) {
  1388. printk(KERN_ERR "perfmon: pfm_poll: NULL ctx [%d]\n", task_pid_nr(current));
  1389. return 0;
  1390. }
  1391. DPRINT(("pfm_poll ctx_fd=%d before poll_wait\n", ctx->ctx_fd));
  1392. poll_wait(filp, &ctx->ctx_msgq_wait, wait);
  1393. PROTECT_CTX(ctx, flags);
  1394. if (PFM_CTXQ_EMPTY(ctx) == 0)
  1395. mask = POLLIN | POLLRDNORM;
  1396. UNPROTECT_CTX(ctx, flags);
  1397. DPRINT(("pfm_poll ctx_fd=%d mask=0x%x\n", ctx->ctx_fd, mask));
  1398. return mask;
  1399. }
  1400. static long
  1401. pfm_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
  1402. {
  1403. DPRINT(("pfm_ioctl called\n"));
  1404. return -EINVAL;
  1405. }
  1406. /*
  1407. * interrupt cannot be masked when coming here
  1408. */
  1409. static inline int
  1410. pfm_do_fasync(int fd, struct file *filp, pfm_context_t *ctx, int on)
  1411. {
  1412. int ret;
  1413. ret = fasync_helper (fd, filp, on, &ctx->ctx_async_queue);
  1414. DPRINT(("pfm_fasync called by [%d] on ctx_fd=%d on=%d async_queue=%p ret=%d\n",
  1415. task_pid_nr(current),
  1416. fd,
  1417. on,
  1418. ctx->ctx_async_queue, ret));
  1419. return ret;
  1420. }
  1421. static int
  1422. pfm_fasync(int fd, struct file *filp, int on)
  1423. {
  1424. pfm_context_t *ctx;
  1425. int ret;
  1426. if (PFM_IS_FILE(filp) == 0) {
  1427. printk(KERN_ERR "perfmon: pfm_fasync bad magic [%d]\n", task_pid_nr(current));
  1428. return -EBADF;
  1429. }
  1430. ctx = filp->private_data;
  1431. if (ctx == NULL) {
  1432. printk(KERN_ERR "perfmon: pfm_fasync NULL ctx [%d]\n", task_pid_nr(current));
  1433. return -EBADF;
  1434. }
  1435. /*
  1436. * we cannot mask interrupts during this call because this may
  1437. * may go to sleep if memory is not readily avalaible.
  1438. *
  1439. * We are protected from the conetxt disappearing by the get_fd()/put_fd()
  1440. * done in caller. Serialization of this function is ensured by caller.
  1441. */
  1442. ret = pfm_do_fasync(fd, filp, ctx, on);
  1443. DPRINT(("pfm_fasync called on ctx_fd=%d on=%d async_queue=%p ret=%d\n",
  1444. fd,
  1445. on,
  1446. ctx->ctx_async_queue, ret));
  1447. return ret;
  1448. }
  1449. #ifdef CONFIG_SMP
  1450. /*
  1451. * this function is exclusively called from pfm_close().
  1452. * The context is not protected at that time, nor are interrupts
  1453. * on the remote CPU. That's necessary to avoid deadlocks.
  1454. */
  1455. static void
  1456. pfm_syswide_force_stop(void *info)
  1457. {
  1458. pfm_context_t *ctx = (pfm_context_t *)info;
  1459. struct pt_regs *regs = task_pt_regs(current);
  1460. struct task_struct *owner;
  1461. unsigned long flags;
  1462. int ret;
  1463. if (ctx->ctx_cpu != smp_processor_id()) {
  1464. printk(KERN_ERR "perfmon: pfm_syswide_force_stop for CPU%d but on CPU%d\n",
  1465. ctx->ctx_cpu,
  1466. smp_processor_id());
  1467. return;
  1468. }
  1469. owner = GET_PMU_OWNER();
  1470. if (owner != ctx->ctx_task) {
  1471. printk(KERN_ERR "perfmon: pfm_syswide_force_stop CPU%d unexpected owner [%d] instead of [%d]\n",
  1472. smp_processor_id(),
  1473. task_pid_nr(owner), task_pid_nr(ctx->ctx_task));
  1474. return;
  1475. }
  1476. if (GET_PMU_CTX() != ctx) {
  1477. printk(KERN_ERR "perfmon: pfm_syswide_force_stop CPU%d unexpected ctx %p instead of %p\n",
  1478. smp_processor_id(),
  1479. GET_PMU_CTX(), ctx);
  1480. return;
  1481. }
  1482. DPRINT(("on CPU%d forcing system wide stop for [%d]\n", smp_processor_id(), task_pid_nr(ctx->ctx_task)));
  1483. /*
  1484. * the context is already protected in pfm_close(), we simply
  1485. * need to mask interrupts to avoid a PMU interrupt race on
  1486. * this CPU
  1487. */
  1488. local_irq_save(flags);
  1489. ret = pfm_context_unload(ctx, NULL, 0, regs);
  1490. if (ret) {
  1491. DPRINT(("context_unload returned %d\n", ret));
  1492. }
  1493. /*
  1494. * unmask interrupts, PMU interrupts are now spurious here
  1495. */
  1496. local_irq_restore(flags);
  1497. }
  1498. static void
  1499. pfm_syswide_cleanup_other_cpu(pfm_context_t *ctx)
  1500. {
  1501. int ret;
  1502. DPRINT(("calling CPU%d for cleanup\n", ctx->ctx_cpu));
  1503. ret = smp_call_function_single(ctx->ctx_cpu, pfm_syswide_force_stop, ctx, 1);
  1504. DPRINT(("called CPU%d for cleanup ret=%d\n", ctx->ctx_cpu, ret));
  1505. }
  1506. #endif /* CONFIG_SMP */
  1507. /*
  1508. * called for each close(). Partially free resources.
  1509. * When caller is self-monitoring, the context is unloaded.
  1510. */
  1511. static int
  1512. pfm_flush(struct file *filp, fl_owner_t id)
  1513. {
  1514. pfm_context_t *ctx;
  1515. struct task_struct *task;
  1516. struct pt_regs *regs;
  1517. unsigned long flags;
  1518. unsigned long smpl_buf_size = 0UL;
  1519. void *smpl_buf_vaddr = NULL;
  1520. int state, is_system;
  1521. if (PFM_IS_FILE(filp) == 0) {
  1522. DPRINT(("bad magic for\n"));
  1523. return -EBADF;
  1524. }
  1525. ctx = filp->private_data;
  1526. if (ctx == NULL) {
  1527. printk(KERN_ERR "perfmon: pfm_flush: NULL ctx [%d]\n", task_pid_nr(current));
  1528. return -EBADF;
  1529. }
  1530. /*
  1531. * remove our file from the async queue, if we use this mode.
  1532. * This can be done without the context being protected. We come
  1533. * here when the context has become unreachable by other tasks.
  1534. *
  1535. * We may still have active monitoring at this point and we may
  1536. * end up in pfm_overflow_handler(). However, fasync_helper()
  1537. * operates with interrupts disabled and it cleans up the
  1538. * queue. If the PMU handler is called prior to entering
  1539. * fasync_helper() then it will send a signal. If it is
  1540. * invoked after, it will find an empty queue and no
  1541. * signal will be sent. In both case, we are safe
  1542. */
  1543. PROTECT_CTX(ctx, flags);
  1544. state = ctx->ctx_state;
  1545. is_system = ctx->ctx_fl_system;
  1546. task = PFM_CTX_TASK(ctx);
  1547. regs = task_pt_regs(task);
  1548. DPRINT(("ctx_state=%d is_current=%d\n",
  1549. state,
  1550. task == current ? 1 : 0));
  1551. /*
  1552. * if state == UNLOADED, then task is NULL
  1553. */
  1554. /*
  1555. * we must stop and unload because we are losing access to the context.
  1556. */
  1557. if (task == current) {
  1558. #ifdef CONFIG_SMP
  1559. /*
  1560. * the task IS the owner but it migrated to another CPU: that's bad
  1561. * but we must handle this cleanly. Unfortunately, the kernel does
  1562. * not provide a mechanism to block migration (while the context is loaded).
  1563. *
  1564. * We need to release the resource on the ORIGINAL cpu.
  1565. */
  1566. if (is_system && ctx->ctx_cpu != smp_processor_id()) {
  1567. DPRINT(("should be running on CPU%d\n", ctx->ctx_cpu));
  1568. /*
  1569. * keep context protected but unmask interrupt for IPI
  1570. */
  1571. local_irq_restore(flags);
  1572. pfm_syswide_cleanup_other_cpu(ctx);
  1573. /*
  1574. * restore interrupt masking
  1575. */
  1576. local_irq_save(flags);
  1577. /*
  1578. * context is unloaded at this point
  1579. */
  1580. } else
  1581. #endif /* CONFIG_SMP */
  1582. {
  1583. DPRINT(("forcing unload\n"));
  1584. /*
  1585. * stop and unload, returning with state UNLOADED
  1586. * and session unreserved.
  1587. */
  1588. pfm_context_unload(ctx, NULL, 0, regs);
  1589. DPRINT(("ctx_state=%d\n", ctx->ctx_state));
  1590. }
  1591. }
  1592. /*
  1593. * remove virtual mapping, if any, for the calling task.
  1594. * cannot reset ctx field until last user is calling close().
  1595. *
  1596. * ctx_smpl_vaddr must never be cleared because it is needed
  1597. * by every task with access to the context
  1598. *
  1599. * When called from do_exit(), the mm context is gone already, therefore
  1600. * mm is NULL, i.e., the VMA is already gone and we do not have to
  1601. * do anything here
  1602. */
  1603. if (ctx->ctx_smpl_vaddr && current->mm) {
  1604. smpl_buf_vaddr = ctx->ctx_smpl_vaddr;
  1605. smpl_buf_size = ctx->ctx_smpl_size;
  1606. }
  1607. UNPROTECT_CTX(ctx, flags);
  1608. /*
  1609. * if there was a mapping, then we systematically remove it
  1610. * at this point. Cannot be done inside critical section
  1611. * because some VM function reenables interrupts.
  1612. *
  1613. */
  1614. if (smpl_buf_vaddr) pfm_remove_smpl_mapping(smpl_buf_vaddr, smpl_buf_size);
  1615. return 0;
  1616. }
  1617. /*
  1618. * called either on explicit close() or from exit_files().
  1619. * Only the LAST user of the file gets to this point, i.e., it is
  1620. * called only ONCE.
  1621. *
  1622. * IMPORTANT: we get called ONLY when the refcnt on the file gets to zero
  1623. * (fput()),i.e, last task to access the file. Nobody else can access the
  1624. * file at this point.
  1625. *
  1626. * When called from exit_files(), the VMA has been freed because exit_mm()
  1627. * is executed before exit_files().
  1628. *
  1629. * When called from exit_files(), the current task is not yet ZOMBIE but we
  1630. * flush the PMU state to the context.
  1631. */
  1632. static int
  1633. pfm_close(struct inode *inode, struct file *filp)
  1634. {
  1635. pfm_context_t *ctx;
  1636. struct task_struct *task;
  1637. struct pt_regs *regs;
  1638. DECLARE_WAITQUEUE(wait, current);
  1639. unsigned long flags;
  1640. unsigned long smpl_buf_size = 0UL;
  1641. void *smpl_buf_addr = NULL;
  1642. int free_possible = 1;
  1643. int state, is_system;
  1644. DPRINT(("pfm_close called private=%p\n", filp->private_data));
  1645. if (PFM_IS_FILE(filp) == 0) {
  1646. DPRINT(("bad magic\n"));
  1647. return -EBADF;
  1648. }
  1649. ctx = filp->private_data;
  1650. if (ctx == NULL) {
  1651. printk(KERN_ERR "perfmon: pfm_close: NULL ctx [%d]\n", task_pid_nr(current));
  1652. return -EBADF;
  1653. }
  1654. PROTECT_CTX(ctx, flags);
  1655. state = ctx->ctx_state;
  1656. is_system = ctx->ctx_fl_system;
  1657. task = PFM_CTX_TASK(ctx);
  1658. regs = task_pt_regs(task);
  1659. DPRINT(("ctx_state=%d is_current=%d\n",
  1660. state,
  1661. task == current ? 1 : 0));
  1662. /*
  1663. * if task == current, then pfm_flush() unloaded the context
  1664. */
  1665. if (state == PFM_CTX_UNLOADED) goto doit;
  1666. /*
  1667. * context is loaded/masked and task != current, we need to
  1668. * either force an unload or go zombie
  1669. */
  1670. /*
  1671. * The task is currently blocked or will block after an overflow.
  1672. * we must force it to wakeup to get out of the
  1673. * MASKED state and transition to the unloaded state by itself.
  1674. *
  1675. * This situation is only possible for per-task mode
  1676. */
  1677. if (state == PFM_CTX_MASKED && CTX_OVFL_NOBLOCK(ctx) == 0) {
  1678. /*
  1679. * set a "partial" zombie state to be checked
  1680. * upon return from down() in pfm_handle_work().
  1681. *
  1682. * We cannot use the ZOMBIE state, because it is checked
  1683. * by pfm_load_regs() which is called upon wakeup from down().
  1684. * In such case, it would free the context and then we would
  1685. * return to pfm_handle_work() which would access the
  1686. * stale context. Instead, we set a flag invisible to pfm_load_regs()
  1687. * but visible to pfm_handle_work().
  1688. *
  1689. * For some window of time, we have a zombie context with
  1690. * ctx_state = MASKED and not ZOMBIE
  1691. */
  1692. ctx->ctx_fl_going_zombie = 1;
  1693. /*
  1694. * force task to wake up from MASKED state
  1695. */
  1696. complete(&ctx->ctx_restart_done);
  1697. DPRINT(("waking up ctx_state=%d\n", state));
  1698. /*
  1699. * put ourself to sleep waiting for the other
  1700. * task to report completion
  1701. *
  1702. * the context is protected by mutex, therefore there
  1703. * is no risk of being notified of completion before
  1704. * begin actually on the waitq.
  1705. */
  1706. set_current_state(TASK_INTERRUPTIBLE);
  1707. add_wait_queue(&ctx->ctx_zombieq, &wait);
  1708. UNPROTECT_CTX(ctx, flags);
  1709. /*
  1710. * XXX: check for signals :
  1711. * - ok for explicit close
  1712. * - not ok when coming from exit_files()
  1713. */
  1714. schedule();
  1715. PROTECT_CTX(ctx, flags);
  1716. remove_wait_queue(&ctx->ctx_zombieq, &wait);
  1717. set_current_state(TASK_RUNNING);
  1718. /*
  1719. * context is unloaded at this point
  1720. */
  1721. DPRINT(("after zombie wakeup ctx_state=%d for\n", state));
  1722. }
  1723. else if (task != current) {
  1724. #ifdef CONFIG_SMP
  1725. /*
  1726. * switch context to zombie state
  1727. */
  1728. ctx->ctx_state = PFM_CTX_ZOMBIE;
  1729. DPRINT(("zombie ctx for [%d]\n", task_pid_nr(task)));
  1730. /*
  1731. * cannot free the context on the spot. deferred until
  1732. * the task notices the ZOMBIE state
  1733. */
  1734. free_possible = 0;
  1735. #else
  1736. pfm_context_unload(ctx, NULL, 0, regs);
  1737. #endif
  1738. }
  1739. doit:
  1740. /* reload state, may have changed during opening of critical section */
  1741. state = ctx->ctx_state;
  1742. /*
  1743. * the context is still attached to a task (possibly current)
  1744. * we cannot destroy it right now
  1745. */
  1746. /*
  1747. * we must free the sampling buffer right here because
  1748. * we cannot rely on it being cleaned up later by the
  1749. * monitored task. It is not possible to free vmalloc'ed
  1750. * memory in pfm_load_regs(). Instead, we remove the buffer
  1751. * now. should there be subsequent PMU overflow originally
  1752. * meant for sampling, the will be converted to spurious
  1753. * and that's fine because the monitoring tools is gone anyway.
  1754. */
  1755. if (ctx->ctx_smpl_hdr) {
  1756. smpl_buf_addr = ctx->ctx_smpl_hdr;
  1757. smpl_buf_size = ctx->ctx_smpl_size;
  1758. /* no more sampling */
  1759. ctx->ctx_smpl_hdr = NULL;
  1760. ctx->ctx_fl_is_sampling = 0;
  1761. }
  1762. DPRINT(("ctx_state=%d free_possible=%d addr=%p size=%lu\n",
  1763. state,
  1764. free_possible,
  1765. smpl_buf_addr,
  1766. smpl_buf_size));
  1767. if (smpl_buf_addr) pfm_exit_smpl_buffer(ctx->ctx_buf_fmt);
  1768. /*
  1769. * UNLOADED that the session has already been unreserved.
  1770. */
  1771. if (state == PFM_CTX_ZOMBIE) {
  1772. pfm_unreserve_session(ctx, ctx->ctx_fl_system , ctx->ctx_cpu);
  1773. }
  1774. /*
  1775. * disconnect file descriptor from context must be done
  1776. * before we unlock.
  1777. */
  1778. filp->private_data = NULL;
  1779. /*
  1780. * if we free on the spot, the context is now completely unreachable
  1781. * from the callers side. The monitored task side is also cut, so we
  1782. * can freely cut.
  1783. *
  1784. * If we have a deferred free, only the caller side is disconnected.
  1785. */
  1786. UNPROTECT_CTX(ctx, flags);
  1787. /*
  1788. * All memory free operations (especially for vmalloc'ed memory)
  1789. * MUST be done with interrupts ENABLED.
  1790. */
  1791. if (smpl_buf_addr) pfm_rvfree(smpl_buf_addr, smpl_buf_size);
  1792. /*
  1793. * return the memory used by the context
  1794. */
  1795. if (free_possible) pfm_context_free(ctx);
  1796. return 0;
  1797. }
  1798. static const struct file_operations pfm_file_ops = {
  1799. .llseek = no_llseek,
  1800. .read = pfm_read,
  1801. .write = pfm_write,
  1802. .poll = pfm_poll,
  1803. .unlocked_ioctl = pfm_ioctl,
  1804. .fasync = pfm_fasync,
  1805. .release = pfm_close,
  1806. .flush = pfm_flush
  1807. };
  1808. static char *pfmfs_dname(struct dentry *dentry, char *buffer, int buflen)
  1809. {
  1810. return dynamic_dname(dentry, buffer, buflen, "pfm:[%lu]",
  1811. d_inode(dentry)->i_ino);
  1812. }
  1813. static const struct dentry_operations pfmfs_dentry_operations = {
  1814. .d_delete = always_delete_dentry,
  1815. .d_dname = pfmfs_dname,
  1816. };
  1817. static struct file *
  1818. pfm_alloc_file(pfm_context_t *ctx)
  1819. {
  1820. struct file *file;
  1821. struct inode *inode;
  1822. struct path path;
  1823. struct qstr this = { .name = "" };
  1824. /*
  1825. * allocate a new inode
  1826. */
  1827. inode = new_inode(pfmfs_mnt->mnt_sb);
  1828. if (!inode)
  1829. return ERR_PTR(-ENOMEM);
  1830. DPRINT(("new inode ino=%ld @%p\n", inode->i_ino, inode));
  1831. inode->i_mode = S_IFCHR|S_IRUGO;
  1832. inode->i_uid = current_fsuid();
  1833. inode->i_gid = current_fsgid();
  1834. /*
  1835. * allocate a new dcache entry
  1836. */
  1837. path.dentry = d_alloc(pfmfs_mnt->mnt_root, &this);
  1838. if (!path.dentry) {
  1839. iput(inode);
  1840. return ERR_PTR(-ENOMEM);
  1841. }
  1842. path.mnt = mntget(pfmfs_mnt);
  1843. d_add(path.dentry, inode);
  1844. file = alloc_file(&path, FMODE_READ, &pfm_file_ops);
  1845. if (IS_ERR(file)) {
  1846. path_put(&path);
  1847. return file;
  1848. }
  1849. file->f_flags = O_RDONLY;
  1850. file->private_data = ctx;
  1851. return file;
  1852. }
  1853. static int
  1854. pfm_remap_buffer(struct vm_area_struct *vma, unsigned long buf, unsigned long addr, unsigned long size)
  1855. {
  1856. DPRINT(("CPU%d buf=0x%lx addr=0x%lx size=%ld\n", smp_processor_id(), buf, addr, size));
  1857. while (size > 0) {
  1858. unsigned long pfn = ia64_tpa(buf) >> PAGE_SHIFT;
  1859. if (remap_pfn_range(vma, addr, pfn, PAGE_SIZE, PAGE_READONLY))
  1860. return -ENOMEM;
  1861. addr += PAGE_SIZE;
  1862. buf += PAGE_SIZE;
  1863. size -= PAGE_SIZE;
  1864. }
  1865. return 0;
  1866. }
  1867. /*
  1868. * allocate a sampling buffer and remaps it into the user address space of the task
  1869. */
  1870. static int
  1871. pfm_smpl_buffer_alloc(struct task_struct *task, struct file *filp, pfm_context_t *ctx, unsigned long rsize, void **user_vaddr)
  1872. {
  1873. struct mm_struct *mm = task->mm;
  1874. struct vm_area_struct *vma = NULL;
  1875. unsigned long size;
  1876. void *smpl_buf;
  1877. /*
  1878. * the fixed header + requested size and align to page boundary
  1879. */
  1880. size = PAGE_ALIGN(rsize);
  1881. DPRINT(("sampling buffer rsize=%lu size=%lu bytes\n", rsize, size));
  1882. /*
  1883. * check requested size to avoid Denial-of-service attacks
  1884. * XXX: may have to refine this test
  1885. * Check against address space limit.
  1886. *
  1887. * if ((mm->total_vm << PAGE_SHIFT) + len> task->rlim[RLIMIT_AS].rlim_cur)
  1888. * return -ENOMEM;
  1889. */
  1890. if (size > task_rlimit(task, RLIMIT_MEMLOCK))
  1891. return -ENOMEM;
  1892. /*
  1893. * We do the easy to undo allocations first.
  1894. *
  1895. * pfm_rvmalloc(), clears the buffer, so there is no leak
  1896. */
  1897. smpl_buf = pfm_rvmalloc(size);
  1898. if (smpl_buf == NULL) {
  1899. DPRINT(("Can't allocate sampling buffer\n"));
  1900. return -ENOMEM;
  1901. }
  1902. DPRINT(("smpl_buf @%p\n", smpl_buf));
  1903. /* allocate vma */
  1904. vma = kmem_cache_zalloc(vm_area_cachep, GFP_KERNEL);
  1905. if (!vma) {
  1906. DPRINT(("Cannot allocate vma\n"));
  1907. goto error_kmem;
  1908. }
  1909. INIT_LIST_HEAD(&vma->anon_vma_chain);
  1910. /*
  1911. * partially initialize the vma for the sampling buffer
  1912. */
  1913. vma->vm_mm = mm;
  1914. vma->vm_file = get_file(filp);
  1915. vma->vm_flags = VM_READ|VM_MAYREAD|VM_DONTEXPAND|VM_DONTDUMP;
  1916. vma->vm_page_prot = PAGE_READONLY; /* XXX may need to change */
  1917. /*
  1918. * Now we have everything we need and we can initialize
  1919. * and connect all the data structures
  1920. */
  1921. ctx->ctx_smpl_hdr = smpl_buf;
  1922. ctx->ctx_smpl_size = size; /* aligned size */
  1923. /*
  1924. * Let's do the difficult operations next.
  1925. *
  1926. * now we atomically find some area in the address space and
  1927. * remap the buffer in it.
  1928. */
  1929. down_write(&task->mm->mmap_sem);
  1930. /* find some free area in address space, must have mmap sem held */
  1931. vma->vm_start = get_unmapped_area(NULL, 0, size, 0, MAP_PRIVATE|MAP_ANONYMOUS);
  1932. if (IS_ERR_VALUE(vma->vm_start)) {
  1933. DPRINT(("Cannot find unmapped area for size %ld\n", size));
  1934. up_write(&task->mm->mmap_sem);
  1935. goto error;
  1936. }
  1937. vma->vm_end = vma->vm_start + size;
  1938. vma->vm_pgoff = vma->vm_start >> PAGE_SHIFT;
  1939. DPRINT(("aligned size=%ld, hdr=%p mapped @0x%lx\n", size, ctx->ctx_smpl_hdr, vma->vm_start));
  1940. /* can only be applied to current task, need to have the mm semaphore held when called */
  1941. if (pfm_remap_buffer(vma, (unsigned long)smpl_buf, vma->vm_start, size)) {
  1942. DPRINT(("Can't remap buffer\n"));
  1943. up_write(&task->mm->mmap_sem);
  1944. goto error;
  1945. }
  1946. /*
  1947. * now insert the vma in the vm list for the process, must be
  1948. * done with mmap lock held
  1949. */
  1950. insert_vm_struct(mm, vma);
  1951. vm_stat_account(vma->vm_mm, vma->vm_flags, vma_pages(vma));
  1952. up_write(&task->mm->mmap_sem);
  1953. /*
  1954. * keep track of user level virtual address
  1955. */
  1956. ctx->ctx_smpl_vaddr = (void *)vma->vm_start;
  1957. *(unsigned long *)user_vaddr = vma->vm_start;
  1958. return 0;
  1959. error:
  1960. kmem_cache_free(vm_area_cachep, vma);
  1961. error_kmem:
  1962. pfm_rvfree(smpl_buf, size);
  1963. return -ENOMEM;
  1964. }
  1965. /*
  1966. * XXX: do something better here
  1967. */
  1968. static int
  1969. pfm_bad_permissions(struct task_struct *task)
  1970. {
  1971. const struct cred *tcred;
  1972. kuid_t uid = current_uid();
  1973. kgid_t gid = current_gid();
  1974. int ret;
  1975. rcu_read_lock();
  1976. tcred = __task_cred(task);
  1977. /* inspired by ptrace_attach() */
  1978. DPRINT(("cur: uid=%d gid=%d task: euid=%d suid=%d uid=%d egid=%d sgid=%d\n",
  1979. from_kuid(&init_user_ns, uid),
  1980. from_kgid(&init_user_ns, gid),
  1981. from_kuid(&init_user_ns, tcred->euid),
  1982. from_kuid(&init_user_ns, tcred->suid),
  1983. from_kuid(&init_user_ns, tcred->uid),
  1984. from_kgid(&init_user_ns, tcred->egid),
  1985. from_kgid(&init_user_ns, tcred->sgid)));
  1986. ret = ((!uid_eq(uid, tcred->euid))
  1987. || (!uid_eq(uid, tcred->suid))
  1988. || (!uid_eq(uid, tcred->uid))
  1989. || (!gid_eq(gid, tcred->egid))
  1990. || (!gid_eq(gid, tcred->sgid))
  1991. || (!gid_eq(gid, tcred->gid))) && !capable(CAP_SYS_PTRACE);
  1992. rcu_read_unlock();
  1993. return ret;
  1994. }
  1995. static int
  1996. pfarg_is_sane(struct task_struct *task, pfarg_context_t *pfx)
  1997. {
  1998. int ctx_flags;
  1999. /* valid signal */
  2000. ctx_flags = pfx->ctx_flags;
  2001. if (ctx_flags & PFM_FL_SYSTEM_WIDE) {
  2002. /*
  2003. * cannot block in this mode
  2004. */
  2005. if (ctx_flags & PFM_FL_NOTIFY_BLOCK) {
  2006. DPRINT(("cannot use blocking mode when in system wide monitoring\n"));
  2007. return -EINVAL;
  2008. }
  2009. } else {
  2010. }
  2011. /* probably more to add here */
  2012. return 0;
  2013. }
  2014. static int
  2015. pfm_setup_buffer_fmt(struct task_struct *task, struct file *filp, pfm_context_t *ctx, unsigned int ctx_flags,
  2016. unsigned int cpu, pfarg_context_t *arg)
  2017. {
  2018. pfm_buffer_fmt_t *fmt = NULL;
  2019. unsigned long size = 0UL;
  2020. void *uaddr = NULL;
  2021. void *fmt_arg = NULL;
  2022. int ret = 0;
  2023. #define PFM_CTXARG_BUF_ARG(a) (pfm_buffer_fmt_t *)(a+1)
  2024. /* invoke and lock buffer format, if found */
  2025. fmt = pfm_find_buffer_fmt(arg->ctx_smpl_buf_id);
  2026. if (fmt == NULL) {
  2027. DPRINT(("[%d] cannot find buffer format\n", task_pid_nr(task)));
  2028. return -EINVAL;
  2029. }
  2030. /*
  2031. * buffer argument MUST be contiguous to pfarg_context_t
  2032. */
  2033. if (fmt->fmt_arg_size) fmt_arg = PFM_CTXARG_BUF_ARG(arg);
  2034. ret = pfm_buf_fmt_validate(fmt, task, ctx_flags, cpu, fmt_arg);
  2035. DPRINT(("[%d] after validate(0x%x,%d,%p)=%d\n", task_pid_nr(task), ctx_flags, cpu, fmt_arg, ret));
  2036. if (ret) goto error;
  2037. /* link buffer format and context */
  2038. ctx->ctx_buf_fmt = fmt;
  2039. ctx->ctx_fl_is_sampling = 1; /* assume record() is defined */
  2040. /*
  2041. * check if buffer format wants to use perfmon buffer allocation/mapping service
  2042. */
  2043. ret = pfm_buf_fmt_getsize(fmt, task, ctx_flags, cpu, fmt_arg, &size);
  2044. if (ret) goto error;
  2045. if (size) {
  2046. /*
  2047. * buffer is always remapped into the caller's address space
  2048. */
  2049. ret = pfm_smpl_buffer_alloc(current, filp, ctx, size, &uaddr);
  2050. if (ret) goto error;
  2051. /* keep track of user address of buffer */
  2052. arg->ctx_smpl_vaddr = uaddr;
  2053. }
  2054. ret = pfm_buf_fmt_init(fmt, task, ctx->ctx_smpl_hdr, ctx_flags, cpu, fmt_arg);
  2055. error:
  2056. return ret;
  2057. }
  2058. static void
  2059. pfm_reset_pmu_state(pfm_context_t *ctx)
  2060. {
  2061. int i;
  2062. /*
  2063. * install reset values for PMC.
  2064. */
  2065. for (i=1; PMC_IS_LAST(i) == 0; i++) {
  2066. if (PMC_IS_IMPL(i) == 0) continue;
  2067. ctx->ctx_pmcs[i] = PMC_DFL_VAL(i);
  2068. DPRINT(("pmc[%d]=0x%lx\n", i, ctx->ctx_pmcs[i]));
  2069. }
  2070. /*
  2071. * PMD registers are set to 0UL when the context in memset()
  2072. */
  2073. /*
  2074. * On context switched restore, we must restore ALL pmc and ALL pmd even
  2075. * when they are not actively used by the task. In UP, the incoming process
  2076. * may otherwise pick up left over PMC, PMD state from the previous process.
  2077. * As opposed to PMD, stale PMC can cause harm to the incoming
  2078. * process because they may change what is being measured.
  2079. * Therefore, we must systematically reinstall the entire
  2080. * PMC state. In SMP, the same thing is possible on the
  2081. * same CPU but also on between 2 CPUs.
  2082. *
  2083. * The problem with PMD is information leaking especially
  2084. * to user level when psr.sp=0
  2085. *
  2086. * There is unfortunately no easy way to avoid this problem
  2087. * on either UP or SMP. This definitively slows down the
  2088. * pfm_load_regs() function.
  2089. */
  2090. /*
  2091. * bitmask of all PMCs accessible to this context
  2092. *
  2093. * PMC0 is treated differently.
  2094. */
  2095. ctx->ctx_all_pmcs[0] = pmu_conf->impl_pmcs[0] & ~0x1;
  2096. /*
  2097. * bitmask of all PMDs that are accessible to this context
  2098. */
  2099. ctx->ctx_all_pmds[0] = pmu_conf->impl_pmds[0];
  2100. DPRINT(("<%d> all_pmcs=0x%lx all_pmds=0x%lx\n", ctx->ctx_fd, ctx->ctx_all_pmcs[0],ctx->ctx_all_pmds[0]));
  2101. /*
  2102. * useful in case of re-enable after disable
  2103. */
  2104. ctx->ctx_used_ibrs[0] = 0UL;
  2105. ctx->ctx_used_dbrs[0] = 0UL;
  2106. }
  2107. static int
  2108. pfm_ctx_getsize(void *arg, size_t *sz)
  2109. {
  2110. pfarg_context_t *req = (pfarg_context_t *)arg;
  2111. pfm_buffer_fmt_t *fmt;
  2112. *sz = 0;
  2113. if (!pfm_uuid_cmp(req->ctx_smpl_buf_id, pfm_null_uuid)) return 0;
  2114. fmt = pfm_find_buffer_fmt(req->ctx_smpl_buf_id);
  2115. if (fmt == NULL) {
  2116. DPRINT(("cannot find buffer format\n"));
  2117. return -EINVAL;
  2118. }
  2119. /* get just enough to copy in user parameters */
  2120. *sz = fmt->fmt_arg_size;
  2121. DPRINT(("arg_size=%lu\n", *sz));
  2122. return 0;
  2123. }
  2124. /*
  2125. * cannot attach if :
  2126. * - kernel task
  2127. * - task not owned by caller
  2128. * - task incompatible with context mode
  2129. */
  2130. static int
  2131. pfm_task_incompatible(pfm_context_t *ctx, struct task_struct *task)
  2132. {
  2133. /*
  2134. * no kernel task or task not owner by caller
  2135. */
  2136. if (task->mm == NULL) {
  2137. DPRINT(("task [%d] has not memory context (kernel thread)\n", task_pid_nr(task)));
  2138. return -EPERM;
  2139. }
  2140. if (pfm_bad_permissions(task)) {
  2141. DPRINT(("no permission to attach to [%d]\n", task_pid_nr(task)));
  2142. return -EPERM;
  2143. }
  2144. /*
  2145. * cannot block in self-monitoring mode
  2146. */
  2147. if (CTX_OVFL_NOBLOCK(ctx) == 0 && task == current) {
  2148. DPRINT(("cannot load a blocking context on self for [%d]\n", task_pid_nr(task)));
  2149. return -EINVAL;
  2150. }
  2151. if (task->exit_state == EXIT_ZOMBIE) {
  2152. DPRINT(("cannot attach to zombie task [%d]\n", task_pid_nr(task)));
  2153. return -EBUSY;
  2154. }
  2155. /*
  2156. * always ok for self
  2157. */
  2158. if (task == current) return 0;
  2159. if (!task_is_stopped_or_traced(task)) {
  2160. DPRINT(("cannot attach to non-stopped task [%d] state=%ld\n", task_pid_nr(task), task->state));
  2161. return -EBUSY;
  2162. }
  2163. /*
  2164. * make sure the task is off any CPU
  2165. */
  2166. wait_task_inactive(task, 0);
  2167. /* more to come... */
  2168. return 0;
  2169. }
  2170. static int
  2171. pfm_get_task(pfm_context_t *ctx, pid_t pid, struct task_struct **task)
  2172. {
  2173. struct task_struct *p = current;
  2174. int ret;
  2175. /* XXX: need to add more checks here */
  2176. if (pid < 2) return -EPERM;
  2177. if (pid != task_pid_vnr(current)) {
  2178. read_lock(&tasklist_lock);
  2179. p = find_task_by_vpid(pid);
  2180. /* make sure task cannot go away while we operate on it */
  2181. if (p) get_task_struct(p);
  2182. read_unlock(&tasklist_lock);
  2183. if (p == NULL) return -ESRCH;
  2184. }
  2185. ret = pfm_task_incompatible(ctx, p);
  2186. if (ret == 0) {
  2187. *task = p;
  2188. } else if (p != current) {
  2189. pfm_put_task(p);
  2190. }
  2191. return ret;
  2192. }
  2193. static int
  2194. pfm_context_create(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  2195. {
  2196. pfarg_context_t *req = (pfarg_context_t *)arg;
  2197. struct file *filp;
  2198. struct path path;
  2199. int ctx_flags;
  2200. int fd;
  2201. int ret;
  2202. /* let's check the arguments first */
  2203. ret = pfarg_is_sane(current, req);
  2204. if (ret < 0)
  2205. return ret;
  2206. ctx_flags = req->ctx_flags;
  2207. ret = -ENOMEM;
  2208. fd = get_unused_fd_flags(0);
  2209. if (fd < 0)
  2210. return fd;
  2211. ctx = pfm_context_alloc(ctx_flags);
  2212. if (!ctx)
  2213. goto error;
  2214. filp = pfm_alloc_file(ctx);
  2215. if (IS_ERR(filp)) {
  2216. ret = PTR_ERR(filp);
  2217. goto error_file;
  2218. }
  2219. req->ctx_fd = ctx->ctx_fd = fd;
  2220. /*
  2221. * does the user want to sample?
  2222. */
  2223. if (pfm_uuid_cmp(req->ctx_smpl_buf_id, pfm_null_uuid)) {
  2224. ret = pfm_setup_buffer_fmt(current, filp, ctx, ctx_flags, 0, req);
  2225. if (ret)
  2226. goto buffer_error;
  2227. }
  2228. DPRINT(("ctx=%p flags=0x%x system=%d notify_block=%d excl_idle=%d no_msg=%d ctx_fd=%d\n",
  2229. ctx,
  2230. ctx_flags,
  2231. ctx->ctx_fl_system,
  2232. ctx->ctx_fl_block,
  2233. ctx->ctx_fl_excl_idle,
  2234. ctx->ctx_fl_no_msg,
  2235. ctx->ctx_fd));
  2236. /*
  2237. * initialize soft PMU state
  2238. */
  2239. pfm_reset_pmu_state(ctx);
  2240. fd_install(fd, filp);
  2241. return 0;
  2242. buffer_error:
  2243. path = filp->f_path;
  2244. put_filp(filp);
  2245. path_put(&path);
  2246. if (ctx->ctx_buf_fmt) {
  2247. pfm_buf_fmt_exit(ctx->ctx_buf_fmt, current, NULL, regs);
  2248. }
  2249. error_file:
  2250. pfm_context_free(ctx);
  2251. error:
  2252. put_unused_fd(fd);
  2253. return ret;
  2254. }
  2255. static inline unsigned long
  2256. pfm_new_counter_value (pfm_counter_t *reg, int is_long_reset)
  2257. {
  2258. unsigned long val = is_long_reset ? reg->long_reset : reg->short_reset;
  2259. unsigned long new_seed, old_seed = reg->seed, mask = reg->mask;
  2260. extern unsigned long carta_random32 (unsigned long seed);
  2261. if (reg->flags & PFM_REGFL_RANDOM) {
  2262. new_seed = carta_random32(old_seed);
  2263. val -= (old_seed & mask); /* counter values are negative numbers! */
  2264. if ((mask >> 32) != 0)
  2265. /* construct a full 64-bit random value: */
  2266. new_seed |= carta_random32(old_seed >> 32) << 32;
  2267. reg->seed = new_seed;
  2268. }
  2269. reg->lval = val;
  2270. return val;
  2271. }
  2272. static void
  2273. pfm_reset_regs_masked(pfm_context_t *ctx, unsigned long *ovfl_regs, int is_long_reset)
  2274. {
  2275. unsigned long mask = ovfl_regs[0];
  2276. unsigned long reset_others = 0UL;
  2277. unsigned long val;
  2278. int i;
  2279. /*
  2280. * now restore reset value on sampling overflowed counters
  2281. */
  2282. mask >>= PMU_FIRST_COUNTER;
  2283. for(i = PMU_FIRST_COUNTER; mask; i++, mask >>= 1) {
  2284. if ((mask & 0x1UL) == 0UL) continue;
  2285. ctx->ctx_pmds[i].val = val = pfm_new_counter_value(ctx->ctx_pmds+ i, is_long_reset);
  2286. reset_others |= ctx->ctx_pmds[i].reset_pmds[0];
  2287. DPRINT_ovfl((" %s reset ctx_pmds[%d]=%lx\n", is_long_reset ? "long" : "short", i, val));
  2288. }
  2289. /*
  2290. * Now take care of resetting the other registers
  2291. */
  2292. for(i = 0; reset_others; i++, reset_others >>= 1) {
  2293. if ((reset_others & 0x1) == 0) continue;
  2294. ctx->ctx_pmds[i].val = val = pfm_new_counter_value(ctx->ctx_pmds + i, is_long_reset);
  2295. DPRINT_ovfl(("%s reset_others pmd[%d]=%lx\n",
  2296. is_long_reset ? "long" : "short", i, val));
  2297. }
  2298. }
  2299. static void
  2300. pfm_reset_regs(pfm_context_t *ctx, unsigned long *ovfl_regs, int is_long_reset)
  2301. {
  2302. unsigned long mask = ovfl_regs[0];
  2303. unsigned long reset_others = 0UL;
  2304. unsigned long val;
  2305. int i;
  2306. DPRINT_ovfl(("ovfl_regs=0x%lx is_long_reset=%d\n", ovfl_regs[0], is_long_reset));
  2307. if (ctx->ctx_state == PFM_CTX_MASKED) {
  2308. pfm_reset_regs_masked(ctx, ovfl_regs, is_long_reset);
  2309. return;
  2310. }
  2311. /*
  2312. * now restore reset value on sampling overflowed counters
  2313. */
  2314. mask >>= PMU_FIRST_COUNTER;
  2315. for(i = PMU_FIRST_COUNTER; mask; i++, mask >>= 1) {
  2316. if ((mask & 0x1UL) == 0UL) continue;
  2317. val = pfm_new_counter_value(ctx->ctx_pmds+ i, is_long_reset);
  2318. reset_others |= ctx->ctx_pmds[i].reset_pmds[0];
  2319. DPRINT_ovfl((" %s reset ctx_pmds[%d]=%lx\n", is_long_reset ? "long" : "short", i, val));
  2320. pfm_write_soft_counter(ctx, i, val);
  2321. }
  2322. /*
  2323. * Now take care of resetting the other registers
  2324. */
  2325. for(i = 0; reset_others; i++, reset_others >>= 1) {
  2326. if ((reset_others & 0x1) == 0) continue;
  2327. val = pfm_new_counter_value(ctx->ctx_pmds + i, is_long_reset);
  2328. if (PMD_IS_COUNTING(i)) {
  2329. pfm_write_soft_counter(ctx, i, val);
  2330. } else {
  2331. ia64_set_pmd(i, val);
  2332. }
  2333. DPRINT_ovfl(("%s reset_others pmd[%d]=%lx\n",
  2334. is_long_reset ? "long" : "short", i, val));
  2335. }
  2336. ia64_srlz_d();
  2337. }
  2338. static int
  2339. pfm_write_pmcs(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  2340. {
  2341. struct task_struct *task;
  2342. pfarg_reg_t *req = (pfarg_reg_t *)arg;
  2343. unsigned long value, pmc_pm;
  2344. unsigned long smpl_pmds, reset_pmds, impl_pmds;
  2345. unsigned int cnum, reg_flags, flags, pmc_type;
  2346. int i, can_access_pmu = 0, is_loaded, is_system, expert_mode;
  2347. int is_monitor, is_counting, state;
  2348. int ret = -EINVAL;
  2349. pfm_reg_check_t wr_func;
  2350. #define PFM_CHECK_PMC_PM(x, y, z) ((x)->ctx_fl_system ^ PMC_PM(y, z))
  2351. state = ctx->ctx_state;
  2352. is_loaded = state == PFM_CTX_LOADED ? 1 : 0;
  2353. is_system = ctx->ctx_fl_system;
  2354. task = ctx->ctx_task;
  2355. impl_pmds = pmu_conf->impl_pmds[0];
  2356. if (state == PFM_CTX_ZOMBIE) return -EINVAL;
  2357. if (is_loaded) {
  2358. /*
  2359. * In system wide and when the context is loaded, access can only happen
  2360. * when the caller is running on the CPU being monitored by the session.
  2361. * It does not have to be the owner (ctx_task) of the context per se.
  2362. */
  2363. if (is_system && ctx->ctx_cpu != smp_processor_id()) {
  2364. DPRINT(("should be running on CPU%d\n", ctx->ctx_cpu));
  2365. return -EBUSY;
  2366. }
  2367. can_access_pmu = GET_PMU_OWNER() == task || is_system ? 1 : 0;
  2368. }
  2369. expert_mode = pfm_sysctl.expert_mode;
  2370. for (i = 0; i < count; i++, req++) {
  2371. cnum = req->reg_num;
  2372. reg_flags = req->reg_flags;
  2373. value = req->reg_value;
  2374. smpl_pmds = req->reg_smpl_pmds[0];
  2375. reset_pmds = req->reg_reset_pmds[0];
  2376. flags = 0;
  2377. if (cnum >= PMU_MAX_PMCS) {
  2378. DPRINT(("pmc%u is invalid\n", cnum));
  2379. goto error;
  2380. }
  2381. pmc_type = pmu_conf->pmc_desc[cnum].type;
  2382. pmc_pm = (value >> pmu_conf->pmc_desc[cnum].pm_pos) & 0x1;
  2383. is_counting = (pmc_type & PFM_REG_COUNTING) == PFM_REG_COUNTING ? 1 : 0;
  2384. is_monitor = (pmc_type & PFM_REG_MONITOR) == PFM_REG_MONITOR ? 1 : 0;
  2385. /*
  2386. * we reject all non implemented PMC as well
  2387. * as attempts to modify PMC[0-3] which are used
  2388. * as status registers by the PMU
  2389. */
  2390. if ((pmc_type & PFM_REG_IMPL) == 0 || (pmc_type & PFM_REG_CONTROL) == PFM_REG_CONTROL) {
  2391. DPRINT(("pmc%u is unimplemented or no-access pmc_type=%x\n", cnum, pmc_type));
  2392. goto error;
  2393. }
  2394. wr_func = pmu_conf->pmc_desc[cnum].write_check;
  2395. /*
  2396. * If the PMC is a monitor, then if the value is not the default:
  2397. * - system-wide session: PMCx.pm=1 (privileged monitor)
  2398. * - per-task : PMCx.pm=0 (user monitor)
  2399. */
  2400. if (is_monitor && value != PMC_DFL_VAL(cnum) && is_system ^ pmc_pm) {
  2401. DPRINT(("pmc%u pmc_pm=%lu is_system=%d\n",
  2402. cnum,
  2403. pmc_pm,
  2404. is_system));
  2405. goto error;
  2406. }
  2407. if (is_counting) {
  2408. /*
  2409. * enforce generation of overflow interrupt. Necessary on all
  2410. * CPUs.
  2411. */
  2412. value |= 1 << PMU_PMC_OI;
  2413. if (reg_flags & PFM_REGFL_OVFL_NOTIFY) {
  2414. flags |= PFM_REGFL_OVFL_NOTIFY;
  2415. }
  2416. if (reg_flags & PFM_REGFL_RANDOM) flags |= PFM_REGFL_RANDOM;
  2417. /* verify validity of smpl_pmds */
  2418. if ((smpl_pmds & impl_pmds) != smpl_pmds) {
  2419. DPRINT(("invalid smpl_pmds 0x%lx for pmc%u\n", smpl_pmds, cnum));
  2420. goto error;
  2421. }
  2422. /* verify validity of reset_pmds */
  2423. if ((reset_pmds & impl_pmds) != reset_pmds) {
  2424. DPRINT(("invalid reset_pmds 0x%lx for pmc%u\n", reset_pmds, cnum));
  2425. goto error;
  2426. }
  2427. } else {
  2428. if (reg_flags & (PFM_REGFL_OVFL_NOTIFY|PFM_REGFL_RANDOM)) {
  2429. DPRINT(("cannot set ovfl_notify or random on pmc%u\n", cnum));
  2430. goto error;
  2431. }
  2432. /* eventid on non-counting monitors are ignored */
  2433. }
  2434. /*
  2435. * execute write checker, if any
  2436. */
  2437. if (likely(expert_mode == 0 && wr_func)) {
  2438. ret = (*wr_func)(task, ctx, cnum, &value, regs);
  2439. if (ret) goto error;
  2440. ret = -EINVAL;
  2441. }
  2442. /*
  2443. * no error on this register
  2444. */
  2445. PFM_REG_RETFLAG_SET(req->reg_flags, 0);
  2446. /*
  2447. * Now we commit the changes to the software state
  2448. */
  2449. /*
  2450. * update overflow information
  2451. */
  2452. if (is_counting) {
  2453. /*
  2454. * full flag update each time a register is programmed
  2455. */
  2456. ctx->ctx_pmds[cnum].flags = flags;
  2457. ctx->ctx_pmds[cnum].reset_pmds[0] = reset_pmds;
  2458. ctx->ctx_pmds[cnum].smpl_pmds[0] = smpl_pmds;
  2459. ctx->ctx_pmds[cnum].eventid = req->reg_smpl_eventid;
  2460. /*
  2461. * Mark all PMDS to be accessed as used.
  2462. *
  2463. * We do not keep track of PMC because we have to
  2464. * systematically restore ALL of them.
  2465. *
  2466. * We do not update the used_monitors mask, because
  2467. * if we have not programmed them, then will be in
  2468. * a quiescent state, therefore we will not need to
  2469. * mask/restore then when context is MASKED.
  2470. */
  2471. CTX_USED_PMD(ctx, reset_pmds);
  2472. CTX_USED_PMD(ctx, smpl_pmds);
  2473. /*
  2474. * make sure we do not try to reset on
  2475. * restart because we have established new values
  2476. */
  2477. if (state == PFM_CTX_MASKED) ctx->ctx_ovfl_regs[0] &= ~1UL << cnum;
  2478. }
  2479. /*
  2480. * Needed in case the user does not initialize the equivalent
  2481. * PMD. Clearing is done indirectly via pfm_reset_pmu_state() so there is no
  2482. * possible leak here.
  2483. */
  2484. CTX_USED_PMD(ctx, pmu_conf->pmc_desc[cnum].dep_pmd[0]);
  2485. /*
  2486. * keep track of the monitor PMC that we are using.
  2487. * we save the value of the pmc in ctx_pmcs[] and if
  2488. * the monitoring is not stopped for the context we also
  2489. * place it in the saved state area so that it will be
  2490. * picked up later by the context switch code.
  2491. *
  2492. * The value in ctx_pmcs[] can only be changed in pfm_write_pmcs().
  2493. *
  2494. * The value in th_pmcs[] may be modified on overflow, i.e., when
  2495. * monitoring needs to be stopped.
  2496. */
  2497. if (is_monitor) CTX_USED_MONITOR(ctx, 1UL << cnum);
  2498. /*
  2499. * update context state
  2500. */
  2501. ctx->ctx_pmcs[cnum] = value;
  2502. if (is_loaded) {
  2503. /*
  2504. * write thread state
  2505. */
  2506. if (is_system == 0) ctx->th_pmcs[cnum] = value;
  2507. /*
  2508. * write hardware register if we can
  2509. */
  2510. if (can_access_pmu) {
  2511. ia64_set_pmc(cnum, value);
  2512. }
  2513. #ifdef CONFIG_SMP
  2514. else {
  2515. /*
  2516. * per-task SMP only here
  2517. *
  2518. * we are guaranteed that the task is not running on the other CPU,
  2519. * we indicate that this PMD will need to be reloaded if the task
  2520. * is rescheduled on the CPU it ran last on.
  2521. */
  2522. ctx->ctx_reload_pmcs[0] |= 1UL << cnum;
  2523. }
  2524. #endif
  2525. }
  2526. DPRINT(("pmc[%u]=0x%lx ld=%d apmu=%d flags=0x%x all_pmcs=0x%lx used_pmds=0x%lx eventid=%ld smpl_pmds=0x%lx reset_pmds=0x%lx reloads_pmcs=0x%lx used_monitors=0x%lx ovfl_regs=0x%lx\n",
  2527. cnum,
  2528. value,
  2529. is_loaded,
  2530. can_access_pmu,
  2531. flags,
  2532. ctx->ctx_all_pmcs[0],
  2533. ctx->ctx_used_pmds[0],
  2534. ctx->ctx_pmds[cnum].eventid,
  2535. smpl_pmds,
  2536. reset_pmds,
  2537. ctx->ctx_reload_pmcs[0],
  2538. ctx->ctx_used_monitors[0],
  2539. ctx->ctx_ovfl_regs[0]));
  2540. }
  2541. /*
  2542. * make sure the changes are visible
  2543. */
  2544. if (can_access_pmu) ia64_srlz_d();
  2545. return 0;
  2546. error:
  2547. PFM_REG_RETFLAG_SET(req->reg_flags, PFM_REG_RETFL_EINVAL);
  2548. return ret;
  2549. }
  2550. static int
  2551. pfm_write_pmds(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  2552. {
  2553. struct task_struct *task;
  2554. pfarg_reg_t *req = (pfarg_reg_t *)arg;
  2555. unsigned long value, hw_value, ovfl_mask;
  2556. unsigned int cnum;
  2557. int i, can_access_pmu = 0, state;
  2558. int is_counting, is_loaded, is_system, expert_mode;
  2559. int ret = -EINVAL;
  2560. pfm_reg_check_t wr_func;
  2561. state = ctx->ctx_state;
  2562. is_loaded = state == PFM_CTX_LOADED ? 1 : 0;
  2563. is_system = ctx->ctx_fl_system;
  2564. ovfl_mask = pmu_conf->ovfl_val;
  2565. task = ctx->ctx_task;
  2566. if (unlikely(state == PFM_CTX_ZOMBIE)) return -EINVAL;
  2567. /*
  2568. * on both UP and SMP, we can only write to the PMC when the task is
  2569. * the owner of the local PMU.
  2570. */
  2571. if (likely(is_loaded)) {
  2572. /*
  2573. * In system wide and when the context is loaded, access can only happen
  2574. * when the caller is running on the CPU being monitored by the session.
  2575. * It does not have to be the owner (ctx_task) of the context per se.
  2576. */
  2577. if (unlikely(is_system && ctx->ctx_cpu != smp_processor_id())) {
  2578. DPRINT(("should be running on CPU%d\n", ctx->ctx_cpu));
  2579. return -EBUSY;
  2580. }
  2581. can_access_pmu = GET_PMU_OWNER() == task || is_system ? 1 : 0;
  2582. }
  2583. expert_mode = pfm_sysctl.expert_mode;
  2584. for (i = 0; i < count; i++, req++) {
  2585. cnum = req->reg_num;
  2586. value = req->reg_value;
  2587. if (!PMD_IS_IMPL(cnum)) {
  2588. DPRINT(("pmd[%u] is unimplemented or invalid\n", cnum));
  2589. goto abort_mission;
  2590. }
  2591. is_counting = PMD_IS_COUNTING(cnum);
  2592. wr_func = pmu_conf->pmd_desc[cnum].write_check;
  2593. /*
  2594. * execute write checker, if any
  2595. */
  2596. if (unlikely(expert_mode == 0 && wr_func)) {
  2597. unsigned long v = value;
  2598. ret = (*wr_func)(task, ctx, cnum, &v, regs);
  2599. if (ret) goto abort_mission;
  2600. value = v;
  2601. ret = -EINVAL;
  2602. }
  2603. /*
  2604. * no error on this register
  2605. */
  2606. PFM_REG_RETFLAG_SET(req->reg_flags, 0);
  2607. /*
  2608. * now commit changes to software state
  2609. */
  2610. hw_value = value;
  2611. /*
  2612. * update virtualized (64bits) counter
  2613. */
  2614. if (is_counting) {
  2615. /*
  2616. * write context state
  2617. */
  2618. ctx->ctx_pmds[cnum].lval = value;
  2619. /*
  2620. * when context is load we use the split value
  2621. */
  2622. if (is_loaded) {
  2623. hw_value = value & ovfl_mask;
  2624. value = value & ~ovfl_mask;
  2625. }
  2626. }
  2627. /*
  2628. * update reset values (not just for counters)
  2629. */
  2630. ctx->ctx_pmds[cnum].long_reset = req->reg_long_reset;
  2631. ctx->ctx_pmds[cnum].short_reset = req->reg_short_reset;
  2632. /*
  2633. * update randomization parameters (not just for counters)
  2634. */
  2635. ctx->ctx_pmds[cnum].seed = req->reg_random_seed;
  2636. ctx->ctx_pmds[cnum].mask = req->reg_random_mask;
  2637. /*
  2638. * update context value
  2639. */
  2640. ctx->ctx_pmds[cnum].val = value;
  2641. /*
  2642. * Keep track of what we use
  2643. *
  2644. * We do not keep track of PMC because we have to
  2645. * systematically restore ALL of them.
  2646. */
  2647. CTX_USED_PMD(ctx, PMD_PMD_DEP(cnum));
  2648. /*
  2649. * mark this PMD register used as well
  2650. */
  2651. CTX_USED_PMD(ctx, RDEP(cnum));
  2652. /*
  2653. * make sure we do not try to reset on
  2654. * restart because we have established new values
  2655. */
  2656. if (is_counting && state == PFM_CTX_MASKED) {
  2657. ctx->ctx_ovfl_regs[0] &= ~1UL << cnum;
  2658. }
  2659. if (is_loaded) {
  2660. /*
  2661. * write thread state
  2662. */
  2663. if (is_system == 0) ctx->th_pmds[cnum] = hw_value;
  2664. /*
  2665. * write hardware register if we can
  2666. */
  2667. if (can_access_pmu) {
  2668. ia64_set_pmd(cnum, hw_value);
  2669. } else {
  2670. #ifdef CONFIG_SMP
  2671. /*
  2672. * we are guaranteed that the task is not running on the other CPU,
  2673. * we indicate that this PMD will need to be reloaded if the task
  2674. * is rescheduled on the CPU it ran last on.
  2675. */
  2676. ctx->ctx_reload_pmds[0] |= 1UL << cnum;
  2677. #endif
  2678. }
  2679. }
  2680. DPRINT(("pmd[%u]=0x%lx ld=%d apmu=%d, hw_value=0x%lx ctx_pmd=0x%lx short_reset=0x%lx "
  2681. "long_reset=0x%lx notify=%c seed=0x%lx mask=0x%lx used_pmds=0x%lx reset_pmds=0x%lx reload_pmds=0x%lx all_pmds=0x%lx ovfl_regs=0x%lx\n",
  2682. cnum,
  2683. value,
  2684. is_loaded,
  2685. can_access_pmu,
  2686. hw_value,
  2687. ctx->ctx_pmds[cnum].val,
  2688. ctx->ctx_pmds[cnum].short_reset,
  2689. ctx->ctx_pmds[cnum].long_reset,
  2690. PMC_OVFL_NOTIFY(ctx, cnum) ? 'Y':'N',
  2691. ctx->ctx_pmds[cnum].seed,
  2692. ctx->ctx_pmds[cnum].mask,
  2693. ctx->ctx_used_pmds[0],
  2694. ctx->ctx_pmds[cnum].reset_pmds[0],
  2695. ctx->ctx_reload_pmds[0],
  2696. ctx->ctx_all_pmds[0],
  2697. ctx->ctx_ovfl_regs[0]));
  2698. }
  2699. /*
  2700. * make changes visible
  2701. */
  2702. if (can_access_pmu) ia64_srlz_d();
  2703. return 0;
  2704. abort_mission:
  2705. /*
  2706. * for now, we have only one possibility for error
  2707. */
  2708. PFM_REG_RETFLAG_SET(req->reg_flags, PFM_REG_RETFL_EINVAL);
  2709. return ret;
  2710. }
  2711. /*
  2712. * By the way of PROTECT_CONTEXT(), interrupts are masked while we are in this function.
  2713. * Therefore we know, we do not have to worry about the PMU overflow interrupt. If an
  2714. * interrupt is delivered during the call, it will be kept pending until we leave, making
  2715. * it appears as if it had been generated at the UNPROTECT_CONTEXT(). At least we are
  2716. * guaranteed to return consistent data to the user, it may simply be old. It is not
  2717. * trivial to treat the overflow while inside the call because you may end up in
  2718. * some module sampling buffer code causing deadlocks.
  2719. */
  2720. static int
  2721. pfm_read_pmds(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  2722. {
  2723. struct task_struct *task;
  2724. unsigned long val = 0UL, lval, ovfl_mask, sval;
  2725. pfarg_reg_t *req = (pfarg_reg_t *)arg;
  2726. unsigned int cnum, reg_flags = 0;
  2727. int i, can_access_pmu = 0, state;
  2728. int is_loaded, is_system, is_counting, expert_mode;
  2729. int ret = -EINVAL;
  2730. pfm_reg_check_t rd_func;
  2731. /*
  2732. * access is possible when loaded only for
  2733. * self-monitoring tasks or in UP mode
  2734. */
  2735. state = ctx->ctx_state;
  2736. is_loaded = state == PFM_CTX_LOADED ? 1 : 0;
  2737. is_system = ctx->ctx_fl_system;
  2738. ovfl_mask = pmu_conf->ovfl_val;
  2739. task = ctx->ctx_task;
  2740. if (state == PFM_CTX_ZOMBIE) return -EINVAL;
  2741. if (likely(is_loaded)) {
  2742. /*
  2743. * In system wide and when the context is loaded, access can only happen
  2744. * when the caller is running on the CPU being monitored by the session.
  2745. * It does not have to be the owner (ctx_task) of the context per se.
  2746. */
  2747. if (unlikely(is_system && ctx->ctx_cpu != smp_processor_id())) {
  2748. DPRINT(("should be running on CPU%d\n", ctx->ctx_cpu));
  2749. return -EBUSY;
  2750. }
  2751. /*
  2752. * this can be true when not self-monitoring only in UP
  2753. */
  2754. can_access_pmu = GET_PMU_OWNER() == task || is_system ? 1 : 0;
  2755. if (can_access_pmu) ia64_srlz_d();
  2756. }
  2757. expert_mode = pfm_sysctl.expert_mode;
  2758. DPRINT(("ld=%d apmu=%d ctx_state=%d\n",
  2759. is_loaded,
  2760. can_access_pmu,
  2761. state));
  2762. /*
  2763. * on both UP and SMP, we can only read the PMD from the hardware register when
  2764. * the task is the owner of the local PMU.
  2765. */
  2766. for (i = 0; i < count; i++, req++) {
  2767. cnum = req->reg_num;
  2768. reg_flags = req->reg_flags;
  2769. if (unlikely(!PMD_IS_IMPL(cnum))) goto error;
  2770. /*
  2771. * we can only read the register that we use. That includes
  2772. * the one we explicitly initialize AND the one we want included
  2773. * in the sampling buffer (smpl_regs).
  2774. *
  2775. * Having this restriction allows optimization in the ctxsw routine
  2776. * without compromising security (leaks)
  2777. */
  2778. if (unlikely(!CTX_IS_USED_PMD(ctx, cnum))) goto error;
  2779. sval = ctx->ctx_pmds[cnum].val;
  2780. lval = ctx->ctx_pmds[cnum].lval;
  2781. is_counting = PMD_IS_COUNTING(cnum);
  2782. /*
  2783. * If the task is not the current one, then we check if the
  2784. * PMU state is still in the local live register due to lazy ctxsw.
  2785. * If true, then we read directly from the registers.
  2786. */
  2787. if (can_access_pmu){
  2788. val = ia64_get_pmd(cnum);
  2789. } else {
  2790. /*
  2791. * context has been saved
  2792. * if context is zombie, then task does not exist anymore.
  2793. * In this case, we use the full value saved in the context (pfm_flush_regs()).
  2794. */
  2795. val = is_loaded ? ctx->th_pmds[cnum] : 0UL;
  2796. }
  2797. rd_func = pmu_conf->pmd_desc[cnum].read_check;
  2798. if (is_counting) {
  2799. /*
  2800. * XXX: need to check for overflow when loaded
  2801. */
  2802. val &= ovfl_mask;
  2803. val += sval;
  2804. }
  2805. /*
  2806. * execute read checker, if any
  2807. */
  2808. if (unlikely(expert_mode == 0 && rd_func)) {
  2809. unsigned long v = val;
  2810. ret = (*rd_func)(ctx->ctx_task, ctx, cnum, &v, regs);
  2811. if (ret) goto error;
  2812. val = v;
  2813. ret = -EINVAL;
  2814. }
  2815. PFM_REG_RETFLAG_SET(reg_flags, 0);
  2816. DPRINT(("pmd[%u]=0x%lx\n", cnum, val));
  2817. /*
  2818. * update register return value, abort all if problem during copy.
  2819. * we only modify the reg_flags field. no check mode is fine because
  2820. * access has been verified upfront in sys_perfmonctl().
  2821. */
  2822. req->reg_value = val;
  2823. req->reg_flags = reg_flags;
  2824. req->reg_last_reset_val = lval;
  2825. }
  2826. return 0;
  2827. error:
  2828. PFM_REG_RETFLAG_SET(req->reg_flags, PFM_REG_RETFL_EINVAL);
  2829. return ret;
  2830. }
  2831. int
  2832. pfm_mod_write_pmcs(struct task_struct *task, void *req, unsigned int nreq, struct pt_regs *regs)
  2833. {
  2834. pfm_context_t *ctx;
  2835. if (req == NULL) return -EINVAL;
  2836. ctx = GET_PMU_CTX();
  2837. if (ctx == NULL) return -EINVAL;
  2838. /*
  2839. * for now limit to current task, which is enough when calling
  2840. * from overflow handler
  2841. */
  2842. if (task != current && ctx->ctx_fl_system == 0) return -EBUSY;
  2843. return pfm_write_pmcs(ctx, req, nreq, regs);
  2844. }
  2845. EXPORT_SYMBOL(pfm_mod_write_pmcs);
  2846. int
  2847. pfm_mod_read_pmds(struct task_struct *task, void *req, unsigned int nreq, struct pt_regs *regs)
  2848. {
  2849. pfm_context_t *ctx;
  2850. if (req == NULL) return -EINVAL;
  2851. ctx = GET_PMU_CTX();
  2852. if (ctx == NULL) return -EINVAL;
  2853. /*
  2854. * for now limit to current task, which is enough when calling
  2855. * from overflow handler
  2856. */
  2857. if (task != current && ctx->ctx_fl_system == 0) return -EBUSY;
  2858. return pfm_read_pmds(ctx, req, nreq, regs);
  2859. }
  2860. EXPORT_SYMBOL(pfm_mod_read_pmds);
  2861. /*
  2862. * Only call this function when a process it trying to
  2863. * write the debug registers (reading is always allowed)
  2864. */
  2865. int
  2866. pfm_use_debug_registers(struct task_struct *task)
  2867. {
  2868. pfm_context_t *ctx = task->thread.pfm_context;
  2869. unsigned long flags;
  2870. int ret = 0;
  2871. if (pmu_conf->use_rr_dbregs == 0) return 0;
  2872. DPRINT(("called for [%d]\n", task_pid_nr(task)));
  2873. /*
  2874. * do it only once
  2875. */
  2876. if (task->thread.flags & IA64_THREAD_DBG_VALID) return 0;
  2877. /*
  2878. * Even on SMP, we do not need to use an atomic here because
  2879. * the only way in is via ptrace() and this is possible only when the
  2880. * process is stopped. Even in the case where the ctxsw out is not totally
  2881. * completed by the time we come here, there is no way the 'stopped' process
  2882. * could be in the middle of fiddling with the pfm_write_ibr_dbr() routine.
  2883. * So this is always safe.
  2884. */
  2885. if (ctx && ctx->ctx_fl_using_dbreg == 1) return -1;
  2886. LOCK_PFS(flags);
  2887. /*
  2888. * We cannot allow setting breakpoints when system wide monitoring
  2889. * sessions are using the debug registers.
  2890. */
  2891. if (pfm_sessions.pfs_sys_use_dbregs> 0)
  2892. ret = -1;
  2893. else
  2894. pfm_sessions.pfs_ptrace_use_dbregs++;
  2895. DPRINT(("ptrace_use_dbregs=%u sys_use_dbregs=%u by [%d] ret = %d\n",
  2896. pfm_sessions.pfs_ptrace_use_dbregs,
  2897. pfm_sessions.pfs_sys_use_dbregs,
  2898. task_pid_nr(task), ret));
  2899. UNLOCK_PFS(flags);
  2900. return ret;
  2901. }
  2902. /*
  2903. * This function is called for every task that exits with the
  2904. * IA64_THREAD_DBG_VALID set. This indicates a task which was
  2905. * able to use the debug registers for debugging purposes via
  2906. * ptrace(). Therefore we know it was not using them for
  2907. * performance monitoring, so we only decrement the number
  2908. * of "ptraced" debug register users to keep the count up to date
  2909. */
  2910. int
  2911. pfm_release_debug_registers(struct task_struct *task)
  2912. {
  2913. unsigned long flags;
  2914. int ret;
  2915. if (pmu_conf->use_rr_dbregs == 0) return 0;
  2916. LOCK_PFS(flags);
  2917. if (pfm_sessions.pfs_ptrace_use_dbregs == 0) {
  2918. printk(KERN_ERR "perfmon: invalid release for [%d] ptrace_use_dbregs=0\n", task_pid_nr(task));
  2919. ret = -1;
  2920. } else {
  2921. pfm_sessions.pfs_ptrace_use_dbregs--;
  2922. ret = 0;
  2923. }
  2924. UNLOCK_PFS(flags);
  2925. return ret;
  2926. }
  2927. static int
  2928. pfm_restart(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  2929. {
  2930. struct task_struct *task;
  2931. pfm_buffer_fmt_t *fmt;
  2932. pfm_ovfl_ctrl_t rst_ctrl;
  2933. int state, is_system;
  2934. int ret = 0;
  2935. state = ctx->ctx_state;
  2936. fmt = ctx->ctx_buf_fmt;
  2937. is_system = ctx->ctx_fl_system;
  2938. task = PFM_CTX_TASK(ctx);
  2939. switch(state) {
  2940. case PFM_CTX_MASKED:
  2941. break;
  2942. case PFM_CTX_LOADED:
  2943. if (CTX_HAS_SMPL(ctx) && fmt->fmt_restart_active) break;
  2944. /* fall through */
  2945. case PFM_CTX_UNLOADED:
  2946. case PFM_CTX_ZOMBIE:
  2947. DPRINT(("invalid state=%d\n", state));
  2948. return -EBUSY;
  2949. default:
  2950. DPRINT(("state=%d, cannot operate (no active_restart handler)\n", state));
  2951. return -EINVAL;
  2952. }
  2953. /*
  2954. * In system wide and when the context is loaded, access can only happen
  2955. * when the caller is running on the CPU being monitored by the session.
  2956. * It does not have to be the owner (ctx_task) of the context per se.
  2957. */
  2958. if (is_system && ctx->ctx_cpu != smp_processor_id()) {
  2959. DPRINT(("should be running on CPU%d\n", ctx->ctx_cpu));
  2960. return -EBUSY;
  2961. }
  2962. /* sanity check */
  2963. if (unlikely(task == NULL)) {
  2964. printk(KERN_ERR "perfmon: [%d] pfm_restart no task\n", task_pid_nr(current));
  2965. return -EINVAL;
  2966. }
  2967. if (task == current || is_system) {
  2968. fmt = ctx->ctx_buf_fmt;
  2969. DPRINT(("restarting self %d ovfl=0x%lx\n",
  2970. task_pid_nr(task),
  2971. ctx->ctx_ovfl_regs[0]));
  2972. if (CTX_HAS_SMPL(ctx)) {
  2973. prefetch(ctx->ctx_smpl_hdr);
  2974. rst_ctrl.bits.mask_monitoring = 0;
  2975. rst_ctrl.bits.reset_ovfl_pmds = 0;
  2976. if (state == PFM_CTX_LOADED)
  2977. ret = pfm_buf_fmt_restart_active(fmt, task, &rst_ctrl, ctx->ctx_smpl_hdr, regs);
  2978. else
  2979. ret = pfm_buf_fmt_restart(fmt, task, &rst_ctrl, ctx->ctx_smpl_hdr, regs);
  2980. } else {
  2981. rst_ctrl.bits.mask_monitoring = 0;
  2982. rst_ctrl.bits.reset_ovfl_pmds = 1;
  2983. }
  2984. if (ret == 0) {
  2985. if (rst_ctrl.bits.reset_ovfl_pmds)
  2986. pfm_reset_regs(ctx, ctx->ctx_ovfl_regs, PFM_PMD_LONG_RESET);
  2987. if (rst_ctrl.bits.mask_monitoring == 0) {
  2988. DPRINT(("resuming monitoring for [%d]\n", task_pid_nr(task)));
  2989. if (state == PFM_CTX_MASKED) pfm_restore_monitoring(task);
  2990. } else {
  2991. DPRINT(("keeping monitoring stopped for [%d]\n", task_pid_nr(task)));
  2992. // cannot use pfm_stop_monitoring(task, regs);
  2993. }
  2994. }
  2995. /*
  2996. * clear overflowed PMD mask to remove any stale information
  2997. */
  2998. ctx->ctx_ovfl_regs[0] = 0UL;
  2999. /*
  3000. * back to LOADED state
  3001. */
  3002. ctx->ctx_state = PFM_CTX_LOADED;
  3003. /*
  3004. * XXX: not really useful for self monitoring
  3005. */
  3006. ctx->ctx_fl_can_restart = 0;
  3007. return 0;
  3008. }
  3009. /*
  3010. * restart another task
  3011. */
  3012. /*
  3013. * When PFM_CTX_MASKED, we cannot issue a restart before the previous
  3014. * one is seen by the task.
  3015. */
  3016. if (state == PFM_CTX_MASKED) {
  3017. if (ctx->ctx_fl_can_restart == 0) return -EINVAL;
  3018. /*
  3019. * will prevent subsequent restart before this one is
  3020. * seen by other task
  3021. */
  3022. ctx->ctx_fl_can_restart = 0;
  3023. }
  3024. /*
  3025. * if blocking, then post the semaphore is PFM_CTX_MASKED, i.e.
  3026. * the task is blocked or on its way to block. That's the normal
  3027. * restart path. If the monitoring is not masked, then the task
  3028. * can be actively monitoring and we cannot directly intervene.
  3029. * Therefore we use the trap mechanism to catch the task and
  3030. * force it to reset the buffer/reset PMDs.
  3031. *
  3032. * if non-blocking, then we ensure that the task will go into
  3033. * pfm_handle_work() before returning to user mode.
  3034. *
  3035. * We cannot explicitly reset another task, it MUST always
  3036. * be done by the task itself. This works for system wide because
  3037. * the tool that is controlling the session is logically doing
  3038. * "self-monitoring".
  3039. */
  3040. if (CTX_OVFL_NOBLOCK(ctx) == 0 && state == PFM_CTX_MASKED) {
  3041. DPRINT(("unblocking [%d]\n", task_pid_nr(task)));
  3042. complete(&ctx->ctx_restart_done);
  3043. } else {
  3044. DPRINT(("[%d] armed exit trap\n", task_pid_nr(task)));
  3045. ctx->ctx_fl_trap_reason = PFM_TRAP_REASON_RESET;
  3046. PFM_SET_WORK_PENDING(task, 1);
  3047. set_notify_resume(task);
  3048. /*
  3049. * XXX: send reschedule if task runs on another CPU
  3050. */
  3051. }
  3052. return 0;
  3053. }
  3054. static int
  3055. pfm_debug(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3056. {
  3057. unsigned int m = *(unsigned int *)arg;
  3058. pfm_sysctl.debug = m == 0 ? 0 : 1;
  3059. printk(KERN_INFO "perfmon debugging %s (timing reset)\n", pfm_sysctl.debug ? "on" : "off");
  3060. if (m == 0) {
  3061. memset(pfm_stats, 0, sizeof(pfm_stats));
  3062. for(m=0; m < NR_CPUS; m++) pfm_stats[m].pfm_ovfl_intr_cycles_min = ~0UL;
  3063. }
  3064. return 0;
  3065. }
  3066. /*
  3067. * arg can be NULL and count can be zero for this function
  3068. */
  3069. static int
  3070. pfm_write_ibr_dbr(int mode, pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3071. {
  3072. struct thread_struct *thread = NULL;
  3073. struct task_struct *task;
  3074. pfarg_dbreg_t *req = (pfarg_dbreg_t *)arg;
  3075. unsigned long flags;
  3076. dbreg_t dbreg;
  3077. unsigned int rnum;
  3078. int first_time;
  3079. int ret = 0, state;
  3080. int i, can_access_pmu = 0;
  3081. int is_system, is_loaded;
  3082. if (pmu_conf->use_rr_dbregs == 0) return -EINVAL;
  3083. state = ctx->ctx_state;
  3084. is_loaded = state == PFM_CTX_LOADED ? 1 : 0;
  3085. is_system = ctx->ctx_fl_system;
  3086. task = ctx->ctx_task;
  3087. if (state == PFM_CTX_ZOMBIE) return -EINVAL;
  3088. /*
  3089. * on both UP and SMP, we can only write to the PMC when the task is
  3090. * the owner of the local PMU.
  3091. */
  3092. if (is_loaded) {
  3093. thread = &task->thread;
  3094. /*
  3095. * In system wide and when the context is loaded, access can only happen
  3096. * when the caller is running on the CPU being monitored by the session.
  3097. * It does not have to be the owner (ctx_task) of the context per se.
  3098. */
  3099. if (unlikely(is_system && ctx->ctx_cpu != smp_processor_id())) {
  3100. DPRINT(("should be running on CPU%d\n", ctx->ctx_cpu));
  3101. return -EBUSY;
  3102. }
  3103. can_access_pmu = GET_PMU_OWNER() == task || is_system ? 1 : 0;
  3104. }
  3105. /*
  3106. * we do not need to check for ipsr.db because we do clear ibr.x, dbr.r, and dbr.w
  3107. * ensuring that no real breakpoint can be installed via this call.
  3108. *
  3109. * IMPORTANT: regs can be NULL in this function
  3110. */
  3111. first_time = ctx->ctx_fl_using_dbreg == 0;
  3112. /*
  3113. * don't bother if we are loaded and task is being debugged
  3114. */
  3115. if (is_loaded && (thread->flags & IA64_THREAD_DBG_VALID) != 0) {
  3116. DPRINT(("debug registers already in use for [%d]\n", task_pid_nr(task)));
  3117. return -EBUSY;
  3118. }
  3119. /*
  3120. * check for debug registers in system wide mode
  3121. *
  3122. * If though a check is done in pfm_context_load(),
  3123. * we must repeat it here, in case the registers are
  3124. * written after the context is loaded
  3125. */
  3126. if (is_loaded) {
  3127. LOCK_PFS(flags);
  3128. if (first_time && is_system) {
  3129. if (pfm_sessions.pfs_ptrace_use_dbregs)
  3130. ret = -EBUSY;
  3131. else
  3132. pfm_sessions.pfs_sys_use_dbregs++;
  3133. }
  3134. UNLOCK_PFS(flags);
  3135. }
  3136. if (ret != 0) return ret;
  3137. /*
  3138. * mark ourself as user of the debug registers for
  3139. * perfmon purposes.
  3140. */
  3141. ctx->ctx_fl_using_dbreg = 1;
  3142. /*
  3143. * clear hardware registers to make sure we don't
  3144. * pick up stale state.
  3145. *
  3146. * for a system wide session, we do not use
  3147. * thread.dbr, thread.ibr because this process
  3148. * never leaves the current CPU and the state
  3149. * is shared by all processes running on it
  3150. */
  3151. if (first_time && can_access_pmu) {
  3152. DPRINT(("[%d] clearing ibrs, dbrs\n", task_pid_nr(task)));
  3153. for (i=0; i < pmu_conf->num_ibrs; i++) {
  3154. ia64_set_ibr(i, 0UL);
  3155. ia64_dv_serialize_instruction();
  3156. }
  3157. ia64_srlz_i();
  3158. for (i=0; i < pmu_conf->num_dbrs; i++) {
  3159. ia64_set_dbr(i, 0UL);
  3160. ia64_dv_serialize_data();
  3161. }
  3162. ia64_srlz_d();
  3163. }
  3164. /*
  3165. * Now install the values into the registers
  3166. */
  3167. for (i = 0; i < count; i++, req++) {
  3168. rnum = req->dbreg_num;
  3169. dbreg.val = req->dbreg_value;
  3170. ret = -EINVAL;
  3171. if ((mode == PFM_CODE_RR && rnum >= PFM_NUM_IBRS) || ((mode == PFM_DATA_RR) && rnum >= PFM_NUM_DBRS)) {
  3172. DPRINT(("invalid register %u val=0x%lx mode=%d i=%d count=%d\n",
  3173. rnum, dbreg.val, mode, i, count));
  3174. goto abort_mission;
  3175. }
  3176. /*
  3177. * make sure we do not install enabled breakpoint
  3178. */
  3179. if (rnum & 0x1) {
  3180. if (mode == PFM_CODE_RR)
  3181. dbreg.ibr.ibr_x = 0;
  3182. else
  3183. dbreg.dbr.dbr_r = dbreg.dbr.dbr_w = 0;
  3184. }
  3185. PFM_REG_RETFLAG_SET(req->dbreg_flags, 0);
  3186. /*
  3187. * Debug registers, just like PMC, can only be modified
  3188. * by a kernel call. Moreover, perfmon() access to those
  3189. * registers are centralized in this routine. The hardware
  3190. * does not modify the value of these registers, therefore,
  3191. * if we save them as they are written, we can avoid having
  3192. * to save them on context switch out. This is made possible
  3193. * by the fact that when perfmon uses debug registers, ptrace()
  3194. * won't be able to modify them concurrently.
  3195. */
  3196. if (mode == PFM_CODE_RR) {
  3197. CTX_USED_IBR(ctx, rnum);
  3198. if (can_access_pmu) {
  3199. ia64_set_ibr(rnum, dbreg.val);
  3200. ia64_dv_serialize_instruction();
  3201. }
  3202. ctx->ctx_ibrs[rnum] = dbreg.val;
  3203. DPRINT(("write ibr%u=0x%lx used_ibrs=0x%x ld=%d apmu=%d\n",
  3204. rnum, dbreg.val, ctx->ctx_used_ibrs[0], is_loaded, can_access_pmu));
  3205. } else {
  3206. CTX_USED_DBR(ctx, rnum);
  3207. if (can_access_pmu) {
  3208. ia64_set_dbr(rnum, dbreg.val);
  3209. ia64_dv_serialize_data();
  3210. }
  3211. ctx->ctx_dbrs[rnum] = dbreg.val;
  3212. DPRINT(("write dbr%u=0x%lx used_dbrs=0x%x ld=%d apmu=%d\n",
  3213. rnum, dbreg.val, ctx->ctx_used_dbrs[0], is_loaded, can_access_pmu));
  3214. }
  3215. }
  3216. return 0;
  3217. abort_mission:
  3218. /*
  3219. * in case it was our first attempt, we undo the global modifications
  3220. */
  3221. if (first_time) {
  3222. LOCK_PFS(flags);
  3223. if (ctx->ctx_fl_system) {
  3224. pfm_sessions.pfs_sys_use_dbregs--;
  3225. }
  3226. UNLOCK_PFS(flags);
  3227. ctx->ctx_fl_using_dbreg = 0;
  3228. }
  3229. /*
  3230. * install error return flag
  3231. */
  3232. PFM_REG_RETFLAG_SET(req->dbreg_flags, PFM_REG_RETFL_EINVAL);
  3233. return ret;
  3234. }
  3235. static int
  3236. pfm_write_ibrs(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3237. {
  3238. return pfm_write_ibr_dbr(PFM_CODE_RR, ctx, arg, count, regs);
  3239. }
  3240. static int
  3241. pfm_write_dbrs(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3242. {
  3243. return pfm_write_ibr_dbr(PFM_DATA_RR, ctx, arg, count, regs);
  3244. }
  3245. int
  3246. pfm_mod_write_ibrs(struct task_struct *task, void *req, unsigned int nreq, struct pt_regs *regs)
  3247. {
  3248. pfm_context_t *ctx;
  3249. if (req == NULL) return -EINVAL;
  3250. ctx = GET_PMU_CTX();
  3251. if (ctx == NULL) return -EINVAL;
  3252. /*
  3253. * for now limit to current task, which is enough when calling
  3254. * from overflow handler
  3255. */
  3256. if (task != current && ctx->ctx_fl_system == 0) return -EBUSY;
  3257. return pfm_write_ibrs(ctx, req, nreq, regs);
  3258. }
  3259. EXPORT_SYMBOL(pfm_mod_write_ibrs);
  3260. int
  3261. pfm_mod_write_dbrs(struct task_struct *task, void *req, unsigned int nreq, struct pt_regs *regs)
  3262. {
  3263. pfm_context_t *ctx;
  3264. if (req == NULL) return -EINVAL;
  3265. ctx = GET_PMU_CTX();
  3266. if (ctx == NULL) return -EINVAL;
  3267. /*
  3268. * for now limit to current task, which is enough when calling
  3269. * from overflow handler
  3270. */
  3271. if (task != current && ctx->ctx_fl_system == 0) return -EBUSY;
  3272. return pfm_write_dbrs(ctx, req, nreq, regs);
  3273. }
  3274. EXPORT_SYMBOL(pfm_mod_write_dbrs);
  3275. static int
  3276. pfm_get_features(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3277. {
  3278. pfarg_features_t *req = (pfarg_features_t *)arg;
  3279. req->ft_version = PFM_VERSION;
  3280. return 0;
  3281. }
  3282. static int
  3283. pfm_stop(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3284. {
  3285. struct pt_regs *tregs;
  3286. struct task_struct *task = PFM_CTX_TASK(ctx);
  3287. int state, is_system;
  3288. state = ctx->ctx_state;
  3289. is_system = ctx->ctx_fl_system;
  3290. /*
  3291. * context must be attached to issue the stop command (includes LOADED,MASKED,ZOMBIE)
  3292. */
  3293. if (state == PFM_CTX_UNLOADED) return -EINVAL;
  3294. /*
  3295. * In system wide and when the context is loaded, access can only happen
  3296. * when the caller is running on the CPU being monitored by the session.
  3297. * It does not have to be the owner (ctx_task) of the context per se.
  3298. */
  3299. if (is_system && ctx->ctx_cpu != smp_processor_id()) {
  3300. DPRINT(("should be running on CPU%d\n", ctx->ctx_cpu));
  3301. return -EBUSY;
  3302. }
  3303. DPRINT(("task [%d] ctx_state=%d is_system=%d\n",
  3304. task_pid_nr(PFM_CTX_TASK(ctx)),
  3305. state,
  3306. is_system));
  3307. /*
  3308. * in system mode, we need to update the PMU directly
  3309. * and the user level state of the caller, which may not
  3310. * necessarily be the creator of the context.
  3311. */
  3312. if (is_system) {
  3313. /*
  3314. * Update local PMU first
  3315. *
  3316. * disable dcr pp
  3317. */
  3318. ia64_setreg(_IA64_REG_CR_DCR, ia64_getreg(_IA64_REG_CR_DCR) & ~IA64_DCR_PP);
  3319. ia64_srlz_i();
  3320. /*
  3321. * update local cpuinfo
  3322. */
  3323. PFM_CPUINFO_CLEAR(PFM_CPUINFO_DCR_PP);
  3324. /*
  3325. * stop monitoring, does srlz.i
  3326. */
  3327. pfm_clear_psr_pp();
  3328. /*
  3329. * stop monitoring in the caller
  3330. */
  3331. ia64_psr(regs)->pp = 0;
  3332. return 0;
  3333. }
  3334. /*
  3335. * per-task mode
  3336. */
  3337. if (task == current) {
  3338. /* stop monitoring at kernel level */
  3339. pfm_clear_psr_up();
  3340. /*
  3341. * stop monitoring at the user level
  3342. */
  3343. ia64_psr(regs)->up = 0;
  3344. } else {
  3345. tregs = task_pt_regs(task);
  3346. /*
  3347. * stop monitoring at the user level
  3348. */
  3349. ia64_psr(tregs)->up = 0;
  3350. /*
  3351. * monitoring disabled in kernel at next reschedule
  3352. */
  3353. ctx->ctx_saved_psr_up = 0;
  3354. DPRINT(("task=[%d]\n", task_pid_nr(task)));
  3355. }
  3356. return 0;
  3357. }
  3358. static int
  3359. pfm_start(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3360. {
  3361. struct pt_regs *tregs;
  3362. int state, is_system;
  3363. state = ctx->ctx_state;
  3364. is_system = ctx->ctx_fl_system;
  3365. if (state != PFM_CTX_LOADED) return -EINVAL;
  3366. /*
  3367. * In system wide and when the context is loaded, access can only happen
  3368. * when the caller is running on the CPU being monitored by the session.
  3369. * It does not have to be the owner (ctx_task) of the context per se.
  3370. */
  3371. if (is_system && ctx->ctx_cpu != smp_processor_id()) {
  3372. DPRINT(("should be running on CPU%d\n", ctx->ctx_cpu));
  3373. return -EBUSY;
  3374. }
  3375. /*
  3376. * in system mode, we need to update the PMU directly
  3377. * and the user level state of the caller, which may not
  3378. * necessarily be the creator of the context.
  3379. */
  3380. if (is_system) {
  3381. /*
  3382. * set user level psr.pp for the caller
  3383. */
  3384. ia64_psr(regs)->pp = 1;
  3385. /*
  3386. * now update the local PMU and cpuinfo
  3387. */
  3388. PFM_CPUINFO_SET(PFM_CPUINFO_DCR_PP);
  3389. /*
  3390. * start monitoring at kernel level
  3391. */
  3392. pfm_set_psr_pp();
  3393. /* enable dcr pp */
  3394. ia64_setreg(_IA64_REG_CR_DCR, ia64_getreg(_IA64_REG_CR_DCR) | IA64_DCR_PP);
  3395. ia64_srlz_i();
  3396. return 0;
  3397. }
  3398. /*
  3399. * per-process mode
  3400. */
  3401. if (ctx->ctx_task == current) {
  3402. /* start monitoring at kernel level */
  3403. pfm_set_psr_up();
  3404. /*
  3405. * activate monitoring at user level
  3406. */
  3407. ia64_psr(regs)->up = 1;
  3408. } else {
  3409. tregs = task_pt_regs(ctx->ctx_task);
  3410. /*
  3411. * start monitoring at the kernel level the next
  3412. * time the task is scheduled
  3413. */
  3414. ctx->ctx_saved_psr_up = IA64_PSR_UP;
  3415. /*
  3416. * activate monitoring at user level
  3417. */
  3418. ia64_psr(tregs)->up = 1;
  3419. }
  3420. return 0;
  3421. }
  3422. static int
  3423. pfm_get_pmc_reset(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3424. {
  3425. pfarg_reg_t *req = (pfarg_reg_t *)arg;
  3426. unsigned int cnum;
  3427. int i;
  3428. int ret = -EINVAL;
  3429. for (i = 0; i < count; i++, req++) {
  3430. cnum = req->reg_num;
  3431. if (!PMC_IS_IMPL(cnum)) goto abort_mission;
  3432. req->reg_value = PMC_DFL_VAL(cnum);
  3433. PFM_REG_RETFLAG_SET(req->reg_flags, 0);
  3434. DPRINT(("pmc_reset_val pmc[%u]=0x%lx\n", cnum, req->reg_value));
  3435. }
  3436. return 0;
  3437. abort_mission:
  3438. PFM_REG_RETFLAG_SET(req->reg_flags, PFM_REG_RETFL_EINVAL);
  3439. return ret;
  3440. }
  3441. static int
  3442. pfm_check_task_exist(pfm_context_t *ctx)
  3443. {
  3444. struct task_struct *g, *t;
  3445. int ret = -ESRCH;
  3446. read_lock(&tasklist_lock);
  3447. do_each_thread (g, t) {
  3448. if (t->thread.pfm_context == ctx) {
  3449. ret = 0;
  3450. goto out;
  3451. }
  3452. } while_each_thread (g, t);
  3453. out:
  3454. read_unlock(&tasklist_lock);
  3455. DPRINT(("pfm_check_task_exist: ret=%d ctx=%p\n", ret, ctx));
  3456. return ret;
  3457. }
  3458. static int
  3459. pfm_context_load(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3460. {
  3461. struct task_struct *task;
  3462. struct thread_struct *thread;
  3463. struct pfm_context_t *old;
  3464. unsigned long flags;
  3465. #ifndef CONFIG_SMP
  3466. struct task_struct *owner_task = NULL;
  3467. #endif
  3468. pfarg_load_t *req = (pfarg_load_t *)arg;
  3469. unsigned long *pmcs_source, *pmds_source;
  3470. int the_cpu;
  3471. int ret = 0;
  3472. int state, is_system, set_dbregs = 0;
  3473. state = ctx->ctx_state;
  3474. is_system = ctx->ctx_fl_system;
  3475. /*
  3476. * can only load from unloaded or terminated state
  3477. */
  3478. if (state != PFM_CTX_UNLOADED) {
  3479. DPRINT(("cannot load to [%d], invalid ctx_state=%d\n",
  3480. req->load_pid,
  3481. ctx->ctx_state));
  3482. return -EBUSY;
  3483. }
  3484. DPRINT(("load_pid [%d] using_dbreg=%d\n", req->load_pid, ctx->ctx_fl_using_dbreg));
  3485. if (CTX_OVFL_NOBLOCK(ctx) == 0 && req->load_pid == current->pid) {
  3486. DPRINT(("cannot use blocking mode on self\n"));
  3487. return -EINVAL;
  3488. }
  3489. ret = pfm_get_task(ctx, req->load_pid, &task);
  3490. if (ret) {
  3491. DPRINT(("load_pid [%d] get_task=%d\n", req->load_pid, ret));
  3492. return ret;
  3493. }
  3494. ret = -EINVAL;
  3495. /*
  3496. * system wide is self monitoring only
  3497. */
  3498. if (is_system && task != current) {
  3499. DPRINT(("system wide is self monitoring only load_pid=%d\n",
  3500. req->load_pid));
  3501. goto error;
  3502. }
  3503. thread = &task->thread;
  3504. ret = 0;
  3505. /*
  3506. * cannot load a context which is using range restrictions,
  3507. * into a task that is being debugged.
  3508. */
  3509. if (ctx->ctx_fl_using_dbreg) {
  3510. if (thread->flags & IA64_THREAD_DBG_VALID) {
  3511. ret = -EBUSY;
  3512. DPRINT(("load_pid [%d] task is debugged, cannot load range restrictions\n", req->load_pid));
  3513. goto error;
  3514. }
  3515. LOCK_PFS(flags);
  3516. if (is_system) {
  3517. if (pfm_sessions.pfs_ptrace_use_dbregs) {
  3518. DPRINT(("cannot load [%d] dbregs in use\n",
  3519. task_pid_nr(task)));
  3520. ret = -EBUSY;
  3521. } else {
  3522. pfm_sessions.pfs_sys_use_dbregs++;
  3523. DPRINT(("load [%d] increased sys_use_dbreg=%u\n", task_pid_nr(task), pfm_sessions.pfs_sys_use_dbregs));
  3524. set_dbregs = 1;
  3525. }
  3526. }
  3527. UNLOCK_PFS(flags);
  3528. if (ret) goto error;
  3529. }
  3530. /*
  3531. * SMP system-wide monitoring implies self-monitoring.
  3532. *
  3533. * The programming model expects the task to
  3534. * be pinned on a CPU throughout the session.
  3535. * Here we take note of the current CPU at the
  3536. * time the context is loaded. No call from
  3537. * another CPU will be allowed.
  3538. *
  3539. * The pinning via shed_setaffinity()
  3540. * must be done by the calling task prior
  3541. * to this call.
  3542. *
  3543. * systemwide: keep track of CPU this session is supposed to run on
  3544. */
  3545. the_cpu = ctx->ctx_cpu = smp_processor_id();
  3546. ret = -EBUSY;
  3547. /*
  3548. * now reserve the session
  3549. */
  3550. ret = pfm_reserve_session(current, is_system, the_cpu);
  3551. if (ret) goto error;
  3552. /*
  3553. * task is necessarily stopped at this point.
  3554. *
  3555. * If the previous context was zombie, then it got removed in
  3556. * pfm_save_regs(). Therefore we should not see it here.
  3557. * If we see a context, then this is an active context
  3558. *
  3559. * XXX: needs to be atomic
  3560. */
  3561. DPRINT(("before cmpxchg() old_ctx=%p new_ctx=%p\n",
  3562. thread->pfm_context, ctx));
  3563. ret = -EBUSY;
  3564. old = ia64_cmpxchg(acq, &thread->pfm_context, NULL, ctx, sizeof(pfm_context_t *));
  3565. if (old != NULL) {
  3566. DPRINT(("load_pid [%d] already has a context\n", req->load_pid));
  3567. goto error_unres;
  3568. }
  3569. pfm_reset_msgq(ctx);
  3570. ctx->ctx_state = PFM_CTX_LOADED;
  3571. /*
  3572. * link context to task
  3573. */
  3574. ctx->ctx_task = task;
  3575. if (is_system) {
  3576. /*
  3577. * we load as stopped
  3578. */
  3579. PFM_CPUINFO_SET(PFM_CPUINFO_SYST_WIDE);
  3580. PFM_CPUINFO_CLEAR(PFM_CPUINFO_DCR_PP);
  3581. if (ctx->ctx_fl_excl_idle) PFM_CPUINFO_SET(PFM_CPUINFO_EXCL_IDLE);
  3582. } else {
  3583. thread->flags |= IA64_THREAD_PM_VALID;
  3584. }
  3585. /*
  3586. * propagate into thread-state
  3587. */
  3588. pfm_copy_pmds(task, ctx);
  3589. pfm_copy_pmcs(task, ctx);
  3590. pmcs_source = ctx->th_pmcs;
  3591. pmds_source = ctx->th_pmds;
  3592. /*
  3593. * always the case for system-wide
  3594. */
  3595. if (task == current) {
  3596. if (is_system == 0) {
  3597. /* allow user level control */
  3598. ia64_psr(regs)->sp = 0;
  3599. DPRINT(("clearing psr.sp for [%d]\n", task_pid_nr(task)));
  3600. SET_LAST_CPU(ctx, smp_processor_id());
  3601. INC_ACTIVATION();
  3602. SET_ACTIVATION(ctx);
  3603. #ifndef CONFIG_SMP
  3604. /*
  3605. * push the other task out, if any
  3606. */
  3607. owner_task = GET_PMU_OWNER();
  3608. if (owner_task) pfm_lazy_save_regs(owner_task);
  3609. #endif
  3610. }
  3611. /*
  3612. * load all PMD from ctx to PMU (as opposed to thread state)
  3613. * restore all PMC from ctx to PMU
  3614. */
  3615. pfm_restore_pmds(pmds_source, ctx->ctx_all_pmds[0]);
  3616. pfm_restore_pmcs(pmcs_source, ctx->ctx_all_pmcs[0]);
  3617. ctx->ctx_reload_pmcs[0] = 0UL;
  3618. ctx->ctx_reload_pmds[0] = 0UL;
  3619. /*
  3620. * guaranteed safe by earlier check against DBG_VALID
  3621. */
  3622. if (ctx->ctx_fl_using_dbreg) {
  3623. pfm_restore_ibrs(ctx->ctx_ibrs, pmu_conf->num_ibrs);
  3624. pfm_restore_dbrs(ctx->ctx_dbrs, pmu_conf->num_dbrs);
  3625. }
  3626. /*
  3627. * set new ownership
  3628. */
  3629. SET_PMU_OWNER(task, ctx);
  3630. DPRINT(("context loaded on PMU for [%d]\n", task_pid_nr(task)));
  3631. } else {
  3632. /*
  3633. * when not current, task MUST be stopped, so this is safe
  3634. */
  3635. regs = task_pt_regs(task);
  3636. /* force a full reload */
  3637. ctx->ctx_last_activation = PFM_INVALID_ACTIVATION;
  3638. SET_LAST_CPU(ctx, -1);
  3639. /* initial saved psr (stopped) */
  3640. ctx->ctx_saved_psr_up = 0UL;
  3641. ia64_psr(regs)->up = ia64_psr(regs)->pp = 0;
  3642. }
  3643. ret = 0;
  3644. error_unres:
  3645. if (ret) pfm_unreserve_session(ctx, ctx->ctx_fl_system, the_cpu);
  3646. error:
  3647. /*
  3648. * we must undo the dbregs setting (for system-wide)
  3649. */
  3650. if (ret && set_dbregs) {
  3651. LOCK_PFS(flags);
  3652. pfm_sessions.pfs_sys_use_dbregs--;
  3653. UNLOCK_PFS(flags);
  3654. }
  3655. /*
  3656. * release task, there is now a link with the context
  3657. */
  3658. if (is_system == 0 && task != current) {
  3659. pfm_put_task(task);
  3660. if (ret == 0) {
  3661. ret = pfm_check_task_exist(ctx);
  3662. if (ret) {
  3663. ctx->ctx_state = PFM_CTX_UNLOADED;
  3664. ctx->ctx_task = NULL;
  3665. }
  3666. }
  3667. }
  3668. return ret;
  3669. }
  3670. /*
  3671. * in this function, we do not need to increase the use count
  3672. * for the task via get_task_struct(), because we hold the
  3673. * context lock. If the task were to disappear while having
  3674. * a context attached, it would go through pfm_exit_thread()
  3675. * which also grabs the context lock and would therefore be blocked
  3676. * until we are here.
  3677. */
  3678. static void pfm_flush_pmds(struct task_struct *, pfm_context_t *ctx);
  3679. static int
  3680. pfm_context_unload(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs)
  3681. {
  3682. struct task_struct *task = PFM_CTX_TASK(ctx);
  3683. struct pt_regs *tregs;
  3684. int prev_state, is_system;
  3685. int ret;
  3686. DPRINT(("ctx_state=%d task [%d]\n", ctx->ctx_state, task ? task_pid_nr(task) : -1));
  3687. prev_state = ctx->ctx_state;
  3688. is_system = ctx->ctx_fl_system;
  3689. /*
  3690. * unload only when necessary
  3691. */
  3692. if (prev_state == PFM_CTX_UNLOADED) {
  3693. DPRINT(("ctx_state=%d, nothing to do\n", prev_state));
  3694. return 0;
  3695. }
  3696. /*
  3697. * clear psr and dcr bits
  3698. */
  3699. ret = pfm_stop(ctx, NULL, 0, regs);
  3700. if (ret) return ret;
  3701. ctx->ctx_state = PFM_CTX_UNLOADED;
  3702. /*
  3703. * in system mode, we need to update the PMU directly
  3704. * and the user level state of the caller, which may not
  3705. * necessarily be the creator of the context.
  3706. */
  3707. if (is_system) {
  3708. /*
  3709. * Update cpuinfo
  3710. *
  3711. * local PMU is taken care of in pfm_stop()
  3712. */
  3713. PFM_CPUINFO_CLEAR(PFM_CPUINFO_SYST_WIDE);
  3714. PFM_CPUINFO_CLEAR(PFM_CPUINFO_EXCL_IDLE);
  3715. /*
  3716. * save PMDs in context
  3717. * release ownership
  3718. */
  3719. pfm_flush_pmds(current, ctx);
  3720. /*
  3721. * at this point we are done with the PMU
  3722. * so we can unreserve the resource.
  3723. */
  3724. if (prev_state != PFM_CTX_ZOMBIE)
  3725. pfm_unreserve_session(ctx, 1 , ctx->ctx_cpu);
  3726. /*
  3727. * disconnect context from task
  3728. */
  3729. task->thread.pfm_context = NULL;
  3730. /*
  3731. * disconnect task from context
  3732. */
  3733. ctx->ctx_task = NULL;
  3734. /*
  3735. * There is nothing more to cleanup here.
  3736. */
  3737. return 0;
  3738. }
  3739. /*
  3740. * per-task mode
  3741. */
  3742. tregs = task == current ? regs : task_pt_regs(task);
  3743. if (task == current) {
  3744. /*
  3745. * cancel user level control
  3746. */
  3747. ia64_psr(regs)->sp = 1;
  3748. DPRINT(("setting psr.sp for [%d]\n", task_pid_nr(task)));
  3749. }
  3750. /*
  3751. * save PMDs to context
  3752. * release ownership
  3753. */
  3754. pfm_flush_pmds(task, ctx);
  3755. /*
  3756. * at this point we are done with the PMU
  3757. * so we can unreserve the resource.
  3758. *
  3759. * when state was ZOMBIE, we have already unreserved.
  3760. */
  3761. if (prev_state != PFM_CTX_ZOMBIE)
  3762. pfm_unreserve_session(ctx, 0 , ctx->ctx_cpu);
  3763. /*
  3764. * reset activation counter and psr
  3765. */
  3766. ctx->ctx_last_activation = PFM_INVALID_ACTIVATION;
  3767. SET_LAST_CPU(ctx, -1);
  3768. /*
  3769. * PMU state will not be restored
  3770. */
  3771. task->thread.flags &= ~IA64_THREAD_PM_VALID;
  3772. /*
  3773. * break links between context and task
  3774. */
  3775. task->thread.pfm_context = NULL;
  3776. ctx->ctx_task = NULL;
  3777. PFM_SET_WORK_PENDING(task, 0);
  3778. ctx->ctx_fl_trap_reason = PFM_TRAP_REASON_NONE;
  3779. ctx->ctx_fl_can_restart = 0;
  3780. ctx->ctx_fl_going_zombie = 0;
  3781. DPRINT(("disconnected [%d] from context\n", task_pid_nr(task)));
  3782. return 0;
  3783. }
  3784. /*
  3785. * called only from exit_thread()
  3786. * we come here only if the task has a context attached (loaded or masked)
  3787. */
  3788. void
  3789. pfm_exit_thread(struct task_struct *task)
  3790. {
  3791. pfm_context_t *ctx;
  3792. unsigned long flags;
  3793. struct pt_regs *regs = task_pt_regs(task);
  3794. int ret, state;
  3795. int free_ok = 0;
  3796. ctx = PFM_GET_CTX(task);
  3797. PROTECT_CTX(ctx, flags);
  3798. DPRINT(("state=%d task [%d]\n", ctx->ctx_state, task_pid_nr(task)));
  3799. state = ctx->ctx_state;
  3800. switch(state) {
  3801. case PFM_CTX_UNLOADED:
  3802. /*
  3803. * only comes to this function if pfm_context is not NULL, i.e., cannot
  3804. * be in unloaded state
  3805. */
  3806. printk(KERN_ERR "perfmon: pfm_exit_thread [%d] ctx unloaded\n", task_pid_nr(task));
  3807. break;
  3808. case PFM_CTX_LOADED:
  3809. case PFM_CTX_MASKED:
  3810. ret = pfm_context_unload(ctx, NULL, 0, regs);
  3811. if (ret) {
  3812. printk(KERN_ERR "perfmon: pfm_exit_thread [%d] state=%d unload failed %d\n", task_pid_nr(task), state, ret);
  3813. }
  3814. DPRINT(("ctx unloaded for current state was %d\n", state));
  3815. pfm_end_notify_user(ctx);
  3816. break;
  3817. case PFM_CTX_ZOMBIE:
  3818. ret = pfm_context_unload(ctx, NULL, 0, regs);
  3819. if (ret) {
  3820. printk(KERN_ERR "perfmon: pfm_exit_thread [%d] state=%d unload failed %d\n", task_pid_nr(task), state, ret);
  3821. }
  3822. free_ok = 1;
  3823. break;
  3824. default:
  3825. printk(KERN_ERR "perfmon: pfm_exit_thread [%d] unexpected state=%d\n", task_pid_nr(task), state);
  3826. break;
  3827. }
  3828. UNPROTECT_CTX(ctx, flags);
  3829. { u64 psr = pfm_get_psr();
  3830. BUG_ON(psr & (IA64_PSR_UP|IA64_PSR_PP));
  3831. BUG_ON(GET_PMU_OWNER());
  3832. BUG_ON(ia64_psr(regs)->up);
  3833. BUG_ON(ia64_psr(regs)->pp);
  3834. }
  3835. /*
  3836. * All memory free operations (especially for vmalloc'ed memory)
  3837. * MUST be done with interrupts ENABLED.
  3838. */
  3839. if (free_ok) pfm_context_free(ctx);
  3840. }
  3841. /*
  3842. * functions MUST be listed in the increasing order of their index (see permfon.h)
  3843. */
  3844. #define PFM_CMD(name, flags, arg_count, arg_type, getsz) { name, #name, flags, arg_count, sizeof(arg_type), getsz }
  3845. #define PFM_CMD_S(name, flags) { name, #name, flags, 0, 0, NULL }
  3846. #define PFM_CMD_PCLRWS (PFM_CMD_FD|PFM_CMD_ARG_RW|PFM_CMD_STOP)
  3847. #define PFM_CMD_PCLRW (PFM_CMD_FD|PFM_CMD_ARG_RW)
  3848. #define PFM_CMD_NONE { NULL, "no-cmd", 0, 0, 0, NULL}
  3849. static pfm_cmd_desc_t pfm_cmd_tab[]={
  3850. /* 0 */PFM_CMD_NONE,
  3851. /* 1 */PFM_CMD(pfm_write_pmcs, PFM_CMD_PCLRWS, PFM_CMD_ARG_MANY, pfarg_reg_t, NULL),
  3852. /* 2 */PFM_CMD(pfm_write_pmds, PFM_CMD_PCLRWS, PFM_CMD_ARG_MANY, pfarg_reg_t, NULL),
  3853. /* 3 */PFM_CMD(pfm_read_pmds, PFM_CMD_PCLRWS, PFM_CMD_ARG_MANY, pfarg_reg_t, NULL),
  3854. /* 4 */PFM_CMD_S(pfm_stop, PFM_CMD_PCLRWS),
  3855. /* 5 */PFM_CMD_S(pfm_start, PFM_CMD_PCLRWS),
  3856. /* 6 */PFM_CMD_NONE,
  3857. /* 7 */PFM_CMD_NONE,
  3858. /* 8 */PFM_CMD(pfm_context_create, PFM_CMD_ARG_RW, 1, pfarg_context_t, pfm_ctx_getsize),
  3859. /* 9 */PFM_CMD_NONE,
  3860. /* 10 */PFM_CMD_S(pfm_restart, PFM_CMD_PCLRW),
  3861. /* 11 */PFM_CMD_NONE,
  3862. /* 12 */PFM_CMD(pfm_get_features, PFM_CMD_ARG_RW, 1, pfarg_features_t, NULL),
  3863. /* 13 */PFM_CMD(pfm_debug, 0, 1, unsigned int, NULL),
  3864. /* 14 */PFM_CMD_NONE,
  3865. /* 15 */PFM_CMD(pfm_get_pmc_reset, PFM_CMD_ARG_RW, PFM_CMD_ARG_MANY, pfarg_reg_t, NULL),
  3866. /* 16 */PFM_CMD(pfm_context_load, PFM_CMD_PCLRWS, 1, pfarg_load_t, NULL),
  3867. /* 17 */PFM_CMD_S(pfm_context_unload, PFM_CMD_PCLRWS),
  3868. /* 18 */PFM_CMD_NONE,
  3869. /* 19 */PFM_CMD_NONE,
  3870. /* 20 */PFM_CMD_NONE,
  3871. /* 21 */PFM_CMD_NONE,
  3872. /* 22 */PFM_CMD_NONE,
  3873. /* 23 */PFM_CMD_NONE,
  3874. /* 24 */PFM_CMD_NONE,
  3875. /* 25 */PFM_CMD_NONE,
  3876. /* 26 */PFM_CMD_NONE,
  3877. /* 27 */PFM_CMD_NONE,
  3878. /* 28 */PFM_CMD_NONE,
  3879. /* 29 */PFM_CMD_NONE,
  3880. /* 30 */PFM_CMD_NONE,
  3881. /* 31 */PFM_CMD_NONE,
  3882. /* 32 */PFM_CMD(pfm_write_ibrs, PFM_CMD_PCLRWS, PFM_CMD_ARG_MANY, pfarg_dbreg_t, NULL),
  3883. /* 33 */PFM_CMD(pfm_write_dbrs, PFM_CMD_PCLRWS, PFM_CMD_ARG_MANY, pfarg_dbreg_t, NULL)
  3884. };
  3885. #define PFM_CMD_COUNT (sizeof(pfm_cmd_tab)/sizeof(pfm_cmd_desc_t))
  3886. static int
  3887. pfm_check_task_state(pfm_context_t *ctx, int cmd, unsigned long flags)
  3888. {
  3889. struct task_struct *task;
  3890. int state, old_state;
  3891. recheck:
  3892. state = ctx->ctx_state;
  3893. task = ctx->ctx_task;
  3894. if (task == NULL) {
  3895. DPRINT(("context %d no task, state=%d\n", ctx->ctx_fd, state));
  3896. return 0;
  3897. }
  3898. DPRINT(("context %d state=%d [%d] task_state=%ld must_stop=%d\n",
  3899. ctx->ctx_fd,
  3900. state,
  3901. task_pid_nr(task),
  3902. task->state, PFM_CMD_STOPPED(cmd)));
  3903. /*
  3904. * self-monitoring always ok.
  3905. *
  3906. * for system-wide the caller can either be the creator of the
  3907. * context (to one to which the context is attached to) OR
  3908. * a task running on the same CPU as the session.
  3909. */
  3910. if (task == current || ctx->ctx_fl_system) return 0;
  3911. /*
  3912. * we are monitoring another thread
  3913. */
  3914. switch(state) {
  3915. case PFM_CTX_UNLOADED:
  3916. /*
  3917. * if context is UNLOADED we are safe to go
  3918. */
  3919. return 0;
  3920. case PFM_CTX_ZOMBIE:
  3921. /*
  3922. * no command can operate on a zombie context
  3923. */
  3924. DPRINT(("cmd %d state zombie cannot operate on context\n", cmd));
  3925. return -EINVAL;
  3926. case PFM_CTX_MASKED:
  3927. /*
  3928. * PMU state has been saved to software even though
  3929. * the thread may still be running.
  3930. */
  3931. if (cmd != PFM_UNLOAD_CONTEXT) return 0;
  3932. }
  3933. /*
  3934. * context is LOADED or MASKED. Some commands may need to have
  3935. * the task stopped.
  3936. *
  3937. * We could lift this restriction for UP but it would mean that
  3938. * the user has no guarantee the task would not run between
  3939. * two successive calls to perfmonctl(). That's probably OK.
  3940. * If this user wants to ensure the task does not run, then
  3941. * the task must be stopped.
  3942. */
  3943. if (PFM_CMD_STOPPED(cmd)) {
  3944. if (!task_is_stopped_or_traced(task)) {
  3945. DPRINT(("[%d] task not in stopped state\n", task_pid_nr(task)));
  3946. return -EBUSY;
  3947. }
  3948. /*
  3949. * task is now stopped, wait for ctxsw out
  3950. *
  3951. * This is an interesting point in the code.
  3952. * We need to unprotect the context because
  3953. * the pfm_save_regs() routines needs to grab
  3954. * the same lock. There are danger in doing
  3955. * this because it leaves a window open for
  3956. * another task to get access to the context
  3957. * and possibly change its state. The one thing
  3958. * that is not possible is for the context to disappear
  3959. * because we are protected by the VFS layer, i.e.,
  3960. * get_fd()/put_fd().
  3961. */
  3962. old_state = state;
  3963. UNPROTECT_CTX(ctx, flags);
  3964. wait_task_inactive(task, 0);
  3965. PROTECT_CTX(ctx, flags);
  3966. /*
  3967. * we must recheck to verify if state has changed
  3968. */
  3969. if (ctx->ctx_state != old_state) {
  3970. DPRINT(("old_state=%d new_state=%d\n", old_state, ctx->ctx_state));
  3971. goto recheck;
  3972. }
  3973. }
  3974. return 0;
  3975. }
  3976. /*
  3977. * system-call entry point (must return long)
  3978. */
  3979. asmlinkage long
  3980. sys_perfmonctl (int fd, int cmd, void __user *arg, int count)
  3981. {
  3982. struct fd f = {NULL, 0};
  3983. pfm_context_t *ctx = NULL;
  3984. unsigned long flags = 0UL;
  3985. void *args_k = NULL;
  3986. long ret; /* will expand int return types */
  3987. size_t base_sz, sz, xtra_sz = 0;
  3988. int narg, completed_args = 0, call_made = 0, cmd_flags;
  3989. int (*func)(pfm_context_t *ctx, void *arg, int count, struct pt_regs *regs);
  3990. int (*getsize)(void *arg, size_t *sz);
  3991. #define PFM_MAX_ARGSIZE 4096
  3992. /*
  3993. * reject any call if perfmon was disabled at initialization
  3994. */
  3995. if (unlikely(pmu_conf == NULL)) return -ENOSYS;
  3996. if (unlikely(cmd < 0 || cmd >= PFM_CMD_COUNT)) {
  3997. DPRINT(("invalid cmd=%d\n", cmd));
  3998. return -EINVAL;
  3999. }
  4000. func = pfm_cmd_tab[cmd].cmd_func;
  4001. narg = pfm_cmd_tab[cmd].cmd_narg;
  4002. base_sz = pfm_cmd_tab[cmd].cmd_argsize;
  4003. getsize = pfm_cmd_tab[cmd].cmd_getsize;
  4004. cmd_flags = pfm_cmd_tab[cmd].cmd_flags;
  4005. if (unlikely(func == NULL)) {
  4006. DPRINT(("invalid cmd=%d\n", cmd));
  4007. return -EINVAL;
  4008. }
  4009. DPRINT(("cmd=%s idx=%d narg=0x%x argsz=%lu count=%d\n",
  4010. PFM_CMD_NAME(cmd),
  4011. cmd,
  4012. narg,
  4013. base_sz,
  4014. count));
  4015. /*
  4016. * check if number of arguments matches what the command expects
  4017. */
  4018. if (unlikely((narg == PFM_CMD_ARG_MANY && count <= 0) || (narg > 0 && narg != count)))
  4019. return -EINVAL;
  4020. restart_args:
  4021. sz = xtra_sz + base_sz*count;
  4022. /*
  4023. * limit abuse to min page size
  4024. */
  4025. if (unlikely(sz > PFM_MAX_ARGSIZE)) {
  4026. printk(KERN_ERR "perfmon: [%d] argument too big %lu\n", task_pid_nr(current), sz);
  4027. return -E2BIG;
  4028. }
  4029. /*
  4030. * allocate default-sized argument buffer
  4031. */
  4032. if (likely(count && args_k == NULL)) {
  4033. args_k = kmalloc(PFM_MAX_ARGSIZE, GFP_KERNEL);
  4034. if (args_k == NULL) return -ENOMEM;
  4035. }
  4036. ret = -EFAULT;
  4037. /*
  4038. * copy arguments
  4039. *
  4040. * assume sz = 0 for command without parameters
  4041. */
  4042. if (sz && copy_from_user(args_k, arg, sz)) {
  4043. DPRINT(("cannot copy_from_user %lu bytes @%p\n", sz, arg));
  4044. goto error_args;
  4045. }
  4046. /*
  4047. * check if command supports extra parameters
  4048. */
  4049. if (completed_args == 0 && getsize) {
  4050. /*
  4051. * get extra parameters size (based on main argument)
  4052. */
  4053. ret = (*getsize)(args_k, &xtra_sz);
  4054. if (ret) goto error_args;
  4055. completed_args = 1;
  4056. DPRINT(("restart_args sz=%lu xtra_sz=%lu\n", sz, xtra_sz));
  4057. /* retry if necessary */
  4058. if (likely(xtra_sz)) goto restart_args;
  4059. }
  4060. if (unlikely((cmd_flags & PFM_CMD_FD) == 0)) goto skip_fd;
  4061. ret = -EBADF;
  4062. f = fdget(fd);
  4063. if (unlikely(f.file == NULL)) {
  4064. DPRINT(("invalid fd %d\n", fd));
  4065. goto error_args;
  4066. }
  4067. if (unlikely(PFM_IS_FILE(f.file) == 0)) {
  4068. DPRINT(("fd %d not related to perfmon\n", fd));
  4069. goto error_args;
  4070. }
  4071. ctx = f.file->private_data;
  4072. if (unlikely(ctx == NULL)) {
  4073. DPRINT(("no context for fd %d\n", fd));
  4074. goto error_args;
  4075. }
  4076. prefetch(&ctx->ctx_state);
  4077. PROTECT_CTX(ctx, flags);
  4078. /*
  4079. * check task is stopped
  4080. */
  4081. ret = pfm_check_task_state(ctx, cmd, flags);
  4082. if (unlikely(ret)) goto abort_locked;
  4083. skip_fd:
  4084. ret = (*func)(ctx, args_k, count, task_pt_regs(current));
  4085. call_made = 1;
  4086. abort_locked:
  4087. if (likely(ctx)) {
  4088. DPRINT(("context unlocked\n"));
  4089. UNPROTECT_CTX(ctx, flags);
  4090. }
  4091. /* copy argument back to user, if needed */
  4092. if (call_made && PFM_CMD_RW_ARG(cmd) && copy_to_user(arg, args_k, base_sz*count)) ret = -EFAULT;
  4093. error_args:
  4094. if (f.file)
  4095. fdput(f);
  4096. kfree(args_k);
  4097. DPRINT(("cmd=%s ret=%ld\n", PFM_CMD_NAME(cmd), ret));
  4098. return ret;
  4099. }
  4100. static void
  4101. pfm_resume_after_ovfl(pfm_context_t *ctx, unsigned long ovfl_regs, struct pt_regs *regs)
  4102. {
  4103. pfm_buffer_fmt_t *fmt = ctx->ctx_buf_fmt;
  4104. pfm_ovfl_ctrl_t rst_ctrl;
  4105. int state;
  4106. int ret = 0;
  4107. state = ctx->ctx_state;
  4108. /*
  4109. * Unlock sampling buffer and reset index atomically
  4110. * XXX: not really needed when blocking
  4111. */
  4112. if (CTX_HAS_SMPL(ctx)) {
  4113. rst_ctrl.bits.mask_monitoring = 0;
  4114. rst_ctrl.bits.reset_ovfl_pmds = 0;
  4115. if (state == PFM_CTX_LOADED)
  4116. ret = pfm_buf_fmt_restart_active(fmt, current, &rst_ctrl, ctx->ctx_smpl_hdr, regs);
  4117. else
  4118. ret = pfm_buf_fmt_restart(fmt, current, &rst_ctrl, ctx->ctx_smpl_hdr, regs);
  4119. } else {
  4120. rst_ctrl.bits.mask_monitoring = 0;
  4121. rst_ctrl.bits.reset_ovfl_pmds = 1;
  4122. }
  4123. if (ret == 0) {
  4124. if (rst_ctrl.bits.reset_ovfl_pmds) {
  4125. pfm_reset_regs(ctx, &ovfl_regs, PFM_PMD_LONG_RESET);
  4126. }
  4127. if (rst_ctrl.bits.mask_monitoring == 0) {
  4128. DPRINT(("resuming monitoring\n"));
  4129. if (ctx->ctx_state == PFM_CTX_MASKED) pfm_restore_monitoring(current);
  4130. } else {
  4131. DPRINT(("stopping monitoring\n"));
  4132. //pfm_stop_monitoring(current, regs);
  4133. }
  4134. ctx->ctx_state = PFM_CTX_LOADED;
  4135. }
  4136. }
  4137. /*
  4138. * context MUST BE LOCKED when calling
  4139. * can only be called for current
  4140. */
  4141. static void
  4142. pfm_context_force_terminate(pfm_context_t *ctx, struct pt_regs *regs)
  4143. {
  4144. int ret;
  4145. DPRINT(("entering for [%d]\n", task_pid_nr(current)));
  4146. ret = pfm_context_unload(ctx, NULL, 0, regs);
  4147. if (ret) {
  4148. printk(KERN_ERR "pfm_context_force_terminate: [%d] unloaded failed with %d\n", task_pid_nr(current), ret);
  4149. }
  4150. /*
  4151. * and wakeup controlling task, indicating we are now disconnected
  4152. */
  4153. wake_up_interruptible(&ctx->ctx_zombieq);
  4154. /*
  4155. * given that context is still locked, the controlling
  4156. * task will only get access when we return from
  4157. * pfm_handle_work().
  4158. */
  4159. }
  4160. static int pfm_ovfl_notify_user(pfm_context_t *ctx, unsigned long ovfl_pmds);
  4161. /*
  4162. * pfm_handle_work() can be called with interrupts enabled
  4163. * (TIF_NEED_RESCHED) or disabled. The down_interruptible
  4164. * call may sleep, therefore we must re-enable interrupts
  4165. * to avoid deadlocks. It is safe to do so because this function
  4166. * is called ONLY when returning to user level (pUStk=1), in which case
  4167. * there is no risk of kernel stack overflow due to deep
  4168. * interrupt nesting.
  4169. */
  4170. void
  4171. pfm_handle_work(void)
  4172. {
  4173. pfm_context_t *ctx;
  4174. struct pt_regs *regs;
  4175. unsigned long flags, dummy_flags;
  4176. unsigned long ovfl_regs;
  4177. unsigned int reason;
  4178. int ret;
  4179. ctx = PFM_GET_CTX(current);
  4180. if (ctx == NULL) {
  4181. printk(KERN_ERR "perfmon: [%d] has no PFM context\n",
  4182. task_pid_nr(current));
  4183. return;
  4184. }
  4185. PROTECT_CTX(ctx, flags);
  4186. PFM_SET_WORK_PENDING(current, 0);
  4187. regs = task_pt_regs(current);
  4188. /*
  4189. * extract reason for being here and clear
  4190. */
  4191. reason = ctx->ctx_fl_trap_reason;
  4192. ctx->ctx_fl_trap_reason = PFM_TRAP_REASON_NONE;
  4193. ovfl_regs = ctx->ctx_ovfl_regs[0];
  4194. DPRINT(("reason=%d state=%d\n", reason, ctx->ctx_state));
  4195. /*
  4196. * must be done before we check for simple-reset mode
  4197. */
  4198. if (ctx->ctx_fl_going_zombie || ctx->ctx_state == PFM_CTX_ZOMBIE)
  4199. goto do_zombie;
  4200. //if (CTX_OVFL_NOBLOCK(ctx)) goto skip_blocking;
  4201. if (reason == PFM_TRAP_REASON_RESET)
  4202. goto skip_blocking;
  4203. /*
  4204. * restore interrupt mask to what it was on entry.
  4205. * Could be enabled/diasbled.
  4206. */
  4207. UNPROTECT_CTX(ctx, flags);
  4208. /*
  4209. * force interrupt enable because of down_interruptible()
  4210. */
  4211. local_irq_enable();
  4212. DPRINT(("before block sleeping\n"));
  4213. /*
  4214. * may go through without blocking on SMP systems
  4215. * if restart has been received already by the time we call down()
  4216. */
  4217. ret = wait_for_completion_interruptible(&ctx->ctx_restart_done);
  4218. DPRINT(("after block sleeping ret=%d\n", ret));
  4219. /*
  4220. * lock context and mask interrupts again
  4221. * We save flags into a dummy because we may have
  4222. * altered interrupts mask compared to entry in this
  4223. * function.
  4224. */
  4225. PROTECT_CTX(ctx, dummy_flags);
  4226. /*
  4227. * we need to read the ovfl_regs only after wake-up
  4228. * because we may have had pfm_write_pmds() in between
  4229. * and that can changed PMD values and therefore
  4230. * ovfl_regs is reset for these new PMD values.
  4231. */
  4232. ovfl_regs = ctx->ctx_ovfl_regs[0];
  4233. if (ctx->ctx_fl_going_zombie) {
  4234. do_zombie:
  4235. DPRINT(("context is zombie, bailing out\n"));
  4236. pfm_context_force_terminate(ctx, regs);
  4237. goto nothing_to_do;
  4238. }
  4239. /*
  4240. * in case of interruption of down() we don't restart anything
  4241. */
  4242. if (ret < 0)
  4243. goto nothing_to_do;
  4244. skip_blocking:
  4245. pfm_resume_after_ovfl(ctx, ovfl_regs, regs);
  4246. ctx->ctx_ovfl_regs[0] = 0UL;
  4247. nothing_to_do:
  4248. /*
  4249. * restore flags as they were upon entry
  4250. */
  4251. UNPROTECT_CTX(ctx, flags);
  4252. }
  4253. static int
  4254. pfm_notify_user(pfm_context_t *ctx, pfm_msg_t *msg)
  4255. {
  4256. if (ctx->ctx_state == PFM_CTX_ZOMBIE) {
  4257. DPRINT(("ignoring overflow notification, owner is zombie\n"));
  4258. return 0;
  4259. }
  4260. DPRINT(("waking up somebody\n"));
  4261. if (msg) wake_up_interruptible(&ctx->ctx_msgq_wait);
  4262. /*
  4263. * safe, we are not in intr handler, nor in ctxsw when
  4264. * we come here
  4265. */
  4266. kill_fasync (&ctx->ctx_async_queue, SIGIO, POLL_IN);
  4267. return 0;
  4268. }
  4269. static int
  4270. pfm_ovfl_notify_user(pfm_context_t *ctx, unsigned long ovfl_pmds)
  4271. {
  4272. pfm_msg_t *msg = NULL;
  4273. if (ctx->ctx_fl_no_msg == 0) {
  4274. msg = pfm_get_new_msg(ctx);
  4275. if (msg == NULL) {
  4276. printk(KERN_ERR "perfmon: pfm_ovfl_notify_user no more notification msgs\n");
  4277. return -1;
  4278. }
  4279. msg->pfm_ovfl_msg.msg_type = PFM_MSG_OVFL;
  4280. msg->pfm_ovfl_msg.msg_ctx_fd = ctx->ctx_fd;
  4281. msg->pfm_ovfl_msg.msg_active_set = 0;
  4282. msg->pfm_ovfl_msg.msg_ovfl_pmds[0] = ovfl_pmds;
  4283. msg->pfm_ovfl_msg.msg_ovfl_pmds[1] = 0UL;
  4284. msg->pfm_ovfl_msg.msg_ovfl_pmds[2] = 0UL;
  4285. msg->pfm_ovfl_msg.msg_ovfl_pmds[3] = 0UL;
  4286. msg->pfm_ovfl_msg.msg_tstamp = 0UL;
  4287. }
  4288. DPRINT(("ovfl msg: msg=%p no_msg=%d fd=%d ovfl_pmds=0x%lx\n",
  4289. msg,
  4290. ctx->ctx_fl_no_msg,
  4291. ctx->ctx_fd,
  4292. ovfl_pmds));
  4293. return pfm_notify_user(ctx, msg);
  4294. }
  4295. static int
  4296. pfm_end_notify_user(pfm_context_t *ctx)
  4297. {
  4298. pfm_msg_t *msg;
  4299. msg = pfm_get_new_msg(ctx);
  4300. if (msg == NULL) {
  4301. printk(KERN_ERR "perfmon: pfm_end_notify_user no more notification msgs\n");
  4302. return -1;
  4303. }
  4304. /* no leak */
  4305. memset(msg, 0, sizeof(*msg));
  4306. msg->pfm_end_msg.msg_type = PFM_MSG_END;
  4307. msg->pfm_end_msg.msg_ctx_fd = ctx->ctx_fd;
  4308. msg->pfm_ovfl_msg.msg_tstamp = 0UL;
  4309. DPRINT(("end msg: msg=%p no_msg=%d ctx_fd=%d\n",
  4310. msg,
  4311. ctx->ctx_fl_no_msg,
  4312. ctx->ctx_fd));
  4313. return pfm_notify_user(ctx, msg);
  4314. }
  4315. /*
  4316. * main overflow processing routine.
  4317. * it can be called from the interrupt path or explicitly during the context switch code
  4318. */
  4319. static void pfm_overflow_handler(struct task_struct *task, pfm_context_t *ctx,
  4320. unsigned long pmc0, struct pt_regs *regs)
  4321. {
  4322. pfm_ovfl_arg_t *ovfl_arg;
  4323. unsigned long mask;
  4324. unsigned long old_val, ovfl_val, new_val;
  4325. unsigned long ovfl_notify = 0UL, ovfl_pmds = 0UL, smpl_pmds = 0UL, reset_pmds;
  4326. unsigned long tstamp;
  4327. pfm_ovfl_ctrl_t ovfl_ctrl;
  4328. unsigned int i, has_smpl;
  4329. int must_notify = 0;
  4330. if (unlikely(ctx->ctx_state == PFM_CTX_ZOMBIE)) goto stop_monitoring;
  4331. /*
  4332. * sanity test. Should never happen
  4333. */
  4334. if (unlikely((pmc0 & 0x1) == 0)) goto sanity_check;
  4335. tstamp = ia64_get_itc();
  4336. mask = pmc0 >> PMU_FIRST_COUNTER;
  4337. ovfl_val = pmu_conf->ovfl_val;
  4338. has_smpl = CTX_HAS_SMPL(ctx);
  4339. DPRINT_ovfl(("pmc0=0x%lx pid=%d iip=0x%lx, %s "
  4340. "used_pmds=0x%lx\n",
  4341. pmc0,
  4342. task ? task_pid_nr(task): -1,
  4343. (regs ? regs->cr_iip : 0),
  4344. CTX_OVFL_NOBLOCK(ctx) ? "nonblocking" : "blocking",
  4345. ctx->ctx_used_pmds[0]));
  4346. /*
  4347. * first we update the virtual counters
  4348. * assume there was a prior ia64_srlz_d() issued
  4349. */
  4350. for (i = PMU_FIRST_COUNTER; mask ; i++, mask >>= 1) {
  4351. /* skip pmd which did not overflow */
  4352. if ((mask & 0x1) == 0) continue;
  4353. /*
  4354. * Note that the pmd is not necessarily 0 at this point as qualified events
  4355. * may have happened before the PMU was frozen. The residual count is not
  4356. * taken into consideration here but will be with any read of the pmd via
  4357. * pfm_read_pmds().
  4358. */
  4359. old_val = new_val = ctx->ctx_pmds[i].val;
  4360. new_val += 1 + ovfl_val;
  4361. ctx->ctx_pmds[i].val = new_val;
  4362. /*
  4363. * check for overflow condition
  4364. */
  4365. if (likely(old_val > new_val)) {
  4366. ovfl_pmds |= 1UL << i;
  4367. if (PMC_OVFL_NOTIFY(ctx, i)) ovfl_notify |= 1UL << i;
  4368. }
  4369. DPRINT_ovfl(("ctx_pmd[%d].val=0x%lx old_val=0x%lx pmd=0x%lx ovfl_pmds=0x%lx ovfl_notify=0x%lx\n",
  4370. i,
  4371. new_val,
  4372. old_val,
  4373. ia64_get_pmd(i) & ovfl_val,
  4374. ovfl_pmds,
  4375. ovfl_notify));
  4376. }
  4377. /*
  4378. * there was no 64-bit overflow, nothing else to do
  4379. */
  4380. if (ovfl_pmds == 0UL) return;
  4381. /*
  4382. * reset all control bits
  4383. */
  4384. ovfl_ctrl.val = 0;
  4385. reset_pmds = 0UL;
  4386. /*
  4387. * if a sampling format module exists, then we "cache" the overflow by
  4388. * calling the module's handler() routine.
  4389. */
  4390. if (has_smpl) {
  4391. unsigned long start_cycles, end_cycles;
  4392. unsigned long pmd_mask;
  4393. int j, k, ret = 0;
  4394. int this_cpu = smp_processor_id();
  4395. pmd_mask = ovfl_pmds >> PMU_FIRST_COUNTER;
  4396. ovfl_arg = &ctx->ctx_ovfl_arg;
  4397. prefetch(ctx->ctx_smpl_hdr);
  4398. for(i=PMU_FIRST_COUNTER; pmd_mask && ret == 0; i++, pmd_mask >>=1) {
  4399. mask = 1UL << i;
  4400. if ((pmd_mask & 0x1) == 0) continue;
  4401. ovfl_arg->ovfl_pmd = (unsigned char )i;
  4402. ovfl_arg->ovfl_notify = ovfl_notify & mask ? 1 : 0;
  4403. ovfl_arg->active_set = 0;
  4404. ovfl_arg->ovfl_ctrl.val = 0; /* module must fill in all fields */
  4405. ovfl_arg->smpl_pmds[0] = smpl_pmds = ctx->ctx_pmds[i].smpl_pmds[0];
  4406. ovfl_arg->pmd_value = ctx->ctx_pmds[i].val;
  4407. ovfl_arg->pmd_last_reset = ctx->ctx_pmds[i].lval;
  4408. ovfl_arg->pmd_eventid = ctx->ctx_pmds[i].eventid;
  4409. /*
  4410. * copy values of pmds of interest. Sampling format may copy them
  4411. * into sampling buffer.
  4412. */
  4413. if (smpl_pmds) {
  4414. for(j=0, k=0; smpl_pmds; j++, smpl_pmds >>=1) {
  4415. if ((smpl_pmds & 0x1) == 0) continue;
  4416. ovfl_arg->smpl_pmds_values[k++] = PMD_IS_COUNTING(j) ? pfm_read_soft_counter(ctx, j) : ia64_get_pmd(j);
  4417. DPRINT_ovfl(("smpl_pmd[%d]=pmd%u=0x%lx\n", k-1, j, ovfl_arg->smpl_pmds_values[k-1]));
  4418. }
  4419. }
  4420. pfm_stats[this_cpu].pfm_smpl_handler_calls++;
  4421. start_cycles = ia64_get_itc();
  4422. /*
  4423. * call custom buffer format record (handler) routine
  4424. */
  4425. ret = (*ctx->ctx_buf_fmt->fmt_handler)(task, ctx->ctx_smpl_hdr, ovfl_arg, regs, tstamp);
  4426. end_cycles = ia64_get_itc();
  4427. /*
  4428. * For those controls, we take the union because they have
  4429. * an all or nothing behavior.
  4430. */
  4431. ovfl_ctrl.bits.notify_user |= ovfl_arg->ovfl_ctrl.bits.notify_user;
  4432. ovfl_ctrl.bits.block_task |= ovfl_arg->ovfl_ctrl.bits.block_task;
  4433. ovfl_ctrl.bits.mask_monitoring |= ovfl_arg->ovfl_ctrl.bits.mask_monitoring;
  4434. /*
  4435. * build the bitmask of pmds to reset now
  4436. */
  4437. if (ovfl_arg->ovfl_ctrl.bits.reset_ovfl_pmds) reset_pmds |= mask;
  4438. pfm_stats[this_cpu].pfm_smpl_handler_cycles += end_cycles - start_cycles;
  4439. }
  4440. /*
  4441. * when the module cannot handle the rest of the overflows, we abort right here
  4442. */
  4443. if (ret && pmd_mask) {
  4444. DPRINT(("handler aborts leftover ovfl_pmds=0x%lx\n",
  4445. pmd_mask<<PMU_FIRST_COUNTER));
  4446. }
  4447. /*
  4448. * remove the pmds we reset now from the set of pmds to reset in pfm_restart()
  4449. */
  4450. ovfl_pmds &= ~reset_pmds;
  4451. } else {
  4452. /*
  4453. * when no sampling module is used, then the default
  4454. * is to notify on overflow if requested by user
  4455. */
  4456. ovfl_ctrl.bits.notify_user = ovfl_notify ? 1 : 0;
  4457. ovfl_ctrl.bits.block_task = ovfl_notify ? 1 : 0;
  4458. ovfl_ctrl.bits.mask_monitoring = ovfl_notify ? 1 : 0; /* XXX: change for saturation */
  4459. ovfl_ctrl.bits.reset_ovfl_pmds = ovfl_notify ? 0 : 1;
  4460. /*
  4461. * if needed, we reset all overflowed pmds
  4462. */
  4463. if (ovfl_notify == 0) reset_pmds = ovfl_pmds;
  4464. }
  4465. DPRINT_ovfl(("ovfl_pmds=0x%lx reset_pmds=0x%lx\n", ovfl_pmds, reset_pmds));
  4466. /*
  4467. * reset the requested PMD registers using the short reset values
  4468. */
  4469. if (reset_pmds) {
  4470. unsigned long bm = reset_pmds;
  4471. pfm_reset_regs(ctx, &bm, PFM_PMD_SHORT_RESET);
  4472. }
  4473. if (ovfl_notify && ovfl_ctrl.bits.notify_user) {
  4474. /*
  4475. * keep track of what to reset when unblocking
  4476. */
  4477. ctx->ctx_ovfl_regs[0] = ovfl_pmds;
  4478. /*
  4479. * check for blocking context
  4480. */
  4481. if (CTX_OVFL_NOBLOCK(ctx) == 0 && ovfl_ctrl.bits.block_task) {
  4482. ctx->ctx_fl_trap_reason = PFM_TRAP_REASON_BLOCK;
  4483. /*
  4484. * set the perfmon specific checking pending work for the task
  4485. */
  4486. PFM_SET_WORK_PENDING(task, 1);
  4487. /*
  4488. * when coming from ctxsw, current still points to the
  4489. * previous task, therefore we must work with task and not current.
  4490. */
  4491. set_notify_resume(task);
  4492. }
  4493. /*
  4494. * defer until state is changed (shorten spin window). the context is locked
  4495. * anyway, so the signal receiver would come spin for nothing.
  4496. */
  4497. must_notify = 1;
  4498. }
  4499. DPRINT_ovfl(("owner [%d] pending=%ld reason=%u ovfl_pmds=0x%lx ovfl_notify=0x%lx masked=%d\n",
  4500. GET_PMU_OWNER() ? task_pid_nr(GET_PMU_OWNER()) : -1,
  4501. PFM_GET_WORK_PENDING(task),
  4502. ctx->ctx_fl_trap_reason,
  4503. ovfl_pmds,
  4504. ovfl_notify,
  4505. ovfl_ctrl.bits.mask_monitoring ? 1 : 0));
  4506. /*
  4507. * in case monitoring must be stopped, we toggle the psr bits
  4508. */
  4509. if (ovfl_ctrl.bits.mask_monitoring) {
  4510. pfm_mask_monitoring(task);
  4511. ctx->ctx_state = PFM_CTX_MASKED;
  4512. ctx->ctx_fl_can_restart = 1;
  4513. }
  4514. /*
  4515. * send notification now
  4516. */
  4517. if (must_notify) pfm_ovfl_notify_user(ctx, ovfl_notify);
  4518. return;
  4519. sanity_check:
  4520. printk(KERN_ERR "perfmon: CPU%d overflow handler [%d] pmc0=0x%lx\n",
  4521. smp_processor_id(),
  4522. task ? task_pid_nr(task) : -1,
  4523. pmc0);
  4524. return;
  4525. stop_monitoring:
  4526. /*
  4527. * in SMP, zombie context is never restored but reclaimed in pfm_load_regs().
  4528. * Moreover, zombies are also reclaimed in pfm_save_regs(). Therefore we can
  4529. * come here as zombie only if the task is the current task. In which case, we
  4530. * can access the PMU hardware directly.
  4531. *
  4532. * Note that zombies do have PM_VALID set. So here we do the minimal.
  4533. *
  4534. * In case the context was zombified it could not be reclaimed at the time
  4535. * the monitoring program exited. At this point, the PMU reservation has been
  4536. * returned, the sampiing buffer has been freed. We must convert this call
  4537. * into a spurious interrupt. However, we must also avoid infinite overflows
  4538. * by stopping monitoring for this task. We can only come here for a per-task
  4539. * context. All we need to do is to stop monitoring using the psr bits which
  4540. * are always task private. By re-enabling secure montioring, we ensure that
  4541. * the monitored task will not be able to re-activate monitoring.
  4542. * The task will eventually be context switched out, at which point the context
  4543. * will be reclaimed (that includes releasing ownership of the PMU).
  4544. *
  4545. * So there might be a window of time where the number of per-task session is zero
  4546. * yet one PMU might have a owner and get at most one overflow interrupt for a zombie
  4547. * context. This is safe because if a per-task session comes in, it will push this one
  4548. * out and by the virtue on pfm_save_regs(), this one will disappear. If a system wide
  4549. * session is force on that CPU, given that we use task pinning, pfm_save_regs() will
  4550. * also push our zombie context out.
  4551. *
  4552. * Overall pretty hairy stuff....
  4553. */
  4554. DPRINT(("ctx is zombie for [%d], converted to spurious\n", task ? task_pid_nr(task): -1));
  4555. pfm_clear_psr_up();
  4556. ia64_psr(regs)->up = 0;
  4557. ia64_psr(regs)->sp = 1;
  4558. return;
  4559. }
  4560. static int
  4561. pfm_do_interrupt_handler(void *arg, struct pt_regs *regs)
  4562. {
  4563. struct task_struct *task;
  4564. pfm_context_t *ctx;
  4565. unsigned long flags;
  4566. u64 pmc0;
  4567. int this_cpu = smp_processor_id();
  4568. int retval = 0;
  4569. pfm_stats[this_cpu].pfm_ovfl_intr_count++;
  4570. /*
  4571. * srlz.d done before arriving here
  4572. */
  4573. pmc0 = ia64_get_pmc(0);
  4574. task = GET_PMU_OWNER();
  4575. ctx = GET_PMU_CTX();
  4576. /*
  4577. * if we have some pending bits set
  4578. * assumes : if any PMC0.bit[63-1] is set, then PMC0.fr = 1
  4579. */
  4580. if (PMC0_HAS_OVFL(pmc0) && task) {
  4581. /*
  4582. * we assume that pmc0.fr is always set here
  4583. */
  4584. /* sanity check */
  4585. if (!ctx) goto report_spurious1;
  4586. if (ctx->ctx_fl_system == 0 && (task->thread.flags & IA64_THREAD_PM_VALID) == 0)
  4587. goto report_spurious2;
  4588. PROTECT_CTX_NOPRINT(ctx, flags);
  4589. pfm_overflow_handler(task, ctx, pmc0, regs);
  4590. UNPROTECT_CTX_NOPRINT(ctx, flags);
  4591. } else {
  4592. pfm_stats[this_cpu].pfm_spurious_ovfl_intr_count++;
  4593. retval = -1;
  4594. }
  4595. /*
  4596. * keep it unfrozen at all times
  4597. */
  4598. pfm_unfreeze_pmu();
  4599. return retval;
  4600. report_spurious1:
  4601. printk(KERN_INFO "perfmon: spurious overflow interrupt on CPU%d: process %d has no PFM context\n",
  4602. this_cpu, task_pid_nr(task));
  4603. pfm_unfreeze_pmu();
  4604. return -1;
  4605. report_spurious2:
  4606. printk(KERN_INFO "perfmon: spurious overflow interrupt on CPU%d: process %d, invalid flag\n",
  4607. this_cpu,
  4608. task_pid_nr(task));
  4609. pfm_unfreeze_pmu();
  4610. return -1;
  4611. }
  4612. static irqreturn_t
  4613. pfm_interrupt_handler(int irq, void *arg)
  4614. {
  4615. unsigned long start_cycles, total_cycles;
  4616. unsigned long min, max;
  4617. int this_cpu;
  4618. int ret;
  4619. struct pt_regs *regs = get_irq_regs();
  4620. this_cpu = get_cpu();
  4621. if (likely(!pfm_alt_intr_handler)) {
  4622. min = pfm_stats[this_cpu].pfm_ovfl_intr_cycles_min;
  4623. max = pfm_stats[this_cpu].pfm_ovfl_intr_cycles_max;
  4624. start_cycles = ia64_get_itc();
  4625. ret = pfm_do_interrupt_handler(arg, regs);
  4626. total_cycles = ia64_get_itc();
  4627. /*
  4628. * don't measure spurious interrupts
  4629. */
  4630. if (likely(ret == 0)) {
  4631. total_cycles -= start_cycles;
  4632. if (total_cycles < min) pfm_stats[this_cpu].pfm_ovfl_intr_cycles_min = total_cycles;
  4633. if (total_cycles > max) pfm_stats[this_cpu].pfm_ovfl_intr_cycles_max = total_cycles;
  4634. pfm_stats[this_cpu].pfm_ovfl_intr_cycles += total_cycles;
  4635. }
  4636. }
  4637. else {
  4638. (*pfm_alt_intr_handler->handler)(irq, arg, regs);
  4639. }
  4640. put_cpu();
  4641. return IRQ_HANDLED;
  4642. }
  4643. /*
  4644. * /proc/perfmon interface, for debug only
  4645. */
  4646. #define PFM_PROC_SHOW_HEADER ((void *)(long)nr_cpu_ids+1)
  4647. static void *
  4648. pfm_proc_start(struct seq_file *m, loff_t *pos)
  4649. {
  4650. if (*pos == 0) {
  4651. return PFM_PROC_SHOW_HEADER;
  4652. }
  4653. while (*pos <= nr_cpu_ids) {
  4654. if (cpu_online(*pos - 1)) {
  4655. return (void *)*pos;
  4656. }
  4657. ++*pos;
  4658. }
  4659. return NULL;
  4660. }
  4661. static void *
  4662. pfm_proc_next(struct seq_file *m, void *v, loff_t *pos)
  4663. {
  4664. ++*pos;
  4665. return pfm_proc_start(m, pos);
  4666. }
  4667. static void
  4668. pfm_proc_stop(struct seq_file *m, void *v)
  4669. {
  4670. }
  4671. static void
  4672. pfm_proc_show_header(struct seq_file *m)
  4673. {
  4674. struct list_head * pos;
  4675. pfm_buffer_fmt_t * entry;
  4676. unsigned long flags;
  4677. seq_printf(m,
  4678. "perfmon version : %u.%u\n"
  4679. "model : %s\n"
  4680. "fastctxsw : %s\n"
  4681. "expert mode : %s\n"
  4682. "ovfl_mask : 0x%lx\n"
  4683. "PMU flags : 0x%x\n",
  4684. PFM_VERSION_MAJ, PFM_VERSION_MIN,
  4685. pmu_conf->pmu_name,
  4686. pfm_sysctl.fastctxsw > 0 ? "Yes": "No",
  4687. pfm_sysctl.expert_mode > 0 ? "Yes": "No",
  4688. pmu_conf->ovfl_val,
  4689. pmu_conf->flags);
  4690. LOCK_PFS(flags);
  4691. seq_printf(m,
  4692. "proc_sessions : %u\n"
  4693. "sys_sessions : %u\n"
  4694. "sys_use_dbregs : %u\n"
  4695. "ptrace_use_dbregs : %u\n",
  4696. pfm_sessions.pfs_task_sessions,
  4697. pfm_sessions.pfs_sys_sessions,
  4698. pfm_sessions.pfs_sys_use_dbregs,
  4699. pfm_sessions.pfs_ptrace_use_dbregs);
  4700. UNLOCK_PFS(flags);
  4701. spin_lock(&pfm_buffer_fmt_lock);
  4702. list_for_each(pos, &pfm_buffer_fmt_list) {
  4703. entry = list_entry(pos, pfm_buffer_fmt_t, fmt_list);
  4704. seq_printf(m, "format : %16phD %s\n",
  4705. entry->fmt_uuid, entry->fmt_name);
  4706. }
  4707. spin_unlock(&pfm_buffer_fmt_lock);
  4708. }
  4709. static int
  4710. pfm_proc_show(struct seq_file *m, void *v)
  4711. {
  4712. unsigned long psr;
  4713. unsigned int i;
  4714. int cpu;
  4715. if (v == PFM_PROC_SHOW_HEADER) {
  4716. pfm_proc_show_header(m);
  4717. return 0;
  4718. }
  4719. /* show info for CPU (v - 1) */
  4720. cpu = (long)v - 1;
  4721. seq_printf(m,
  4722. "CPU%-2d overflow intrs : %lu\n"
  4723. "CPU%-2d overflow cycles : %lu\n"
  4724. "CPU%-2d overflow min : %lu\n"
  4725. "CPU%-2d overflow max : %lu\n"
  4726. "CPU%-2d smpl handler calls : %lu\n"
  4727. "CPU%-2d smpl handler cycles : %lu\n"
  4728. "CPU%-2d spurious intrs : %lu\n"
  4729. "CPU%-2d replay intrs : %lu\n"
  4730. "CPU%-2d syst_wide : %d\n"
  4731. "CPU%-2d dcr_pp : %d\n"
  4732. "CPU%-2d exclude idle : %d\n"
  4733. "CPU%-2d owner : %d\n"
  4734. "CPU%-2d context : %p\n"
  4735. "CPU%-2d activations : %lu\n",
  4736. cpu, pfm_stats[cpu].pfm_ovfl_intr_count,
  4737. cpu, pfm_stats[cpu].pfm_ovfl_intr_cycles,
  4738. cpu, pfm_stats[cpu].pfm_ovfl_intr_cycles_min,
  4739. cpu, pfm_stats[cpu].pfm_ovfl_intr_cycles_max,
  4740. cpu, pfm_stats[cpu].pfm_smpl_handler_calls,
  4741. cpu, pfm_stats[cpu].pfm_smpl_handler_cycles,
  4742. cpu, pfm_stats[cpu].pfm_spurious_ovfl_intr_count,
  4743. cpu, pfm_stats[cpu].pfm_replay_ovfl_intr_count,
  4744. cpu, pfm_get_cpu_data(pfm_syst_info, cpu) & PFM_CPUINFO_SYST_WIDE ? 1 : 0,
  4745. cpu, pfm_get_cpu_data(pfm_syst_info, cpu) & PFM_CPUINFO_DCR_PP ? 1 : 0,
  4746. cpu, pfm_get_cpu_data(pfm_syst_info, cpu) & PFM_CPUINFO_EXCL_IDLE ? 1 : 0,
  4747. cpu, pfm_get_cpu_data(pmu_owner, cpu) ? pfm_get_cpu_data(pmu_owner, cpu)->pid: -1,
  4748. cpu, pfm_get_cpu_data(pmu_ctx, cpu),
  4749. cpu, pfm_get_cpu_data(pmu_activation_number, cpu));
  4750. if (num_online_cpus() == 1 && pfm_sysctl.debug > 0) {
  4751. psr = pfm_get_psr();
  4752. ia64_srlz_d();
  4753. seq_printf(m,
  4754. "CPU%-2d psr : 0x%lx\n"
  4755. "CPU%-2d pmc0 : 0x%lx\n",
  4756. cpu, psr,
  4757. cpu, ia64_get_pmc(0));
  4758. for (i=0; PMC_IS_LAST(i) == 0; i++) {
  4759. if (PMC_IS_COUNTING(i) == 0) continue;
  4760. seq_printf(m,
  4761. "CPU%-2d pmc%u : 0x%lx\n"
  4762. "CPU%-2d pmd%u : 0x%lx\n",
  4763. cpu, i, ia64_get_pmc(i),
  4764. cpu, i, ia64_get_pmd(i));
  4765. }
  4766. }
  4767. return 0;
  4768. }
  4769. const struct seq_operations pfm_seq_ops = {
  4770. .start = pfm_proc_start,
  4771. .next = pfm_proc_next,
  4772. .stop = pfm_proc_stop,
  4773. .show = pfm_proc_show
  4774. };
  4775. static int
  4776. pfm_proc_open(struct inode *inode, struct file *file)
  4777. {
  4778. return seq_open(file, &pfm_seq_ops);
  4779. }
  4780. /*
  4781. * we come here as soon as local_cpu_data->pfm_syst_wide is set. this happens
  4782. * during pfm_enable() hence before pfm_start(). We cannot assume monitoring
  4783. * is active or inactive based on mode. We must rely on the value in
  4784. * local_cpu_data->pfm_syst_info
  4785. */
  4786. void
  4787. pfm_syst_wide_update_task(struct task_struct *task, unsigned long info, int is_ctxswin)
  4788. {
  4789. struct pt_regs *regs;
  4790. unsigned long dcr;
  4791. unsigned long dcr_pp;
  4792. dcr_pp = info & PFM_CPUINFO_DCR_PP ? 1 : 0;
  4793. /*
  4794. * pid 0 is guaranteed to be the idle task. There is one such task with pid 0
  4795. * on every CPU, so we can rely on the pid to identify the idle task.
  4796. */
  4797. if ((info & PFM_CPUINFO_EXCL_IDLE) == 0 || task->pid) {
  4798. regs = task_pt_regs(task);
  4799. ia64_psr(regs)->pp = is_ctxswin ? dcr_pp : 0;
  4800. return;
  4801. }
  4802. /*
  4803. * if monitoring has started
  4804. */
  4805. if (dcr_pp) {
  4806. dcr = ia64_getreg(_IA64_REG_CR_DCR);
  4807. /*
  4808. * context switching in?
  4809. */
  4810. if (is_ctxswin) {
  4811. /* mask monitoring for the idle task */
  4812. ia64_setreg(_IA64_REG_CR_DCR, dcr & ~IA64_DCR_PP);
  4813. pfm_clear_psr_pp();
  4814. ia64_srlz_i();
  4815. return;
  4816. }
  4817. /*
  4818. * context switching out
  4819. * restore monitoring for next task
  4820. *
  4821. * Due to inlining this odd if-then-else construction generates
  4822. * better code.
  4823. */
  4824. ia64_setreg(_IA64_REG_CR_DCR, dcr |IA64_DCR_PP);
  4825. pfm_set_psr_pp();
  4826. ia64_srlz_i();
  4827. }
  4828. }
  4829. #ifdef CONFIG_SMP
  4830. static void
  4831. pfm_force_cleanup(pfm_context_t *ctx, struct pt_regs *regs)
  4832. {
  4833. struct task_struct *task = ctx->ctx_task;
  4834. ia64_psr(regs)->up = 0;
  4835. ia64_psr(regs)->sp = 1;
  4836. if (GET_PMU_OWNER() == task) {
  4837. DPRINT(("cleared ownership for [%d]\n",
  4838. task_pid_nr(ctx->ctx_task)));
  4839. SET_PMU_OWNER(NULL, NULL);
  4840. }
  4841. /*
  4842. * disconnect the task from the context and vice-versa
  4843. */
  4844. PFM_SET_WORK_PENDING(task, 0);
  4845. task->thread.pfm_context = NULL;
  4846. task->thread.flags &= ~IA64_THREAD_PM_VALID;
  4847. DPRINT(("force cleanup for [%d]\n", task_pid_nr(task)));
  4848. }
  4849. /*
  4850. * in 2.6, interrupts are masked when we come here and the runqueue lock is held
  4851. */
  4852. void
  4853. pfm_save_regs(struct task_struct *task)
  4854. {
  4855. pfm_context_t *ctx;
  4856. unsigned long flags;
  4857. u64 psr;
  4858. ctx = PFM_GET_CTX(task);
  4859. if (ctx == NULL) return;
  4860. /*
  4861. * we always come here with interrupts ALREADY disabled by
  4862. * the scheduler. So we simply need to protect against concurrent
  4863. * access, not CPU concurrency.
  4864. */
  4865. flags = pfm_protect_ctx_ctxsw(ctx);
  4866. if (ctx->ctx_state == PFM_CTX_ZOMBIE) {
  4867. struct pt_regs *regs = task_pt_regs(task);
  4868. pfm_clear_psr_up();
  4869. pfm_force_cleanup(ctx, regs);
  4870. BUG_ON(ctx->ctx_smpl_hdr);
  4871. pfm_unprotect_ctx_ctxsw(ctx, flags);
  4872. pfm_context_free(ctx);
  4873. return;
  4874. }
  4875. /*
  4876. * save current PSR: needed because we modify it
  4877. */
  4878. ia64_srlz_d();
  4879. psr = pfm_get_psr();
  4880. BUG_ON(psr & (IA64_PSR_I));
  4881. /*
  4882. * stop monitoring:
  4883. * This is the last instruction which may generate an overflow
  4884. *
  4885. * We do not need to set psr.sp because, it is irrelevant in kernel.
  4886. * It will be restored from ipsr when going back to user level
  4887. */
  4888. pfm_clear_psr_up();
  4889. /*
  4890. * keep a copy of psr.up (for reload)
  4891. */
  4892. ctx->ctx_saved_psr_up = psr & IA64_PSR_UP;
  4893. /*
  4894. * release ownership of this PMU.
  4895. * PM interrupts are masked, so nothing
  4896. * can happen.
  4897. */
  4898. SET_PMU_OWNER(NULL, NULL);
  4899. /*
  4900. * we systematically save the PMD as we have no
  4901. * guarantee we will be schedule at that same
  4902. * CPU again.
  4903. */
  4904. pfm_save_pmds(ctx->th_pmds, ctx->ctx_used_pmds[0]);
  4905. /*
  4906. * save pmc0 ia64_srlz_d() done in pfm_save_pmds()
  4907. * we will need it on the restore path to check
  4908. * for pending overflow.
  4909. */
  4910. ctx->th_pmcs[0] = ia64_get_pmc(0);
  4911. /*
  4912. * unfreeze PMU if had pending overflows
  4913. */
  4914. if (ctx->th_pmcs[0] & ~0x1UL) pfm_unfreeze_pmu();
  4915. /*
  4916. * finally, allow context access.
  4917. * interrupts will still be masked after this call.
  4918. */
  4919. pfm_unprotect_ctx_ctxsw(ctx, flags);
  4920. }
  4921. #else /* !CONFIG_SMP */
  4922. void
  4923. pfm_save_regs(struct task_struct *task)
  4924. {
  4925. pfm_context_t *ctx;
  4926. u64 psr;
  4927. ctx = PFM_GET_CTX(task);
  4928. if (ctx == NULL) return;
  4929. /*
  4930. * save current PSR: needed because we modify it
  4931. */
  4932. psr = pfm_get_psr();
  4933. BUG_ON(psr & (IA64_PSR_I));
  4934. /*
  4935. * stop monitoring:
  4936. * This is the last instruction which may generate an overflow
  4937. *
  4938. * We do not need to set psr.sp because, it is irrelevant in kernel.
  4939. * It will be restored from ipsr when going back to user level
  4940. */
  4941. pfm_clear_psr_up();
  4942. /*
  4943. * keep a copy of psr.up (for reload)
  4944. */
  4945. ctx->ctx_saved_psr_up = psr & IA64_PSR_UP;
  4946. }
  4947. static void
  4948. pfm_lazy_save_regs (struct task_struct *task)
  4949. {
  4950. pfm_context_t *ctx;
  4951. unsigned long flags;
  4952. { u64 psr = pfm_get_psr();
  4953. BUG_ON(psr & IA64_PSR_UP);
  4954. }
  4955. ctx = PFM_GET_CTX(task);
  4956. /*
  4957. * we need to mask PMU overflow here to
  4958. * make sure that we maintain pmc0 until
  4959. * we save it. overflow interrupts are
  4960. * treated as spurious if there is no
  4961. * owner.
  4962. *
  4963. * XXX: I don't think this is necessary
  4964. */
  4965. PROTECT_CTX(ctx,flags);
  4966. /*
  4967. * release ownership of this PMU.
  4968. * must be done before we save the registers.
  4969. *
  4970. * after this call any PMU interrupt is treated
  4971. * as spurious.
  4972. */
  4973. SET_PMU_OWNER(NULL, NULL);
  4974. /*
  4975. * save all the pmds we use
  4976. */
  4977. pfm_save_pmds(ctx->th_pmds, ctx->ctx_used_pmds[0]);
  4978. /*
  4979. * save pmc0 ia64_srlz_d() done in pfm_save_pmds()
  4980. * it is needed to check for pended overflow
  4981. * on the restore path
  4982. */
  4983. ctx->th_pmcs[0] = ia64_get_pmc(0);
  4984. /*
  4985. * unfreeze PMU if had pending overflows
  4986. */
  4987. if (ctx->th_pmcs[0] & ~0x1UL) pfm_unfreeze_pmu();
  4988. /*
  4989. * now get can unmask PMU interrupts, they will
  4990. * be treated as purely spurious and we will not
  4991. * lose any information
  4992. */
  4993. UNPROTECT_CTX(ctx,flags);
  4994. }
  4995. #endif /* CONFIG_SMP */
  4996. #ifdef CONFIG_SMP
  4997. /*
  4998. * in 2.6, interrupts are masked when we come here and the runqueue lock is held
  4999. */
  5000. void
  5001. pfm_load_regs (struct task_struct *task)
  5002. {
  5003. pfm_context_t *ctx;
  5004. unsigned long pmc_mask = 0UL, pmd_mask = 0UL;
  5005. unsigned long flags;
  5006. u64 psr, psr_up;
  5007. int need_irq_resend;
  5008. ctx = PFM_GET_CTX(task);
  5009. if (unlikely(ctx == NULL)) return;
  5010. BUG_ON(GET_PMU_OWNER());
  5011. /*
  5012. * possible on unload
  5013. */
  5014. if (unlikely((task->thread.flags & IA64_THREAD_PM_VALID) == 0)) return;
  5015. /*
  5016. * we always come here with interrupts ALREADY disabled by
  5017. * the scheduler. So we simply need to protect against concurrent
  5018. * access, not CPU concurrency.
  5019. */
  5020. flags = pfm_protect_ctx_ctxsw(ctx);
  5021. psr = pfm_get_psr();
  5022. need_irq_resend = pmu_conf->flags & PFM_PMU_IRQ_RESEND;
  5023. BUG_ON(psr & (IA64_PSR_UP|IA64_PSR_PP));
  5024. BUG_ON(psr & IA64_PSR_I);
  5025. if (unlikely(ctx->ctx_state == PFM_CTX_ZOMBIE)) {
  5026. struct pt_regs *regs = task_pt_regs(task);
  5027. BUG_ON(ctx->ctx_smpl_hdr);
  5028. pfm_force_cleanup(ctx, regs);
  5029. pfm_unprotect_ctx_ctxsw(ctx, flags);
  5030. /*
  5031. * this one (kmalloc'ed) is fine with interrupts disabled
  5032. */
  5033. pfm_context_free(ctx);
  5034. return;
  5035. }
  5036. /*
  5037. * we restore ALL the debug registers to avoid picking up
  5038. * stale state.
  5039. */
  5040. if (ctx->ctx_fl_using_dbreg) {
  5041. pfm_restore_ibrs(ctx->ctx_ibrs, pmu_conf->num_ibrs);
  5042. pfm_restore_dbrs(ctx->ctx_dbrs, pmu_conf->num_dbrs);
  5043. }
  5044. /*
  5045. * retrieve saved psr.up
  5046. */
  5047. psr_up = ctx->ctx_saved_psr_up;
  5048. /*
  5049. * if we were the last user of the PMU on that CPU,
  5050. * then nothing to do except restore psr
  5051. */
  5052. if (GET_LAST_CPU(ctx) == smp_processor_id() && ctx->ctx_last_activation == GET_ACTIVATION()) {
  5053. /*
  5054. * retrieve partial reload masks (due to user modifications)
  5055. */
  5056. pmc_mask = ctx->ctx_reload_pmcs[0];
  5057. pmd_mask = ctx->ctx_reload_pmds[0];
  5058. } else {
  5059. /*
  5060. * To avoid leaking information to the user level when psr.sp=0,
  5061. * we must reload ALL implemented pmds (even the ones we don't use).
  5062. * In the kernel we only allow PFM_READ_PMDS on registers which
  5063. * we initialized or requested (sampling) so there is no risk there.
  5064. */
  5065. pmd_mask = pfm_sysctl.fastctxsw ? ctx->ctx_used_pmds[0] : ctx->ctx_all_pmds[0];
  5066. /*
  5067. * ALL accessible PMCs are systematically reloaded, unused registers
  5068. * get their default (from pfm_reset_pmu_state()) values to avoid picking
  5069. * up stale configuration.
  5070. *
  5071. * PMC0 is never in the mask. It is always restored separately.
  5072. */
  5073. pmc_mask = ctx->ctx_all_pmcs[0];
  5074. }
  5075. /*
  5076. * when context is MASKED, we will restore PMC with plm=0
  5077. * and PMD with stale information, but that's ok, nothing
  5078. * will be captured.
  5079. *
  5080. * XXX: optimize here
  5081. */
  5082. if (pmd_mask) pfm_restore_pmds(ctx->th_pmds, pmd_mask);
  5083. if (pmc_mask) pfm_restore_pmcs(ctx->th_pmcs, pmc_mask);
  5084. /*
  5085. * check for pending overflow at the time the state
  5086. * was saved.
  5087. */
  5088. if (unlikely(PMC0_HAS_OVFL(ctx->th_pmcs[0]))) {
  5089. /*
  5090. * reload pmc0 with the overflow information
  5091. * On McKinley PMU, this will trigger a PMU interrupt
  5092. */
  5093. ia64_set_pmc(0, ctx->th_pmcs[0]);
  5094. ia64_srlz_d();
  5095. ctx->th_pmcs[0] = 0UL;
  5096. /*
  5097. * will replay the PMU interrupt
  5098. */
  5099. if (need_irq_resend) ia64_resend_irq(IA64_PERFMON_VECTOR);
  5100. pfm_stats[smp_processor_id()].pfm_replay_ovfl_intr_count++;
  5101. }
  5102. /*
  5103. * we just did a reload, so we reset the partial reload fields
  5104. */
  5105. ctx->ctx_reload_pmcs[0] = 0UL;
  5106. ctx->ctx_reload_pmds[0] = 0UL;
  5107. SET_LAST_CPU(ctx, smp_processor_id());
  5108. /*
  5109. * dump activation value for this PMU
  5110. */
  5111. INC_ACTIVATION();
  5112. /*
  5113. * record current activation for this context
  5114. */
  5115. SET_ACTIVATION(ctx);
  5116. /*
  5117. * establish new ownership.
  5118. */
  5119. SET_PMU_OWNER(task, ctx);
  5120. /*
  5121. * restore the psr.up bit. measurement
  5122. * is active again.
  5123. * no PMU interrupt can happen at this point
  5124. * because we still have interrupts disabled.
  5125. */
  5126. if (likely(psr_up)) pfm_set_psr_up();
  5127. /*
  5128. * allow concurrent access to context
  5129. */
  5130. pfm_unprotect_ctx_ctxsw(ctx, flags);
  5131. }
  5132. #else /* !CONFIG_SMP */
  5133. /*
  5134. * reload PMU state for UP kernels
  5135. * in 2.5 we come here with interrupts disabled
  5136. */
  5137. void
  5138. pfm_load_regs (struct task_struct *task)
  5139. {
  5140. pfm_context_t *ctx;
  5141. struct task_struct *owner;
  5142. unsigned long pmd_mask, pmc_mask;
  5143. u64 psr, psr_up;
  5144. int need_irq_resend;
  5145. owner = GET_PMU_OWNER();
  5146. ctx = PFM_GET_CTX(task);
  5147. psr = pfm_get_psr();
  5148. BUG_ON(psr & (IA64_PSR_UP|IA64_PSR_PP));
  5149. BUG_ON(psr & IA64_PSR_I);
  5150. /*
  5151. * we restore ALL the debug registers to avoid picking up
  5152. * stale state.
  5153. *
  5154. * This must be done even when the task is still the owner
  5155. * as the registers may have been modified via ptrace()
  5156. * (not perfmon) by the previous task.
  5157. */
  5158. if (ctx->ctx_fl_using_dbreg) {
  5159. pfm_restore_ibrs(ctx->ctx_ibrs, pmu_conf->num_ibrs);
  5160. pfm_restore_dbrs(ctx->ctx_dbrs, pmu_conf->num_dbrs);
  5161. }
  5162. /*
  5163. * retrieved saved psr.up
  5164. */
  5165. psr_up = ctx->ctx_saved_psr_up;
  5166. need_irq_resend = pmu_conf->flags & PFM_PMU_IRQ_RESEND;
  5167. /*
  5168. * short path, our state is still there, just
  5169. * need to restore psr and we go
  5170. *
  5171. * we do not touch either PMC nor PMD. the psr is not touched
  5172. * by the overflow_handler. So we are safe w.r.t. to interrupt
  5173. * concurrency even without interrupt masking.
  5174. */
  5175. if (likely(owner == task)) {
  5176. if (likely(psr_up)) pfm_set_psr_up();
  5177. return;
  5178. }
  5179. /*
  5180. * someone else is still using the PMU, first push it out and
  5181. * then we'll be able to install our stuff !
  5182. *
  5183. * Upon return, there will be no owner for the current PMU
  5184. */
  5185. if (owner) pfm_lazy_save_regs(owner);
  5186. /*
  5187. * To avoid leaking information to the user level when psr.sp=0,
  5188. * we must reload ALL implemented pmds (even the ones we don't use).
  5189. * In the kernel we only allow PFM_READ_PMDS on registers which
  5190. * we initialized or requested (sampling) so there is no risk there.
  5191. */
  5192. pmd_mask = pfm_sysctl.fastctxsw ? ctx->ctx_used_pmds[0] : ctx->ctx_all_pmds[0];
  5193. /*
  5194. * ALL accessible PMCs are systematically reloaded, unused registers
  5195. * get their default (from pfm_reset_pmu_state()) values to avoid picking
  5196. * up stale configuration.
  5197. *
  5198. * PMC0 is never in the mask. It is always restored separately
  5199. */
  5200. pmc_mask = ctx->ctx_all_pmcs[0];
  5201. pfm_restore_pmds(ctx->th_pmds, pmd_mask);
  5202. pfm_restore_pmcs(ctx->th_pmcs, pmc_mask);
  5203. /*
  5204. * check for pending overflow at the time the state
  5205. * was saved.
  5206. */
  5207. if (unlikely(PMC0_HAS_OVFL(ctx->th_pmcs[0]))) {
  5208. /*
  5209. * reload pmc0 with the overflow information
  5210. * On McKinley PMU, this will trigger a PMU interrupt
  5211. */
  5212. ia64_set_pmc(0, ctx->th_pmcs[0]);
  5213. ia64_srlz_d();
  5214. ctx->th_pmcs[0] = 0UL;
  5215. /*
  5216. * will replay the PMU interrupt
  5217. */
  5218. if (need_irq_resend) ia64_resend_irq(IA64_PERFMON_VECTOR);
  5219. pfm_stats[smp_processor_id()].pfm_replay_ovfl_intr_count++;
  5220. }
  5221. /*
  5222. * establish new ownership.
  5223. */
  5224. SET_PMU_OWNER(task, ctx);
  5225. /*
  5226. * restore the psr.up bit. measurement
  5227. * is active again.
  5228. * no PMU interrupt can happen at this point
  5229. * because we still have interrupts disabled.
  5230. */
  5231. if (likely(psr_up)) pfm_set_psr_up();
  5232. }
  5233. #endif /* CONFIG_SMP */
  5234. /*
  5235. * this function assumes monitoring is stopped
  5236. */
  5237. static void
  5238. pfm_flush_pmds(struct task_struct *task, pfm_context_t *ctx)
  5239. {
  5240. u64 pmc0;
  5241. unsigned long mask2, val, pmd_val, ovfl_val;
  5242. int i, can_access_pmu = 0;
  5243. int is_self;
  5244. /*
  5245. * is the caller the task being monitored (or which initiated the
  5246. * session for system wide measurements)
  5247. */
  5248. is_self = ctx->ctx_task == task ? 1 : 0;
  5249. /*
  5250. * can access PMU is task is the owner of the PMU state on the current CPU
  5251. * or if we are running on the CPU bound to the context in system-wide mode
  5252. * (that is not necessarily the task the context is attached to in this mode).
  5253. * In system-wide we always have can_access_pmu true because a task running on an
  5254. * invalid processor is flagged earlier in the call stack (see pfm_stop).
  5255. */
  5256. can_access_pmu = (GET_PMU_OWNER() == task) || (ctx->ctx_fl_system && ctx->ctx_cpu == smp_processor_id());
  5257. if (can_access_pmu) {
  5258. /*
  5259. * Mark the PMU as not owned
  5260. * This will cause the interrupt handler to do nothing in case an overflow
  5261. * interrupt was in-flight
  5262. * This also guarantees that pmc0 will contain the final state
  5263. * It virtually gives us full control on overflow processing from that point
  5264. * on.
  5265. */
  5266. SET_PMU_OWNER(NULL, NULL);
  5267. DPRINT(("releasing ownership\n"));
  5268. /*
  5269. * read current overflow status:
  5270. *
  5271. * we are guaranteed to read the final stable state
  5272. */
  5273. ia64_srlz_d();
  5274. pmc0 = ia64_get_pmc(0); /* slow */
  5275. /*
  5276. * reset freeze bit, overflow status information destroyed
  5277. */
  5278. pfm_unfreeze_pmu();
  5279. } else {
  5280. pmc0 = ctx->th_pmcs[0];
  5281. /*
  5282. * clear whatever overflow status bits there were
  5283. */
  5284. ctx->th_pmcs[0] = 0;
  5285. }
  5286. ovfl_val = pmu_conf->ovfl_val;
  5287. /*
  5288. * we save all the used pmds
  5289. * we take care of overflows for counting PMDs
  5290. *
  5291. * XXX: sampling situation is not taken into account here
  5292. */
  5293. mask2 = ctx->ctx_used_pmds[0];
  5294. DPRINT(("is_self=%d ovfl_val=0x%lx mask2=0x%lx\n", is_self, ovfl_val, mask2));
  5295. for (i = 0; mask2; i++, mask2>>=1) {
  5296. /* skip non used pmds */
  5297. if ((mask2 & 0x1) == 0) continue;
  5298. /*
  5299. * can access PMU always true in system wide mode
  5300. */
  5301. val = pmd_val = can_access_pmu ? ia64_get_pmd(i) : ctx->th_pmds[i];
  5302. if (PMD_IS_COUNTING(i)) {
  5303. DPRINT(("[%d] pmd[%d] ctx_pmd=0x%lx hw_pmd=0x%lx\n",
  5304. task_pid_nr(task),
  5305. i,
  5306. ctx->ctx_pmds[i].val,
  5307. val & ovfl_val));
  5308. /*
  5309. * we rebuild the full 64 bit value of the counter
  5310. */
  5311. val = ctx->ctx_pmds[i].val + (val & ovfl_val);
  5312. /*
  5313. * now everything is in ctx_pmds[] and we need
  5314. * to clear the saved context from save_regs() such that
  5315. * pfm_read_pmds() gets the correct value
  5316. */
  5317. pmd_val = 0UL;
  5318. /*
  5319. * take care of overflow inline
  5320. */
  5321. if (pmc0 & (1UL << i)) {
  5322. val += 1 + ovfl_val;
  5323. DPRINT(("[%d] pmd[%d] overflowed\n", task_pid_nr(task), i));
  5324. }
  5325. }
  5326. DPRINT(("[%d] ctx_pmd[%d]=0x%lx pmd_val=0x%lx\n", task_pid_nr(task), i, val, pmd_val));
  5327. if (is_self) ctx->th_pmds[i] = pmd_val;
  5328. ctx->ctx_pmds[i].val = val;
  5329. }
  5330. }
  5331. static struct irqaction perfmon_irqaction = {
  5332. .handler = pfm_interrupt_handler,
  5333. .name = "perfmon"
  5334. };
  5335. static void
  5336. pfm_alt_save_pmu_state(void *data)
  5337. {
  5338. struct pt_regs *regs;
  5339. regs = task_pt_regs(current);
  5340. DPRINT(("called\n"));
  5341. /*
  5342. * should not be necessary but
  5343. * let's take not risk
  5344. */
  5345. pfm_clear_psr_up();
  5346. pfm_clear_psr_pp();
  5347. ia64_psr(regs)->pp = 0;
  5348. /*
  5349. * This call is required
  5350. * May cause a spurious interrupt on some processors
  5351. */
  5352. pfm_freeze_pmu();
  5353. ia64_srlz_d();
  5354. }
  5355. void
  5356. pfm_alt_restore_pmu_state(void *data)
  5357. {
  5358. struct pt_regs *regs;
  5359. regs = task_pt_regs(current);
  5360. DPRINT(("called\n"));
  5361. /*
  5362. * put PMU back in state expected
  5363. * by perfmon
  5364. */
  5365. pfm_clear_psr_up();
  5366. pfm_clear_psr_pp();
  5367. ia64_psr(regs)->pp = 0;
  5368. /*
  5369. * perfmon runs with PMU unfrozen at all times
  5370. */
  5371. pfm_unfreeze_pmu();
  5372. ia64_srlz_d();
  5373. }
  5374. int
  5375. pfm_install_alt_pmu_interrupt(pfm_intr_handler_desc_t *hdl)
  5376. {
  5377. int ret, i;
  5378. int reserve_cpu;
  5379. /* some sanity checks */
  5380. if (hdl == NULL || hdl->handler == NULL) return -EINVAL;
  5381. /* do the easy test first */
  5382. if (pfm_alt_intr_handler) return -EBUSY;
  5383. /* one at a time in the install or remove, just fail the others */
  5384. if (!spin_trylock(&pfm_alt_install_check)) {
  5385. return -EBUSY;
  5386. }
  5387. /* reserve our session */
  5388. for_each_online_cpu(reserve_cpu) {
  5389. ret = pfm_reserve_session(NULL, 1, reserve_cpu);
  5390. if (ret) goto cleanup_reserve;
  5391. }
  5392. /* save the current system wide pmu states */
  5393. ret = on_each_cpu(pfm_alt_save_pmu_state, NULL, 1);
  5394. if (ret) {
  5395. DPRINT(("on_each_cpu() failed: %d\n", ret));
  5396. goto cleanup_reserve;
  5397. }
  5398. /* officially change to the alternate interrupt handler */
  5399. pfm_alt_intr_handler = hdl;
  5400. spin_unlock(&pfm_alt_install_check);
  5401. return 0;
  5402. cleanup_reserve:
  5403. for_each_online_cpu(i) {
  5404. /* don't unreserve more than we reserved */
  5405. if (i >= reserve_cpu) break;
  5406. pfm_unreserve_session(NULL, 1, i);
  5407. }
  5408. spin_unlock(&pfm_alt_install_check);
  5409. return ret;
  5410. }
  5411. EXPORT_SYMBOL_GPL(pfm_install_alt_pmu_interrupt);
  5412. int
  5413. pfm_remove_alt_pmu_interrupt(pfm_intr_handler_desc_t *hdl)
  5414. {
  5415. int i;
  5416. int ret;
  5417. if (hdl == NULL) return -EINVAL;
  5418. /* cannot remove someone else's handler! */
  5419. if (pfm_alt_intr_handler != hdl) return -EINVAL;
  5420. /* one at a time in the install or remove, just fail the others */
  5421. if (!spin_trylock(&pfm_alt_install_check)) {
  5422. return -EBUSY;
  5423. }
  5424. pfm_alt_intr_handler = NULL;
  5425. ret = on_each_cpu(pfm_alt_restore_pmu_state, NULL, 1);
  5426. if (ret) {
  5427. DPRINT(("on_each_cpu() failed: %d\n", ret));
  5428. }
  5429. for_each_online_cpu(i) {
  5430. pfm_unreserve_session(NULL, 1, i);
  5431. }
  5432. spin_unlock(&pfm_alt_install_check);
  5433. return 0;
  5434. }
  5435. EXPORT_SYMBOL_GPL(pfm_remove_alt_pmu_interrupt);
  5436. /*
  5437. * perfmon initialization routine, called from the initcall() table
  5438. */
  5439. static int init_pfm_fs(void);
  5440. static int __init
  5441. pfm_probe_pmu(void)
  5442. {
  5443. pmu_config_t **p;
  5444. int family;
  5445. family = local_cpu_data->family;
  5446. p = pmu_confs;
  5447. while(*p) {
  5448. if ((*p)->probe) {
  5449. if ((*p)->probe() == 0) goto found;
  5450. } else if ((*p)->pmu_family == family || (*p)->pmu_family == 0xff) {
  5451. goto found;
  5452. }
  5453. p++;
  5454. }
  5455. return -1;
  5456. found:
  5457. pmu_conf = *p;
  5458. return 0;
  5459. }
  5460. static const struct file_operations pfm_proc_fops = {
  5461. .open = pfm_proc_open,
  5462. .read = seq_read,
  5463. .llseek = seq_lseek,
  5464. .release = seq_release,
  5465. };
  5466. int __init
  5467. pfm_init(void)
  5468. {
  5469. unsigned int n, n_counters, i;
  5470. printk("perfmon: version %u.%u IRQ %u\n",
  5471. PFM_VERSION_MAJ,
  5472. PFM_VERSION_MIN,
  5473. IA64_PERFMON_VECTOR);
  5474. if (pfm_probe_pmu()) {
  5475. printk(KERN_INFO "perfmon: disabled, there is no support for processor family %d\n",
  5476. local_cpu_data->family);
  5477. return -ENODEV;
  5478. }
  5479. /*
  5480. * compute the number of implemented PMD/PMC from the
  5481. * description tables
  5482. */
  5483. n = 0;
  5484. for (i=0; PMC_IS_LAST(i) == 0; i++) {
  5485. if (PMC_IS_IMPL(i) == 0) continue;
  5486. pmu_conf->impl_pmcs[i>>6] |= 1UL << (i&63);
  5487. n++;
  5488. }
  5489. pmu_conf->num_pmcs = n;
  5490. n = 0; n_counters = 0;
  5491. for (i=0; PMD_IS_LAST(i) == 0; i++) {
  5492. if (PMD_IS_IMPL(i) == 0) continue;
  5493. pmu_conf->impl_pmds[i>>6] |= 1UL << (i&63);
  5494. n++;
  5495. if (PMD_IS_COUNTING(i)) n_counters++;
  5496. }
  5497. pmu_conf->num_pmds = n;
  5498. pmu_conf->num_counters = n_counters;
  5499. /*
  5500. * sanity checks on the number of debug registers
  5501. */
  5502. if (pmu_conf->use_rr_dbregs) {
  5503. if (pmu_conf->num_ibrs > IA64_NUM_DBG_REGS) {
  5504. printk(KERN_INFO "perfmon: unsupported number of code debug registers (%u)\n", pmu_conf->num_ibrs);
  5505. pmu_conf = NULL;
  5506. return -1;
  5507. }
  5508. if (pmu_conf->num_dbrs > IA64_NUM_DBG_REGS) {
  5509. printk(KERN_INFO "perfmon: unsupported number of data debug registers (%u)\n", pmu_conf->num_ibrs);
  5510. pmu_conf = NULL;
  5511. return -1;
  5512. }
  5513. }
  5514. printk("perfmon: %s PMU detected, %u PMCs, %u PMDs, %u counters (%lu bits)\n",
  5515. pmu_conf->pmu_name,
  5516. pmu_conf->num_pmcs,
  5517. pmu_conf->num_pmds,
  5518. pmu_conf->num_counters,
  5519. ffz(pmu_conf->ovfl_val));
  5520. /* sanity check */
  5521. if (pmu_conf->num_pmds >= PFM_NUM_PMD_REGS || pmu_conf->num_pmcs >= PFM_NUM_PMC_REGS) {
  5522. printk(KERN_ERR "perfmon: not enough pmc/pmd, perfmon disabled\n");
  5523. pmu_conf = NULL;
  5524. return -1;
  5525. }
  5526. /*
  5527. * create /proc/perfmon (mostly for debugging purposes)
  5528. */
  5529. perfmon_dir = proc_create("perfmon", S_IRUGO, NULL, &pfm_proc_fops);
  5530. if (perfmon_dir == NULL) {
  5531. printk(KERN_ERR "perfmon: cannot create /proc entry, perfmon disabled\n");
  5532. pmu_conf = NULL;
  5533. return -1;
  5534. }
  5535. /*
  5536. * create /proc/sys/kernel/perfmon (for debugging purposes)
  5537. */
  5538. pfm_sysctl_header = register_sysctl_table(pfm_sysctl_root);
  5539. /*
  5540. * initialize all our spinlocks
  5541. */
  5542. spin_lock_init(&pfm_sessions.pfs_lock);
  5543. spin_lock_init(&pfm_buffer_fmt_lock);
  5544. init_pfm_fs();
  5545. for(i=0; i < NR_CPUS; i++) pfm_stats[i].pfm_ovfl_intr_cycles_min = ~0UL;
  5546. return 0;
  5547. }
  5548. __initcall(pfm_init);
  5549. /*
  5550. * this function is called before pfm_init()
  5551. */
  5552. void
  5553. pfm_init_percpu (void)
  5554. {
  5555. static int first_time=1;
  5556. /*
  5557. * make sure no measurement is active
  5558. * (may inherit programmed PMCs from EFI).
  5559. */
  5560. pfm_clear_psr_pp();
  5561. pfm_clear_psr_up();
  5562. /*
  5563. * we run with the PMU not frozen at all times
  5564. */
  5565. pfm_unfreeze_pmu();
  5566. if (first_time) {
  5567. register_percpu_irq(IA64_PERFMON_VECTOR, &perfmon_irqaction);
  5568. first_time=0;
  5569. }
  5570. ia64_setreg(_IA64_REG_CR_PMV, IA64_PERFMON_VECTOR);
  5571. ia64_srlz_d();
  5572. }
  5573. /*
  5574. * used for debug purposes only
  5575. */
  5576. void
  5577. dump_pmu_state(const char *from)
  5578. {
  5579. struct task_struct *task;
  5580. struct pt_regs *regs;
  5581. pfm_context_t *ctx;
  5582. unsigned long psr, dcr, info, flags;
  5583. int i, this_cpu;
  5584. local_irq_save(flags);
  5585. this_cpu = smp_processor_id();
  5586. regs = task_pt_regs(current);
  5587. info = PFM_CPUINFO_GET();
  5588. dcr = ia64_getreg(_IA64_REG_CR_DCR);
  5589. if (info == 0 && ia64_psr(regs)->pp == 0 && (dcr & IA64_DCR_PP) == 0) {
  5590. local_irq_restore(flags);
  5591. return;
  5592. }
  5593. printk("CPU%d from %s() current [%d] iip=0x%lx %s\n",
  5594. this_cpu,
  5595. from,
  5596. task_pid_nr(current),
  5597. regs->cr_iip,
  5598. current->comm);
  5599. task = GET_PMU_OWNER();
  5600. ctx = GET_PMU_CTX();
  5601. printk("->CPU%d owner [%d] ctx=%p\n", this_cpu, task ? task_pid_nr(task) : -1, ctx);
  5602. psr = pfm_get_psr();
  5603. printk("->CPU%d pmc0=0x%lx psr.pp=%d psr.up=%d dcr.pp=%d syst_info=0x%lx user_psr.up=%d user_psr.pp=%d\n",
  5604. this_cpu,
  5605. ia64_get_pmc(0),
  5606. psr & IA64_PSR_PP ? 1 : 0,
  5607. psr & IA64_PSR_UP ? 1 : 0,
  5608. dcr & IA64_DCR_PP ? 1 : 0,
  5609. info,
  5610. ia64_psr(regs)->up,
  5611. ia64_psr(regs)->pp);
  5612. ia64_psr(regs)->up = 0;
  5613. ia64_psr(regs)->pp = 0;
  5614. for (i=1; PMC_IS_LAST(i) == 0; i++) {
  5615. if (PMC_IS_IMPL(i) == 0) continue;
  5616. printk("->CPU%d pmc[%d]=0x%lx thread_pmc[%d]=0x%lx\n", this_cpu, i, ia64_get_pmc(i), i, ctx->th_pmcs[i]);
  5617. }
  5618. for (i=1; PMD_IS_LAST(i) == 0; i++) {
  5619. if (PMD_IS_IMPL(i) == 0) continue;
  5620. printk("->CPU%d pmd[%d]=0x%lx thread_pmd[%d]=0x%lx\n", this_cpu, i, ia64_get_pmd(i), i, ctx->th_pmds[i]);
  5621. }
  5622. if (ctx) {
  5623. printk("->CPU%d ctx_state=%d vaddr=%p addr=%p fd=%d ctx_task=[%d] saved_psr_up=0x%lx\n",
  5624. this_cpu,
  5625. ctx->ctx_state,
  5626. ctx->ctx_smpl_vaddr,
  5627. ctx->ctx_smpl_hdr,
  5628. ctx->ctx_msgq_head,
  5629. ctx->ctx_msgq_tail,
  5630. ctx->ctx_saved_psr_up);
  5631. }
  5632. local_irq_restore(flags);
  5633. }
  5634. /*
  5635. * called from process.c:copy_thread(). task is new child.
  5636. */
  5637. void
  5638. pfm_inherit(struct task_struct *task, struct pt_regs *regs)
  5639. {
  5640. struct thread_struct *thread;
  5641. DPRINT(("perfmon: pfm_inherit clearing state for [%d]\n", task_pid_nr(task)));
  5642. thread = &task->thread;
  5643. /*
  5644. * cut links inherited from parent (current)
  5645. */
  5646. thread->pfm_context = NULL;
  5647. PFM_SET_WORK_PENDING(task, 0);
  5648. /*
  5649. * the psr bits are already set properly in copy_threads()
  5650. */
  5651. }
  5652. #else /* !CONFIG_PERFMON */
  5653. asmlinkage long
  5654. sys_perfmonctl (int fd, int cmd, void *arg, int count)
  5655. {
  5656. return -ENOSYS;
  5657. }
  5658. #endif /* CONFIG_PERFMON */