1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21 /*
22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
23 * Use is subject to license terms.
24 * Copyright (c) 2016 by Delphix. All rights reserved.
25 */
26
27 #include <libcpc.h>
28 #include <stdio.h>
29 #include <stdlib.h>
30 #include <errno.h>
31 #include <strings.h>
32 #include <unistd.h>
33 #include <stropts.h>
34 #include <libintl.h>
35 #include <signal.h>
36 #include <sys/syscall.h>
37 #include <sys/types.h>
38 #include <sys/processor.h>
39 #include <sys/procset.h>
40
41 #include "libcpc_impl.h"
42
43 #define MASK32 0xFFFFFFFF
44
45 /*
46 * The library uses the cpc_lock field of the cpc_t struct to protect access to
47 * the linked lists inside the cpc_t, and only the linked lists. It is NOT used
48 * to protect against users shooting themselves in the foot (such as, for
49 * instance, destroying the same set at the same time from different threads.).
50 *
51 * SIGEMT needs to be blocked while holding the lock, to prevent deadlock among
52 * an app holding the lock and a signal handler attempting to sample or bind.
53 */
54
55 static char *cpc_get_list(int which, int arg);
56 static void cpc_err(cpc_t *cpc, const char *fn, int subcode, ...);
57 static int cpc_set_valid(cpc_t *cpc, cpc_set_t *set);
58 static int cpc_lock(cpc_t *cpc);
59 static void cpc_unlock(cpc_t *cpc, int blocked);
60 static int cpc_valid_event(cpc_t *cpc, uint_t pic, const char *ev);
61 static int cpc_valid_attr(cpc_t *cpc, char *attr);
62 static void cpc_invalidate_pctx(cpc_t *cpc, pctx_t *pctx);
63
64 cpc_t *
cpc_open(int ver)65 cpc_open(int ver)
66 {
67 cpc_t *cpc;
68 void (*sigsaved)();
69 int error = 0;
70 int i;
71 int j;
72
73 if (ver != CPC_VER_CURRENT) {
74 /*
75 * v1 clients must stick to the v1 interface: cpc_version()
76 */
77 errno = EINVAL;
78 return (NULL);
79 }
80
81 /*
82 * Call the syscall with invalid parameters. If we get ENOSYS this CPU
83 * has no CPC support. We need to block SIGSYS because the syscall code
84 * will send the signal if the system call fails to load.
85 */
86 sigsaved = signal(SIGSYS, SIG_IGN);
87 if (syscall(SYS_cpc, -1, -1, -1, -1, -1) != -1) {
88 (void) signal(SIGSYS, sigsaved);
89 errno = EINVAL;
90 return (NULL);
91 }
92 error = errno;
93 (void) signal(SIGSYS, sigsaved);
94
95 if (error != EINVAL) {
96 errno = error;
97 return (NULL);
98 }
99
100 if ((cpc = malloc(sizeof (cpc_t))) == NULL) {
101 errno = ENOMEM;
102 return (NULL);
103 }
104
105 cpc->cpc_npic = syscall(SYS_cpc, CPC_NPIC, -1, 0, 0, 0);
106 cpc->cpc_caps = syscall(SYS_cpc, CPC_CAPS, -1, 0, 0, 0);
107
108 if (syscall(SYS_cpc, CPC_IMPL_NAME, -1, &cpc->cpc_cciname, 0, 0) != 0)
109 return (NULL);
110 if (syscall(SYS_cpc, CPC_CPUREF, -1, &cpc->cpc_cpuref, 0, 0) != 0)
111 return (NULL);
112
113
114 if ((cpc->cpc_attrlist = cpc_get_list(CPC_LIST_ATTRS, 0)) == NULL) {
115 free(cpc);
116 return (NULL);
117 }
118
119 if ((cpc->cpc_evlist = malloc(cpc->cpc_npic * sizeof (char *))) ==
120 NULL) {
121 free(cpc->cpc_attrlist);
122 free(cpc);
123 return (NULL);
124 }
125
126 for (i = 0; i < cpc->cpc_npic; i++) {
127 if ((cpc->cpc_evlist[i] = cpc_get_list(CPC_LIST_EVENTS, i)) ==
128 NULL)
129 break;
130 }
131 if (i != cpc->cpc_npic) {
132 for (j = 0; j < i; j++)
133 free(cpc->cpc_evlist[j]);
134 free(cpc->cpc_evlist);
135 free(cpc->cpc_attrlist);
136 free(cpc);
137 return (NULL);
138 }
139
140 cpc->cpc_sets = NULL;
141 cpc->cpc_bufs = NULL;
142 cpc->cpc_errfn = NULL;
143 (void) mutex_init(&cpc->cpc_lock, USYNC_THREAD, NULL);
144 __pctx_cpc_register_callback(cpc_invalidate_pctx);
145
146 return (cpc);
147 }
148
149 /*
150 * Ensure state is cleaned up:
151 *
152 * - Hardware is unbound
153 * - Sets are all destroyed
154 * - Bufs are all freed
155 */
156 int
cpc_close(cpc_t * cpc)157 cpc_close(cpc_t *cpc)
158 {
159 while (cpc->cpc_sets != NULL) {
160 if (cpc->cpc_sets->cs_state != CS_UNBOUND)
161 (void) cpc_unbind(cpc, cpc->cpc_sets);
162 (void) cpc_set_destroy(cpc, cpc->cpc_sets);
163 }
164
165 while (cpc->cpc_bufs != NULL)
166 (void) cpc_buf_destroy(cpc, cpc->cpc_bufs);
167
168 free(cpc);
169 return (0);
170 }
171
172 /*
173 * Terminate everything that runs in pctx_run
174 */
175 void
cpc_terminate(cpc_t * cpc)176 cpc_terminate(cpc_t *cpc)
177 {
178 cpc_set_t *csp;
179 int sigblocked;
180
181 sigblocked = cpc_lock(cpc);
182 for (csp = cpc->cpc_sets; csp != NULL; csp = csp->cs_next) {
183 if (csp->cs_pctx != NULL)
184 pctx_terminate(csp->cs_pctx);
185 }
186 cpc_unlock(cpc, sigblocked);
187 }
188
189 cpc_set_t *
cpc_set_create(cpc_t * cpc)190 cpc_set_create(cpc_t *cpc)
191 {
192 cpc_set_t *set;
193 int sigblocked;
194
195 if ((set = malloc(sizeof (*set))) == NULL) {
196 errno = ENOMEM;
197 return (NULL);
198 }
199
200 set->cs_request = NULL;
201 set->cs_nreqs = 0;
202 set->cs_state = CS_UNBOUND;
203 set->cs_fd = -1;
204 set->cs_pctx = NULL;
205 set->cs_id = -1;
206 set->cs_thr = 0;
207
208 sigblocked = cpc_lock(cpc);
209 set->cs_next = cpc->cpc_sets;
210 cpc->cpc_sets = set;
211 cpc_unlock(cpc, sigblocked);
212
213 return (set);
214 }
215
216 int
cpc_set_destroy(cpc_t * cpc,cpc_set_t * set)217 cpc_set_destroy(cpc_t *cpc, cpc_set_t *set)
218 {
219 cpc_set_t *csp, *prev;
220 cpc_request_t *req, *next;
221 int sigblocked;
222
223 /*
224 * Remove this set from the cpc handle's list of sets.
225 */
226 sigblocked = cpc_lock(cpc);
227 for (csp = prev = cpc->cpc_sets; csp != NULL; csp = csp->cs_next) {
228 if (csp == set)
229 break;
230 prev = csp;
231 }
232 if (csp == NULL) {
233 cpc_unlock(cpc, sigblocked);
234 errno = EINVAL;
235 return (-1);
236 }
237 if (csp == cpc->cpc_sets)
238 cpc->cpc_sets = csp->cs_next;
239 prev->cs_next = csp->cs_next;
240 cpc_unlock(cpc, sigblocked);
241
242 if (csp->cs_state != CS_UNBOUND)
243 (void) cpc_unbind(cpc, csp);
244
245 /*
246 * Detach from the process
247 */
248 if (csp->cs_pctx != NULL) {
249 pctx_release(csp->cs_pctx);
250 csp->cs_pctx = NULL;
251 }
252
253 for (req = csp->cs_request; req != NULL; req = next) {
254 next = req->cr_next;
255
256 if (req->cr_nattrs != 0)
257 free(req->cr_attr);
258
259 free(req);
260 }
261
262
263 free(set);
264
265 return (0);
266 }
267
268 /*ARGSUSED*/
269 int
cpc_set_add_request(cpc_t * cpc,cpc_set_t * set,const char * event,uint64_t preset,uint_t flags,uint_t nattrs,const cpc_attr_t * attrs)270 cpc_set_add_request(cpc_t *cpc, cpc_set_t *set, const char *event,
271 uint64_t preset, uint_t flags, uint_t nattrs, const cpc_attr_t *attrs)
272 {
273 cpc_request_t *req;
274 const char *fn = "cpc_set_add_request";
275 int i;
276 int npics = cpc_npic(cpc);
277
278 if (cpc_set_valid(cpc, set) != 0 || set->cs_state != CS_UNBOUND) {
279 errno = EINVAL;
280 return (-1);
281 }
282
283 for (i = 0; i < npics; i++)
284 if (cpc_valid_event(cpc, i, event))
285 break;
286 if (i == npics) {
287 cpc_err(cpc, fn, CPC_INVALID_EVENT);
288 errno = EINVAL;
289 return (-1);
290 }
291
292 if ((req = malloc(sizeof (*req))) == NULL) {
293 errno = ENOMEM;
294 return (-1);
295 }
296
297 (void) strncpy(req->cr_event, event, CPC_MAX_EVENT_LEN);
298 req->cr_preset = preset;
299 req->cr_flags = flags;
300 req->cr_nattrs = nattrs;
301 req->cr_index = set->cs_nreqs;
302 req->cr_attr = NULL;
303
304 if (nattrs != 0) {
305 for (i = 0; i < nattrs; i++) {
306 /*
307 * Verify that each attribute name is legal and valid.
308 */
309 if (attrs[i].ca_name[0] == '\0' ||
310 cpc_valid_attr(cpc, attrs[i].ca_name) == 0) {
311 cpc_err(cpc, fn, CPC_INVALID_ATTRIBUTE);
312 goto inval;
313 }
314
315 /*
316 * If the user requested a specific picnum, ensure that
317 * the pic can count the requested event.
318 */
319 if (strncmp("picnum", attrs[i].ca_name, 8) == 0) {
320 if (attrs[i].ca_val >= npics) {
321 cpc_err(cpc, fn, CPC_INVALID_PICNUM);
322 goto inval;
323 }
324
325 if (cpc_valid_event(cpc, attrs[i].ca_val,
326 req->cr_event) == 0) {
327 cpc_err(cpc, fn, CPC_PIC_NOT_CAPABLE);
328 goto inval;
329 }
330 }
331 }
332
333 if ((req->cr_attr = malloc(nattrs * sizeof (kcpc_attr_t)))
334 == NULL) {
335 free(req);
336 return (-1);
337 }
338
339 for (i = 0; i < nattrs; i++) {
340 req->cr_attr[i].ka_val = attrs[i].ca_val;
341 (void) strncpy(req->cr_attr[i].ka_name,
342 attrs[i].ca_name, CPC_MAX_ATTR_LEN);
343 }
344 } else
345 req->cr_attr = NULL;
346
347 req->cr_next = set->cs_request;
348 set->cs_request = req;
349 set->cs_nreqs++;
350
351 return (req->cr_index);
352
353 inval:
354 free(req);
355 errno = EINVAL;
356 return (-1);
357 }
358
359 cpc_buf_t *
cpc_buf_create(cpc_t * cpc,cpc_set_t * set)360 cpc_buf_create(cpc_t *cpc, cpc_set_t *set)
361 {
362 cpc_buf_t *buf;
363 int sigblocked;
364
365 if (cpc_set_valid(cpc, set) != 0) {
366 errno = EINVAL;
367 return (NULL);
368 }
369
370 if ((buf = malloc(sizeof (*buf))) == NULL)
371 return (NULL);
372
373 buf->cb_size = set->cs_nreqs * sizeof (uint64_t);
374 if ((buf->cb_data = malloc(buf->cb_size)) == NULL) {
375 free(buf);
376 return (NULL);
377 }
378
379 bzero(buf->cb_data, buf->cb_size);
380
381 buf->cb_hrtime = 0;
382 buf->cb_tick = 0;
383
384 sigblocked = cpc_lock(cpc);
385 buf->cb_next = cpc->cpc_bufs;
386 cpc->cpc_bufs = buf;
387 cpc_unlock(cpc, sigblocked);
388
389 return (buf);
390 }
391
392 int
cpc_buf_destroy(cpc_t * cpc,cpc_buf_t * buf)393 cpc_buf_destroy(cpc_t *cpc, cpc_buf_t *buf)
394 {
395 cpc_buf_t *cbp, *prev;
396 int sigblocked;
397
398 /*
399 * Remove this buf from the cpc handle's list of bufs.
400 */
401 sigblocked = cpc_lock(cpc);
402 for (cbp = prev = cpc->cpc_bufs; cbp != NULL; cbp = cbp->cb_next) {
403 if (cbp == buf)
404 break;
405 prev = cbp;
406 }
407 if (cbp == NULL) {
408 cpc_unlock(cpc, sigblocked);
409 errno = EINVAL;
410 return (-1);
411 }
412 if (cbp == cpc->cpc_bufs)
413 cpc->cpc_bufs = cbp->cb_next;
414 prev->cb_next = cbp->cb_next;
415
416 cpc_unlock(cpc, sigblocked);
417 free(cbp->cb_data);
418 free(cbp);
419
420 return (0);
421 }
422
423 /*ARGSUSED*/
424 int
cpc_bind_curlwp(cpc_t * cpc,cpc_set_t * set,uint_t flags)425 cpc_bind_curlwp(cpc_t *cpc, cpc_set_t *set, uint_t flags)
426 {
427 char *packed_set;
428 size_t packsize;
429 int ret;
430 int subcode = -1;
431
432 /*
433 * We don't bother checking cpc_set_valid() here, because this is in the
434 * fast path of an app doing SIGEMT-based profiling as they restart the
435 * counters from their signal handler.
436 */
437 if (CPC_SET_VALID_FLAGS(flags) == 0 || set->cs_nreqs <= 0) {
438 errno = EINVAL;
439 return (-1);
440 }
441
442 if ((packed_set = __cpc_pack_set(set, flags, &packsize)) == NULL) {
443 errno = ENOMEM;
444 return (-1);
445 }
446
447 ret = syscall(SYS_cpc, CPC_BIND, -1, packed_set, packsize, &subcode);
448 free(packed_set);
449
450 if (ret != 0) {
451 if (subcode != -1)
452 cpc_err(cpc, "cpc_bind_curlwp", subcode);
453 return (-1);
454 }
455
456 set->cs_thr = thr_self();
457 set->cs_state = CS_BOUND_CURLWP;
458 return (ret);
459 }
460
461 /*ARGSUSED*/
462 int
cpc_bind_pctx(cpc_t * cpc,pctx_t * pctx,id_t id,cpc_set_t * set,uint_t flags)463 cpc_bind_pctx(cpc_t *cpc, pctx_t *pctx, id_t id, cpc_set_t *set, uint_t flags)
464 {
465 char *packed_set;
466 size_t packsize;
467 int ret;
468 int subcode = -1;
469
470 /*
471 * cpc_bind_pctx() currently has no valid flags.
472 */
473 if (flags != 0 || cpc_set_valid(cpc, set) != 0 || set->cs_nreqs <= 0) {
474 errno = EINVAL;
475 return (-1);
476 }
477
478 if ((packed_set = __cpc_pack_set(set, flags, &packsize)) == NULL) {
479 errno = ENOMEM;
480 return (-1);
481 }
482
483 ret = __pctx_cpc(pctx, cpc, CPC_BIND, id, packed_set, (void *)packsize,
484 (void *)&subcode, -1);
485
486 free(packed_set);
487
488 if (ret == 0) {
489 set->cs_pctx = pctx;
490 set->cs_id = id;
491 set->cs_state = CS_BOUND_PCTX;
492 } else if (subcode != -1)
493 cpc_err(cpc, "cpc_bind_pctx", subcode);
494
495 return (ret);
496 }
497
498 /*ARGSUSED*/
499 int
cpc_bind_cpu(cpc_t * cpc,processorid_t id,cpc_set_t * set,uint_t flags)500 cpc_bind_cpu(cpc_t *cpc, processorid_t id, cpc_set_t *set, uint_t flags)
501 {
502 int fd;
503 char *packed_set;
504 size_t packsize;
505 __cpc_args_t cpc_args;
506 int error;
507 const char *fn = "cpc_bind_cpu";
508 int subcode = -1;
509
510 /*
511 * cpc_bind_cpu() currently has no valid flags.
512 */
513 if (flags != 0 || cpc_set_valid(cpc, set) != 0 || set->cs_nreqs <= 0) {
514 errno = EINVAL;
515 return (-1);
516 }
517
518 if (processor_bind(P_LWPID, P_MYID, id, &set->cs_obind) == -1) {
519 cpc_err(cpc, fn, CPC_PBIND_FAILED);
520 return (-1);
521 }
522
523 if ((fd = open(CPUDRV_SHARED, O_RDWR)) < 0) {
524 error = errno;
525 (void) processor_bind(P_LWPID, P_MYID, set->cs_obind, NULL);
526 errno = error;
527 return (-1);
528 }
529
530 /*
531 * To avoid leaking file descriptors, if we find an existing fd here we
532 * just close it. This is only a problem if a user attempts to bind the
533 * same set to different CPUs without first unbinding it.
534 */
535 if (set->cs_fd != -1)
536 (void) close(set->cs_fd);
537 set->cs_fd = fd;
538
539 if ((packed_set = __cpc_pack_set(set, flags, &packsize)) == NULL) {
540 (void) close(fd);
541 (void) processor_bind(P_LWPID, P_MYID, set->cs_obind, NULL);
542 errno = ENOMEM;
543 return (-1);
544 }
545
546 cpc_args.udata1 = packed_set;
547 cpc_args.udata2 = (void *)packsize;
548 cpc_args.udata3 = (void *)&subcode;
549
550 if (ioctl(fd, CPCIO_BIND, &cpc_args) != 0) {
551 error = errno;
552 free(packed_set);
553 (void) close(fd);
554 (void) processor_bind(P_LWPID, P_MYID, set->cs_obind, NULL);
555 if (subcode != -1)
556 cpc_err(cpc, fn, subcode);
557 errno = error;
558 return (-1);
559 }
560
561 free(packed_set);
562
563 set->cs_thr = thr_self();
564 set->cs_state = CS_BOUND_CPU;
565
566 return (0);
567 }
568
569 /*ARGSUSED*/
570 int
cpc_request_preset(cpc_t * cpc,int index,uint64_t preset)571 cpc_request_preset(cpc_t *cpc, int index, uint64_t preset)
572 {
573 return (syscall(SYS_cpc, CPC_PRESET, -1, index,
574 (uint32_t)(preset >> 32), (uint32_t)(preset & MASK32)));
575 }
576
577 /*ARGSUSED*/
578 int
cpc_set_restart(cpc_t * cpc,cpc_set_t * set)579 cpc_set_restart(cpc_t *cpc, cpc_set_t *set)
580 {
581 return (syscall(SYS_cpc, CPC_RESTART, -1, 0, 0, 0));
582 }
583
584 /*ARGSUSED*/
585 int
cpc_unbind(cpc_t * cpc,cpc_set_t * set)586 cpc_unbind(cpc_t *cpc, cpc_set_t *set)
587 {
588 int ret = 0;
589 int error;
590
591 if (cpc_set_valid(cpc, set) != 0) {
592 errno = EINVAL;
593 return (-1);
594 }
595
596 switch (set->cs_state) {
597 case CS_UNBOUND:
598 errno = EINVAL;
599 return (-1);
600 case CS_BOUND_CURLWP:
601 ret = syscall(SYS_cpc, CPC_RELE, -1, 0, 0, 0);
602 error = errno;
603 break;
604 case CS_BOUND_CPU:
605 ret = ioctl(set->cs_fd, CPCIO_RELE, NULL);
606 error = errno;
607 (void) close(set->cs_fd);
608 set->cs_fd = -1;
609 (void) processor_bind(P_LWPID, P_MYID, set->cs_obind, NULL);
610 break;
611 case CS_BOUND_PCTX:
612 if (set->cs_pctx != NULL) {
613 ret = __pctx_cpc(set->cs_pctx, cpc, CPC_RELE,
614 set->cs_id, 0, 0, 0, 0);
615 error = errno;
616 }
617 break;
618 }
619
620 set->cs_thr = 0;
621 set->cs_id = -1;
622 set->cs_state = CS_UNBOUND;
623 if (ret != 0)
624 errno = error;
625 return (ret);
626 }
627
628 /*ARGSUSED*/
629 int
cpc_set_sample(cpc_t * cpc,cpc_set_t * set,cpc_buf_t * buf)630 cpc_set_sample(cpc_t *cpc, cpc_set_t *set, cpc_buf_t *buf)
631 {
632 __cpc_args_t args;
633
634 /*
635 * The following check ensures that only the most recently bound set
636 * can be sampled, as binding a set invalidates all other sets in the
637 * cpc_t.
638 */
639 if (set->cs_state == CS_UNBOUND ||
640 buf->cb_size != set->cs_nreqs * sizeof (uint64_t)) {
641 errno = EINVAL;
642 return (-1);
643 }
644
645 switch (set->cs_state) {
646 case CS_BOUND_CURLWP:
647 return (syscall(SYS_cpc, CPC_SAMPLE, -1, buf->cb_data,
648 &buf->cb_hrtime, &buf->cb_tick));
649 case CS_BOUND_CPU:
650 args.udata1 = buf->cb_data;
651 args.udata2 = &buf->cb_hrtime;
652 args.udata3 = &buf->cb_tick;
653 return (ioctl(set->cs_fd, CPCIO_SAMPLE, &args));
654 case CS_BOUND_PCTX:
655 return (__pctx_cpc(set->cs_pctx, cpc, CPC_SAMPLE, set->cs_id,
656 buf->cb_data, &buf->cb_hrtime, &buf->cb_tick,
657 buf->cb_size));
658 }
659
660 errno = EINVAL;
661 return (-1);
662 }
663
664 /*ARGSUSED*/
665 void
cpc_buf_sub(cpc_t * cpc,cpc_buf_t * ds,cpc_buf_t * a,cpc_buf_t * b)666 cpc_buf_sub(cpc_t *cpc, cpc_buf_t *ds, cpc_buf_t *a, cpc_buf_t *b)
667 {
668 int i;
669
670 if (a->cb_size != ds->cb_size || b->cb_size != ds->cb_size)
671 return;
672
673 ds->cb_hrtime = (a->cb_hrtime > b->cb_hrtime) ?
674 a->cb_hrtime : b->cb_hrtime;
675 ds->cb_tick = a->cb_tick - b->cb_tick;
676
677 for (i = 0; i < ds->cb_size / sizeof (uint64_t); i++)
678 ds->cb_data[i] = a->cb_data[i] - b->cb_data[i];
679 }
680
681 /*ARGSUSED*/
682 void
cpc_buf_add(cpc_t * cpc,cpc_buf_t * ds,cpc_buf_t * a,cpc_buf_t * b)683 cpc_buf_add(cpc_t *cpc, cpc_buf_t *ds, cpc_buf_t *a, cpc_buf_t *b)
684 {
685 int i;
686
687 if (a->cb_size != ds->cb_size || b->cb_size != ds->cb_size)
688 return;
689
690 ds->cb_hrtime = (a->cb_hrtime > b->cb_hrtime) ?
691 a->cb_hrtime : b->cb_hrtime;
692 ds->cb_tick = a->cb_tick + b->cb_tick;
693
694 for (i = 0; i < ds->cb_size / sizeof (uint64_t); i++)
695 ds->cb_data[i] = a->cb_data[i] + b->cb_data[i];
696 }
697
698 /*ARGSUSED*/
699 void
cpc_buf_copy(cpc_t * cpc,cpc_buf_t * ds,cpc_buf_t * src)700 cpc_buf_copy(cpc_t *cpc, cpc_buf_t *ds, cpc_buf_t *src)
701 {
702 if (ds->cb_size != src->cb_size)
703 return;
704
705 bcopy(src->cb_data, ds->cb_data, ds->cb_size);
706 ds->cb_hrtime = src->cb_hrtime;
707 ds->cb_tick = src->cb_tick;
708 }
709
710 /*ARGSUSED*/
711 void
cpc_buf_zero(cpc_t * cpc,cpc_buf_t * buf)712 cpc_buf_zero(cpc_t *cpc, cpc_buf_t *buf)
713 {
714 bzero(buf->cb_data, buf->cb_size);
715 buf->cb_hrtime = 0;
716 buf->cb_tick = 0;
717 }
718
719 /*
720 * Gets or sets the value of the request specified by index.
721 */
722 /*ARGSUSED*/
723 int
cpc_buf_get(cpc_t * cpc,cpc_buf_t * buf,int index,uint64_t * val)724 cpc_buf_get(cpc_t *cpc, cpc_buf_t *buf, int index, uint64_t *val)
725 {
726 *val = buf->cb_data[index];
727
728 return (0);
729 }
730
731 /*ARGSUSED*/
732 int
cpc_buf_set(cpc_t * cpc,cpc_buf_t * buf,int index,uint64_t val)733 cpc_buf_set(cpc_t *cpc, cpc_buf_t *buf, int index, uint64_t val)
734 {
735 buf->cb_data[index] = val;
736
737 return (0);
738 }
739
740 /*ARGSUSED*/
741 hrtime_t
cpc_buf_hrtime(cpc_t * cpc,cpc_buf_t * buf)742 cpc_buf_hrtime(cpc_t *cpc, cpc_buf_t *buf)
743 {
744 return (buf->cb_hrtime);
745 }
746
747 /*ARGSUSED*/
748 uint64_t
cpc_buf_tick(cpc_t * cpc,cpc_buf_t * buf)749 cpc_buf_tick(cpc_t *cpc, cpc_buf_t *buf)
750 {
751 return (buf->cb_tick);
752 }
753
754 static char *
cpc_get_list(int which,int arg)755 cpc_get_list(int which, int arg)
756 {
757 int szcmd;
758 int size;
759 char *list;
760
761 if (which == CPC_LIST_ATTRS)
762 szcmd = CPC_ATTRLIST_SIZE;
763 else
764 szcmd = CPC_EVLIST_SIZE;
765
766 if (syscall(SYS_cpc, szcmd, -1, &size, arg, 0) != 0)
767 return (NULL);
768
769 if ((list = malloc(size)) == NULL)
770 return (NULL);
771
772 if (syscall(SYS_cpc, which, -1, list, arg, 0) != 0) {
773 free(list);
774 return (NULL);
775 }
776
777 return (list);
778 }
779
780 /*ARGSUSED*/
781 void
cpc_walk_requests(cpc_t * cpc,cpc_set_t * set,void * arg,void (* action)(void * arg,int index,const char * event,uint64_t preset,uint_t flags,int nattrs,const cpc_attr_t * attrs))782 cpc_walk_requests(cpc_t *cpc, cpc_set_t *set, void *arg,
783 void (*action)(void *arg, int index, const char *event, uint64_t preset,
784 uint_t flags, int nattrs, const cpc_attr_t *attrs))
785 {
786 cpc_request_t *rp;
787 cpc_attr_t *attrs = NULL;
788 int i;
789
790 for (rp = set->cs_request; rp != NULL; rp = rp->cr_next) {
791 /*
792 * Need to reconstruct a temporary cpc_attr_t array for req.
793 */
794 if (rp->cr_nattrs != 0)
795 if ((attrs = malloc(rp->cr_nattrs *
796 sizeof (cpc_attr_t))) == NULL)
797 return;
798 for (i = 0; i < rp->cr_nattrs; i++) {
799 attrs[i].ca_name = rp->cr_attr[i].ka_name;
800 attrs[i].ca_val = rp->cr_attr[i].ka_val;
801 }
802
803 action(arg, rp->cr_index, rp->cr_event, rp->cr_preset,
804 rp->cr_flags, rp->cr_nattrs, attrs);
805
806 if (rp->cr_nattrs != 0)
807 free(attrs);
808 }
809 }
810
811 /*ARGSUSED*/
812 static void
cpc_walk_events_impl(cpc_t * cpc,void * arg,void (* action)(void * arg,const char * event),int is_generic)813 cpc_walk_events_impl(cpc_t *cpc, void *arg,
814 void (*action)(void *arg, const char *event), int is_generic)
815 {
816 char **list;
817 char *p, *e;
818 int i;
819 int is_papi;
820 int ncounters = cpc_npic(cpc);
821 cpc_strhash_t *hash;
822
823 if ((list = malloc(ncounters * sizeof (char *))) == NULL)
824 return;
825
826 if ((hash = __cpc_strhash_alloc()) == NULL) {
827 free(list);
828 return;
829 }
830
831 for (i = 0; i < ncounters; i++) {
832 if ((list[i] = strdup(cpc->cpc_evlist[i])) == NULL)
833 goto err;
834 p = list[i];
835 while ((e = strchr(p, ',')) != NULL) {
836 *e = '\0';
837
838 /*
839 * Based on is_generic flag, skip appropriate
840 * event names.
841 */
842 is_papi = (strncmp(p, "PAPI", 4) == 0);
843 if (is_generic != is_papi) {
844 p = e + 1;
845 continue;
846 }
847
848 if (__cpc_strhash_add(hash, p) == -1)
849 goto err;
850
851 p = e + 1;
852 }
853
854 is_papi = (strncmp(p, "PAPI", 4) == 0);
855 if (is_generic == is_papi) {
856 if (__cpc_strhash_add(hash, p) == -1)
857 goto err;
858 }
859 }
860
861 while ((p = __cpc_strhash_next(hash)) != NULL)
862 action(arg, p);
863
864 err:
865 __cpc_strhash_free(hash);
866 for (i = 0; i < ncounters; i++)
867 free(list[i]);
868 free(list);
869 }
870
871 /*ARGSUSED*/
872 void
cpc_walk_events_all(cpc_t * cpc,void * arg,void (* action)(void * arg,const char * event))873 cpc_walk_events_all(cpc_t *cpc, void *arg,
874 void (*action)(void *arg, const char *event))
875 {
876 cpc_walk_events_impl(cpc, arg, action, 0);
877 }
878
879
880 /*ARGSUSED*/
881 void
cpc_walk_generic_events_all(cpc_t * cpc,void * arg,void (* action)(void * arg,const char * event))882 cpc_walk_generic_events_all(cpc_t *cpc, void *arg,
883 void (*action)(void *arg, const char *event))
884 {
885 cpc_walk_events_impl(cpc, arg, action, 1);
886 }
887
888 /*ARGSUSED*/
889 static void
cpc_walk_events_pic_impl(cpc_t * cpc,uint_t picno,void * arg,void (* action)(void * arg,uint_t picno,const char * event),int is_generic)890 cpc_walk_events_pic_impl(cpc_t *cpc, uint_t picno, void *arg,
891 void (*action)(void *arg, uint_t picno, const char *event), int is_generic)
892 {
893 char *p;
894 char *e;
895 char *list;
896 int is_papi;
897
898 if (picno >= cpc->cpc_npic) {
899 errno = EINVAL;
900 return;
901 }
902
903 if ((list = strdup(cpc->cpc_evlist[picno])) == NULL)
904 return;
905
906 /*
907 * List now points to a comma-separated list of events supported by
908 * the designated pic.
909 */
910 p = list;
911 while ((e = strchr(p, ',')) != NULL) {
912 *e = '\0';
913
914 /*
915 * Based on is_generic flag, skip appropriate
916 * event names.
917 */
918 is_papi = (strncmp(p, "PAPI", 4) == 0);
919 if (is_generic != is_papi) {
920 p = e + 1;
921 continue;
922 }
923
924 action(arg, picno, p);
925 p = e + 1;
926 }
927
928 is_papi = (strncmp(p, "PAPI", 4) == 0);
929 if (is_generic == is_papi)
930 action(arg, picno, p);
931
932 free(list);
933 }
934
935 /*ARGSUSED*/
936 void
cpc_walk_events_pic(cpc_t * cpc,uint_t picno,void * arg,void (* action)(void * arg,uint_t picno,const char * event))937 cpc_walk_events_pic(cpc_t *cpc, uint_t picno, void *arg,
938 void (*action)(void *arg, uint_t picno, const char *event))
939 {
940 cpc_walk_events_pic_impl(cpc, picno, arg, action, 0);
941 }
942
943 /*ARGSUSED*/
944 void
cpc_walk_generic_events_pic(cpc_t * cpc,uint_t picno,void * arg,void (* action)(void * arg,uint_t picno,const char * event))945 cpc_walk_generic_events_pic(cpc_t *cpc, uint_t picno, void *arg,
946 void (*action)(void *arg, uint_t picno, const char *event))
947 {
948 cpc_walk_events_pic_impl(cpc, picno, arg, action, 1);
949 }
950
951 /*ARGSUSED*/
952 void
cpc_walk_attrs(cpc_t * cpc,void * arg,void (* action)(void * arg,const char * attr))953 cpc_walk_attrs(cpc_t *cpc, void *arg,
954 void (*action)(void *arg, const char *attr))
955 {
956 char *p;
957 char *e;
958 char *list;
959
960 if ((list = strdup(cpc->cpc_attrlist)) == NULL)
961 return;
962
963 /*
964 * Platforms with no attributes will return an empty string.
965 */
966 if (*list == '\0')
967 return;
968
969 /*
970 * List now points to a comma-separated list of attributes supported by
971 * the underlying platform.
972 */
973 p = list;
974 while ((e = strchr(p, ',')) != NULL) {
975 *e = '\0';
976 action(arg, p);
977 p = e + 1;
978 }
979 action(arg, p);
980
981 free(list);
982 }
983
984 /*ARGSUSED*/
985 int
cpc_enable(cpc_t * cpc)986 cpc_enable(cpc_t *cpc)
987 {
988 return (syscall(SYS_cpc, CPC_ENABLE, -1, 0, 0, 0));
989 }
990
991 /*ARGSUSED*/
992 int
cpc_disable(cpc_t * cpc)993 cpc_disable(cpc_t *cpc)
994 {
995 return (syscall(SYS_cpc, CPC_DISABLE, -1, 0, 0, 0));
996 }
997
998 /*ARGSUSED*/
999 uint_t
cpc_npic(cpc_t * cpc)1000 cpc_npic(cpc_t *cpc)
1001 {
1002 return (cpc->cpc_npic);
1003 }
1004
1005 /*ARGSUSED*/
1006 uint_t
cpc_caps(cpc_t * cpc)1007 cpc_caps(cpc_t *cpc)
1008 {
1009 return (cpc->cpc_caps);
1010 }
1011
1012 const char *
cpc_cciname(cpc_t * cpc)1013 cpc_cciname(cpc_t *cpc)
1014 {
1015 return (cpc->cpc_cciname);
1016 }
1017
1018 const char *
cpc_cpuref(cpc_t * cpc)1019 cpc_cpuref(cpc_t *cpc)
1020 {
1021 return (cpc->cpc_cpuref);
1022 }
1023
1024 int
cpc_seterrhndlr(cpc_t * cpc,cpc_errhndlr_t * fn)1025 cpc_seterrhndlr(cpc_t *cpc, cpc_errhndlr_t *fn)
1026 {
1027 cpc->cpc_errfn = fn;
1028 return (0);
1029 }
1030
1031 /*
1032 * These strings may contain printf() conversion specifiers.
1033 */
1034 static const char *errstr[] = {
1035 "", /* zero slot filler */
1036 "Unknown event\n", /* CPC_INVALID_EVENT */
1037 "Invalid counter number\n", /* CPC_INVALID_PICNUM */
1038 "Unknown attribute\n", /* CPC_INVALID_ATTRIBUTE */
1039 "Attribute out of range\n", /* CPC_ATTRIBUTE_OUT_OF_RANGE */
1040 "Hardware resource unavailable\n", /* CPC_RESOURCE_UNAVAIL */
1041 "Counter cannot count requested event\n", /* CPC_PIC_NOT_CAPABLE */
1042 "Invalid flags in a request\n", /* CPC_REQ_INVALID_FLAGS */
1043 "Requests conflict with each other\n", /* CPC_CONFLICTING_REQS */
1044 "Attribute requires the cpc_cpu privilege\n", /* CPC_ATTR_REQUIRES_PRIVILEGE */
1045 "Couldn't bind LWP to requested processor\n", /* CPC_PBIND_FAILED */
1046 "Hypervisor event access denied\n" /* CPC_HV_NO_ACCESS */
1047 };
1048
1049 /*VARARGS3*/
1050 static void
cpc_err(cpc_t * cpc,const char * fn,int subcode,...)1051 cpc_err(cpc_t *cpc, const char *fn, int subcode, ...)
1052 {
1053 va_list ap;
1054 const char *str;
1055 int error;
1056
1057 /*
1058 * If subcode is -1, there is no specific description for this error.
1059 */
1060 if (subcode == -1)
1061 return;
1062
1063 /*
1064 * We need to preserve errno across calls to this function to prevent it
1065 * from being clobbered while here, or in the user's error handler.
1066 */
1067 error = errno;
1068
1069 str = dgettext(TEXT_DOMAIN, errstr[subcode]);
1070
1071 va_start(ap, subcode);
1072 if (cpc->cpc_errfn != NULL)
1073 cpc->cpc_errfn(fn, subcode, str, ap);
1074 else {
1075 /*
1076 * If printf() conversion specifiers are added to the errstr[]
1077 * table, this call needs to be changed to vfprintf().
1078 */
1079 (void) fprintf(stderr, "libcpc: %s: %s", fn, str);
1080 }
1081 va_end(ap);
1082
1083 errno = error;
1084 }
1085
1086 /*
1087 * Hook used by libpctx to alert libcpc when a pctx handle is going away.
1088 * This is necessary to prevent libcpc from attempting a libpctx operation on a
1089 * stale and invalid pctx_t handle. Since pctx_t's are cached by libcpc, we need
1090 * to be notified when they go away.
1091 */
1092 static void
cpc_invalidate_pctx(cpc_t * cpc,pctx_t * pctx)1093 cpc_invalidate_pctx(cpc_t *cpc, pctx_t *pctx)
1094 {
1095 cpc_set_t *set;
1096 int sigblocked;
1097
1098 sigblocked = cpc_lock(cpc);
1099 for (set = cpc->cpc_sets; set != NULL; set = set->cs_next)
1100 if (set->cs_pctx == pctx)
1101 set->cs_pctx = NULL;
1102 cpc_unlock(cpc, sigblocked);
1103 }
1104
1105 /*
1106 * Check that the set is valid; if so it will be in the cpc handle's
1107 * list of sets. The lock protects the list of sets, but not the set
1108 * itself.
1109 */
1110 static int
cpc_set_valid(cpc_t * cpc,cpc_set_t * set)1111 cpc_set_valid(cpc_t *cpc, cpc_set_t *set)
1112 {
1113 cpc_set_t *csp;
1114 int sigblocked;
1115
1116 sigblocked = cpc_lock(cpc);
1117 for (csp = cpc->cpc_sets; csp != NULL; csp = csp->cs_next)
1118 if (csp == set)
1119 break;
1120 cpc_unlock(cpc, sigblocked);
1121 if (csp == NULL)
1122 return (-1);
1123 return (0);
1124 }
1125
1126 static int
cpc_lock(cpc_t * cpc)1127 cpc_lock(cpc_t *cpc)
1128 {
1129 int ret = (sigset(SIGEMT, SIG_HOLD) == SIG_HOLD);
1130 (void) mutex_lock(&cpc->cpc_lock);
1131 return (ret);
1132 }
1133
1134 static void
cpc_unlock(cpc_t * cpc,int sigblocked)1135 cpc_unlock(cpc_t *cpc, int sigblocked)
1136 {
1137 (void) mutex_unlock(&cpc->cpc_lock);
1138 if (sigblocked == 0)
1139 (void) sigrelse(SIGEMT);
1140 }
1141
1142 struct priv {
1143 const char *name;
1144 int found;
1145 };
1146
1147 /*ARGSUSED*/
1148 static void
ev_walker(void * arg,uint_t picno,const char * ev)1149 ev_walker(void *arg, uint_t picno, const char *ev)
1150 {
1151 if (strcmp(((struct priv *)arg)->name, ev) == 0)
1152 ((struct priv *)arg)->found = 1;
1153 }
1154
1155 static void
at_walker(void * arg,const char * at)1156 at_walker(void *arg, const char *at)
1157 {
1158 if (strcmp(((struct priv *)arg)->name, at) == 0)
1159 ((struct priv *)arg)->found = 1;
1160 }
1161
1162 static int
cpc_valid_event(cpc_t * cpc,uint_t pic,const char * ev)1163 cpc_valid_event(cpc_t *cpc, uint_t pic, const char *ev)
1164 {
1165 struct priv pr = { NULL, 0 };
1166 char *end_ev;
1167 int err;
1168
1169 pr.name = ev;
1170 cpc_walk_events_pic(cpc, pic, &pr, ev_walker);
1171 if (pr.found)
1172 return (1);
1173
1174 cpc_walk_generic_events_pic(cpc, pic, &pr, ev_walker);
1175 if (pr.found)
1176 return (1);
1177
1178 /*
1179 * Before assuming this is an invalid event, see if we have been given
1180 * a raw event code.
1181 * Check the second argument of strtol() to ensure invalid events
1182 * beginning with number do not go through.
1183 */
1184 err = errno;
1185 errno = 0;
1186 (void) strtol(ev, &end_ev, 0);
1187 if ((errno == 0) && (*end_ev == '\0')) {
1188 /*
1189 * Success - this is a valid raw code in hex, decimal, or octal.
1190 */
1191 errno = err;
1192 return (1);
1193 }
1194
1195 errno = err;
1196 return (0);
1197 }
1198
1199 static int
cpc_valid_attr(cpc_t * cpc,char * attr)1200 cpc_valid_attr(cpc_t *cpc, char *attr)
1201 {
1202 struct priv pr = { NULL, 0 };
1203
1204 pr.name = attr;
1205 cpc_walk_attrs(cpc, &pr, at_walker);
1206 return (pr.found);
1207 }
1208