Blame view

kernel/linux-imx6_3.14.28/include/linux/oprofile.h 6.1 KB
6b13f685e   김민수   BSP 최초 추가
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
  /**
   * @file oprofile.h
   *
   * API for machine-specific interrupts to interface
   * to oprofile.
   *
   * @remark Copyright 2002 OProfile authors
   * @remark Read the file COPYING
   *
   * @author John Levon <levon@movementarian.org>
   */
  
  #ifndef OPROFILE_H
  #define OPROFILE_H
  
  #include <linux/types.h>
  #include <linux/spinlock.h>
  #include <linux/init.h>
  #include <linux/errno.h>
  #include <linux/printk.h>
  #include <linux/atomic.h>
   
  /* Each escaped entry is prefixed by ESCAPE_CODE
   * then one of the following codes, then the
   * relevant data.
   * These #defines live in this file so that arch-specific
   * buffer sync'ing code can access them.
   */
  #define ESCAPE_CODE			~0UL
  #define CTX_SWITCH_CODE			1
  #define CPU_SWITCH_CODE			2
  #define COOKIE_SWITCH_CODE		3
  #define KERNEL_ENTER_SWITCH_CODE	4
  #define KERNEL_EXIT_SWITCH_CODE		5
  #define MODULE_LOADED_CODE		6
  #define CTX_TGID_CODE			7
  #define TRACE_BEGIN_CODE		8
  #define TRACE_END_CODE			9
  #define XEN_ENTER_SWITCH_CODE		10
  #define SPU_PROFILING_CODE		11
  #define SPU_CTX_SWITCH_CODE		12
  #define IBS_FETCH_CODE			13
  #define IBS_OP_CODE			14
  
  struct dentry;
  struct file_operations;
  struct pt_regs;
   
  /* Operations structure to be filled in */
  struct oprofile_operations {
  	/* create any necessary configuration files in the oprofile fs.
  	 * Optional. */
  	int (*create_files)(struct dentry * root);
  	/* Do any necessary interrupt setup. Optional. */
  	int (*setup)(void);
  	/* Do any necessary interrupt shutdown. Optional. */
  	void (*shutdown)(void);
  	/* Start delivering interrupts. */
  	int (*start)(void);
  	/* Stop delivering interrupts. */
  	void (*stop)(void);
  	/* Arch-specific buffer sync functions.
  	 * Return value = 0:  Success
  	 * Return value = -1: Failure
  	 * Return value = 1:  Run generic sync function
  	 */
  	int (*sync_start)(void);
  	int (*sync_stop)(void);
  
  	/* Initiate a stack backtrace. Optional. */
  	void (*backtrace)(struct pt_regs * const regs, unsigned int depth);
  
  	/* Multiplex between different events. Optional. */
  	int (*switch_events)(void);
  	/* CPU identification string. */
  	char * cpu_type;
  };
  
  /**
   * One-time initialisation. *ops must be set to a filled-in
   * operations structure. This is called even in timer interrupt
   * mode so an arch can set a backtrace callback.
   *
   * If an error occurs, the fields should be left untouched.
   */
  int oprofile_arch_init(struct oprofile_operations * ops);
   
  /**
   * One-time exit/cleanup for the arch.
   */
  void oprofile_arch_exit(void);
  
  /**
   * Add a sample. This may be called from any context.
   */
  void oprofile_add_sample(struct pt_regs * const regs, unsigned long event);
  
  /**
   * Add an extended sample.  Use this when the PC is not from the regs, and
   * we cannot determine if we're in kernel mode from the regs.
   *
   * This function does perform a backtrace.
   *
   */
  void oprofile_add_ext_sample(unsigned long pc, struct pt_regs * const regs,
  				unsigned long event, int is_kernel);
  
  /**
   * Add an hardware sample.
   */
  void oprofile_add_ext_hw_sample(unsigned long pc, struct pt_regs * const regs,
  	unsigned long event, int is_kernel,
  	struct task_struct *task);
  
  /* Use this instead when the PC value is not from the regs. Doesn't
   * backtrace. */
  void oprofile_add_pc(unsigned long pc, int is_kernel, unsigned long event);
  
  /* add a backtrace entry, to be called from the ->backtrace callback */
  void oprofile_add_trace(unsigned long eip);
  
  
  /**
   * Create a file of the given name as a child of the given root, with
   * the specified file operations.
   */
  int oprofilefs_create_file(struct dentry * root,
  	char const * name, const struct file_operations * fops);
  
  int oprofilefs_create_file_perm(struct dentry * root,
  	char const * name, const struct file_operations * fops, int perm);
   
  /** Create a file for read/write access to an unsigned long. */
  int oprofilefs_create_ulong(struct dentry * root,
  	char const * name, ulong * val);
   
  /** Create a file for read-only access to an unsigned long. */
  int oprofilefs_create_ro_ulong(struct dentry * root,
  	char const * name, ulong * val);
   
  /** Create a file for read-only access to an atomic_t. */
  int oprofilefs_create_ro_atomic(struct dentry * root,
  	char const * name, atomic_t * val);
   
  /** create a directory */
  struct dentry *oprofilefs_mkdir(struct dentry *parent, char const *name);
  
  /**
   * Write the given asciz string to the given user buffer @buf, updating *offset
   * appropriately. Returns bytes written or -EFAULT.
   */
  ssize_t oprofilefs_str_to_user(char const * str, char __user * buf, size_t count, loff_t * offset);
  
  /**
   * Convert an unsigned long value into ASCII and copy it to the user buffer @buf,
   * updating *offset appropriately. Returns bytes written or -EFAULT.
   */
  ssize_t oprofilefs_ulong_to_user(unsigned long val, char __user * buf, size_t count, loff_t * offset);
  
  /**
   * Read an ASCII string for a number from a userspace buffer and fill *val on success.
   * Returns 0 on success, < 0 on error.
   */
  int oprofilefs_ulong_from_user(unsigned long * val, char const __user * buf, size_t count);
  
  /** lock for read/write safety */
  extern raw_spinlock_t oprofilefs_lock;
  
  /**
   * Add the contents of a circular buffer to the event buffer.
   */
  void oprofile_put_buff(unsigned long *buf, unsigned int start,
  			unsigned int stop, unsigned int max);
  
  unsigned long oprofile_get_cpu_buffer_size(void);
  void oprofile_cpu_buffer_inc_smpl_lost(void);
   
  /* cpu buffer functions */
  
  struct op_sample;
  
  struct op_entry {
  	struct ring_buffer_event *event;
  	struct op_sample *sample;
  	unsigned long size;
  	unsigned long *data;
  };
  
  void oprofile_write_reserve(struct op_entry *entry,
  			    struct pt_regs * const regs,
  			    unsigned long pc, int code, int size);
  int oprofile_add_data(struct op_entry *entry, unsigned long val);
  int oprofile_add_data64(struct op_entry *entry, u64 val);
  int oprofile_write_commit(struct op_entry *entry);
  
  #ifdef CONFIG_HW_PERF_EVENTS
  int __init oprofile_perf_init(struct oprofile_operations *ops);
  void oprofile_perf_exit(void);
  char *op_name_from_perf_id(void);
  #else
  static inline int __init oprofile_perf_init(struct oprofile_operations *ops)
  {
  	pr_info("oprofile: hardware counters not available
  ");
  	return -ENODEV;
  }
  static inline void oprofile_perf_exit(void) { }
  #endif /* CONFIG_HW_PERF_EVENTS */
  
  #endif /* OPROFILE_H */