xref: /illumos-gate/usr/src/lib/libcpc/common/libcpc.c (revision 5e989a96186a37eb528fb7bb4d28a150874ec799)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #include <libcpc.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <errno.h>
30 #include <strings.h>
31 #include <unistd.h>
32 #include <stropts.h>
33 #include <libintl.h>
34 #include <signal.h>
35 #include <sys/syscall.h>
36 #include <sys/types.h>
37 #include <sys/processor.h>
38 #include <sys/procset.h>
39 
40 #include "libcpc_impl.h"
41 
42 #define	MASK32 0xFFFFFFFF
43 
44 /*
45  * The library uses the cpc_lock field of the cpc_t struct to protect access to
46  * the linked lists inside the cpc_t, and only the linked lists. It is NOT used
47  * to protect against a user shooting his/herself in the foot (such as, for
48  * instance, destroying the same set at the same time from different threads.).
49  *
50  * SIGEMT needs to be blocked while holding the lock, to prevent deadlock among
51  * an app holding the lock and a signal handler attempting to sample or bind.
52  */
53 
54 static char *cpc_get_list(int which, int arg);
55 static void cpc_err(cpc_t *cpc, const char *fn, int subcode, ...);
56 static int cpc_set_valid(cpc_t *cpc, cpc_set_t *set);
57 static int cpc_lock(cpc_t *cpc);
58 static void cpc_unlock(cpc_t *cpc, int blocked);
59 static int cpc_valid_event(cpc_t *cpc, uint_t pic, const char *ev);
60 static int cpc_valid_attr(cpc_t *cpc, char *attr);
61 static void cpc_invalidate_pctx(cpc_t *cpc, pctx_t *pctx);
62 
63 cpc_t *
64 cpc_open(int ver)
65 {
66 	cpc_t	*cpc;
67 	void	(*sigsaved)();
68 	int	error = 0;
69 	int	i;
70 	int	j;
71 
72 	if (ver != CPC_VER_CURRENT) {
73 		/*
74 		 * v1 clients must stick to the v1 interface: cpc_version()
75 		 */
76 		errno = EINVAL;
77 		return (NULL);
78 	}
79 
80 	/*
81 	 * Call the syscall with invalid parameters.  If we get ENOSYS this CPU
82 	 * has no CPC support.  We need to block SIGSYS because the syscall code
83 	 * will send the signal if the system call fails to load.
84 	 */
85 	sigsaved = signal(SIGSYS, SIG_IGN);
86 	if (syscall(SYS_cpc, -1, -1, -1, -1, -1) != -1) {
87 		(void) signal(SIGSYS, sigsaved);
88 		errno = EINVAL;
89 		return (NULL);
90 	}
91 	error = errno;
92 	(void) signal(SIGSYS, sigsaved);
93 
94 	if (error != EINVAL) {
95 		errno = error;
96 		return (NULL);
97 	}
98 
99 	if ((cpc = malloc(sizeof (cpc_t))) == NULL) {
100 		errno = ENOMEM;
101 		return (NULL);
102 	}
103 
104 	cpc->cpc_npic = syscall(SYS_cpc, CPC_NPIC, -1, 0, 0, 0);
105 	cpc->cpc_caps = syscall(SYS_cpc, CPC_CAPS, -1, 0, 0, 0);
106 
107 	if (syscall(SYS_cpc, CPC_IMPL_NAME, -1, &cpc->cpc_cciname, 0, 0) != 0)
108 		return (NULL);
109 	if (syscall(SYS_cpc, CPC_CPUREF, -1, &cpc->cpc_cpuref, 0, 0) != 0)
110 		return (NULL);
111 
112 
113 	if ((cpc->cpc_attrlist = cpc_get_list(CPC_LIST_ATTRS, 0)) == NULL) {
114 		free(cpc);
115 		return (NULL);
116 	}
117 
118 	if ((cpc->cpc_evlist = malloc(cpc->cpc_npic * sizeof (char *))) ==
119 	    NULL) {
120 		free(cpc->cpc_attrlist);
121 		free(cpc);
122 		return (NULL);
123 	}
124 
125 	for (i = 0; i < cpc->cpc_npic; i++) {
126 		if ((cpc->cpc_evlist[i] = cpc_get_list(CPC_LIST_EVENTS, i)) ==
127 		    NULL)
128 			break;
129 	}
130 	if (i != cpc->cpc_npic) {
131 		for (j = 0; j < i; j++)
132 			free(cpc->cpc_evlist[j]);
133 		free(cpc->cpc_evlist);
134 		free(cpc->cpc_attrlist);
135 		free(cpc);
136 		return (NULL);
137 	}
138 
139 	cpc->cpc_sets = NULL;
140 	cpc->cpc_bufs = NULL;
141 	cpc->cpc_errfn = NULL;
142 	(void) mutex_init(&cpc->cpc_lock, USYNC_THREAD, NULL);
143 	__pctx_cpc_register_callback(cpc_invalidate_pctx);
144 
145 	return (cpc);
146 }
147 
148 /*
149  * Ensure state is cleaned up:
150  *
151  * - Hardware is unbound
152  * - Sets are all destroyed
153  * - Bufs are all freed
154  */
155 int
156 cpc_close(cpc_t *cpc)
157 {
158 	while (cpc->cpc_sets != NULL) {
159 		if (cpc->cpc_sets->cs_state != CS_UNBOUND)
160 			(void) cpc_unbind(cpc, cpc->cpc_sets);
161 		(void) cpc_set_destroy(cpc, cpc->cpc_sets);
162 	}
163 
164 	while (cpc->cpc_bufs != NULL)
165 		(void) cpc_buf_destroy(cpc, cpc->cpc_bufs);
166 
167 	free(cpc);
168 	return (0);
169 }
170 
171 /*
172  * Terminate everything that runs in pctx_run
173  */
174 void
175 cpc_terminate(cpc_t *cpc)
176 {
177 	cpc_set_t	*csp;
178 	int		sigblocked;
179 
180 	sigblocked = cpc_lock(cpc);
181 	for (csp = cpc->cpc_sets; csp != NULL; csp = csp->cs_next) {
182 		if (csp->cs_pctx != NULL)
183 			pctx_terminate(csp->cs_pctx);
184 	}
185 	cpc_unlock(cpc, sigblocked);
186 }
187 
188 cpc_set_t *
189 cpc_set_create(cpc_t *cpc)
190 {
191 	cpc_set_t	*set;
192 	int		sigblocked;
193 
194 	if ((set = malloc(sizeof (*set))) == NULL) {
195 		errno = ENOMEM;
196 		return (NULL);
197 	}
198 
199 	set->cs_request = NULL;
200 	set->cs_nreqs	= 0;
201 	set->cs_state	= CS_UNBOUND;
202 	set->cs_fd	= -1;
203 	set->cs_pctx	= NULL;
204 	set->cs_id	= -1;
205 	set->cs_thr	= NULL;
206 
207 	sigblocked = cpc_lock(cpc);
208 	set->cs_next = cpc->cpc_sets;
209 	cpc->cpc_sets = set;
210 	cpc_unlock(cpc, sigblocked);
211 
212 	return (set);
213 }
214 
215 int
216 cpc_set_destroy(cpc_t *cpc, cpc_set_t *set)
217 {
218 	cpc_set_t	*csp, *prev;
219 	cpc_request_t	*req, *next;
220 	int		sigblocked;
221 
222 	/*
223 	 * Remove this set from the cpc handle's list of sets.
224 	 */
225 	sigblocked = cpc_lock(cpc);
226 	for (csp = prev = cpc->cpc_sets; csp != NULL; csp = csp->cs_next) {
227 		if (csp == set)
228 			break;
229 		prev = csp;
230 	}
231 	if (csp == NULL) {
232 		cpc_unlock(cpc, sigblocked);
233 		errno = EINVAL;
234 		return (-1);
235 	}
236 	if (csp == cpc->cpc_sets)
237 		cpc->cpc_sets = csp->cs_next;
238 	prev->cs_next = csp->cs_next;
239 	cpc_unlock(cpc, sigblocked);
240 
241 	if (csp->cs_state != CS_UNBOUND)
242 		(void) cpc_unbind(cpc, csp);
243 
244 	/*
245 	 * Detach from the process
246 	 */
247 	if (csp->cs_pctx != NULL) {
248 		pctx_release(csp->cs_pctx);
249 		csp->cs_pctx = NULL;
250 	}
251 
252 	for (req = csp->cs_request; req != NULL; req = next) {
253 		next = req->cr_next;
254 
255 		if (req->cr_nattrs != 0)
256 			free(req->cr_attr);
257 
258 		free(req);
259 	}
260 
261 
262 	free(set);
263 
264 	return (0);
265 }
266 
267 /*ARGSUSED*/
268 int
269 cpc_set_add_request(cpc_t *cpc, cpc_set_t *set, const char *event,
270     uint64_t preset, uint_t flags, uint_t nattrs, const cpc_attr_t *attrs)
271 {
272 	cpc_request_t	*req;
273 	const char	*fn = "cpc_set_add_request";
274 	int		i;
275 	int		npics = cpc_npic(cpc);
276 
277 	if (cpc_set_valid(cpc, set) != 0 || set->cs_state != CS_UNBOUND) {
278 		errno = EINVAL;
279 		return (-1);
280 	}
281 
282 	for (i = 0; i < npics; i++)
283 		if (cpc_valid_event(cpc, i, event))
284 			break;
285 	if (i == npics) {
286 		cpc_err(cpc, fn, CPC_INVALID_EVENT);
287 		errno = EINVAL;
288 		return (-1);
289 	}
290 
291 	if ((req = malloc(sizeof (*req))) == NULL) {
292 		errno = ENOMEM;
293 		return (-1);
294 	}
295 
296 	(void) strncpy(req->cr_event, event, CPC_MAX_EVENT_LEN);
297 	req->cr_preset = preset;
298 	req->cr_flags = flags;
299 	req->cr_nattrs = nattrs;
300 	req->cr_index = set->cs_nreqs;
301 	req->cr_attr = NULL;
302 
303 	if (nattrs != 0) {
304 		for (i = 0; i < nattrs; i++) {
305 			/*
306 			 * Verify that each attribute name is legal and valid.
307 			 */
308 			if (attrs[i].ca_name[0] == '\0' ||
309 			    cpc_valid_attr(cpc, attrs[i].ca_name) == 0) {
310 				cpc_err(cpc, fn, CPC_INVALID_ATTRIBUTE);
311 				goto inval;
312 			}
313 
314 			/*
315 			 * If the user requested a specific picnum, ensure that
316 			 * the pic can count the requested event.
317 			 */
318 			if (strncmp("picnum", attrs[i].ca_name, 8) == 0) {
319 				if (attrs[i].ca_val >= npics) {
320 					cpc_err(cpc, fn, CPC_INVALID_PICNUM);
321 					goto inval;
322 				}
323 
324 				if (cpc_valid_event(cpc, attrs[i].ca_val,
325 				    req->cr_event) == 0) {
326 					cpc_err(cpc, fn, CPC_PIC_NOT_CAPABLE);
327 					goto inval;
328 				}
329 			}
330 		}
331 
332 		if ((req->cr_attr = malloc(nattrs * sizeof (kcpc_attr_t)))
333 		    == NULL) {
334 			free(req);
335 			return (-1);
336 		}
337 
338 		for (i = 0; i < nattrs; i++) {
339 			req->cr_attr[i].ka_val = attrs[i].ca_val;
340 			(void) strncpy(req->cr_attr[i].ka_name,
341 			    attrs[i].ca_name, CPC_MAX_ATTR_LEN);
342 		}
343 	} else
344 		req->cr_attr = NULL;
345 
346 	req->cr_next = set->cs_request;
347 	set->cs_request = req;
348 	set->cs_nreqs++;
349 
350 	return (req->cr_index);
351 
352 inval:
353 	free(req);
354 	errno = EINVAL;
355 	return (-1);
356 }
357 
358 cpc_buf_t *
359 cpc_buf_create(cpc_t *cpc, cpc_set_t *set)
360 {
361 	cpc_buf_t	*buf;
362 	int		sigblocked;
363 
364 	if (cpc_set_valid(cpc, set) != 0) {
365 		errno = EINVAL;
366 		return (NULL);
367 	}
368 
369 	if ((buf = malloc(sizeof (*buf))) == NULL)
370 		return (NULL);
371 
372 	buf->cb_size = set->cs_nreqs * sizeof (uint64_t);
373 	if ((buf->cb_data = malloc(buf->cb_size)) == NULL) {
374 		free(buf);
375 		return (NULL);
376 	}
377 
378 	bzero(buf->cb_data, buf->cb_size);
379 
380 	buf->cb_hrtime = 0;
381 	buf->cb_tick = 0;
382 
383 	sigblocked = cpc_lock(cpc);
384 	buf->cb_next = cpc->cpc_bufs;
385 	cpc->cpc_bufs = buf;
386 	cpc_unlock(cpc, sigblocked);
387 
388 	return (buf);
389 }
390 
391 int
392 cpc_buf_destroy(cpc_t *cpc, cpc_buf_t *buf)
393 {
394 	cpc_buf_t	*cbp, *prev;
395 	int		sigblocked;
396 
397 	/*
398 	 * Remove this buf from the cpc handle's list of bufs.
399 	 */
400 	sigblocked = cpc_lock(cpc);
401 	for (cbp = prev = cpc->cpc_bufs; cbp != NULL; cbp = cbp->cb_next) {
402 		if (cbp == buf)
403 			break;
404 		prev = cbp;
405 	}
406 	if (cbp == NULL) {
407 		cpc_unlock(cpc, sigblocked);
408 		errno = EINVAL;
409 		return (-1);
410 	}
411 	if (cbp == cpc->cpc_bufs)
412 		cpc->cpc_bufs = cbp->cb_next;
413 	prev->cb_next = cbp->cb_next;
414 
415 	cpc_unlock(cpc, sigblocked);
416 	free(cbp->cb_data);
417 	free(cbp);
418 
419 	return (0);
420 }
421 
422 /*ARGSUSED*/
423 int
424 cpc_bind_curlwp(cpc_t *cpc, cpc_set_t *set, uint_t flags)
425 {
426 	char		*packed_set;
427 	size_t		packsize;
428 	int		ret;
429 	int		subcode = -1;
430 
431 	/*
432 	 * We don't bother checking cpc_set_valid() here, because this is in the
433 	 * fast path of an app doing SIGEMT-based profiling as they restart the
434 	 * counters from their signal handler.
435 	 */
436 	if (CPC_SET_VALID_FLAGS(flags) == 0 || set->cs_nreqs <= 0) {
437 		errno = EINVAL;
438 		return (-1);
439 	}
440 
441 	if ((packed_set = __cpc_pack_set(set, flags, &packsize)) == NULL) {
442 		errno = ENOMEM;
443 		return (-1);
444 	}
445 
446 	ret = syscall(SYS_cpc, CPC_BIND, -1, packed_set, packsize, &subcode);
447 	free(packed_set);
448 
449 	if (ret != 0) {
450 		if (subcode != -1)
451 			cpc_err(cpc, "cpc_bind_curlwp", subcode);
452 		return (-1);
453 	}
454 
455 	set->cs_thr = thr_self();
456 	set->cs_state = CS_BOUND_CURLWP;
457 	return (ret);
458 }
459 
460 /*ARGSUSED*/
461 int
462 cpc_bind_pctx(cpc_t *cpc, pctx_t *pctx, id_t id, cpc_set_t *set, uint_t flags)
463 {
464 	char		*packed_set;
465 	size_t		packsize;
466 	int		ret;
467 	int		subcode = -1;
468 
469 	/*
470 	 * cpc_bind_pctx() currently has no valid flags.
471 	 */
472 	if (flags != 0 || cpc_set_valid(cpc, set) != 0 || set->cs_nreqs <= 0) {
473 		errno = EINVAL;
474 		return (-1);
475 	}
476 
477 	if ((packed_set = __cpc_pack_set(set, flags, &packsize)) == NULL) {
478 		errno = ENOMEM;
479 		return (-1);
480 	}
481 
482 	ret = __pctx_cpc(pctx, cpc, CPC_BIND, id, packed_set, (void *)packsize,
483 	    (void *)&subcode, -1);
484 
485 	free(packed_set);
486 
487 	if (ret == 0) {
488 		set->cs_pctx = pctx;
489 		set->cs_id = id;
490 		set->cs_state = CS_BOUND_PCTX;
491 	} else if (subcode != -1)
492 		cpc_err(cpc, "cpc_bind_pctx", subcode);
493 
494 	return (ret);
495 }
496 
497 /*ARGSUSED*/
498 int
499 cpc_bind_cpu(cpc_t *cpc, processorid_t id, cpc_set_t *set, uint_t flags)
500 {
501 	int		fd;
502 	char		*packed_set;
503 	size_t		packsize;
504 	__cpc_args_t	cpc_args;
505 	int		error;
506 	const char	*fn = "cpc_bind_cpu";
507 	int		subcode = -1;
508 
509 	/*
510 	 * cpc_bind_cpu() currently has no valid flags.
511 	 */
512 	if (flags != 0 || cpc_set_valid(cpc, set) != 0 || set->cs_nreqs <= 0) {
513 		errno = EINVAL;
514 		return (-1);
515 	}
516 
517 	if (processor_bind(P_LWPID, P_MYID, id, &set->cs_obind) == -1) {
518 		cpc_err(cpc, fn, CPC_PBIND_FAILED);
519 		return (-1);
520 	}
521 
522 	if ((fd = open(CPUDRV_SHARED, O_RDWR)) < 0) {
523 		error = errno;
524 		(void) processor_bind(P_LWPID, P_MYID, set->cs_obind, NULL);
525 		errno = error;
526 		return (-1);
527 	}
528 
529 	/*
530 	 * To avoid leaking file descriptors, if we find an existing fd here we
531 	 * just close it. This is only a problem if a user attempts to bind the
532 	 * same set to different CPUs without first unbinding it.
533 	 */
534 	if (set->cs_fd != -1)
535 		(void) close(set->cs_fd);
536 	set->cs_fd = fd;
537 
538 	if ((packed_set = __cpc_pack_set(set, flags, &packsize)) == NULL) {
539 		(void) close(fd);
540 		(void) processor_bind(P_LWPID, P_MYID, set->cs_obind, NULL);
541 		errno = ENOMEM;
542 		return (-1);
543 	}
544 
545 	cpc_args.udata1 = packed_set;
546 	cpc_args.udata2 = (void *)packsize;
547 	cpc_args.udata3 = (void *)&subcode;
548 
549 	if (ioctl(fd, CPCIO_BIND, &cpc_args) != 0) {
550 		error = errno;
551 		free(packed_set);
552 		(void) close(fd);
553 		(void) processor_bind(P_LWPID, P_MYID, set->cs_obind, NULL);
554 		if (subcode != -1)
555 			cpc_err(cpc, fn, subcode);
556 		errno = error;
557 		return (-1);
558 	}
559 
560 	free(packed_set);
561 
562 	set->cs_thr = thr_self();
563 	set->cs_state = CS_BOUND_CPU;
564 
565 	return (0);
566 }
567 
568 /*ARGSUSED*/
569 int
570 cpc_request_preset(cpc_t *cpc, int index, uint64_t preset)
571 {
572 	return (syscall(SYS_cpc, CPC_PRESET, -1, index,
573 	    (uint32_t)(preset >> 32), (uint32_t)(preset & MASK32)));
574 }
575 
576 /*ARGSUSED*/
577 int
578 cpc_set_restart(cpc_t *cpc, cpc_set_t *set)
579 {
580 	return (syscall(SYS_cpc, CPC_RESTART, -1, 0, 0, 0));
581 }
582 
583 /*ARGSUSED*/
584 int
585 cpc_unbind(cpc_t *cpc, cpc_set_t *set)
586 {
587 	int		ret = 0;
588 	int		error;
589 
590 	if (cpc_set_valid(cpc, set) != 0) {
591 		errno = EINVAL;
592 		return (-1);
593 	}
594 
595 	switch (set->cs_state) {
596 	case CS_UNBOUND:
597 		errno = EINVAL;
598 		return (-1);
599 	case CS_BOUND_CURLWP:
600 		ret = syscall(SYS_cpc, CPC_RELE, -1, 0, 0, 0);
601 		error = errno;
602 		break;
603 	case CS_BOUND_CPU:
604 		ret = ioctl(set->cs_fd, CPCIO_RELE, NULL);
605 		error = errno;
606 		(void) close(set->cs_fd);
607 		set->cs_fd = -1;
608 		(void) processor_bind(P_LWPID, P_MYID, set->cs_obind, NULL);
609 		break;
610 	case CS_BOUND_PCTX:
611 		if (set->cs_pctx != NULL) {
612 			ret = __pctx_cpc(set->cs_pctx, cpc, CPC_RELE,
613 			    set->cs_id, 0, 0, 0, 0);
614 			error = errno;
615 		}
616 		break;
617 	}
618 
619 	set->cs_thr = NULL;
620 	set->cs_id = -1;
621 	set->cs_state = CS_UNBOUND;
622 	if (ret != 0)
623 		errno = error;
624 	return (ret);
625 }
626 
627 /*ARGSUSED*/
628 int
629 cpc_set_sample(cpc_t *cpc, cpc_set_t *set, cpc_buf_t *buf)
630 {
631 	__cpc_args_t args;
632 
633 	/*
634 	 * The following check ensures that only the most recently bound set
635 	 * can be sampled, as binding a set invalidates all other sets in the
636 	 * cpc_t.
637 	 */
638 	if (set->cs_state == CS_UNBOUND ||
639 	    buf->cb_size != set->cs_nreqs * sizeof (uint64_t)) {
640 		errno = EINVAL;
641 		return (-1);
642 	}
643 
644 	switch (set->cs_state) {
645 	case CS_BOUND_CURLWP:
646 		return (syscall(SYS_cpc, CPC_SAMPLE, -1, buf->cb_data,
647 		    &buf->cb_hrtime, &buf->cb_tick));
648 	case CS_BOUND_CPU:
649 		args.udata1 = buf->cb_data;
650 		args.udata2 = &buf->cb_hrtime;
651 		args.udata3 = &buf->cb_tick;
652 		return (ioctl(set->cs_fd, CPCIO_SAMPLE, &args));
653 	case CS_BOUND_PCTX:
654 		return (__pctx_cpc(set->cs_pctx, cpc, CPC_SAMPLE, set->cs_id,
655 		    buf->cb_data, &buf->cb_hrtime, &buf->cb_tick,
656 		    buf->cb_size));
657 	}
658 
659 	errno = EINVAL;
660 	return (-1);
661 }
662 
663 /*ARGSUSED*/
664 void
665 cpc_buf_sub(cpc_t *cpc, cpc_buf_t *ds, cpc_buf_t *a, cpc_buf_t *b)
666 {
667 	int i;
668 
669 	if (a->cb_size != ds->cb_size || b->cb_size != ds->cb_size)
670 		return;
671 
672 	ds->cb_hrtime = (a->cb_hrtime > b->cb_hrtime) ?
673 	    a->cb_hrtime : b->cb_hrtime;
674 	ds->cb_tick = a->cb_tick - b->cb_tick;
675 
676 	for (i = 0; i < ds->cb_size / sizeof (uint64_t); i++)
677 		ds->cb_data[i] = a->cb_data[i] - b->cb_data[i];
678 }
679 
680 /*ARGSUSED*/
681 void
682 cpc_buf_add(cpc_t *cpc, cpc_buf_t *ds, cpc_buf_t *a, cpc_buf_t *b)
683 {
684 	int i;
685 
686 	if (a->cb_size != ds->cb_size || b->cb_size != ds->cb_size)
687 		return;
688 
689 	ds->cb_hrtime = (a->cb_hrtime > b->cb_hrtime) ?
690 	    a->cb_hrtime : b->cb_hrtime;
691 	ds->cb_tick = a->cb_tick + b->cb_tick;
692 
693 	for (i = 0; i < ds->cb_size / sizeof (uint64_t); i++)
694 		ds->cb_data[i] = a->cb_data[i] + b->cb_data[i];
695 }
696 
697 /*ARGSUSED*/
698 void
699 cpc_buf_copy(cpc_t *cpc, cpc_buf_t *ds, cpc_buf_t *src)
700 {
701 	if (ds->cb_size != src->cb_size)
702 		return;
703 
704 	bcopy(src->cb_data, ds->cb_data, ds->cb_size);
705 	ds->cb_hrtime = src->cb_hrtime;
706 	ds->cb_tick = src->cb_tick;
707 }
708 
709 /*ARGSUSED*/
710 void
711 cpc_buf_zero(cpc_t *cpc, cpc_buf_t *buf)
712 {
713 	bzero(buf->cb_data, buf->cb_size);
714 	buf->cb_hrtime = 0;
715 	buf->cb_tick = 0;
716 }
717 
718 /*
719  * Gets or sets the value of the request specified by index.
720  */
721 /*ARGSUSED*/
722 int
723 cpc_buf_get(cpc_t *cpc, cpc_buf_t *buf, int index, uint64_t *val)
724 {
725 	*val = buf->cb_data[index];
726 
727 	return (0);
728 }
729 
730 /*ARGSUSED*/
731 int
732 cpc_buf_set(cpc_t *cpc, cpc_buf_t *buf, int index, uint64_t val)
733 {
734 	buf->cb_data[index] = val;
735 
736 	return (0);
737 }
738 
739 /*ARGSUSED*/
740 hrtime_t
741 cpc_buf_hrtime(cpc_t *cpc, cpc_buf_t *buf)
742 {
743 	return (buf->cb_hrtime);
744 }
745 
746 /*ARGSUSED*/
747 uint64_t
748 cpc_buf_tick(cpc_t *cpc, cpc_buf_t *buf)
749 {
750 	return (buf->cb_tick);
751 }
752 
753 static char *
754 cpc_get_list(int which, int arg)
755 {
756 	int	szcmd;
757 	int	size;
758 	char	*list;
759 
760 	if (which == CPC_LIST_ATTRS)
761 		szcmd = CPC_ATTRLIST_SIZE;
762 	else
763 		szcmd = CPC_EVLIST_SIZE;
764 
765 	if (syscall(SYS_cpc, szcmd, -1, &size, arg, 0) != 0)
766 		return (NULL);
767 
768 	if ((list = malloc(size)) == NULL)
769 		return (NULL);
770 
771 	if (syscall(SYS_cpc, which, -1, list, arg, 0) != 0) {
772 		free(list);
773 		return (NULL);
774 	}
775 
776 	return (list);
777 }
778 
779 /*ARGSUSED*/
780 void
781 cpc_walk_requests(cpc_t *cpc, cpc_set_t *set, void *arg,
782     void (*action)(void *arg, int index, const char *event, uint64_t preset,
783 	uint_t flags, int nattrs, const cpc_attr_t *attrs))
784 {
785 	cpc_request_t	*rp;
786 	cpc_attr_t	*attrs = NULL;
787 	int		i;
788 
789 	for (rp = set->cs_request; rp != NULL; rp = rp->cr_next) {
790 		/*
791 		 * Need to reconstruct a temporary cpc_attr_t array for req.
792 		 */
793 		if (rp->cr_nattrs != 0)
794 			if ((attrs = malloc(rp->cr_nattrs *
795 			    sizeof (cpc_attr_t))) == NULL)
796 				return;
797 		for (i = 0; i < rp->cr_nattrs; i++) {
798 			attrs[i].ca_name = rp->cr_attr[i].ka_name;
799 			attrs[i].ca_val = rp->cr_attr[i].ka_val;
800 		}
801 
802 		action(arg, rp->cr_index, rp->cr_event, rp->cr_preset,
803 		    rp->cr_flags, rp->cr_nattrs, attrs);
804 
805 		if (rp->cr_nattrs != 0)
806 			free(attrs);
807 	}
808 }
809 
810 /*ARGSUSED*/
811 static void
812 cpc_walk_events_impl(cpc_t *cpc, void *arg,
813     void (*action)(void *arg, const char *event), int is_generic)
814 {
815 	char		**list;
816 	char		*p, *e;
817 	int		i;
818 	int		is_papi;
819 	int		ncounters = cpc_npic(cpc);
820 	cpc_strhash_t	*hash;
821 
822 	if ((list = malloc(ncounters * sizeof (char *))) == NULL)
823 		return;
824 
825 	if ((hash = __cpc_strhash_alloc()) == NULL) {
826 		free(list);
827 		return;
828 	}
829 
830 	for (i = 0; i < ncounters; i++) {
831 		if ((list[i] = strdup(cpc->cpc_evlist[i])) == NULL)
832 			goto err;
833 		p = list[i];
834 		while ((e = strchr(p, ',')) != NULL) {
835 			*e = '\0';
836 
837 			/*
838 			 * Based on is_generic flag, skip appropriate
839 			 * event names.
840 			 */
841 			is_papi = (strncmp(p, "PAPI", 4) == 0);
842 			if (is_generic != is_papi) {
843 				p = e + 1;
844 				continue;
845 			}
846 
847 			if (__cpc_strhash_add(hash, p) == -1)
848 				goto err;
849 
850 			p = e + 1;
851 		}
852 
853 		is_papi = (strncmp(p, "PAPI", 4) == 0);
854 		if (is_generic == is_papi) {
855 			if (__cpc_strhash_add(hash, p) == -1)
856 				goto err;
857 		}
858 	}
859 
860 	while ((p = __cpc_strhash_next(hash)) != NULL)
861 		action(arg, p);
862 
863 err:
864 	__cpc_strhash_free(hash);
865 	for (i = 0; i < ncounters; i++)
866 		free(list[i]);
867 	free(list);
868 }
869 
870 /*ARGSUSED*/
871 void
872 cpc_walk_events_all(cpc_t *cpc, void *arg,
873 		    void (*action)(void *arg, const char *event))
874 {
875 	cpc_walk_events_impl(cpc, arg, action, 0);
876 }
877 
878 
879 /*ARGSUSED*/
880 void
881 cpc_walk_generic_events_all(cpc_t *cpc, void *arg,
882 			    void (*action)(void *arg, const char *event))
883 {
884 	cpc_walk_events_impl(cpc, arg, action, 1);
885 }
886 
887 /*ARGSUSED*/
888 static void
889 cpc_walk_events_pic_impl(cpc_t *cpc, uint_t picno, void *arg,
890     void (*action)(void *arg, uint_t picno, const char *event), int is_generic)
891 {
892 	char	*p;
893 	char	*e;
894 	char	*list;
895 	int	is_papi;
896 
897 	if (picno >= cpc->cpc_npic) {
898 		errno = EINVAL;
899 		return;
900 	}
901 
902 	if ((list = strdup(cpc->cpc_evlist[picno])) == NULL)
903 		return;
904 
905 	/*
906 	 * List now points to a comma-separated list of events supported by
907 	 * the designated pic.
908 	 */
909 	p = list;
910 	while ((e = strchr(p, ',')) != NULL) {
911 		*e = '\0';
912 
913 		/*
914 		 * Based on is_generic flag, skip appropriate
915 		 * event names.
916 		 */
917 		is_papi = (strncmp(p, "PAPI", 4) == 0);
918 		if (is_generic != is_papi) {
919 			p = e + 1;
920 			continue;
921 		}
922 
923 		action(arg, picno, p);
924 		p = e + 1;
925 	}
926 
927 	is_papi = (strncmp(p, "PAPI", 4) == 0);
928 	if (is_generic == is_papi)
929 		action(arg, picno, p);
930 
931 	free(list);
932 }
933 
934 /*ARGSUSED*/
935 void
936 cpc_walk_events_pic(cpc_t *cpc, uint_t picno, void *arg,
937     void (*action)(void *arg, uint_t picno, const char *event))
938 {
939 	cpc_walk_events_pic_impl(cpc, picno, arg, action, 0);
940 }
941 
942 /*ARGSUSED*/
943 void
944 cpc_walk_generic_events_pic(cpc_t *cpc, uint_t picno, void *arg,
945     void (*action)(void *arg, uint_t picno, const char *event))
946 {
947 	cpc_walk_events_pic_impl(cpc, picno, arg, action, 1);
948 }
949 
950 /*ARGSUSED*/
951 void
952 cpc_walk_attrs(cpc_t *cpc, void *arg,
953     void (*action)(void *arg, const char *attr))
954 {
955 	char	*p;
956 	char	*e;
957 	char	*list;
958 
959 	if ((list = strdup(cpc->cpc_attrlist)) == NULL)
960 		return;
961 
962 	/*
963 	 * Platforms with no attributes will return an empty string.
964 	 */
965 	if (*list == '\0')
966 		return;
967 
968 	/*
969 	 * List now points to a comma-separated list of attributes supported by
970 	 * the underlying platform.
971 	 */
972 	p = list;
973 	while ((e = strchr(p, ',')) != NULL) {
974 		*e = '\0';
975 		action(arg, p);
976 		p = e + 1;
977 	}
978 	action(arg, p);
979 
980 	free(list);
981 }
982 
983 /*ARGSUSED*/
984 int
985 cpc_enable(cpc_t *cpc)
986 {
987 	return (syscall(SYS_cpc, CPC_ENABLE, -1, 0, 0, 0));
988 }
989 
990 /*ARGSUSED*/
991 int
992 cpc_disable(cpc_t *cpc)
993 {
994 	return (syscall(SYS_cpc, CPC_DISABLE, -1, 0, 0, 0));
995 }
996 
997 /*ARGSUSED*/
998 uint_t
999 cpc_npic(cpc_t *cpc)
1000 {
1001 	return (cpc->cpc_npic);
1002 }
1003 
1004 /*ARGSUSED*/
1005 uint_t
1006 cpc_caps(cpc_t *cpc)
1007 {
1008 	return (cpc->cpc_caps);
1009 }
1010 
1011 const char *
1012 cpc_cciname(cpc_t *cpc)
1013 {
1014 	return (cpc->cpc_cciname);
1015 }
1016 
1017 const char *
1018 cpc_cpuref(cpc_t *cpc)
1019 {
1020 	return (cpc->cpc_cpuref);
1021 }
1022 
1023 int
1024 cpc_seterrhndlr(cpc_t *cpc, cpc_errhndlr_t *fn)
1025 {
1026 	cpc->cpc_errfn = fn;
1027 	return (0);
1028 }
1029 
1030 /*
1031  * These strings may contain printf() conversion specifiers.
1032  */
1033 static const char *errstr[] = {
1034 "",						/* zero slot filler */
1035 "Unknown event\n",				/* CPC_INVALID_EVENT */
1036 "Invalid counter number\n",			/* CPC_INVALID_PICNUM */
1037 "Unknown attribute\n",				/* CPC_INVALID_ATTRIBUTE */
1038 "Attribute out of range\n",			/* CPC_ATTRIBUTE_OUT_OF_RANGE */
1039 "Hardware resource unavailable\n",		/* CPC_RESOURCE_UNAVAIL */
1040 "Counter cannot count requested event\n",	/* CPC_PIC_NOT_CAPABLE */
1041 "Invalid flags in a request\n",			/* CPC_REQ_INVALID_FLAGS */
1042 "Requests conflict with each other\n",		/* CPC_CONFLICTING_REQS */
1043 "Attribute requires the cpc_cpu privilege\n",  /* CPC_ATTR_REQUIRES_PRIVILEGE */
1044 "Couldn't bind LWP to requested processor\n",	/* CPC_PBIND_FAILED */
1045 "Hypervisor event access denied\n"		/* CPC_HV_NO_ACCESS */
1046 };
1047 
1048 /*VARARGS3*/
1049 static void
1050 cpc_err(cpc_t *cpc, const char *fn, int subcode, ...)
1051 {
1052 	va_list		ap;
1053 	const char	*str;
1054 	int		error;
1055 
1056 	/*
1057 	 * If subcode is -1, there is no specific description for this error.
1058 	 */
1059 	if (subcode == -1)
1060 		return;
1061 
1062 	/*
1063 	 * We need to preserve errno across calls to this function to prevent it
1064 	 * from being clobbered while here, or in the user's error handler.
1065 	 */
1066 	error = errno;
1067 
1068 	str = dgettext(TEXT_DOMAIN, errstr[subcode]);
1069 
1070 	va_start(ap, subcode);
1071 	if (cpc->cpc_errfn != NULL)
1072 		cpc->cpc_errfn(fn, subcode, str, ap);
1073 	else {
1074 		/*
1075 		 * If printf() conversion specifiers are added to the errstr[]
1076 		 * table, this call needs to be changed to vfprintf().
1077 		 */
1078 		(void) fprintf(stderr, "libcpc: %s: %s", fn, str);
1079 	}
1080 	va_end(ap);
1081 
1082 	errno = error;
1083 }
1084 
1085 /*
1086  * Hook used by libpctx to alert libcpc when a pctx handle is going away.
1087  * This is necessary to prevent libcpc from attempting a libpctx operation on a
1088  * stale and invalid pctx_t handle. Since pctx_t's are cached by libcpc, we need
1089  * to be notified when they go away.
1090  */
1091 static void
1092 cpc_invalidate_pctx(cpc_t *cpc, pctx_t *pctx)
1093 {
1094 	cpc_set_t	*set;
1095 	int		sigblocked;
1096 
1097 	sigblocked = cpc_lock(cpc);
1098 	for (set = cpc->cpc_sets; set != NULL; set = set->cs_next)
1099 		if (set->cs_pctx == pctx)
1100 			set->cs_pctx = NULL;
1101 	cpc_unlock(cpc, sigblocked);
1102 }
1103 
1104 /*
1105  * Check that the set is valid; if so it will be in the cpc handle's
1106  * list of sets. The lock protects the list of sets, but not the set
1107  * itself.
1108  */
1109 static int
1110 cpc_set_valid(cpc_t *cpc, cpc_set_t *set)
1111 {
1112 	cpc_set_t	*csp;
1113 	int		sigblocked;
1114 
1115 	sigblocked = cpc_lock(cpc);
1116 	for (csp = cpc->cpc_sets; csp != NULL; csp = csp->cs_next)
1117 		if (csp == set)
1118 			break;
1119 	cpc_unlock(cpc, sigblocked);
1120 	if (csp == NULL)
1121 		return (-1);
1122 	return (0);
1123 }
1124 
1125 static int
1126 cpc_lock(cpc_t *cpc)
1127 {
1128 	int ret = (sigset(SIGEMT, SIG_HOLD) == SIG_HOLD);
1129 	(void) mutex_lock(&cpc->cpc_lock);
1130 	return (ret);
1131 }
1132 
1133 static void
1134 cpc_unlock(cpc_t *cpc, int sigblocked)
1135 {
1136 	(void) mutex_unlock(&cpc->cpc_lock);
1137 	if (sigblocked == 0)
1138 		(void) sigrelse(SIGEMT);
1139 }
1140 
1141 struct priv {
1142 	const char *name;
1143 	int found;
1144 };
1145 
1146 /*ARGSUSED*/
1147 static void
1148 ev_walker(void *arg, uint_t picno, const char *ev)
1149 {
1150 	if (strcmp(((struct priv *)arg)->name, ev) == 0)
1151 		((struct priv *)arg)->found = 1;
1152 }
1153 
1154 static void
1155 at_walker(void *arg, const char *at)
1156 {
1157 	if (strcmp(((struct priv *)arg)->name, at) == 0)
1158 		((struct priv *)arg)->found = 1;
1159 }
1160 
1161 static int
1162 cpc_valid_event(cpc_t *cpc, uint_t pic, const char *ev)
1163 {
1164 	struct priv pr = { NULL, 0 };
1165 	char *end_ev;
1166 	int err;
1167 
1168 	pr.name = ev;
1169 	cpc_walk_events_pic(cpc, pic, &pr, ev_walker);
1170 	if (pr.found)
1171 		return (1);
1172 
1173 	cpc_walk_generic_events_pic(cpc, pic, &pr, ev_walker);
1174 	if (pr.found)
1175 		return (1);
1176 
1177 	/*
1178 	 * Before assuming this is an invalid event, see if we have been given
1179 	 * a raw event code.
1180 	 * Check the second argument of strtol() to ensure invalid events
1181 	 * beginning with number do not go through.
1182 	 */
1183 	err = errno;
1184 	errno = 0;
1185 	(void) strtol(ev, &end_ev, 0);
1186 	if ((errno == 0) && (*end_ev == '\0')) {
1187 		/*
1188 		 * Success - this is a valid raw code in hex, decimal, or octal.
1189 		 */
1190 		errno = err;
1191 		return (1);
1192 	}
1193 
1194 	errno = err;
1195 	return (0);
1196 }
1197 
1198 static int
1199 cpc_valid_attr(cpc_t *cpc, char *attr)
1200 {
1201 	struct priv pr = { NULL, 0 };
1202 
1203 	pr.name = attr;
1204 	cpc_walk_attrs(cpc, &pr, at_walker);
1205 	return (pr.found);
1206 }
1207