136 lines
3.1 KiB
C
136 lines
3.1 KiB
C
/*
|
|
* Copyright (C) 2010-2011 ARM Limited. All rights reserved.
|
|
*
|
|
* This program is free software and is provided to you under the terms of the GNU General Public License version 2
|
|
* as published by the Free Software Foundation, and any use by you of this program is subject to the terms of such GNU licence.
|
|
*
|
|
* A copy of the licence is included with the program, and can also be obtained from Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
#include <linux/fs.h> /* file system operations */
|
|
#include <asm/uaccess.h> /* user space access */
|
|
|
|
#include "mali_ukk.h"
|
|
#include "mali_osk.h"
|
|
#include "mali_kernel_common.h"
|
|
#include "mali_kernel_session_manager.h"
|
|
#include "mali_ukk_wrappers.h"
|
|
|
|
int profiling_start_wrapper(struct mali_session_data *session_data, _mali_uk_profiling_start_s __user *uargs)
|
|
{
|
|
_mali_uk_profiling_start_s kargs;
|
|
_mali_osk_errcode_t err;
|
|
|
|
MALI_CHECK_NON_NULL(uargs, -EINVAL);
|
|
|
|
if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_profiling_start_s)))
|
|
{
|
|
return -EFAULT;
|
|
}
|
|
|
|
kargs.ctx = session_data;
|
|
err = _mali_ukk_profiling_start(&kargs);
|
|
if (_MALI_OSK_ERR_OK != err)
|
|
{
|
|
return map_errcode(err);
|
|
}
|
|
|
|
if (0 != put_user(kargs.limit, &uargs->limit))
|
|
{
|
|
return -EFAULT;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int profiling_add_event_wrapper(struct mali_session_data *session_data, _mali_uk_profiling_add_event_s __user *uargs)
|
|
{
|
|
_mali_uk_profiling_add_event_s kargs;
|
|
_mali_osk_errcode_t err;
|
|
|
|
MALI_CHECK_NON_NULL(uargs, -EINVAL);
|
|
|
|
if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_profiling_add_event_s)))
|
|
{
|
|
return -EFAULT;
|
|
}
|
|
|
|
kargs.ctx = session_data;
|
|
err = _mali_ukk_profiling_add_event(&kargs);
|
|
if (_MALI_OSK_ERR_OK != err)
|
|
{
|
|
return map_errcode(err);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int profiling_stop_wrapper(struct mali_session_data *session_data, _mali_uk_profiling_stop_s __user *uargs)
|
|
{
|
|
_mali_uk_profiling_stop_s kargs;
|
|
_mali_osk_errcode_t err;
|
|
|
|
MALI_CHECK_NON_NULL(uargs, -EINVAL);
|
|
|
|
kargs.ctx = session_data;
|
|
err = _mali_ukk_profiling_stop(&kargs);
|
|
if (_MALI_OSK_ERR_OK != err)
|
|
{
|
|
return map_errcode(err);
|
|
}
|
|
|
|
if (0 != put_user(kargs.count, &uargs->count))
|
|
{
|
|
return -EFAULT;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int profiling_get_event_wrapper(struct mali_session_data *session_data, _mali_uk_profiling_get_event_s __user *uargs)
|
|
{
|
|
_mali_uk_profiling_get_event_s kargs;
|
|
_mali_osk_errcode_t err;
|
|
|
|
MALI_CHECK_NON_NULL(uargs, -EINVAL);
|
|
|
|
if (0 != get_user(kargs.index, &uargs->index))
|
|
{
|
|
return -EFAULT;
|
|
}
|
|
|
|
kargs.ctx = session_data;
|
|
|
|
err = _mali_ukk_profiling_get_event(&kargs);
|
|
if (_MALI_OSK_ERR_OK != err)
|
|
{
|
|
return map_errcode(err);
|
|
}
|
|
|
|
kargs.ctx = NULL; /* prevent kernel address to be returned to user space */
|
|
if (0 != copy_to_user(uargs, &kargs, sizeof(_mali_uk_profiling_get_event_s)))
|
|
{
|
|
return -EFAULT;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int profiling_clear_wrapper(struct mali_session_data *session_data, _mali_uk_profiling_clear_s __user *uargs)
|
|
{
|
|
_mali_uk_profiling_clear_s kargs;
|
|
_mali_osk_errcode_t err;
|
|
|
|
MALI_CHECK_NON_NULL(uargs, -EINVAL);
|
|
|
|
kargs.ctx = session_data;
|
|
err = _mali_ukk_profiling_clear(&kargs);
|
|
if (_MALI_OSK_ERR_OK != err)
|
|
{
|
|
return map_errcode(err);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|