Linux kernel mirror (for testing)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel
os
linux
1// SPDX-License-Identifier: GPL-2.0
2#include <internal/lib.h>
3#include <subcmd/parse-options.h>
4#include <api/fd/array.h>
5#include <api/fs/fs.h>
6#include <linux/zalloc.h>
7#include <linux/string.h>
8#include <linux/limits.h>
9#include <linux/string.h>
10#include <string.h>
11#include <sys/file.h>
12#include <signal.h>
13#include <stdlib.h>
14#include <time.h>
15#include <stdio.h>
16#include <unistd.h>
17#include <errno.h>
18#include <sys/inotify.h>
19#include <libgen.h>
20#include <sys/types.h>
21#include <sys/socket.h>
22#include <sys/un.h>
23#include <sys/stat.h>
24#include <sys/signalfd.h>
25#include <sys/wait.h>
26#include <poll.h>
27#include <sys/stat.h>
28#include <time.h>
29#include "builtin.h"
30#include "perf.h"
31#include "debug.h"
32#include "config.h"
33#include "util.h"
34
35#define SESSION_OUTPUT "output"
36#define SESSION_CONTROL "control"
37#define SESSION_ACK "ack"
38
39/*
40 * Session states:
41 *
42 * OK - session is up and running
43 * RECONFIG - session is pending for reconfiguration,
44 * new values are already loaded in session object
45 * KILL - session is pending to be killed
46 *
47 * Session object life and its state is maintained by
48 * following functions:
49 *
50 * setup_server_config
51 * - reads config file and setup session objects
52 * with following states:
53 *
54 * OK - no change needed
55 * RECONFIG - session needs to be changed
56 * (run variable changed)
57 * KILL - session needs to be killed
58 * (session is no longer in config file)
59 *
60 * daemon__reconfig
61 * - scans session objects and does following actions
62 * for states:
63 *
64 * OK - skip
65 * RECONFIG - session is killed and re-run with new config
66 * KILL - session is killed
67 *
68 * - all sessions have OK state on the function exit
69 */
70enum daemon_session_state {
71 OK,
72 RECONFIG,
73 KILL,
74};
75
76struct daemon_session {
77 char *base;
78 char *name;
79 char *run;
80 char *control;
81 int pid;
82 struct list_head list;
83 enum daemon_session_state state;
84 time_t start;
85};
86
87struct daemon {
88 const char *config;
89 char *config_real;
90 char *config_base;
91 const char *csv_sep;
92 const char *base_user;
93 char *base;
94 struct list_head sessions;
95 FILE *out;
96 char perf[PATH_MAX];
97 int signal_fd;
98 time_t start;
99};
100
101static struct daemon __daemon = {
102 .sessions = LIST_HEAD_INIT(__daemon.sessions),
103};
104
105static const char * const daemon_usage[] = {
106 "perf daemon start [<options>]",
107 "perf daemon [<options>]",
108 NULL
109};
110
111static bool done;
112
113static void sig_handler(int sig __maybe_unused)
114{
115 done = true;
116}
117
118static struct daemon_session *daemon__add_session(struct daemon *config, char *name)
119{
120 struct daemon_session *session = zalloc(sizeof(*session));
121
122 if (!session)
123 return NULL;
124
125 session->name = strdup(name);
126 if (!session->name) {
127 free(session);
128 return NULL;
129 }
130
131 session->pid = -1;
132 list_add_tail(&session->list, &config->sessions);
133 return session;
134}
135
136static struct daemon_session *daemon__find_session(struct daemon *daemon, char *name)
137{
138 struct daemon_session *session;
139
140 list_for_each_entry(session, &daemon->sessions, list) {
141 if (!strcmp(session->name, name))
142 return session;
143 }
144
145 return NULL;
146}
147
148static int get_session_name(const char *var, char *session, int len)
149{
150 const char *p = var + sizeof("session-") - 1;
151
152 while (*p != '.' && *p != 0x0 && len--)
153 *session++ = *p++;
154
155 *session = 0;
156 return *p == '.' ? 0 : -EINVAL;
157}
158
159static int session_config(struct daemon *daemon, const char *var, const char *value)
160{
161 struct daemon_session *session;
162 char name[100];
163
164 if (get_session_name(var, name, sizeof(name) - 1))
165 return -EINVAL;
166
167 var = strchr(var, '.');
168 if (!var)
169 return -EINVAL;
170
171 var++;
172
173 session = daemon__find_session(daemon, name);
174
175 if (!session) {
176 /* New session is defined. */
177 session = daemon__add_session(daemon, name);
178 if (!session)
179 return -ENOMEM;
180
181 pr_debug("reconfig: found new session %s\n", name);
182
183 /* Trigger reconfig to start it. */
184 session->state = RECONFIG;
185 } else if (session->state == KILL) {
186 /* Current session is defined, no action needed. */
187 pr_debug("reconfig: found current session %s\n", name);
188 session->state = OK;
189 }
190
191 if (!strcmp(var, "run")) {
192 bool same = false;
193
194 if (session->run)
195 same = !strcmp(session->run, value);
196
197 if (!same) {
198 if (session->run) {
199 free(session->run);
200 pr_debug("reconfig: session %s is changed\n", name);
201 }
202
203 session->run = strdup(value);
204 if (!session->run)
205 return -ENOMEM;
206
207 /*
208 * Either new or changed run value is defined,
209 * trigger reconfig for the session.
210 */
211 session->state = RECONFIG;
212 }
213 }
214
215 return 0;
216}
217
218static int server_config(const char *var, const char *value, void *cb)
219{
220 struct daemon *daemon = cb;
221
222 if (strstarts(var, "session-")) {
223 return session_config(daemon, var, value);
224 } else if (!strcmp(var, "daemon.base") && !daemon->base_user) {
225 if (daemon->base && strcmp(daemon->base, value)) {
226 pr_err("failed: can't redefine base, bailing out\n");
227 return -EINVAL;
228 }
229 daemon->base = strdup(value);
230 if (!daemon->base)
231 return -ENOMEM;
232 }
233
234 return 0;
235}
236
237static int client_config(const char *var, const char *value, void *cb)
238{
239 struct daemon *daemon = cb;
240
241 if (!strcmp(var, "daemon.base") && !daemon->base_user) {
242 daemon->base = strdup(value);
243 if (!daemon->base)
244 return -ENOMEM;
245 }
246
247 return 0;
248}
249
250static int check_base(struct daemon *daemon)
251{
252 struct stat st;
253
254 if (!daemon->base) {
255 pr_err("failed: base not defined\n");
256 return -EINVAL;
257 }
258
259 if (stat(daemon->base, &st)) {
260 switch (errno) {
261 case EACCES:
262 pr_err("failed: permission denied for '%s' base\n",
263 daemon->base);
264 return -EACCES;
265 case ENOENT:
266 pr_err("failed: base '%s' does not exists\n",
267 daemon->base);
268 return -EACCES;
269 default:
270 pr_err("failed: can't access base '%s': %s\n",
271 daemon->base, strerror(errno));
272 return -errno;
273 }
274 }
275
276 if ((st.st_mode & S_IFMT) != S_IFDIR) {
277 pr_err("failed: base '%s' is not directory\n",
278 daemon->base);
279 return -EINVAL;
280 }
281
282 return 0;
283}
284
285static int setup_client_config(struct daemon *daemon)
286{
287 struct perf_config_set *set = perf_config_set__load_file(daemon->config_real);
288 int err = -ENOMEM;
289
290 if (set) {
291 err = perf_config_set(set, client_config, daemon);
292 perf_config_set__delete(set);
293 }
294
295 return err ?: check_base(daemon);
296}
297
298static int setup_server_config(struct daemon *daemon)
299{
300 struct perf_config_set *set;
301 struct daemon_session *session;
302 int err = -ENOMEM;
303
304 pr_debug("reconfig: started\n");
305
306 /*
307 * Mark all sessions for kill, the server config
308 * will set following states, see explanation at
309 * enum daemon_session_state declaration.
310 */
311 list_for_each_entry(session, &daemon->sessions, list)
312 session->state = KILL;
313
314 set = perf_config_set__load_file(daemon->config_real);
315 if (set) {
316 err = perf_config_set(set, server_config, daemon);
317 perf_config_set__delete(set);
318 }
319
320 return err ?: check_base(daemon);
321}
322
323static int daemon_session__run(struct daemon_session *session,
324 struct daemon *daemon)
325{
326 char buf[PATH_MAX];
327 char **argv;
328 int argc, fd;
329
330 if (asprintf(&session->base, "%s/session-%s",
331 daemon->base, session->name) < 0) {
332 perror("failed: asprintf");
333 return -1;
334 }
335
336 if (mkdir(session->base, 0755) && errno != EEXIST) {
337 perror("failed: mkdir");
338 return -1;
339 }
340
341 session->start = time(NULL);
342
343 session->pid = fork();
344 if (session->pid < 0)
345 return -1;
346 if (session->pid > 0) {
347 pr_info("reconfig: ruining session [%s:%d]: %s\n",
348 session->name, session->pid, session->run);
349 return 0;
350 }
351
352 if (chdir(session->base)) {
353 perror("failed: chdir");
354 return -1;
355 }
356
357 fd = open("/dev/null", O_RDONLY);
358 if (fd < 0) {
359 perror("failed: open /dev/null");
360 return -1;
361 }
362
363 dup2(fd, 0);
364 close(fd);
365
366 fd = open(SESSION_OUTPUT, O_RDWR|O_CREAT|O_TRUNC, 0644);
367 if (fd < 0) {
368 perror("failed: open session output");
369 return -1;
370 }
371
372 dup2(fd, 1);
373 dup2(fd, 2);
374 close(fd);
375
376 if (mkfifo(SESSION_CONTROL, 0600) && errno != EEXIST) {
377 perror("failed: create control fifo");
378 return -1;
379 }
380
381 if (mkfifo(SESSION_ACK, 0600) && errno != EEXIST) {
382 perror("failed: create ack fifo");
383 return -1;
384 }
385
386 scnprintf(buf, sizeof(buf), "%s record --control=fifo:%s,%s %s",
387 daemon->perf, SESSION_CONTROL, SESSION_ACK, session->run);
388
389 argv = argv_split(buf, &argc);
390 if (!argv)
391 exit(-1);
392
393 exit(execve(daemon->perf, argv, NULL));
394 return -1;
395}
396
397static pid_t handle_signalfd(struct daemon *daemon)
398{
399 struct daemon_session *session;
400 struct signalfd_siginfo si;
401 ssize_t err;
402 int status;
403 pid_t pid;
404
405 /*
406 * Take signal fd data as pure signal notification and check all
407 * the sessions state. The reason is that multiple signals can get
408 * coalesced in kernel and we can receive only single signal even
409 * if multiple SIGCHLD were generated.
410 */
411 err = read(daemon->signal_fd, &si, sizeof(struct signalfd_siginfo));
412 if (err != sizeof(struct signalfd_siginfo)) {
413 pr_err("failed to read signal fd\n");
414 return -1;
415 }
416
417 list_for_each_entry(session, &daemon->sessions, list) {
418 if (session->pid == -1)
419 continue;
420
421 pid = waitpid(session->pid, &status, WNOHANG);
422 if (pid <= 0)
423 continue;
424
425 if (WIFEXITED(status)) {
426 pr_info("session '%s' exited, status=%d\n",
427 session->name, WEXITSTATUS(status));
428 } else if (WIFSIGNALED(status)) {
429 pr_info("session '%s' killed (signal %d)\n",
430 session->name, WTERMSIG(status));
431 } else if (WIFSTOPPED(status)) {
432 pr_info("session '%s' stopped (signal %d)\n",
433 session->name, WSTOPSIG(status));
434 } else {
435 pr_info("session '%s' Unexpected status (0x%x)\n",
436 session->name, status);
437 }
438
439 session->state = KILL;
440 session->pid = -1;
441 }
442
443 return 0;
444}
445
446static int daemon_session__wait(struct daemon_session *session, struct daemon *daemon,
447 int secs)
448{
449 struct pollfd pollfd = {
450 .fd = daemon->signal_fd,
451 .events = POLLIN,
452 };
453 time_t start;
454
455 start = time(NULL);
456
457 do {
458 int err = poll(&pollfd, 1, 1000);
459
460 if (err > 0) {
461 handle_signalfd(daemon);
462 } else if (err < 0) {
463 perror("failed: poll\n");
464 return -1;
465 }
466
467 if (start + secs < time(NULL))
468 return -1;
469 } while (session->pid != -1);
470
471 return 0;
472}
473
474static bool daemon__has_alive_session(struct daemon *daemon)
475{
476 struct daemon_session *session;
477
478 list_for_each_entry(session, &daemon->sessions, list) {
479 if (session->pid != -1)
480 return true;
481 }
482
483 return false;
484}
485
486static int daemon__wait(struct daemon *daemon, int secs)
487{
488 struct pollfd pollfd = {
489 .fd = daemon->signal_fd,
490 .events = POLLIN,
491 };
492 time_t start;
493
494 start = time(NULL);
495
496 do {
497 int err = poll(&pollfd, 1, 1000);
498
499 if (err > 0) {
500 handle_signalfd(daemon);
501 } else if (err < 0) {
502 perror("failed: poll\n");
503 return -1;
504 }
505
506 if (start + secs < time(NULL))
507 return -1;
508 } while (daemon__has_alive_session(daemon));
509
510 return 0;
511}
512
513static int daemon_session__control(struct daemon_session *session,
514 const char *msg, bool do_ack)
515{
516 struct pollfd pollfd = { .events = POLLIN, };
517 char control_path[PATH_MAX];
518 char ack_path[PATH_MAX];
519 int control, ack = -1, len;
520 char buf[20];
521 int ret = -1;
522 ssize_t err;
523
524 /* open the control file */
525 scnprintf(control_path, sizeof(control_path), "%s/%s",
526 session->base, SESSION_CONTROL);
527
528 control = open(control_path, O_WRONLY|O_NONBLOCK);
529 if (!control)
530 return -1;
531
532 if (do_ack) {
533 /* open the ack file */
534 scnprintf(ack_path, sizeof(ack_path), "%s/%s",
535 session->base, SESSION_ACK);
536
537 ack = open(ack_path, O_RDONLY, O_NONBLOCK);
538 if (!ack) {
539 close(control);
540 return -1;
541 }
542 }
543
544 /* write the command */
545 len = strlen(msg);
546
547 err = writen(control, msg, len);
548 if (err != len) {
549 pr_err("failed: write to control pipe: %d (%s)\n",
550 errno, control_path);
551 goto out;
552 }
553
554 if (!do_ack)
555 goto out;
556
557 /* wait for an ack */
558 pollfd.fd = ack;
559
560 if (!poll(&pollfd, 1, 2000)) {
561 pr_err("failed: control ack timeout\n");
562 goto out;
563 }
564
565 if (!(pollfd.revents & POLLIN)) {
566 pr_err("failed: did not received an ack\n");
567 goto out;
568 }
569
570 err = read(ack, buf, sizeof(buf));
571 if (err > 0)
572 ret = strcmp(buf, "ack\n");
573 else
574 perror("failed: read ack %d\n");
575
576out:
577 if (ack != -1)
578 close(ack);
579
580 close(control);
581 return ret;
582}
583
584static int setup_server_socket(struct daemon *daemon)
585{
586 struct sockaddr_un addr;
587 char path[PATH_MAX];
588 int fd = socket(AF_UNIX, SOCK_STREAM, 0);
589
590 if (fd < 0) {
591 fprintf(stderr, "socket: %s\n", strerror(errno));
592 return -1;
593 }
594
595 if (fcntl(fd, F_SETFD, FD_CLOEXEC)) {
596 perror("failed: fcntl FD_CLOEXEC");
597 close(fd);
598 return -1;
599 }
600
601 scnprintf(path, sizeof(path), "%s/control", daemon->base);
602
603 if (strlen(path) + 1 >= sizeof(addr.sun_path)) {
604 pr_err("failed: control path too long '%s'\n", path);
605 close(fd);
606 return -1;
607 }
608
609 memset(&addr, 0, sizeof(addr));
610 addr.sun_family = AF_UNIX;
611
612 strlcpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
613 unlink(path);
614
615 if (bind(fd, (struct sockaddr *)&addr, sizeof(addr)) == -1) {
616 perror("failed: bind");
617 close(fd);
618 return -1;
619 }
620
621 if (listen(fd, 1) == -1) {
622 perror("failed: listen");
623 close(fd);
624 return -1;
625 }
626
627 return fd;
628}
629
630enum {
631 CMD_LIST = 0,
632 CMD_SIGNAL = 1,
633 CMD_STOP = 2,
634 CMD_PING = 3,
635 CMD_MAX,
636};
637
638#define SESSION_MAX 64
639
640union cmd {
641 int cmd;
642
643 /* CMD_LIST */
644 struct {
645 int cmd;
646 int verbose;
647 char csv_sep;
648 } list;
649
650 /* CMD_SIGNAL */
651 struct {
652 int cmd;
653 int sig;
654 char name[SESSION_MAX];
655 } signal;
656
657 /* CMD_PING */
658 struct {
659 int cmd;
660 char name[SESSION_MAX];
661 } ping;
662};
663
664enum {
665 PING_OK = 0,
666 PING_FAIL = 1,
667 PING_MAX,
668};
669
670static int daemon_session__ping(struct daemon_session *session)
671{
672 return daemon_session__control(session, "ping", true) ? PING_FAIL : PING_OK;
673}
674
675static int cmd_session_list(struct daemon *daemon, union cmd *cmd, FILE *out)
676{
677 char csv_sep = cmd->list.csv_sep;
678 struct daemon_session *session;
679 time_t curr = time(NULL);
680
681 if (csv_sep) {
682 fprintf(out, "%d%c%s%c%s%c%s/%s",
683 /* pid daemon */
684 getpid(), csv_sep, "daemon",
685 /* base */
686 csv_sep, daemon->base,
687 /* output */
688 csv_sep, daemon->base, SESSION_OUTPUT);
689
690 fprintf(out, "%c%s/%s",
691 /* lock */
692 csv_sep, daemon->base, "lock");
693
694 fprintf(out, "%c%lu",
695 /* session up time */
696 csv_sep, (curr - daemon->start) / 60);
697
698 fprintf(out, "\n");
699 } else {
700 fprintf(out, "[%d:daemon] base: %s\n", getpid(), daemon->base);
701 if (cmd->list.verbose) {
702 fprintf(out, " output: %s/%s\n",
703 daemon->base, SESSION_OUTPUT);
704 fprintf(out, " lock: %s/lock\n",
705 daemon->base);
706 fprintf(out, " up: %lu minutes\n",
707 (curr - daemon->start) / 60);
708 }
709 }
710
711 list_for_each_entry(session, &daemon->sessions, list) {
712 if (csv_sep) {
713 fprintf(out, "%d%c%s%c%s",
714 /* pid */
715 session->pid,
716 /* name */
717 csv_sep, session->name,
718 /* base */
719 csv_sep, session->run);
720
721 fprintf(out, "%c%s%c%s/%s",
722 /* session dir */
723 csv_sep, session->base,
724 /* session output */
725 csv_sep, session->base, SESSION_OUTPUT);
726
727 fprintf(out, "%c%s/%s%c%s/%s",
728 /* session control */
729 csv_sep, session->base, SESSION_CONTROL,
730 /* session ack */
731 csv_sep, session->base, SESSION_ACK);
732
733 fprintf(out, "%c%lu",
734 /* session up time */
735 csv_sep, (curr - session->start) / 60);
736
737 fprintf(out, "\n");
738 } else {
739 fprintf(out, "[%d:%s] perf record %s\n",
740 session->pid, session->name, session->run);
741 if (!cmd->list.verbose)
742 continue;
743 fprintf(out, " base: %s\n",
744 session->base);
745 fprintf(out, " output: %s/%s\n",
746 session->base, SESSION_OUTPUT);
747 fprintf(out, " control: %s/%s\n",
748 session->base, SESSION_CONTROL);
749 fprintf(out, " ack: %s/%s\n",
750 session->base, SESSION_ACK);
751 fprintf(out, " up: %lu minutes\n",
752 (curr - session->start) / 60);
753 }
754 }
755
756 return 0;
757}
758
759static int daemon_session__signal(struct daemon_session *session, int sig)
760{
761 if (session->pid < 0)
762 return -1;
763 return kill(session->pid, sig);
764}
765
766static int cmd_session_kill(struct daemon *daemon, union cmd *cmd, FILE *out)
767{
768 struct daemon_session *session;
769 bool all = false;
770
771 all = !strcmp(cmd->signal.name, "all");
772
773 list_for_each_entry(session, &daemon->sessions, list) {
774 if (all || !strcmp(cmd->signal.name, session->name)) {
775 daemon_session__signal(session, cmd->signal.sig);
776 fprintf(out, "signal %d sent to session '%s [%d]'\n",
777 cmd->signal.sig, session->name, session->pid);
778 }
779 }
780
781 return 0;
782}
783
784static const char *ping_str[PING_MAX] = {
785 [PING_OK] = "OK",
786 [PING_FAIL] = "FAIL",
787};
788
789static int cmd_session_ping(struct daemon *daemon, union cmd *cmd, FILE *out)
790{
791 struct daemon_session *session;
792 bool all = false, found = false;
793
794 all = !strcmp(cmd->ping.name, "all");
795
796 list_for_each_entry(session, &daemon->sessions, list) {
797 if (all || !strcmp(cmd->ping.name, session->name)) {
798 int state = daemon_session__ping(session);
799
800 fprintf(out, "%-4s %s\n", ping_str[state], session->name);
801 found = true;
802 }
803 }
804
805 if (!found && !all) {
806 fprintf(out, "%-4s %s (not found)\n",
807 ping_str[PING_FAIL], cmd->ping.name);
808 }
809 return 0;
810}
811
812static int handle_server_socket(struct daemon *daemon, int sock_fd)
813{
814 int ret = -1, fd;
815 FILE *out = NULL;
816 union cmd cmd;
817
818 fd = accept(sock_fd, NULL, NULL);
819 if (fd < 0) {
820 perror("failed: accept");
821 return -1;
822 }
823
824 if (sizeof(cmd) != readn(fd, &cmd, sizeof(cmd))) {
825 perror("failed: read");
826 goto out;
827 }
828
829 out = fdopen(fd, "w");
830 if (!out) {
831 perror("failed: fdopen");
832 goto out;
833 }
834
835 switch (cmd.cmd) {
836 case CMD_LIST:
837 ret = cmd_session_list(daemon, &cmd, out);
838 break;
839 case CMD_SIGNAL:
840 ret = cmd_session_kill(daemon, &cmd, out);
841 break;
842 case CMD_STOP:
843 done = 1;
844 ret = 0;
845 pr_debug("perf daemon is exciting\n");
846 break;
847 case CMD_PING:
848 ret = cmd_session_ping(daemon, &cmd, out);
849 break;
850 default:
851 break;
852 }
853
854 fclose(out);
855out:
856 /* If out is defined, then fd is closed via fclose. */
857 if (!out)
858 close(fd);
859 return ret;
860}
861
862static int setup_client_socket(struct daemon *daemon)
863{
864 struct sockaddr_un addr;
865 char path[PATH_MAX];
866 int fd = socket(AF_UNIX, SOCK_STREAM, 0);
867
868 if (fd == -1) {
869 perror("failed: socket");
870 return -1;
871 }
872
873 scnprintf(path, sizeof(path), "%s/control", daemon->base);
874
875 if (strlen(path) + 1 >= sizeof(addr.sun_path)) {
876 pr_err("failed: control path too long '%s'\n", path);
877 close(fd);
878 return -1;
879 }
880
881 memset(&addr, 0, sizeof(addr));
882 addr.sun_family = AF_UNIX;
883 strlcpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
884
885 if (connect(fd, (struct sockaddr *) &addr, sizeof(addr)) == -1) {
886 perror("failed: connect");
887 close(fd);
888 return -1;
889 }
890
891 return fd;
892}
893
894static void daemon_session__kill(struct daemon_session *session,
895 struct daemon *daemon)
896{
897 int how = 0;
898
899 do {
900 switch (how) {
901 case 0:
902 daemon_session__control(session, "stop", false);
903 break;
904 case 1:
905 daemon_session__signal(session, SIGTERM);
906 break;
907 case 2:
908 daemon_session__signal(session, SIGKILL);
909 break;
910 default:
911 pr_err("failed to wait for session %s\n",
912 session->name);
913 return;
914 }
915 how++;
916
917 } while (daemon_session__wait(session, daemon, 10));
918}
919
920static void daemon__signal(struct daemon *daemon, int sig)
921{
922 struct daemon_session *session;
923
924 list_for_each_entry(session, &daemon->sessions, list)
925 daemon_session__signal(session, sig);
926}
927
928static void daemon_session__delete(struct daemon_session *session)
929{
930 free(session->base);
931 free(session->name);
932 free(session->run);
933 free(session);
934}
935
936static void daemon_session__remove(struct daemon_session *session)
937{
938 list_del(&session->list);
939 daemon_session__delete(session);
940}
941
942static void daemon__stop(struct daemon *daemon)
943{
944 struct daemon_session *session;
945
946 list_for_each_entry(session, &daemon->sessions, list)
947 daemon_session__control(session, "stop", false);
948}
949
950static void daemon__kill(struct daemon *daemon)
951{
952 int how = 0;
953
954 do {
955 switch (how) {
956 case 0:
957 daemon__stop(daemon);
958 break;
959 case 1:
960 daemon__signal(daemon, SIGTERM);
961 break;
962 case 2:
963 daemon__signal(daemon, SIGKILL);
964 break;
965 default:
966 pr_err("failed to wait for sessions\n");
967 return;
968 }
969 how++;
970
971 } while (daemon__wait(daemon, 10));
972}
973
974static void daemon__exit(struct daemon *daemon)
975{
976 struct daemon_session *session, *h;
977
978 list_for_each_entry_safe(session, h, &daemon->sessions, list)
979 daemon_session__remove(session);
980
981 free(daemon->config_real);
982 free(daemon->config_base);
983 free(daemon->base);
984}
985
986static int daemon__reconfig(struct daemon *daemon)
987{
988 struct daemon_session *session, *n;
989
990 list_for_each_entry_safe(session, n, &daemon->sessions, list) {
991 /* No change. */
992 if (session->state == OK)
993 continue;
994
995 /* Remove session. */
996 if (session->state == KILL) {
997 if (session->pid > 0) {
998 daemon_session__kill(session, daemon);
999 pr_info("reconfig: session '%s' killed\n", session->name);
1000 }
1001 daemon_session__remove(session);
1002 continue;
1003 }
1004
1005 /* Reconfig session. */
1006 if (session->pid > 0) {
1007 daemon_session__kill(session, daemon);
1008 pr_info("reconfig: session '%s' killed\n", session->name);
1009 }
1010 if (daemon_session__run(session, daemon))
1011 return -1;
1012
1013 session->state = OK;
1014 }
1015
1016 return 0;
1017}
1018
1019static int setup_config_changes(struct daemon *daemon)
1020{
1021 char *basen = strdup(daemon->config_real);
1022 char *dirn = strdup(daemon->config_real);
1023 char *base, *dir;
1024 int fd, wd = -1;
1025
1026 if (!dirn || !basen)
1027 goto out;
1028
1029 fd = inotify_init1(IN_NONBLOCK|O_CLOEXEC);
1030 if (fd < 0) {
1031 perror("failed: inotify_init");
1032 goto out;
1033 }
1034
1035 dir = dirname(dirn);
1036 base = basename(basen);
1037 pr_debug("config file: %s, dir: %s\n", base, dir);
1038
1039 wd = inotify_add_watch(fd, dir, IN_CLOSE_WRITE);
1040 if (wd >= 0) {
1041 daemon->config_base = strdup(base);
1042 if (!daemon->config_base) {
1043 close(fd);
1044 wd = -1;
1045 }
1046 } else {
1047 perror("failed: inotify_add_watch");
1048 }
1049
1050out:
1051 free(basen);
1052 free(dirn);
1053 return wd < 0 ? -1 : fd;
1054}
1055
1056static bool process_inotify_event(struct daemon *daemon, char *buf, ssize_t len)
1057{
1058 char *p = buf;
1059
1060 while (p < (buf + len)) {
1061 struct inotify_event *event = (struct inotify_event *) p;
1062
1063 /*
1064 * We monitor config directory, check if our
1065 * config file was changes.
1066 */
1067 if ((event->mask & IN_CLOSE_WRITE) &&
1068 !(event->mask & IN_ISDIR)) {
1069 if (!strcmp(event->name, daemon->config_base))
1070 return true;
1071 }
1072 p += sizeof(*event) + event->len;
1073 }
1074 return false;
1075}
1076
1077static int handle_config_changes(struct daemon *daemon, int conf_fd,
1078 bool *config_changed)
1079{
1080 char buf[4096];
1081 ssize_t len;
1082
1083 while (!(*config_changed)) {
1084 len = read(conf_fd, buf, sizeof(buf));
1085 if (len == -1) {
1086 if (errno != EAGAIN) {
1087 perror("failed: read");
1088 return -1;
1089 }
1090 return 0;
1091 }
1092 *config_changed = process_inotify_event(daemon, buf, len);
1093 }
1094 return 0;
1095}
1096
1097static int setup_config(struct daemon *daemon)
1098{
1099 if (daemon->base_user) {
1100 daemon->base = strdup(daemon->base_user);
1101 if (!daemon->base)
1102 return -ENOMEM;
1103 }
1104
1105 if (daemon->config) {
1106 char *real = realpath(daemon->config, NULL);
1107
1108 if (!real) {
1109 perror("failed: realpath");
1110 return -1;
1111 }
1112 daemon->config_real = real;
1113 return 0;
1114 }
1115
1116 if (perf_config_system() && !access(perf_etc_perfconfig(), R_OK))
1117 daemon->config_real = strdup(perf_etc_perfconfig());
1118 else if (perf_config_global() && perf_home_perfconfig())
1119 daemon->config_real = strdup(perf_home_perfconfig());
1120
1121 return daemon->config_real ? 0 : -1;
1122}
1123
1124#ifndef F_TLOCK
1125#define F_TLOCK 2
1126
1127#include <sys/file.h>
1128
1129static int lockf(int fd, int cmd, off_t len)
1130{
1131 if (cmd != F_TLOCK || len != 0)
1132 return -1;
1133
1134 return flock(fd, LOCK_EX | LOCK_NB);
1135}
1136#endif // F_TLOCK
1137
1138/*
1139 * Each daemon tries to create and lock BASE/lock file,
1140 * if it's successful we are sure we're the only daemon
1141 * running over the BASE.
1142 *
1143 * Once daemon is finished, file descriptor to lock file
1144 * is closed and lock is released.
1145 */
1146static int check_lock(struct daemon *daemon)
1147{
1148 char path[PATH_MAX];
1149 char buf[20];
1150 int fd, pid;
1151 ssize_t len;
1152
1153 scnprintf(path, sizeof(path), "%s/lock", daemon->base);
1154
1155 fd = open(path, O_RDWR|O_CREAT|O_CLOEXEC, 0640);
1156 if (fd < 0)
1157 return -1;
1158
1159 if (lockf(fd, F_TLOCK, 0) < 0) {
1160 filename__read_int(path, &pid);
1161 fprintf(stderr, "failed: another perf daemon (pid %d) owns %s\n",
1162 pid, daemon->base);
1163 close(fd);
1164 return -1;
1165 }
1166
1167 scnprintf(buf, sizeof(buf), "%d", getpid());
1168 len = strlen(buf);
1169
1170 if (write(fd, buf, len) != len) {
1171 perror("failed: write");
1172 close(fd);
1173 return -1;
1174 }
1175
1176 if (ftruncate(fd, len)) {
1177 perror("failed: ftruncate");
1178 close(fd);
1179 return -1;
1180 }
1181
1182 return 0;
1183}
1184
1185static int go_background(struct daemon *daemon)
1186{
1187 int pid, fd;
1188
1189 pid = fork();
1190 if (pid < 0)
1191 return -1;
1192
1193 if (pid > 0)
1194 return 1;
1195
1196 if (setsid() < 0)
1197 return -1;
1198
1199 if (check_lock(daemon))
1200 return -1;
1201
1202 umask(0);
1203
1204 if (chdir(daemon->base)) {
1205 perror("failed: chdir");
1206 return -1;
1207 }
1208
1209 fd = open("output", O_RDWR|O_CREAT|O_TRUNC, 0644);
1210 if (fd < 0) {
1211 perror("failed: open");
1212 return -1;
1213 }
1214
1215 if (fcntl(fd, F_SETFD, FD_CLOEXEC)) {
1216 perror("failed: fcntl FD_CLOEXEC");
1217 close(fd);
1218 return -1;
1219 }
1220
1221 close(0);
1222 dup2(fd, 1);
1223 dup2(fd, 2);
1224 close(fd);
1225
1226 daemon->out = fdopen(1, "w");
1227 if (!daemon->out) {
1228 close(1);
1229 close(2);
1230 return -1;
1231 }
1232
1233 setbuf(daemon->out, NULL);
1234 return 0;
1235}
1236
1237static int setup_signalfd(struct daemon *daemon)
1238{
1239 sigset_t mask;
1240
1241 sigemptyset(&mask);
1242 sigaddset(&mask, SIGCHLD);
1243
1244 if (sigprocmask(SIG_BLOCK, &mask, NULL) == -1)
1245 return -1;
1246
1247 daemon->signal_fd = signalfd(-1, &mask, SFD_NONBLOCK|SFD_CLOEXEC);
1248 return daemon->signal_fd;
1249}
1250
1251static int __cmd_start(struct daemon *daemon, struct option parent_options[],
1252 int argc, const char **argv)
1253{
1254 bool foreground = false;
1255 struct option start_options[] = {
1256 OPT_BOOLEAN('f', "foreground", &foreground, "stay on console"),
1257 OPT_PARENT(parent_options),
1258 OPT_END()
1259 };
1260 int sock_fd = -1, conf_fd = -1, signal_fd = -1;
1261 int sock_pos, file_pos, signal_pos;
1262 struct fdarray fda;
1263 int err = 0;
1264
1265 argc = parse_options(argc, argv, start_options, daemon_usage, 0);
1266 if (argc)
1267 usage_with_options(daemon_usage, start_options);
1268
1269 daemon->start = time(NULL);
1270
1271 if (setup_config(daemon)) {
1272 pr_err("failed: config not found\n");
1273 return -1;
1274 }
1275
1276 if (setup_server_config(daemon))
1277 return -1;
1278
1279 if (foreground && check_lock(daemon))
1280 return -1;
1281
1282 if (!foreground) {
1283 err = go_background(daemon);
1284 if (err) {
1285 /* original process, exit normally */
1286 if (err == 1)
1287 err = 0;
1288 daemon__exit(daemon);
1289 return err;
1290 }
1291 }
1292
1293 debug_set_file(daemon->out);
1294 debug_set_display_time(true);
1295
1296 pr_info("daemon started (pid %d)\n", getpid());
1297
1298 fdarray__init(&fda, 3);
1299
1300 sock_fd = setup_server_socket(daemon);
1301 if (sock_fd < 0)
1302 goto out;
1303
1304 conf_fd = setup_config_changes(daemon);
1305 if (conf_fd < 0)
1306 goto out;
1307
1308 signal_fd = setup_signalfd(daemon);
1309 if (signal_fd < 0)
1310 goto out;
1311
1312 sock_pos = fdarray__add(&fda, sock_fd, POLLIN|POLLERR|POLLHUP, 0);
1313 if (sock_pos < 0)
1314 goto out;
1315
1316 file_pos = fdarray__add(&fda, conf_fd, POLLIN|POLLERR|POLLHUP, 0);
1317 if (file_pos < 0)
1318 goto out;
1319
1320 signal_pos = fdarray__add(&fda, signal_fd, POLLIN|POLLERR|POLLHUP, 0);
1321 if (signal_pos < 0)
1322 goto out;
1323
1324 signal(SIGINT, sig_handler);
1325 signal(SIGTERM, sig_handler);
1326 signal(SIGPIPE, SIG_IGN);
1327
1328 while (!done && !err) {
1329 err = daemon__reconfig(daemon);
1330
1331 if (!err && fdarray__poll(&fda, -1)) {
1332 bool reconfig = false;
1333
1334 if (fda.entries[sock_pos].revents & POLLIN)
1335 err = handle_server_socket(daemon, sock_fd);
1336 if (fda.entries[file_pos].revents & POLLIN)
1337 err = handle_config_changes(daemon, conf_fd, &reconfig);
1338 if (fda.entries[signal_pos].revents & POLLIN)
1339 err = handle_signalfd(daemon) < 0;
1340
1341 if (reconfig)
1342 err = setup_server_config(daemon);
1343 }
1344 }
1345
1346out:
1347 fdarray__exit(&fda);
1348
1349 daemon__kill(daemon);
1350 daemon__exit(daemon);
1351
1352 if (sock_fd != -1)
1353 close(sock_fd);
1354 if (conf_fd != -1)
1355 close(conf_fd);
1356 if (signal_fd != -1)
1357 close(signal_fd);
1358
1359 pr_info("daemon exited\n");
1360 fclose(daemon->out);
1361 return err;
1362}
1363
1364static int send_cmd(struct daemon *daemon, union cmd *cmd)
1365{
1366 int ret = -1, fd;
1367 char *line = NULL;
1368 size_t len = 0;
1369 ssize_t nread;
1370 FILE *in = NULL;
1371
1372 if (setup_client_config(daemon))
1373 return -1;
1374
1375 fd = setup_client_socket(daemon);
1376 if (fd < 0)
1377 return -1;
1378
1379 if (sizeof(*cmd) != writen(fd, cmd, sizeof(*cmd))) {
1380 perror("failed: write");
1381 goto out;
1382 }
1383
1384 in = fdopen(fd, "r");
1385 if (!in) {
1386 perror("failed: fdopen");
1387 goto out;
1388 }
1389
1390 while ((nread = getline(&line, &len, in)) != -1) {
1391 if (fwrite(line, nread, 1, stdout) != 1)
1392 goto out_fclose;
1393 fflush(stdout);
1394 }
1395
1396 ret = 0;
1397out_fclose:
1398 fclose(in);
1399 free(line);
1400out:
1401 /* If in is defined, then fd is closed via fclose. */
1402 if (!in)
1403 close(fd);
1404 return ret;
1405}
1406
1407static int send_cmd_list(struct daemon *daemon)
1408{
1409 union cmd cmd = { .cmd = CMD_LIST, };
1410
1411 cmd.list.verbose = verbose;
1412 cmd.list.csv_sep = daemon->csv_sep ? *daemon->csv_sep : 0;
1413
1414 return send_cmd(daemon, &cmd);
1415}
1416
1417static int __cmd_signal(struct daemon *daemon, struct option parent_options[],
1418 int argc, const char **argv)
1419{
1420 const char *name = "all";
1421 struct option start_options[] = {
1422 OPT_STRING(0, "session", &name, "session",
1423 "Sent signal to specific session"),
1424 OPT_PARENT(parent_options),
1425 OPT_END()
1426 };
1427 union cmd cmd;
1428
1429 argc = parse_options(argc, argv, start_options, daemon_usage, 0);
1430 if (argc)
1431 usage_with_options(daemon_usage, start_options);
1432
1433 if (setup_config(daemon)) {
1434 pr_err("failed: config not found\n");
1435 return -1;
1436 }
1437
1438 cmd.signal.cmd = CMD_SIGNAL,
1439 cmd.signal.sig = SIGUSR2;
1440 strncpy(cmd.signal.name, name, sizeof(cmd.signal.name) - 1);
1441
1442 return send_cmd(daemon, &cmd);
1443}
1444
1445static int __cmd_stop(struct daemon *daemon, struct option parent_options[],
1446 int argc, const char **argv)
1447{
1448 struct option start_options[] = {
1449 OPT_PARENT(parent_options),
1450 OPT_END()
1451 };
1452 union cmd cmd = { .cmd = CMD_STOP, };
1453
1454 argc = parse_options(argc, argv, start_options, daemon_usage, 0);
1455 if (argc)
1456 usage_with_options(daemon_usage, start_options);
1457
1458 if (setup_config(daemon)) {
1459 pr_err("failed: config not found\n");
1460 return -1;
1461 }
1462
1463 return send_cmd(daemon, &cmd);
1464}
1465
1466static int __cmd_ping(struct daemon *daemon, struct option parent_options[],
1467 int argc, const char **argv)
1468{
1469 const char *name = "all";
1470 struct option ping_options[] = {
1471 OPT_STRING(0, "session", &name, "session",
1472 "Ping to specific session"),
1473 OPT_PARENT(parent_options),
1474 OPT_END()
1475 };
1476 union cmd cmd = { .cmd = CMD_PING, };
1477
1478 argc = parse_options(argc, argv, ping_options, daemon_usage, 0);
1479 if (argc)
1480 usage_with_options(daemon_usage, ping_options);
1481
1482 if (setup_config(daemon)) {
1483 pr_err("failed: config not found\n");
1484 return -1;
1485 }
1486
1487 scnprintf(cmd.ping.name, sizeof(cmd.ping.name), "%s", name);
1488 return send_cmd(daemon, &cmd);
1489}
1490
1491int cmd_daemon(int argc, const char **argv)
1492{
1493 struct option daemon_options[] = {
1494 OPT_INCR('v', "verbose", &verbose, "be more verbose"),
1495 OPT_STRING(0, "config", &__daemon.config,
1496 "config file", "config file path"),
1497 OPT_STRING(0, "base", &__daemon.base_user,
1498 "directory", "base directory"),
1499 OPT_STRING_OPTARG('x', "field-separator", &__daemon.csv_sep,
1500 "field separator", "print counts with custom separator", ","),
1501 OPT_END()
1502 };
1503
1504 perf_exe(__daemon.perf, sizeof(__daemon.perf));
1505 __daemon.out = stdout;
1506
1507 argc = parse_options(argc, argv, daemon_options, daemon_usage,
1508 PARSE_OPT_STOP_AT_NON_OPTION);
1509
1510 if (argc) {
1511 if (!strcmp(argv[0], "start"))
1512 return __cmd_start(&__daemon, daemon_options, argc, argv);
1513 if (!strcmp(argv[0], "signal"))
1514 return __cmd_signal(&__daemon, daemon_options, argc, argv);
1515 else if (!strcmp(argv[0], "stop"))
1516 return __cmd_stop(&__daemon, daemon_options, argc, argv);
1517 else if (!strcmp(argv[0], "ping"))
1518 return __cmd_ping(&__daemon, daemon_options, argc, argv);
1519
1520 pr_err("failed: unknown command '%s'\n", argv[0]);
1521 return -1;
1522 }
1523
1524 if (setup_config(&__daemon)) {
1525 pr_err("failed: config not found\n");
1526 return -1;
1527 }
1528
1529 return send_cmd_list(&__daemon);
1530}