blob: 1a31feb9999f8fa4043db9b019cc989e9f34bddd [file] [log] [blame]
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -02001#include <linux/types.h>
2#include "event.h"
3#include "debug.h"
Arnaldo Carvalho de Meloec913362009-12-13 19:50:27 -02004#include "session.h"
Arnaldo Carvalho de Meloc410a332009-12-15 20:04:41 -02005#include "sort.h"
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -02006#include "string.h"
Arnaldo Carvalho de Meloc410a332009-12-15 20:04:41 -02007#include "strlist.h"
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -02008#include "thread.h"
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -02009
10static pid_t event__synthesize_comm(pid_t pid, int full,
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -020011 int (*process)(event_t *event,
12 struct perf_session *session),
13 struct perf_session *session)
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -020014{
15 event_t ev;
16 char filename[PATH_MAX];
17 char bf[BUFSIZ];
18 FILE *fp;
19 size_t size = 0;
20 DIR *tasks;
21 struct dirent dirent, *next;
22 pid_t tgid = 0;
23
24 snprintf(filename, sizeof(filename), "/proc/%d/status", pid);
25
26 fp = fopen(filename, "r");
27 if (fp == NULL) {
28out_race:
29 /*
30 * We raced with a task exiting - just return:
31 */
32 pr_debug("couldn't open %s\n", filename);
33 return 0;
34 }
35
36 memset(&ev.comm, 0, sizeof(ev.comm));
37 while (!ev.comm.comm[0] || !ev.comm.pid) {
38 if (fgets(bf, sizeof(bf), fp) == NULL)
39 goto out_failure;
40
41 if (memcmp(bf, "Name:", 5) == 0) {
42 char *name = bf + 5;
43 while (*name && isspace(*name))
44 ++name;
45 size = strlen(name) - 1;
46 memcpy(ev.comm.comm, name, size++);
47 } else if (memcmp(bf, "Tgid:", 5) == 0) {
48 char *tgids = bf + 5;
49 while (*tgids && isspace(*tgids))
50 ++tgids;
51 tgid = ev.comm.pid = atoi(tgids);
52 }
53 }
54
55 ev.comm.header.type = PERF_RECORD_COMM;
56 size = ALIGN(size, sizeof(u64));
57 ev.comm.header.size = sizeof(ev.comm) - (sizeof(ev.comm.comm) - size);
58
59 if (!full) {
60 ev.comm.tid = pid;
61
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -020062 process(&ev, session);
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -020063 goto out_fclose;
64 }
65
66 snprintf(filename, sizeof(filename), "/proc/%d/task", pid);
67
68 tasks = opendir(filename);
69 if (tasks == NULL)
70 goto out_race;
71
72 while (!readdir_r(tasks, &dirent, &next) && next) {
73 char *end;
74 pid = strtol(dirent.d_name, &end, 10);
75 if (*end)
76 continue;
77
78 ev.comm.tid = pid;
79
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -020080 process(&ev, session);
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -020081 }
82 closedir(tasks);
83
84out_fclose:
85 fclose(fp);
86 return tgid;
87
88out_failure:
89 pr_warning("couldn't get COMM and pgid, malformed %s\n", filename);
90 return -1;
91}
92
93static int event__synthesize_mmap_events(pid_t pid, pid_t tgid,
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -020094 int (*process)(event_t *event,
95 struct perf_session *session),
96 struct perf_session *session)
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -020097{
98 char filename[PATH_MAX];
99 FILE *fp;
100
101 snprintf(filename, sizeof(filename), "/proc/%d/maps", pid);
102
103 fp = fopen(filename, "r");
104 if (fp == NULL) {
105 /*
106 * We raced with a task exiting - just return:
107 */
108 pr_debug("couldn't open %s\n", filename);
109 return -1;
110 }
111
112 while (1) {
113 char bf[BUFSIZ], *pbf = bf;
114 event_t ev = {
115 .header = { .type = PERF_RECORD_MMAP },
116 };
117 int n;
118 size_t size;
119 if (fgets(bf, sizeof(bf), fp) == NULL)
120 break;
121
122 /* 00400000-0040c000 r-xp 00000000 fd:01 41038 /bin/cat */
123 n = hex2u64(pbf, &ev.mmap.start);
124 if (n < 0)
125 continue;
126 pbf += n + 1;
127 n = hex2u64(pbf, &ev.mmap.len);
128 if (n < 0)
129 continue;
130 pbf += n + 3;
131 if (*pbf == 'x') { /* vm_exec */
132 char *execname = strchr(bf, '/');
133
134 /* Catch VDSO */
135 if (execname == NULL)
136 execname = strstr(bf, "[vdso]");
137
138 if (execname == NULL)
139 continue;
140
141 size = strlen(execname);
142 execname[size - 1] = '\0'; /* Remove \n */
143 memcpy(ev.mmap.filename, execname, size);
144 size = ALIGN(size, sizeof(u64));
145 ev.mmap.len -= ev.mmap.start;
146 ev.mmap.header.size = (sizeof(ev.mmap) -
147 (sizeof(ev.mmap.filename) - size));
148 ev.mmap.pid = tgid;
149 ev.mmap.tid = pid;
150
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -0200151 process(&ev, session);
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -0200152 }
153 }
154
155 fclose(fp);
156 return 0;
157}
158
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -0200159int event__synthesize_thread(pid_t pid,
160 int (*process)(event_t *event,
161 struct perf_session *session),
162 struct perf_session *session)
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -0200163{
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -0200164 pid_t tgid = event__synthesize_comm(pid, 1, process, session);
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -0200165 if (tgid == -1)
166 return -1;
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -0200167 return event__synthesize_mmap_events(pid, tgid, process, session);
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -0200168}
169
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -0200170void event__synthesize_threads(int (*process)(event_t *event,
171 struct perf_session *session),
172 struct perf_session *session)
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -0200173{
174 DIR *proc;
175 struct dirent dirent, *next;
176
177 proc = opendir("/proc");
178
179 while (!readdir_r(proc, &dirent, &next) && next) {
180 char *end;
181 pid_t pid = strtol(dirent.d_name, &end, 10);
182
183 if (*end) /* only interested in proper numerical dirents */
184 continue;
185
Arnaldo Carvalho de Melod8f66242009-12-13 19:50:24 -0200186 event__synthesize_thread(pid, process, session);
Arnaldo Carvalho de Melo234fbbf2009-10-26 19:23:18 -0200187 }
188
189 closedir(proc);
190}
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200191
Arnaldo Carvalho de Melo56b03f32010-01-05 16:50:31 -0200192struct process_symbol_args {
193 const char *name;
194 u64 start;
195};
196
197static int find_symbol_cb(void *arg, const char *name, char type, u64 start)
198{
199 struct process_symbol_args *args = arg;
200
201 if (!symbol_type__is_a(type, MAP__FUNCTION) || strcmp(name, args->name))
202 return 0;
203
204 args->start = start;
205 return 1;
206}
207
208int event__synthesize_kernel_mmap(int (*process)(event_t *event,
209 struct perf_session *session),
210 struct perf_session *session,
211 const char *symbol_name)
212{
213 size_t size;
214 event_t ev = {
215 .header = { .type = PERF_RECORD_MMAP },
216 };
217 /*
218 * We should get this from /sys/kernel/sections/.text, but till that is
219 * available use this, and after it is use this as a fallback for older
220 * kernels.
221 */
222 struct process_symbol_args args = { .name = symbol_name, };
223
224 if (kallsyms__parse(&args, find_symbol_cb) <= 0)
225 return -ENOENT;
226
227 size = snprintf(ev.mmap.filename, sizeof(ev.mmap.filename),
228 "[kernel.kallsyms.%s]", symbol_name) + 1;
229 size = ALIGN(size, sizeof(u64));
230 ev.mmap.header.size = (sizeof(ev.mmap) - (sizeof(ev.mmap.filename) - size));
231 ev.mmap.start = args.start;
232
233 return process(&ev, session);
234}
235
Arnaldo Carvalho de Melod599db32009-12-15 20:04:42 -0200236static void thread__comm_adjust(struct thread *self)
237{
238 char *comm = self->comm;
239
240 if (!symbol_conf.col_width_list_str && !symbol_conf.field_sep &&
241 (!symbol_conf.comm_list ||
242 strlist__has_entry(symbol_conf.comm_list, comm))) {
243 unsigned int slen = strlen(comm);
244
245 if (slen > comms__col_width) {
246 comms__col_width = slen;
247 threads__col_width = slen + 6;
248 }
249 }
250}
251
252static int thread__set_comm_adjust(struct thread *self, const char *comm)
253{
254 int ret = thread__set_comm(self, comm);
255
256 if (ret)
257 return ret;
258
259 thread__comm_adjust(self);
260
261 return 0;
262}
263
Arnaldo Carvalho de Melob3165f42009-12-13 19:50:28 -0200264int event__process_comm(event_t *self, struct perf_session *session)
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200265{
Arnaldo Carvalho de Melob3165f42009-12-13 19:50:28 -0200266 struct thread *thread = perf_session__findnew(session, self->comm.pid);
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200267
Li Zefanbab81b62009-12-01 14:04:49 +0800268 dump_printf(": %s:%d\n", self->comm.comm, self->comm.pid);
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200269
Arnaldo Carvalho de Melod599db32009-12-15 20:04:42 -0200270 if (thread == NULL || thread__set_comm_adjust(thread, self->comm.comm)) {
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200271 dump_printf("problem processing PERF_RECORD_COMM, skipping event.\n");
272 return -1;
273 }
274
275 return 0;
276}
277
Arnaldo Carvalho de Melof823e442009-12-14 15:06:01 -0200278int event__process_lost(event_t *self, struct perf_session *session)
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200279{
280 dump_printf(": id:%Ld: lost:%Ld\n", self->lost.id, self->lost.lost);
Arnaldo Carvalho de Melof823e442009-12-14 15:06:01 -0200281 session->events_stats.lost += self->lost.lost;
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200282 return 0;
283}
284
Arnaldo Carvalho de Meloec913362009-12-13 19:50:27 -0200285int event__process_mmap(event_t *self, struct perf_session *session)
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200286{
Arnaldo Carvalho de Melo56b03f32010-01-05 16:50:31 -0200287 struct thread *thread;
288 struct map *map;
289 static const char kmmap_prefix[] = "[kernel.kallsyms.";
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200290
291 dump_printf(" %d/%d: [%p(%p) @ %p]: %s\n",
292 self->mmap.pid, self->mmap.tid,
293 (void *)(long)self->mmap.start,
294 (void *)(long)self->mmap.len,
295 (void *)(long)self->mmap.pgoff,
296 self->mmap.filename);
297
Arnaldo Carvalho de Melo56b03f32010-01-05 16:50:31 -0200298 if (self->mmap.pid == 0 &&
299 memcmp(self->mmap.filename, kmmap_prefix,
300 sizeof(kmmap_prefix) - 1) == 0) {
301 const char *symbol_name = (self->mmap.filename +
302 sizeof(kmmap_prefix) - 1);
303 perf_session__set_kallsyms_ref_reloc_sym(session, symbol_name,
304 self->mmap.start);
305 return 0;
306 }
307
308 thread = perf_session__findnew(session, self->mmap.pid);
309 map = map__new(&self->mmap, MAP__FUNCTION,
310 session->cwd, session->cwdlen);
311
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200312 if (thread == NULL || map == NULL)
313 dump_printf("problem processing PERF_RECORD_MMAP, skipping event.\n");
314 else
315 thread__insert_map(thread, map);
316
317 return 0;
318}
319
Arnaldo Carvalho de Melob3165f42009-12-13 19:50:28 -0200320int event__process_task(event_t *self, struct perf_session *session)
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200321{
Arnaldo Carvalho de Melob3165f42009-12-13 19:50:28 -0200322 struct thread *thread = perf_session__findnew(session, self->fork.pid);
323 struct thread *parent = perf_session__findnew(session, self->fork.ppid);
Arnaldo Carvalho de Melo62daacb2009-11-27 16:29:22 -0200324
325 dump_printf("(%d:%d):(%d:%d)\n", self->fork.pid, self->fork.tid,
326 self->fork.ppid, self->fork.ptid);
327 /*
328 * A thread clone will have the same PID for both parent and child.
329 */
330 if (thread == parent)
331 return 0;
332
333 if (self->header.type == PERF_RECORD_EXIT)
334 return 0;
335
336 if (thread == NULL || parent == NULL ||
337 thread__fork(thread, parent) < 0) {
338 dump_printf("problem processing PERF_RECORD_FORK, skipping event.\n");
339 return -1;
340 }
341
342 return 0;
343}
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200344
Arnaldo Carvalho de Melo4aa65632009-12-13 19:50:29 -0200345void thread__find_addr_location(struct thread *self,
346 struct perf_session *session, u8 cpumode,
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200347 enum map_type type, u64 addr,
348 struct addr_location *al,
349 symbol_filter_t filter)
350{
Arnaldo Carvalho de Melo9958e1f2009-12-11 14:50:36 -0200351 struct map_groups *mg = &self->mg;
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200352
Arnaldo Carvalho de Melo9958e1f2009-12-11 14:50:36 -0200353 al->thread = self;
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200354 al->addr = addr;
355
356 if (cpumode & PERF_RECORD_MISC_KERNEL) {
357 al->level = 'k';
Arnaldo Carvalho de Melo4aa65632009-12-13 19:50:29 -0200358 mg = &session->kmaps;
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200359 } else if (cpumode & PERF_RECORD_MISC_USER)
360 al->level = '.';
361 else {
362 al->level = 'H';
363 al->map = NULL;
364 al->sym = NULL;
365 return;
366 }
367try_again:
Arnaldo Carvalho de Melo9958e1f2009-12-11 14:50:36 -0200368 al->map = map_groups__find(mg, type, al->addr);
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200369 if (al->map == NULL) {
370 /*
371 * If this is outside of all known maps, and is a negative
372 * address, try to look it up in the kernel dso, as it might be
373 * a vsyscall or vdso (which executes in user-mode).
374 *
375 * XXX This is nasty, we should have a symbol list in the
376 * "[vdso]" dso, but for now lets use the old trick of looking
377 * in the whole kernel symbol list.
378 */
Arnaldo Carvalho de Melo4aa65632009-12-13 19:50:29 -0200379 if ((long long)al->addr < 0 && mg != &session->kmaps) {
380 mg = &session->kmaps;
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200381 goto try_again;
382 }
383 al->sym = NULL;
384 } else {
385 al->addr = al->map->map_ip(al->map, al->addr);
Arnaldo Carvalho de Melo4aa65632009-12-13 19:50:29 -0200386 al->sym = map__find_symbol(al->map, session, al->addr, filter);
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200387 }
388}
389
Arnaldo Carvalho de Meloc410a332009-12-15 20:04:41 -0200390static void dso__calc_col_width(struct dso *self)
391{
392 if (!symbol_conf.col_width_list_str && !symbol_conf.field_sep &&
393 (!symbol_conf.dso_list ||
394 strlist__has_entry(symbol_conf.dso_list, self->name))) {
395 unsigned int slen = strlen(self->name);
396 if (slen > dsos__col_width)
397 dsos__col_width = slen;
398 }
399
400 self->slen_calculated = 1;
401}
402
Arnaldo Carvalho de Melob3165f42009-12-13 19:50:28 -0200403int event__preprocess_sample(const event_t *self, struct perf_session *session,
404 struct addr_location *al, symbol_filter_t filter)
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200405{
406 u8 cpumode = self->header.misc & PERF_RECORD_MISC_CPUMODE_MASK;
Arnaldo Carvalho de Melob3165f42009-12-13 19:50:28 -0200407 struct thread *thread = perf_session__findnew(session, self->ip.pid);
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200408
409 if (thread == NULL)
410 return -1;
411
Arnaldo Carvalho de Meloc410a332009-12-15 20:04:41 -0200412 if (symbol_conf.comm_list &&
413 !strlist__has_entry(symbol_conf.comm_list, thread->comm))
414 goto out_filtered;
415
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200416 dump_printf(" ... thread: %s:%d\n", thread->comm, thread->pid);
417
Arnaldo Carvalho de Melo4aa65632009-12-13 19:50:29 -0200418 thread__find_addr_location(thread, session, cpumode, MAP__FUNCTION,
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200419 self->ip.ip, al, filter);
420 dump_printf(" ...... dso: %s\n",
421 al->map ? al->map->dso->long_name :
422 al->level == 'H' ? "[hypervisor]" : "<not found>");
Arnaldo Carvalho de Meloc410a332009-12-15 20:04:41 -0200423 /*
424 * We have to do this here as we may have a dso with no symbol hit that
425 * has a name longer than the ones with symbols sampled.
426 */
427 if (al->map && !sort_dso.elide && !al->map->dso->slen_calculated)
428 dso__calc_col_width(al->map->dso);
429
430 if (symbol_conf.dso_list &&
431 (!al->map || !al->map->dso ||
432 !(strlist__has_entry(symbol_conf.dso_list, al->map->dso->short_name) ||
433 (al->map->dso->short_name != al->map->dso->long_name &&
434 strlist__has_entry(symbol_conf.dso_list, al->map->dso->long_name)))))
435 goto out_filtered;
436
437 if (symbol_conf.sym_list && al->sym &&
438 !strlist__has_entry(symbol_conf.sym_list, al->sym->name))
439 goto out_filtered;
440
441 al->filtered = false;
442 return 0;
443
444out_filtered:
445 al->filtered = true;
Arnaldo Carvalho de Melo1ed091c2009-11-27 16:29:23 -0200446 return 0;
447}
OGAWA Hirofumi180f95e2009-12-06 20:08:24 +0900448
449int event__parse_sample(event_t *event, u64 type, struct sample_data *data)
450{
451 u64 *array = event->sample.array;
452
453 if (type & PERF_SAMPLE_IP) {
454 data->ip = event->ip.ip;
455 array++;
456 }
457
458 if (type & PERF_SAMPLE_TID) {
459 u32 *p = (u32 *)array;
460 data->pid = p[0];
461 data->tid = p[1];
462 array++;
463 }
464
465 if (type & PERF_SAMPLE_TIME) {
466 data->time = *array;
467 array++;
468 }
469
470 if (type & PERF_SAMPLE_ADDR) {
471 data->addr = *array;
472 array++;
473 }
474
475 if (type & PERF_SAMPLE_ID) {
476 data->id = *array;
477 array++;
478 }
479
480 if (type & PERF_SAMPLE_STREAM_ID) {
481 data->stream_id = *array;
482 array++;
483 }
484
485 if (type & PERF_SAMPLE_CPU) {
486 u32 *p = (u32 *)array;
487 data->cpu = *p;
488 array++;
489 }
490
491 if (type & PERF_SAMPLE_PERIOD) {
492 data->period = *array;
493 array++;
494 }
495
496 if (type & PERF_SAMPLE_READ) {
497 pr_debug("PERF_SAMPLE_READ is unsuported for now\n");
498 return -1;
499 }
500
501 if (type & PERF_SAMPLE_CALLCHAIN) {
502 data->callchain = (struct ip_callchain *)array;
503 array += 1 + data->callchain->nr;
504 }
505
506 if (type & PERF_SAMPLE_RAW) {
507 u32 *p = (u32 *)array;
508 data->raw_size = *p;
509 p++;
510 data->raw_data = p;
511 }
512
513 return 0;
514}