| /** |
| * @file daemon/oprofiled.c |
| * Initialisation and setup |
| * |
| * @remark Copyright 2002, 2003 OProfile authors |
| * @remark Read the file COPYING |
| * |
| * @author John Levon |
| * @author Philippe Elie |
| * Modified by Aravind Menon for Xen |
| * These modifications are: |
| * Copyright (C) 2005 Hewlett-Packard Co. |
| */ |
| |
| #include "config.h" |
| |
| #include "oprofiled.h" |
| #include "opd_printf.h" |
| #include "opd_events.h" |
| #include "opd_extended.h" |
| |
| #include "op_config.h" |
| #include "op_version.h" |
| #include "op_hw_config.h" |
| #include "op_libiberty.h" |
| #include "op_file.h" |
| #include "op_abi.h" |
| #include "op_string.h" |
| #include "op_cpu_type.h" |
| #include "op_popt.h" |
| #include "op_lockfile.h" |
| #include "op_list.h" |
| #include "op_fileio.h" |
| |
| #include <sys/types.h> |
| #include <sys/resource.h> |
| #include <stdlib.h> |
| #include <fcntl.h> |
| #include <stdio.h> |
| #include <string.h> |
| #include <unistd.h> |
| #include <errno.h> |
| #include <assert.h> |
| #include <dirent.h> |
| #include <limits.h> |
| |
| sig_atomic_t signal_alarm; |
| sig_atomic_t signal_hup; |
| sig_atomic_t signal_term; |
| sig_atomic_t signal_child; |
| sig_atomic_t signal_usr1; |
| sig_atomic_t signal_usr2; |
| |
| uint op_nr_counters; |
| op_cpu cpu_type; |
| int no_event_ok; |
| int vsfile; |
| int vsamples; |
| int varcs; |
| int vmodule; |
| int vmisc; |
| int vext; |
| int separate_lib; |
| int separate_kernel; |
| int separate_thread; |
| int separate_cpu; |
| int no_vmlinux; |
| char * vmlinux; |
| char * kernel_range; |
| char * session_dir; |
| int no_xen; |
| char * xenimage; |
| char * xen_range; |
| static char * verbose; |
| static char * binary_name_filter; |
| static char * events; |
| static char * ext_feature; |
| static int showvers; |
| static struct oprofiled_ops * opd_ops; |
| extern struct oprofiled_ops opd_24_ops; |
| extern struct oprofiled_ops opd_26_ops; |
| |
| #define OPD_IMAGE_FILTER_HASH_SIZE 32 |
| static struct list_head images_filter[OPD_IMAGE_FILTER_HASH_SIZE]; |
| |
| static struct poptOption options[] = { |
| { "session-dir", 0, POPT_ARG_STRING, &session_dir, 0, "place sample database in dir instead of default location", "/var/lib/oprofile", }, |
| { "kernel-range", 'r', POPT_ARG_STRING, &kernel_range, 0, "Kernel VMA range", "start-end", }, |
| { "vmlinux", 'k', POPT_ARG_STRING, &vmlinux, 0, "vmlinux kernel image", "file", }, |
| { "no-vmlinux", 0, POPT_ARG_NONE, &no_vmlinux, 0, "vmlinux kernel image file not available", NULL, }, |
| { "xen-range", 0, POPT_ARG_STRING, &xen_range, 0, "Xen VMA range", "start-end", }, |
| { "xen-image", 0, POPT_ARG_STRING, &xenimage, 0, "Xen image", "file", }, |
| { "image", 0, POPT_ARG_STRING, &binary_name_filter, 0, "image name filter", "profile these comma separated image" }, |
| { "separate-lib", 0, POPT_ARG_INT, &separate_lib, 0, "separate library samples for each distinct application", "[0|1]", }, |
| { "separate-kernel", 0, POPT_ARG_INT, &separate_kernel, 0, "separate kernel samples for each distinct application", "[0|1]", }, |
| { "separate-thread", 0, POPT_ARG_INT, &separate_thread, 0, "thread-profiling mode", "[0|1]" }, |
| { "separate-cpu", 0, POPT_ARG_INT, &separate_cpu, 0, "separate samples for each CPU", "[0|1]" }, |
| { "events", 'e', POPT_ARG_STRING, &events, 0, "events list", "[events]" }, |
| { "version", 'v', POPT_ARG_NONE, &showvers, 0, "show version", NULL, }, |
| { "verbose", 'V', POPT_ARG_STRING, &verbose, 0, "be verbose in log file", "all,sfile,arcs,samples,module,misc", }, |
| { "ext-feature", 'x', POPT_ARG_STRING, &ext_feature, 1, "enable extended feature", "<extended-feature-name>:[args]", }, |
| POPT_AUTOHELP |
| { NULL, 0, 0, NULL, 0, NULL, NULL, }, |
| }; |
| |
| |
| void opd_open_logfile(void) |
| { |
| if (open(op_log_file, O_WRONLY|O_CREAT|O_NOCTTY|O_APPEND, 0644) == -1) { |
| perror("oprofiled: couldn't re-open stdout: "); |
| exit(EXIT_FAILURE); |
| } |
| |
| if (dup2(1, 2) == -1) { |
| perror("oprofiled: couldn't dup stdout to stderr: "); |
| exit(EXIT_FAILURE); |
| } |
| } |
| |
| |
| /** |
| * opd_fork - fork and return as child |
| * |
| * fork() and exit the parent with _exit(). |
| * Failure is fatal. |
| */ |
| static void opd_fork(void) |
| { |
| switch (fork()) { |
| case -1: |
| perror("oprofiled: fork() failed: "); |
| exit(EXIT_FAILURE); |
| break; |
| case 0: |
| break; |
| default: |
| /* parent */ |
| _exit(EXIT_SUCCESS); |
| break; |
| } |
| } |
| |
| |
| static void opd_go_daemon(void) |
| { |
| opd_fork(); |
| |
| if (chdir(op_session_dir)) { |
| fprintf(stderr, "oprofiled: opd_go_daemon: couldn't chdir to %s: %s", |
| op_session_dir, strerror(errno)); |
| exit(EXIT_FAILURE); |
| } |
| |
| if (setsid() < 0) { |
| perror("oprofiled: opd_go_daemon: couldn't setsid: "); |
| exit(EXIT_FAILURE); |
| } |
| |
| opd_fork(); |
| } |
| |
| |
| static void opd_write_abi(void) |
| { |
| char * cbuf; |
| |
| cbuf = xmalloc(strlen(op_session_dir) + 5); |
| strcpy(cbuf, op_session_dir); |
| strcat(cbuf, "/abi"); |
| op_write_abi_to_file(cbuf); |
| free(cbuf); |
| } |
| |
| |
| /** |
| * opd_alarm - sync files and report stats |
| */ |
| static void opd_alarm(int val __attribute__((unused))) |
| { |
| signal_alarm = 1; |
| } |
| |
| |
| /* re-open logfile for logrotate */ |
| static void opd_sighup(int val __attribute__((unused))) |
| { |
| signal_hup = 1; |
| } |
| |
| |
| static void opd_sigterm(int val __attribute__((unused))) |
| { |
| signal_term = 1; |
| } |
| |
| static void opd_sigchild(int val __attribute__((unused))) |
| { |
| signal_child = 1; |
| } |
| |
| |
| static void opd_sigusr1(int val __attribute__((unused))) |
| { |
| signal_usr1 = 1; |
| } |
| |
| |
| static void opd_sigusr2(int val __attribute__((unused))) |
| { |
| signal_usr2 = 1; |
| } |
| |
| |
| static void opd_setup_signals(void) |
| { |
| struct sigaction act; |
| |
| act.sa_handler = opd_alarm; |
| act.sa_flags = 0; |
| sigemptyset(&act.sa_mask); |
| |
| if (sigaction(SIGALRM, &act, NULL)) { |
| perror("oprofiled: install of SIGALRM handler failed: "); |
| exit(EXIT_FAILURE); |
| } |
| |
| act.sa_handler = opd_sighup; |
| act.sa_flags = 0; |
| sigemptyset(&act.sa_mask); |
| sigaddset(&act.sa_mask, SIGALRM); |
| |
| if (sigaction(SIGHUP, &act, NULL)) { |
| perror("oprofiled: install of SIGHUP handler failed: "); |
| exit(EXIT_FAILURE); |
| } |
| |
| act.sa_handler = opd_sigterm; |
| act.sa_flags = 0; |
| sigemptyset(&act.sa_mask); |
| sigaddset(&act.sa_mask, SIGTERM); |
| |
| if (sigaction(SIGTERM, &act, NULL)) { |
| perror("oprofiled: install of SIGTERM handler failed: "); |
| exit(EXIT_FAILURE); |
| } |
| |
| act.sa_handler = opd_sigchild; |
| act.sa_flags = 0; |
| sigemptyset(&act.sa_mask); |
| sigaddset(&act.sa_mask, SIGCHLD); |
| |
| if (sigaction(SIGCHLD, &act, NULL)) { |
| perror("oprofiled: install of SIGCHLD handler failed: "); |
| exit(EXIT_FAILURE); |
| } |
| |
| act.sa_handler = opd_sigusr1; |
| act.sa_flags = 0; |
| sigemptyset(&act.sa_mask); |
| sigaddset(&act.sa_mask, SIGTERM); |
| |
| if (sigaction(SIGUSR1, &act, NULL)) { |
| perror("oprofiled: install of SIGUSR1 handler failed: "); |
| exit(EXIT_FAILURE); |
| } |
| |
| act.sa_handler = opd_sigusr2; |
| act.sa_flags = 0; |
| sigemptyset(&act.sa_mask); |
| sigaddset(&act.sa_mask, SIGTERM); |
| |
| if (sigaction(SIGUSR2, &act, NULL)) { |
| perror("oprofiled: install of SIGUSR2 handler failed: "); |
| exit(EXIT_FAILURE); |
| } |
| } |
| |
| |
| struct opd_hashed_name { |
| char * name; |
| struct list_head next; |
| }; |
| |
| |
| static void add_image_filter(char const * name) |
| { |
| size_t hash; |
| struct opd_hashed_name * elt = xmalloc(sizeof(struct opd_hashed_name)); |
| elt->name = xmalloc(PATH_MAX); |
| if (!realpath(name, elt->name)) { |
| free(elt->name); |
| free(elt); |
| return; |
| } |
| hash = op_hash_string(elt->name); |
| verbprintf(vmisc, "Adding to image filter: \"%s\"\n", elt->name); |
| list_add(&elt->next, &images_filter[hash % OPD_IMAGE_FILTER_HASH_SIZE]); |
| } |
| |
| |
| static void opd_parse_image_filter(void) |
| { |
| size_t i; |
| char const * last = binary_name_filter; |
| char const * cur = binary_name_filter; |
| |
| if (!binary_name_filter) |
| return; |
| |
| for (i = 0; i < OPD_IMAGE_FILTER_HASH_SIZE; ++i) |
| list_init(&images_filter[i]); |
| |
| while ((cur = strchr(last, ',')) != NULL) { |
| char * tmp = op_xstrndup(last, cur - last); |
| add_image_filter(tmp); |
| free(tmp); |
| last = cur + 1; |
| } |
| add_image_filter(last); |
| } |
| |
| |
| int is_image_ignored(char const * name) |
| { |
| size_t hash; |
| struct list_head * pos; |
| |
| if (!binary_name_filter) |
| return 0; |
| |
| hash = op_hash_string(name); |
| |
| list_for_each(pos, &images_filter[hash % OPD_IMAGE_FILTER_HASH_SIZE]) { |
| struct opd_hashed_name * hashed_name = |
| list_entry(pos, struct opd_hashed_name, next); |
| if (!strcmp(hashed_name->name, name)) |
| return 0; |
| } |
| |
| return 1; |
| } |
| |
| |
| /** return the int in the given oprofilefs file */ |
| int opd_read_fs_int(char const * path, char const * name, int fatal) |
| { |
| char filename[PATH_MAX + 1]; |
| snprintf(filename, PATH_MAX, "%s/%s", path, name); |
| return op_read_int_from_file(filename, fatal); |
| } |
| |
| |
| static void opd_handle_verbose_option(char const * name) |
| { |
| if (!strcmp(name, "all")) { |
| vsfile = 1; |
| vsamples = 1; |
| varcs = 1; |
| vmodule = 1; |
| vmisc = 1; |
| vext= 1; |
| } else if (!strcmp(name, "sfile")) { |
| vsfile = 1; |
| } else if (!strcmp(name, "arcs")) { |
| varcs = 1; |
| } else if (!strcmp(name, "samples")) { |
| vsamples = 1; |
| } else if (!strcmp(name, "module")) { |
| vmodule = 1; |
| } else if (!strcmp(name, "misc")) { |
| vmisc = 1; |
| } else if (!strcmp(name, "ext")) { |
| vext= 1; |
| } else { |
| fprintf(stderr, "unknown verbose options\n"); |
| exit(EXIT_FAILURE); |
| } |
| } |
| |
| static void opd_parse_verbose(void) |
| { |
| char const * last = verbose; |
| char const * cur = verbose; |
| |
| if (!verbose) |
| return; |
| |
| while ((cur = strchr(last, ',')) != NULL) { |
| char * tmp = op_xstrndup(last, cur - last); |
| opd_handle_verbose_option(tmp); |
| free(tmp); |
| last = cur + 1; |
| } |
| opd_handle_verbose_option(last); |
| } |
| |
| |
| static void opd_options(int argc, char const * argv[]) |
| { |
| poptContext optcon; |
| char * tmp; |
| |
| optcon = op_poptGetContext(NULL, argc, argv, options, 0); |
| |
| if (showvers) |
| show_version(argv[0]); |
| |
| opd_parse_verbose(); |
| |
| if (separate_kernel) |
| separate_lib = 1; |
| |
| cpu_type = op_get_cpu_type(); |
| op_nr_counters = op_get_nr_counters(cpu_type); |
| |
| if (!no_vmlinux) { |
| if (!vmlinux || !strcmp("", vmlinux)) { |
| fprintf(stderr, "oprofiled: no vmlinux specified.\n"); |
| poptPrintHelp(optcon, stderr, 0); |
| exit(EXIT_FAILURE); |
| } |
| |
| /* canonicalise vmlinux filename. fix #637805 */ |
| tmp = xmalloc(PATH_MAX); |
| if (realpath(vmlinux, tmp)) |
| vmlinux = tmp; |
| else |
| free(tmp); |
| |
| if (!kernel_range || !strcmp("", kernel_range)) { |
| fprintf(stderr, "oprofiled: no kernel VMA range specified.\n"); |
| poptPrintHelp(optcon, stderr, 0); |
| exit(EXIT_FAILURE); |
| } |
| } |
| |
| if(opd_ext_initialize(ext_feature) != EXIT_SUCCESS) |
| exit(EXIT_FAILURE); |
| |
| if (events == NULL && no_event_ok == 0) { |
| fprintf(stderr, "oprofiled: no events specified.\n"); |
| poptPrintHelp(optcon, stderr, 0); |
| exit(EXIT_FAILURE); |
| } |
| |
| if (!xenimage || !strcmp("", xenimage)) { |
| no_xen = 1; |
| } else { |
| no_xen = 0; |
| |
| /* canonicalise xen image filename. */ |
| tmp = xmalloc(PATH_MAX); |
| if (realpath(xenimage, tmp)) |
| xenimage = tmp; |
| else |
| free(tmp); |
| |
| if (!xen_range || !strcmp("", xen_range)) { |
| fprintf(stderr, "oprofiled: no Xen VMA range specified.\n"); |
| poptPrintHelp(optcon, stderr, 0); |
| exit(EXIT_FAILURE); |
| } |
| } |
| |
| if (events != NULL) |
| opd_parse_events(events); |
| |
| opd_parse_image_filter(); |
| |
| poptFreeContext(optcon); |
| } |
| |
| |
| /* determine what kernel we're running and which daemon |
| * to use |
| */ |
| static struct oprofiled_ops * get_ops(void) |
| { |
| switch (op_get_interface()) { |
| #ifndef ANDROID |
| case OP_INTERFACE_24: |
| printf("Using 2.4 OProfile kernel interface.\n"); |
| return &opd_24_ops; |
| #endif |
| case OP_INTERFACE_26: |
| printf("Using 2.6+ OProfile kernel interface.\n"); |
| return &opd_26_ops; |
| default: |
| break; |
| } |
| |
| fprintf(stderr, "Couldn't determine kernel version.\n"); |
| exit(EXIT_FAILURE); |
| return NULL; |
| } |
| |
| |
| int main(int argc, char const * argv[]) |
| { |
| int err; |
| struct rlimit rlim = { 2048, 2048 }; |
| |
| opd_options(argc, argv); |
| init_op_config_dirs(session_dir); |
| |
| opd_setup_signals(); |
| |
| err = setrlimit(RLIMIT_NOFILE, &rlim); |
| if (err) |
| perror("warning: could not set RLIMIT_NOFILE to 2048: "); |
| |
| opd_write_abi(); |
| |
| opd_ops = get_ops(); |
| |
| opd_ops->init(); |
| |
| opd_go_daemon(); |
| |
| /* clean up every 10 minutes */ |
| alarm(60 * 10); |
| |
| if (op_write_lock_file(op_lock_file)) { |
| fprintf(stderr, "oprofiled: could not create lock file %s\n", |
| op_lock_file); |
| exit(EXIT_FAILURE); |
| } |
| |
| opd_ops->start(); |
| |
| opd_ops->exit(); |
| |
| return 0; |
| } |