mirror of
https://github.com/torvalds/linux.git
synced 2024-12-17 16:43:08 +00:00
4af8b35db6
When we synthesize mmap events we need to fill in the pgoff field. I wasn't able to test this completely since I couldn't find an executable region with a non 0 offset. We will see it when we start doing data profiling. Signed-off-by: Anton Blanchard <anton@samba.org> Cc: David Miller <davem@davemloft.net> Cc: Peter Zijlstra <a.p.zijlstra@chello.nl> Cc: Paul Mackerras <paulus@samba.org> LKML-Reference: <20100403115331.GK5594@kryten> Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
631 lines
15 KiB
C
631 lines
15 KiB
C
#include <linux/types.h>
|
|
#include "event.h"
|
|
#include "debug.h"
|
|
#include "session.h"
|
|
#include "sort.h"
|
|
#include "string.h"
|
|
#include "strlist.h"
|
|
#include "thread.h"
|
|
|
|
static pid_t event__synthesize_comm(pid_t pid, int full,
|
|
event__handler_t process,
|
|
struct perf_session *session)
|
|
{
|
|
event_t ev;
|
|
char filename[PATH_MAX];
|
|
char bf[BUFSIZ];
|
|
FILE *fp;
|
|
size_t size = 0;
|
|
DIR *tasks;
|
|
struct dirent dirent, *next;
|
|
pid_t tgid = 0;
|
|
|
|
snprintf(filename, sizeof(filename), "/proc/%d/status", pid);
|
|
|
|
fp = fopen(filename, "r");
|
|
if (fp == NULL) {
|
|
out_race:
|
|
/*
|
|
* We raced with a task exiting - just return:
|
|
*/
|
|
pr_debug("couldn't open %s\n", filename);
|
|
return 0;
|
|
}
|
|
|
|
memset(&ev.comm, 0, sizeof(ev.comm));
|
|
while (!ev.comm.comm[0] || !ev.comm.pid) {
|
|
if (fgets(bf, sizeof(bf), fp) == NULL)
|
|
goto out_failure;
|
|
|
|
if (memcmp(bf, "Name:", 5) == 0) {
|
|
char *name = bf + 5;
|
|
while (*name && isspace(*name))
|
|
++name;
|
|
size = strlen(name) - 1;
|
|
memcpy(ev.comm.comm, name, size++);
|
|
} else if (memcmp(bf, "Tgid:", 5) == 0) {
|
|
char *tgids = bf + 5;
|
|
while (*tgids && isspace(*tgids))
|
|
++tgids;
|
|
tgid = ev.comm.pid = atoi(tgids);
|
|
}
|
|
}
|
|
|
|
ev.comm.header.type = PERF_RECORD_COMM;
|
|
size = ALIGN(size, sizeof(u64));
|
|
ev.comm.header.size = sizeof(ev.comm) - (sizeof(ev.comm.comm) - size);
|
|
|
|
if (!full) {
|
|
ev.comm.tid = pid;
|
|
|
|
process(&ev, session);
|
|
goto out_fclose;
|
|
}
|
|
|
|
snprintf(filename, sizeof(filename), "/proc/%d/task", pid);
|
|
|
|
tasks = opendir(filename);
|
|
if (tasks == NULL)
|
|
goto out_race;
|
|
|
|
while (!readdir_r(tasks, &dirent, &next) && next) {
|
|
char *end;
|
|
pid = strtol(dirent.d_name, &end, 10);
|
|
if (*end)
|
|
continue;
|
|
|
|
ev.comm.tid = pid;
|
|
|
|
process(&ev, session);
|
|
}
|
|
closedir(tasks);
|
|
|
|
out_fclose:
|
|
fclose(fp);
|
|
return tgid;
|
|
|
|
out_failure:
|
|
pr_warning("couldn't get COMM and pgid, malformed %s\n", filename);
|
|
return -1;
|
|
}
|
|
|
|
static int event__synthesize_mmap_events(pid_t pid, pid_t tgid,
|
|
event__handler_t process,
|
|
struct perf_session *session)
|
|
{
|
|
char filename[PATH_MAX];
|
|
FILE *fp;
|
|
|
|
snprintf(filename, sizeof(filename), "/proc/%d/maps", pid);
|
|
|
|
fp = fopen(filename, "r");
|
|
if (fp == NULL) {
|
|
/*
|
|
* We raced with a task exiting - just return:
|
|
*/
|
|
pr_debug("couldn't open %s\n", filename);
|
|
return -1;
|
|
}
|
|
|
|
while (1) {
|
|
char bf[BUFSIZ], *pbf = bf;
|
|
event_t ev = {
|
|
.header = {
|
|
.type = PERF_RECORD_MMAP,
|
|
.misc = 0, /* Just like the kernel, see kernel/perf_event.c __perf_event_mmap */
|
|
},
|
|
};
|
|
int n;
|
|
size_t size;
|
|
if (fgets(bf, sizeof(bf), fp) == NULL)
|
|
break;
|
|
|
|
/* 00400000-0040c000 r-xp 00000000 fd:01 41038 /bin/cat */
|
|
n = hex2u64(pbf, &ev.mmap.start);
|
|
if (n < 0)
|
|
continue;
|
|
pbf += n + 1;
|
|
n = hex2u64(pbf, &ev.mmap.len);
|
|
if (n < 0)
|
|
continue;
|
|
pbf += n + 3;
|
|
if (*pbf == 'x') { /* vm_exec */
|
|
u64 vm_pgoff;
|
|
char *execname = strchr(bf, '/');
|
|
|
|
/* Catch VDSO */
|
|
if (execname == NULL)
|
|
execname = strstr(bf, "[vdso]");
|
|
|
|
if (execname == NULL)
|
|
continue;
|
|
|
|
pbf += 3;
|
|
n = hex2u64(pbf, &vm_pgoff);
|
|
/* pgoff is in bytes, not pages */
|
|
if (n >= 0)
|
|
ev.mmap.pgoff = vm_pgoff << getpagesize();
|
|
else
|
|
ev.mmap.pgoff = 0;
|
|
|
|
size = strlen(execname);
|
|
execname[size - 1] = '\0'; /* Remove \n */
|
|
memcpy(ev.mmap.filename, execname, size);
|
|
size = ALIGN(size, sizeof(u64));
|
|
ev.mmap.len -= ev.mmap.start;
|
|
ev.mmap.header.size = (sizeof(ev.mmap) -
|
|
(sizeof(ev.mmap.filename) - size));
|
|
ev.mmap.pid = tgid;
|
|
ev.mmap.tid = pid;
|
|
|
|
process(&ev, session);
|
|
}
|
|
}
|
|
|
|
fclose(fp);
|
|
return 0;
|
|
}
|
|
|
|
int event__synthesize_modules(event__handler_t process,
|
|
struct perf_session *session)
|
|
{
|
|
struct rb_node *nd;
|
|
|
|
for (nd = rb_first(&session->kmaps.maps[MAP__FUNCTION]);
|
|
nd; nd = rb_next(nd)) {
|
|
event_t ev;
|
|
size_t size;
|
|
struct map *pos = rb_entry(nd, struct map, rb_node);
|
|
|
|
if (pos->dso->kernel)
|
|
continue;
|
|
|
|
size = ALIGN(pos->dso->long_name_len + 1, sizeof(u64));
|
|
memset(&ev, 0, sizeof(ev));
|
|
ev.mmap.header.misc = 1; /* kernel uses 0 for user space maps, see kernel/perf_event.c __perf_event_mmap */
|
|
ev.mmap.header.type = PERF_RECORD_MMAP;
|
|
ev.mmap.header.size = (sizeof(ev.mmap) -
|
|
(sizeof(ev.mmap.filename) - size));
|
|
ev.mmap.start = pos->start;
|
|
ev.mmap.len = pos->end - pos->start;
|
|
|
|
memcpy(ev.mmap.filename, pos->dso->long_name,
|
|
pos->dso->long_name_len + 1);
|
|
process(&ev, session);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int event__synthesize_thread(pid_t pid, event__handler_t process,
|
|
struct perf_session *session)
|
|
{
|
|
pid_t tgid = event__synthesize_comm(pid, 1, process, session);
|
|
if (tgid == -1)
|
|
return -1;
|
|
return event__synthesize_mmap_events(pid, tgid, process, session);
|
|
}
|
|
|
|
void event__synthesize_threads(event__handler_t process,
|
|
struct perf_session *session)
|
|
{
|
|
DIR *proc;
|
|
struct dirent dirent, *next;
|
|
|
|
proc = opendir("/proc");
|
|
|
|
while (!readdir_r(proc, &dirent, &next) && next) {
|
|
char *end;
|
|
pid_t pid = strtol(dirent.d_name, &end, 10);
|
|
|
|
if (*end) /* only interested in proper numerical dirents */
|
|
continue;
|
|
|
|
event__synthesize_thread(pid, process, session);
|
|
}
|
|
|
|
closedir(proc);
|
|
}
|
|
|
|
struct process_symbol_args {
|
|
const char *name;
|
|
u64 start;
|
|
};
|
|
|
|
static int find_symbol_cb(void *arg, const char *name, char type, u64 start)
|
|
{
|
|
struct process_symbol_args *args = arg;
|
|
|
|
/*
|
|
* Must be a function or at least an alias, as in PARISC64, where "_text" is
|
|
* an 'A' to the same address as "_stext".
|
|
*/
|
|
if (!(symbol_type__is_a(type, MAP__FUNCTION) ||
|
|
type == 'A') || strcmp(name, args->name))
|
|
return 0;
|
|
|
|
args->start = start;
|
|
return 1;
|
|
}
|
|
|
|
int event__synthesize_kernel_mmap(event__handler_t process,
|
|
struct perf_session *session,
|
|
const char *symbol_name)
|
|
{
|
|
size_t size;
|
|
event_t ev = {
|
|
.header = {
|
|
.type = PERF_RECORD_MMAP,
|
|
.misc = 1, /* kernel uses 0 for user space maps, see kernel/perf_event.c __perf_event_mmap */
|
|
},
|
|
};
|
|
/*
|
|
* We should get this from /sys/kernel/sections/.text, but till that is
|
|
* available use this, and after it is use this as a fallback for older
|
|
* kernels.
|
|
*/
|
|
struct process_symbol_args args = { .name = symbol_name, };
|
|
|
|
if (kallsyms__parse("/proc/kallsyms", &args, find_symbol_cb) <= 0)
|
|
return -ENOENT;
|
|
|
|
size = snprintf(ev.mmap.filename, sizeof(ev.mmap.filename),
|
|
"[kernel.kallsyms.%s]", symbol_name) + 1;
|
|
size = ALIGN(size, sizeof(u64));
|
|
ev.mmap.header.size = (sizeof(ev.mmap) - (sizeof(ev.mmap.filename) - size));
|
|
ev.mmap.pgoff = args.start;
|
|
ev.mmap.start = session->vmlinux_maps[MAP__FUNCTION]->start;
|
|
ev.mmap.len = session->vmlinux_maps[MAP__FUNCTION]->end - ev.mmap.start ;
|
|
|
|
return process(&ev, session);
|
|
}
|
|
|
|
static void thread__comm_adjust(struct thread *self)
|
|
{
|
|
char *comm = self->comm;
|
|
|
|
if (!symbol_conf.col_width_list_str && !symbol_conf.field_sep &&
|
|
(!symbol_conf.comm_list ||
|
|
strlist__has_entry(symbol_conf.comm_list, comm))) {
|
|
unsigned int slen = strlen(comm);
|
|
|
|
if (slen > comms__col_width) {
|
|
comms__col_width = slen;
|
|
threads__col_width = slen + 6;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int thread__set_comm_adjust(struct thread *self, const char *comm)
|
|
{
|
|
int ret = thread__set_comm(self, comm);
|
|
|
|
if (ret)
|
|
return ret;
|
|
|
|
thread__comm_adjust(self);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int event__process_comm(event_t *self, struct perf_session *session)
|
|
{
|
|
struct thread *thread = perf_session__findnew(session, self->comm.pid);
|
|
|
|
dump_printf(": %s:%d\n", self->comm.comm, self->comm.pid);
|
|
|
|
if (thread == NULL || thread__set_comm_adjust(thread, self->comm.comm)) {
|
|
dump_printf("problem processing PERF_RECORD_COMM, skipping event.\n");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int event__process_lost(event_t *self, struct perf_session *session)
|
|
{
|
|
dump_printf(": id:%Ld: lost:%Ld\n", self->lost.id, self->lost.lost);
|
|
session->events_stats.lost += self->lost.lost;
|
|
return 0;
|
|
}
|
|
|
|
int event__process_mmap(event_t *self, struct perf_session *session)
|
|
{
|
|
struct thread *thread;
|
|
struct map *map;
|
|
|
|
dump_printf(" %d/%d: [%#Lx(%#Lx) @ %#Lx]: %s\n",
|
|
self->mmap.pid, self->mmap.tid, self->mmap.start,
|
|
self->mmap.len, self->mmap.pgoff, self->mmap.filename);
|
|
|
|
if (self->mmap.pid == 0) {
|
|
static const char kmmap_prefix[] = "[kernel.kallsyms.";
|
|
|
|
if (self->mmap.filename[0] == '/') {
|
|
char short_module_name[1024];
|
|
char *name = strrchr(self->mmap.filename, '/'), *dot;
|
|
|
|
if (name == NULL)
|
|
goto out_problem;
|
|
|
|
++name; /* skip / */
|
|
dot = strrchr(name, '.');
|
|
if (dot == NULL)
|
|
goto out_problem;
|
|
|
|
snprintf(short_module_name, sizeof(short_module_name),
|
|
"[%.*s]", (int)(dot - name), name);
|
|
strxfrchar(short_module_name, '-', '_');
|
|
|
|
map = perf_session__new_module_map(session,
|
|
self->mmap.start,
|
|
self->mmap.filename);
|
|
if (map == NULL)
|
|
goto out_problem;
|
|
|
|
name = strdup(short_module_name);
|
|
if (name == NULL)
|
|
goto out_problem;
|
|
|
|
map->dso->short_name = name;
|
|
map->end = map->start + self->mmap.len;
|
|
} else if (memcmp(self->mmap.filename, kmmap_prefix,
|
|
sizeof(kmmap_prefix) - 1) == 0) {
|
|
const char *symbol_name = (self->mmap.filename +
|
|
sizeof(kmmap_prefix) - 1);
|
|
/*
|
|
* Should be there already, from the build-id table in
|
|
* the header.
|
|
*/
|
|
struct dso *kernel = __dsos__findnew(&dsos__kernel,
|
|
"[kernel.kallsyms]");
|
|
if (kernel == NULL)
|
|
goto out_problem;
|
|
|
|
kernel->kernel = 1;
|
|
if (__perf_session__create_kernel_maps(session, kernel) < 0)
|
|
goto out_problem;
|
|
|
|
session->vmlinux_maps[MAP__FUNCTION]->start = self->mmap.start;
|
|
session->vmlinux_maps[MAP__FUNCTION]->end = self->mmap.start + self->mmap.len;
|
|
/*
|
|
* Be a bit paranoid here, some perf.data file came with
|
|
* a zero sized synthesized MMAP event for the kernel.
|
|
*/
|
|
if (session->vmlinux_maps[MAP__FUNCTION]->end == 0)
|
|
session->vmlinux_maps[MAP__FUNCTION]->end = ~0UL;
|
|
|
|
perf_session__set_kallsyms_ref_reloc_sym(session, symbol_name,
|
|
self->mmap.pgoff);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
thread = perf_session__findnew(session, self->mmap.pid);
|
|
map = map__new(self->mmap.start, self->mmap.len, self->mmap.pgoff,
|
|
self->mmap.pid, self->mmap.filename, MAP__FUNCTION,
|
|
session->cwd, session->cwdlen);
|
|
|
|
if (thread == NULL || map == NULL)
|
|
goto out_problem;
|
|
|
|
thread__insert_map(thread, map);
|
|
return 0;
|
|
|
|
out_problem:
|
|
dump_printf("problem processing PERF_RECORD_MMAP, skipping event.\n");
|
|
return 0;
|
|
}
|
|
|
|
int event__process_task(event_t *self, struct perf_session *session)
|
|
{
|
|
struct thread *thread = perf_session__findnew(session, self->fork.pid);
|
|
struct thread *parent = perf_session__findnew(session, self->fork.ppid);
|
|
|
|
dump_printf("(%d:%d):(%d:%d)\n", self->fork.pid, self->fork.tid,
|
|
self->fork.ppid, self->fork.ptid);
|
|
/*
|
|
* A thread clone will have the same PID for both parent and child.
|
|
*/
|
|
if (thread == parent)
|
|
return 0;
|
|
|
|
if (self->header.type == PERF_RECORD_EXIT)
|
|
return 0;
|
|
|
|
if (thread == NULL || parent == NULL ||
|
|
thread__fork(thread, parent) < 0) {
|
|
dump_printf("problem processing PERF_RECORD_FORK, skipping event.\n");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
void thread__find_addr_map(struct thread *self,
|
|
struct perf_session *session, u8 cpumode,
|
|
enum map_type type, u64 addr,
|
|
struct addr_location *al)
|
|
{
|
|
struct map_groups *mg = &self->mg;
|
|
|
|
al->thread = self;
|
|
al->addr = addr;
|
|
|
|
if (cpumode == PERF_RECORD_MISC_KERNEL) {
|
|
al->level = 'k';
|
|
mg = &session->kmaps;
|
|
} else if (cpumode == PERF_RECORD_MISC_USER)
|
|
al->level = '.';
|
|
else {
|
|
al->level = 'H';
|
|
al->map = NULL;
|
|
return;
|
|
}
|
|
try_again:
|
|
al->map = map_groups__find(mg, type, al->addr);
|
|
if (al->map == NULL) {
|
|
/*
|
|
* If this is outside of all known maps, and is a negative
|
|
* address, try to look it up in the kernel dso, as it might be
|
|
* a vsyscall or vdso (which executes in user-mode).
|
|
*
|
|
* XXX This is nasty, we should have a symbol list in the
|
|
* "[vdso]" dso, but for now lets use the old trick of looking
|
|
* in the whole kernel symbol list.
|
|
*/
|
|
if ((long long)al->addr < 0 && mg != &session->kmaps) {
|
|
mg = &session->kmaps;
|
|
goto try_again;
|
|
}
|
|
} else
|
|
al->addr = al->map->map_ip(al->map, al->addr);
|
|
}
|
|
|
|
void thread__find_addr_location(struct thread *self,
|
|
struct perf_session *session, u8 cpumode,
|
|
enum map_type type, u64 addr,
|
|
struct addr_location *al,
|
|
symbol_filter_t filter)
|
|
{
|
|
thread__find_addr_map(self, session, cpumode, type, addr, al);
|
|
if (al->map != NULL)
|
|
al->sym = map__find_symbol(al->map, al->addr, filter);
|
|
else
|
|
al->sym = NULL;
|
|
}
|
|
|
|
static void dso__calc_col_width(struct dso *self)
|
|
{
|
|
if (!symbol_conf.col_width_list_str && !symbol_conf.field_sep &&
|
|
(!symbol_conf.dso_list ||
|
|
strlist__has_entry(symbol_conf.dso_list, self->name))) {
|
|
unsigned int slen = strlen(self->name);
|
|
if (slen > dsos__col_width)
|
|
dsos__col_width = slen;
|
|
}
|
|
|
|
self->slen_calculated = 1;
|
|
}
|
|
|
|
int event__preprocess_sample(const event_t *self, struct perf_session *session,
|
|
struct addr_location *al, symbol_filter_t filter)
|
|
{
|
|
u8 cpumode = self->header.misc & PERF_RECORD_MISC_CPUMODE_MASK;
|
|
struct thread *thread = perf_session__findnew(session, self->ip.pid);
|
|
|
|
if (thread == NULL)
|
|
return -1;
|
|
|
|
if (symbol_conf.comm_list &&
|
|
!strlist__has_entry(symbol_conf.comm_list, thread->comm))
|
|
goto out_filtered;
|
|
|
|
dump_printf(" ... thread: %s:%d\n", thread->comm, thread->pid);
|
|
|
|
thread__find_addr_map(thread, session, cpumode, MAP__FUNCTION,
|
|
self->ip.ip, al);
|
|
dump_printf(" ...... dso: %s\n",
|
|
al->map ? al->map->dso->long_name :
|
|
al->level == 'H' ? "[hypervisor]" : "<not found>");
|
|
al->sym = NULL;
|
|
|
|
if (al->map) {
|
|
if (symbol_conf.dso_list &&
|
|
(!al->map || !al->map->dso ||
|
|
!(strlist__has_entry(symbol_conf.dso_list,
|
|
al->map->dso->short_name) ||
|
|
(al->map->dso->short_name != al->map->dso->long_name &&
|
|
strlist__has_entry(symbol_conf.dso_list,
|
|
al->map->dso->long_name)))))
|
|
goto out_filtered;
|
|
/*
|
|
* We have to do this here as we may have a dso with no symbol
|
|
* hit that has a name longer than the ones with symbols
|
|
* sampled.
|
|
*/
|
|
if (!sort_dso.elide && !al->map->dso->slen_calculated)
|
|
dso__calc_col_width(al->map->dso);
|
|
|
|
al->sym = map__find_symbol(al->map, al->addr, filter);
|
|
}
|
|
|
|
if (symbol_conf.sym_list && al->sym &&
|
|
!strlist__has_entry(symbol_conf.sym_list, al->sym->name))
|
|
goto out_filtered;
|
|
|
|
al->filtered = false;
|
|
return 0;
|
|
|
|
out_filtered:
|
|
al->filtered = true;
|
|
return 0;
|
|
}
|
|
|
|
int event__parse_sample(event_t *event, u64 type, struct sample_data *data)
|
|
{
|
|
u64 *array = event->sample.array;
|
|
|
|
if (type & PERF_SAMPLE_IP) {
|
|
data->ip = event->ip.ip;
|
|
array++;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_TID) {
|
|
u32 *p = (u32 *)array;
|
|
data->pid = p[0];
|
|
data->tid = p[1];
|
|
array++;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_TIME) {
|
|
data->time = *array;
|
|
array++;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_ADDR) {
|
|
data->addr = *array;
|
|
array++;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_ID) {
|
|
data->id = *array;
|
|
array++;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_STREAM_ID) {
|
|
data->stream_id = *array;
|
|
array++;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_CPU) {
|
|
u32 *p = (u32 *)array;
|
|
data->cpu = *p;
|
|
array++;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_PERIOD) {
|
|
data->period = *array;
|
|
array++;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_READ) {
|
|
pr_debug("PERF_SAMPLE_READ is unsuported for now\n");
|
|
return -1;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_CALLCHAIN) {
|
|
data->callchain = (struct ip_callchain *)array;
|
|
array += 1 + data->callchain->nr;
|
|
}
|
|
|
|
if (type & PERF_SAMPLE_RAW) {
|
|
u32 *p = (u32 *)array;
|
|
data->raw_size = *p;
|
|
p++;
|
|
data->raw_data = p;
|
|
}
|
|
|
|
return 0;
|
|
}
|