lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1426079233-16720-3-git-send-email-maddy@linux.vnet.ibm.com>
Date:	Wed, 11 Mar 2015 18:37:08 +0530
From:	Madhavan Srinivasan <maddy@...ux.vnet.ibm.com>
To:	mpe@...erman.id.au, benh@...nel.crashing.org, paulus@...ba.org
Cc:	linux-kernel@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org,
	linuxppc-dev@...abs.org, eranian@...gle.com, ak@...ux.intel.com,
	srivatsa@....edu, Madhavan Srinivasan <maddy@...ux.vnet.ibm.com>
Subject: [RFC PATCH 2/7] powerpc/powernv: uncore foundation code

Patch adds the foundation code enable nest pmu. It defines
various init routines and these are based on Intel's uncore
framework. But it does differ since "box" structure abstraction
is not implemented here.

Signed-off-by: Madhavan Srinivasan <maddy@...ux.vnet.ibm.com>
---
 arch/powerpc/perf/uncore_pmu.c | 104 +++++++++++++++++++++++++++++++++++++++++
 1 file changed, 104 insertions(+)
 create mode 100644 arch/powerpc/perf/uncore_pmu.c

diff --git a/arch/powerpc/perf/uncore_pmu.c b/arch/powerpc/perf/uncore_pmu.c
new file mode 100644
index 0000000..cc544d3
--- /dev/null
+++ b/arch/powerpc/perf/uncore_pmu.c
@@ -0,0 +1,104 @@
+/*
+ * Uncore Performance Monitor counter support.
+ *
+ * Derived from Intel's uncore framework
+ *   written by: Liang,Kan
+ *               Zheng, Yan
+ *               Andi Keen
+ *
+ *   Copyright Intel Corporation.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; under version
+ * 2 of the License.
+ */
+
+#include "uncore_pmu.h"
+
+struct ppc64_uncore_type *empty_uncore[] = { NULL, };
+struct ppc64_uncore_type **ppc64_uncore = empty_uncore;
+
+struct ppc64_uncore_pmu *uncore_event_to_pmu(struct perf_event *event)
+{
+	return container_of(event->pmu, struct ppc64_uncore_pmu, pmu);
+}
+
+int __init uncore_type_init(struct ppc64_uncore_type *type)
+{
+	struct ppc64_uncore_pmu *pmus;
+	int i;
+
+	pmus = kzalloc(sizeof(*pmus) * type->num_boxes, GFP_KERNEL);
+	if (!pmus)
+		return -ENOMEM;
+
+	type->pmus = pmus;
+
+	for (i = 0; i < type->num_boxes; i++) {
+		pmus[i].pmu_idx = i;
+		pmus[i].type = type;
+		pmus[i].pmu = *type->pmu;
+		sprintf((char *)pmus[i].name, "uncore_%s_%d",
+				type->name, (int)i);
+	}
+
+	return 0;
+}
+
+int __init uncore_types_init(struct ppc64_uncore_type **types)
+{
+	int i, ret;
+
+	for (i = 0; types[i]; i++) {
+		ret = uncore_type_init(types[i]);
+		if (ret)
+			goto fail;
+	}
+	return 0;
+fail:
+	while (--i >= 0)
+		kfree(types[i]);
+	return ret;
+}
+
+static int __init uncore_pmus_register(void)
+{
+	struct ppc64_uncore_pmu *pmus;
+	struct pmu *pmu;
+	struct ppc64_uncore_type *type;
+	int i, j, ret;
+
+	for (i = 0; ppc64_uncore[i]; i++) {
+		type = ppc64_uncore[i];
+		for (j = 0; j < type->num_boxes; j++) {
+			pmus = &type->pmus[j];
+			pmu = &pmus->pmu;
+			pmu->attr_groups = pmus->type->attr_groups;
+			ret = perf_pmu_register(pmu, pmus->name, -1);
+		}
+	}
+
+	return 0;
+}
+
+static int __init uncore_init(void)
+{
+	int ret = 0;
+
+	if (!cur_cpu_spec->oprofile_cpu_type ||
+	    strcmp(cur_cpu_spec->oprofile_cpu_type, "ppc64/power8") ||
+	    !cpu_has_feature(CPU_FTR_HVMODE))
+		return ret;
+
+	ret = uncore_types_init(ppc64_uncore);
+	if (ret)
+		return ret;
+
+	uncore_pmus_register();
+
+	return ret;
+}
+
+device_initcall(uncore_init);
+
-- 
1.9.1

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ