2021-02-08 20:08:45 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2021-02-08 20:08:48 +00:00
|
|
|
#include <internal/lib.h>
|
2021-02-08 20:08:45 +00:00
|
|
|
#include <subcmd/parse-options.h>
|
2021-02-08 20:08:48 +00:00
|
|
|
#include <api/fd/array.h>
|
2021-02-08 20:08:57 +00:00
|
|
|
#include <api/fs/fs.h>
|
2021-02-08 20:08:50 +00:00
|
|
|
#include <linux/zalloc.h>
|
|
|
|
#include <linux/string.h>
|
2021-02-08 20:08:45 +00:00
|
|
|
#include <linux/limits.h>
|
|
|
|
#include <string.h>
|
2021-02-08 20:08:57 +00:00
|
|
|
#include <sys/file.h>
|
2021-02-08 20:08:45 +00:00
|
|
|
#include <signal.h>
|
2021-02-08 20:08:46 +00:00
|
|
|
#include <stdlib.h>
|
2021-02-08 20:08:53 +00:00
|
|
|
#include <time.h>
|
2021-02-08 20:08:45 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <unistd.h>
|
2021-02-08 20:08:47 +00:00
|
|
|
#include <errno.h>
|
2021-02-08 20:08:51 +00:00
|
|
|
#include <sys/inotify.h>
|
|
|
|
#include <libgen.h>
|
2021-02-08 20:08:48 +00:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/un.h>
|
2021-02-08 20:08:49 +00:00
|
|
|
#include <sys/stat.h>
|
2021-02-08 20:08:53 +00:00
|
|
|
#include <sys/signalfd.h>
|
|
|
|
#include <sys/wait.h>
|
2021-02-08 20:08:48 +00:00
|
|
|
#include <poll.h>
|
2021-02-08 20:08:45 +00:00
|
|
|
#include "builtin.h"
|
|
|
|
#include "perf.h"
|
|
|
|
#include "debug.h"
|
2021-02-08 20:08:46 +00:00
|
|
|
#include "config.h"
|
2021-02-08 20:08:45 +00:00
|
|
|
#include "util.h"
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
#define SESSION_OUTPUT "output"
|
2021-02-08 20:08:58 +00:00
|
|
|
#define SESSION_CONTROL "control"
|
|
|
|
#define SESSION_ACK "ack"
|
2021-02-08 20:08:50 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Session states:
|
|
|
|
*
|
|
|
|
* OK - session is up and running
|
|
|
|
* RECONFIG - session is pending for reconfiguration,
|
|
|
|
* new values are already loaded in session object
|
|
|
|
* KILL - session is pending to be killed
|
|
|
|
*
|
|
|
|
* Session object life and its state is maintained by
|
|
|
|
* following functions:
|
|
|
|
*
|
|
|
|
* setup_server_config
|
|
|
|
* - reads config file and setup session objects
|
|
|
|
* with following states:
|
|
|
|
*
|
|
|
|
* OK - no change needed
|
|
|
|
* RECONFIG - session needs to be changed
|
|
|
|
* (run variable changed)
|
|
|
|
* KILL - session needs to be killed
|
|
|
|
* (session is no longer in config file)
|
|
|
|
*
|
|
|
|
* daemon__reconfig
|
|
|
|
* - scans session objects and does following actions
|
|
|
|
* for states:
|
|
|
|
*
|
|
|
|
* OK - skip
|
|
|
|
* RECONFIG - session is killed and re-run with new config
|
|
|
|
* KILL - session is killed
|
|
|
|
*
|
|
|
|
* - all sessions have OK state on the function exit
|
|
|
|
*/
|
|
|
|
enum daemon_session_state {
|
|
|
|
OK,
|
|
|
|
RECONFIG,
|
|
|
|
KILL,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct daemon_session {
|
|
|
|
char *base;
|
|
|
|
char *name;
|
|
|
|
char *run;
|
2021-02-08 20:08:58 +00:00
|
|
|
char *control;
|
2021-02-08 20:08:50 +00:00
|
|
|
int pid;
|
|
|
|
struct list_head list;
|
|
|
|
enum daemon_session_state state;
|
2021-02-08 20:09:01 +00:00
|
|
|
time_t start;
|
2021-02-08 20:08:50 +00:00
|
|
|
};
|
|
|
|
|
2021-02-08 20:08:45 +00:00
|
|
|
struct daemon {
|
2021-02-08 20:08:46 +00:00
|
|
|
const char *config;
|
|
|
|
char *config_real;
|
2021-02-08 20:08:51 +00:00
|
|
|
char *config_base;
|
2021-02-08 20:08:54 +00:00
|
|
|
const char *csv_sep;
|
2021-02-08 20:08:47 +00:00
|
|
|
const char *base_user;
|
2021-02-08 20:08:45 +00:00
|
|
|
char *base;
|
2021-02-08 20:08:50 +00:00
|
|
|
struct list_head sessions;
|
2021-02-08 20:08:45 +00:00
|
|
|
FILE *out;
|
2023-05-26 18:33:53 +00:00
|
|
|
char *perf;
|
2021-02-08 20:08:53 +00:00
|
|
|
int signal_fd;
|
2021-02-08 20:09:01 +00:00
|
|
|
time_t start;
|
2021-02-08 20:08:45 +00:00
|
|
|
};
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
static struct daemon __daemon = {
|
|
|
|
.sessions = LIST_HEAD_INIT(__daemon.sessions),
|
|
|
|
};
|
2021-02-08 20:08:45 +00:00
|
|
|
|
|
|
|
static const char * const daemon_usage[] = {
|
2022-10-22 09:27:34 +00:00
|
|
|
"perf daemon {start|signal|stop|ping} [<options>]",
|
2021-02-08 20:08:45 +00:00
|
|
|
"perf daemon [<options>]",
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2022-10-24 18:19:08 +00:00
|
|
|
static volatile sig_atomic_t done;
|
2021-02-08 20:08:45 +00:00
|
|
|
|
|
|
|
static void sig_handler(int sig __maybe_unused)
|
|
|
|
{
|
|
|
|
done = true;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
static struct daemon_session *daemon__add_session(struct daemon *config, char *name)
|
|
|
|
{
|
|
|
|
struct daemon_session *session = zalloc(sizeof(*session));
|
|
|
|
|
|
|
|
if (!session)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
session->name = strdup(name);
|
|
|
|
if (!session->name) {
|
|
|
|
free(session);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
session->pid = -1;
|
|
|
|
list_add_tail(&session->list, &config->sessions);
|
|
|
|
return session;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct daemon_session *daemon__find_session(struct daemon *daemon, char *name)
|
|
|
|
{
|
|
|
|
struct daemon_session *session;
|
|
|
|
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list) {
|
|
|
|
if (!strcmp(session->name, name))
|
|
|
|
return session;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int get_session_name(const char *var, char *session, int len)
|
|
|
|
{
|
|
|
|
const char *p = var + sizeof("session-") - 1;
|
|
|
|
|
|
|
|
while (*p != '.' && *p != 0x0 && len--)
|
|
|
|
*session++ = *p++;
|
|
|
|
|
|
|
|
*session = 0;
|
|
|
|
return *p == '.' ? 0 : -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int session_config(struct daemon *daemon, const char *var, const char *value)
|
|
|
|
{
|
|
|
|
struct daemon_session *session;
|
|
|
|
char name[100];
|
|
|
|
|
2021-02-24 07:14:38 +00:00
|
|
|
if (get_session_name(var, name, sizeof(name) - 1))
|
2021-02-08 20:08:50 +00:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
var = strchr(var, '.');
|
|
|
|
if (!var)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
var++;
|
|
|
|
|
|
|
|
session = daemon__find_session(daemon, name);
|
|
|
|
|
|
|
|
if (!session) {
|
|
|
|
/* New session is defined. */
|
|
|
|
session = daemon__add_session(daemon, name);
|
|
|
|
if (!session)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
pr_debug("reconfig: found new session %s\n", name);
|
|
|
|
|
|
|
|
/* Trigger reconfig to start it. */
|
|
|
|
session->state = RECONFIG;
|
|
|
|
} else if (session->state == KILL) {
|
|
|
|
/* Current session is defined, no action needed. */
|
|
|
|
pr_debug("reconfig: found current session %s\n", name);
|
|
|
|
session->state = OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!strcmp(var, "run")) {
|
|
|
|
bool same = false;
|
|
|
|
|
|
|
|
if (session->run)
|
|
|
|
same = !strcmp(session->run, value);
|
|
|
|
|
|
|
|
if (!same) {
|
|
|
|
if (session->run) {
|
2023-04-12 12:50:08 +00:00
|
|
|
zfree(&session->run);
|
2021-02-08 20:08:50 +00:00
|
|
|
pr_debug("reconfig: session %s is changed\n", name);
|
|
|
|
}
|
|
|
|
|
|
|
|
session->run = strdup(value);
|
|
|
|
if (!session->run)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Either new or changed run value is defined,
|
|
|
|
* trigger reconfig for the session.
|
|
|
|
*/
|
|
|
|
session->state = RECONFIG;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int server_config(const char *var, const char *value, void *cb)
|
|
|
|
{
|
|
|
|
struct daemon *daemon = cb;
|
|
|
|
|
|
|
|
if (strstarts(var, "session-")) {
|
|
|
|
return session_config(daemon, var, value);
|
|
|
|
} else if (!strcmp(var, "daemon.base") && !daemon->base_user) {
|
|
|
|
if (daemon->base && strcmp(daemon->base, value)) {
|
|
|
|
pr_err("failed: can't redefine base, bailing out\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
daemon->base = strdup(value);
|
|
|
|
if (!daemon->base)
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:49 +00:00
|
|
|
static int client_config(const char *var, const char *value, void *cb)
|
|
|
|
{
|
|
|
|
struct daemon *daemon = cb;
|
|
|
|
|
|
|
|
if (!strcmp(var, "daemon.base") && !daemon->base_user) {
|
|
|
|
daemon->base = strdup(value);
|
|
|
|
if (!daemon->base)
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int check_base(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
|
|
|
|
if (!daemon->base) {
|
|
|
|
pr_err("failed: base not defined\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (stat(daemon->base, &st)) {
|
|
|
|
switch (errno) {
|
|
|
|
case EACCES:
|
|
|
|
pr_err("failed: permission denied for '%s' base\n",
|
|
|
|
daemon->base);
|
|
|
|
return -EACCES;
|
|
|
|
case ENOENT:
|
|
|
|
pr_err("failed: base '%s' does not exists\n",
|
|
|
|
daemon->base);
|
|
|
|
return -EACCES;
|
|
|
|
default:
|
|
|
|
pr_err("failed: can't access base '%s': %s\n",
|
|
|
|
daemon->base, strerror(errno));
|
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((st.st_mode & S_IFMT) != S_IFDIR) {
|
|
|
|
pr_err("failed: base '%s' is not directory\n",
|
|
|
|
daemon->base);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int setup_client_config(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct perf_config_set *set = perf_config_set__load_file(daemon->config_real);
|
|
|
|
int err = -ENOMEM;
|
|
|
|
|
|
|
|
if (set) {
|
|
|
|
err = perf_config_set(set, client_config, daemon);
|
|
|
|
perf_config_set__delete(set);
|
|
|
|
}
|
|
|
|
|
|
|
|
return err ?: check_base(daemon);
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
static int setup_server_config(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct perf_config_set *set;
|
|
|
|
struct daemon_session *session;
|
|
|
|
int err = -ENOMEM;
|
|
|
|
|
|
|
|
pr_debug("reconfig: started\n");
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Mark all sessions for kill, the server config
|
|
|
|
* will set following states, see explanation at
|
|
|
|
* enum daemon_session_state declaration.
|
|
|
|
*/
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list)
|
|
|
|
session->state = KILL;
|
|
|
|
|
|
|
|
set = perf_config_set__load_file(daemon->config_real);
|
|
|
|
if (set) {
|
|
|
|
err = perf_config_set(set, server_config, daemon);
|
|
|
|
perf_config_set__delete(set);
|
|
|
|
}
|
|
|
|
|
|
|
|
return err ?: check_base(daemon);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int daemon_session__run(struct daemon_session *session,
|
|
|
|
struct daemon *daemon)
|
|
|
|
{
|
|
|
|
char buf[PATH_MAX];
|
|
|
|
char **argv;
|
|
|
|
int argc, fd;
|
|
|
|
|
|
|
|
if (asprintf(&session->base, "%s/session-%s",
|
|
|
|
daemon->base, session->name) < 0) {
|
|
|
|
perror("failed: asprintf");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mkdir(session->base, 0755) && errno != EEXIST) {
|
|
|
|
perror("failed: mkdir");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:09:01 +00:00
|
|
|
session->start = time(NULL);
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
session->pid = fork();
|
|
|
|
if (session->pid < 0)
|
|
|
|
return -1;
|
|
|
|
if (session->pid > 0) {
|
|
|
|
pr_info("reconfig: ruining session [%s:%d]: %s\n",
|
|
|
|
session->name, session->pid, session->run);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (chdir(session->base)) {
|
|
|
|
perror("failed: chdir");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
fd = open("/dev/null", O_RDONLY);
|
|
|
|
if (fd < 0) {
|
|
|
|
perror("failed: open /dev/null");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
dup2(fd, 0);
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
fd = open(SESSION_OUTPUT, O_RDWR|O_CREAT|O_TRUNC, 0644);
|
|
|
|
if (fd < 0) {
|
|
|
|
perror("failed: open session output");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
dup2(fd, 1);
|
|
|
|
dup2(fd, 2);
|
|
|
|
close(fd);
|
|
|
|
|
2021-03-01 12:25:09 +00:00
|
|
|
if (mkfifo(SESSION_CONTROL, 0600) && errno != EEXIST) {
|
2021-02-08 20:08:58 +00:00
|
|
|
perror("failed: create control fifo");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-03-01 12:25:09 +00:00
|
|
|
if (mkfifo(SESSION_ACK, 0600) && errno != EEXIST) {
|
2021-02-08 20:08:58 +00:00
|
|
|
perror("failed: create ack fifo");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
scnprintf(buf, sizeof(buf), "%s record --control=fifo:%s,%s %s",
|
|
|
|
daemon->perf, SESSION_CONTROL, SESSION_ACK, session->run);
|
2021-02-08 20:08:50 +00:00
|
|
|
|
|
|
|
argv = argv_split(buf, &argc);
|
|
|
|
if (!argv)
|
|
|
|
exit(-1);
|
|
|
|
|
|
|
|
exit(execve(daemon->perf, argv, NULL));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:53 +00:00
|
|
|
static pid_t handle_signalfd(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct daemon_session *session;
|
|
|
|
struct signalfd_siginfo si;
|
|
|
|
ssize_t err;
|
|
|
|
int status;
|
|
|
|
pid_t pid;
|
|
|
|
|
2021-03-20 22:10:12 +00:00
|
|
|
/*
|
|
|
|
* Take signal fd data as pure signal notification and check all
|
|
|
|
* the sessions state. The reason is that multiple signals can get
|
|
|
|
* coalesced in kernel and we can receive only single signal even
|
|
|
|
* if multiple SIGCHLD were generated.
|
|
|
|
*/
|
2021-02-08 20:08:53 +00:00
|
|
|
err = read(daemon->signal_fd, &si, sizeof(struct signalfd_siginfo));
|
2021-03-20 22:10:12 +00:00
|
|
|
if (err != sizeof(struct signalfd_siginfo)) {
|
|
|
|
pr_err("failed to read signal fd\n");
|
2021-02-08 20:08:53 +00:00
|
|
|
return -1;
|
2021-03-20 22:10:12 +00:00
|
|
|
}
|
2021-02-08 20:08:53 +00:00
|
|
|
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list) {
|
2021-03-20 22:10:12 +00:00
|
|
|
if (session->pid == -1)
|
|
|
|
continue;
|
2021-02-08 20:08:53 +00:00
|
|
|
|
2021-03-20 22:10:12 +00:00
|
|
|
pid = waitpid(session->pid, &status, WNOHANG);
|
|
|
|
if (pid <= 0)
|
2021-02-08 20:08:53 +00:00
|
|
|
continue;
|
|
|
|
|
2021-03-20 22:10:12 +00:00
|
|
|
if (WIFEXITED(status)) {
|
|
|
|
pr_info("session '%s' exited, status=%d\n",
|
|
|
|
session->name, WEXITSTATUS(status));
|
|
|
|
} else if (WIFSIGNALED(status)) {
|
|
|
|
pr_info("session '%s' killed (signal %d)\n",
|
|
|
|
session->name, WTERMSIG(status));
|
|
|
|
} else if (WIFSTOPPED(status)) {
|
|
|
|
pr_info("session '%s' stopped (signal %d)\n",
|
|
|
|
session->name, WSTOPSIG(status));
|
|
|
|
} else {
|
|
|
|
pr_info("session '%s' Unexpected status (0x%x)\n",
|
|
|
|
session->name, status);
|
2021-02-08 20:08:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
session->state = KILL;
|
|
|
|
session->pid = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int daemon_session__wait(struct daemon_session *session, struct daemon *daemon,
|
|
|
|
int secs)
|
|
|
|
{
|
|
|
|
struct pollfd pollfd = {
|
|
|
|
.fd = daemon->signal_fd,
|
|
|
|
.events = POLLIN,
|
|
|
|
};
|
|
|
|
time_t start;
|
|
|
|
|
|
|
|
start = time(NULL);
|
|
|
|
|
|
|
|
do {
|
|
|
|
int err = poll(&pollfd, 1, 1000);
|
|
|
|
|
|
|
|
if (err > 0) {
|
2021-03-20 22:10:12 +00:00
|
|
|
handle_signalfd(daemon);
|
2021-02-08 20:08:53 +00:00
|
|
|
} else if (err < 0) {
|
|
|
|
perror("failed: poll\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (start + secs < time(NULL))
|
|
|
|
return -1;
|
2021-03-20 22:10:12 +00:00
|
|
|
} while (session->pid != -1);
|
2021-02-08 20:08:53 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool daemon__has_alive_session(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct daemon_session *session;
|
|
|
|
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list) {
|
|
|
|
if (session->pid != -1)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int daemon__wait(struct daemon *daemon, int secs)
|
|
|
|
{
|
|
|
|
struct pollfd pollfd = {
|
|
|
|
.fd = daemon->signal_fd,
|
|
|
|
.events = POLLIN,
|
|
|
|
};
|
|
|
|
time_t start;
|
|
|
|
|
|
|
|
start = time(NULL);
|
|
|
|
|
|
|
|
do {
|
|
|
|
int err = poll(&pollfd, 1, 1000);
|
|
|
|
|
|
|
|
if (err > 0) {
|
|
|
|
handle_signalfd(daemon);
|
|
|
|
} else if (err < 0) {
|
|
|
|
perror("failed: poll\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (start + secs < time(NULL))
|
|
|
|
return -1;
|
|
|
|
} while (daemon__has_alive_session(daemon));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:59 +00:00
|
|
|
static int daemon_session__control(struct daemon_session *session,
|
|
|
|
const char *msg, bool do_ack)
|
|
|
|
{
|
|
|
|
struct pollfd pollfd = { .events = POLLIN, };
|
|
|
|
char control_path[PATH_MAX];
|
|
|
|
char ack_path[PATH_MAX];
|
|
|
|
int control, ack = -1, len;
|
|
|
|
char buf[20];
|
|
|
|
int ret = -1;
|
|
|
|
ssize_t err;
|
|
|
|
|
|
|
|
/* open the control file */
|
|
|
|
scnprintf(control_path, sizeof(control_path), "%s/%s",
|
|
|
|
session->base, SESSION_CONTROL);
|
|
|
|
|
|
|
|
control = open(control_path, O_WRONLY|O_NONBLOCK);
|
|
|
|
if (!control)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (do_ack) {
|
|
|
|
/* open the ack file */
|
|
|
|
scnprintf(ack_path, sizeof(ack_path), "%s/%s",
|
|
|
|
session->base, SESSION_ACK);
|
|
|
|
|
|
|
|
ack = open(ack_path, O_RDONLY, O_NONBLOCK);
|
|
|
|
if (!ack) {
|
|
|
|
close(control);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* write the command */
|
|
|
|
len = strlen(msg);
|
|
|
|
|
|
|
|
err = writen(control, msg, len);
|
|
|
|
if (err != len) {
|
|
|
|
pr_err("failed: write to control pipe: %d (%s)\n",
|
|
|
|
errno, control_path);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!do_ack)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* wait for an ack */
|
|
|
|
pollfd.fd = ack;
|
|
|
|
|
|
|
|
if (!poll(&pollfd, 1, 2000)) {
|
|
|
|
pr_err("failed: control ack timeout\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(pollfd.revents & POLLIN)) {
|
|
|
|
pr_err("failed: did not received an ack\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = read(ack, buf, sizeof(buf));
|
|
|
|
if (err > 0)
|
|
|
|
ret = strcmp(buf, "ack\n");
|
|
|
|
else
|
|
|
|
perror("failed: read ack %d\n");
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (ack != -1)
|
|
|
|
close(ack);
|
|
|
|
|
|
|
|
close(control);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:48 +00:00
|
|
|
static int setup_server_socket(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct sockaddr_un addr;
|
|
|
|
char path[PATH_MAX];
|
|
|
|
int fd = socket(AF_UNIX, SOCK_STREAM, 0);
|
|
|
|
|
|
|
|
if (fd < 0) {
|
|
|
|
fprintf(stderr, "socket: %s\n", strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fcntl(fd, F_SETFD, FD_CLOEXEC)) {
|
|
|
|
perror("failed: fcntl FD_CLOEXEC");
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
scnprintf(path, sizeof(path), "%s/control", daemon->base);
|
|
|
|
|
|
|
|
if (strlen(path) + 1 >= sizeof(addr.sun_path)) {
|
|
|
|
pr_err("failed: control path too long '%s'\n", path);
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
|
|
addr.sun_family = AF_UNIX;
|
|
|
|
|
|
|
|
strlcpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
|
|
|
|
unlink(path);
|
|
|
|
|
|
|
|
if (bind(fd, (struct sockaddr *)&addr, sizeof(addr)) == -1) {
|
|
|
|
perror("failed: bind");
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (listen(fd, 1) == -1) {
|
|
|
|
perror("failed: listen");
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:54 +00:00
|
|
|
enum {
|
|
|
|
CMD_LIST = 0,
|
2021-02-08 20:08:55 +00:00
|
|
|
CMD_SIGNAL = 1,
|
2021-02-08 20:08:56 +00:00
|
|
|
CMD_STOP = 2,
|
2021-02-08 20:08:59 +00:00
|
|
|
CMD_PING = 3,
|
2021-02-08 20:08:54 +00:00
|
|
|
CMD_MAX,
|
|
|
|
};
|
|
|
|
|
2021-02-08 20:08:55 +00:00
|
|
|
#define SESSION_MAX 64
|
|
|
|
|
2021-02-08 20:08:48 +00:00
|
|
|
union cmd {
|
|
|
|
int cmd;
|
2021-02-08 20:08:54 +00:00
|
|
|
|
|
|
|
/* CMD_LIST */
|
|
|
|
struct {
|
|
|
|
int cmd;
|
|
|
|
int verbose;
|
|
|
|
char csv_sep;
|
|
|
|
} list;
|
2021-02-08 20:08:55 +00:00
|
|
|
|
|
|
|
/* CMD_SIGNAL */
|
|
|
|
struct {
|
|
|
|
int cmd;
|
|
|
|
int sig;
|
|
|
|
char name[SESSION_MAX];
|
|
|
|
} signal;
|
2021-02-08 20:08:59 +00:00
|
|
|
|
|
|
|
/* CMD_PING */
|
|
|
|
struct {
|
|
|
|
int cmd;
|
|
|
|
char name[SESSION_MAX];
|
|
|
|
} ping;
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
PING_OK = 0,
|
|
|
|
PING_FAIL = 1,
|
|
|
|
PING_MAX,
|
2021-02-08 20:08:48 +00:00
|
|
|
};
|
|
|
|
|
2021-02-08 20:08:59 +00:00
|
|
|
static int daemon_session__ping(struct daemon_session *session)
|
|
|
|
{
|
|
|
|
return daemon_session__control(session, "ping", true) ? PING_FAIL : PING_OK;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:54 +00:00
|
|
|
static int cmd_session_list(struct daemon *daemon, union cmd *cmd, FILE *out)
|
|
|
|
{
|
|
|
|
char csv_sep = cmd->list.csv_sep;
|
|
|
|
struct daemon_session *session;
|
2021-02-08 20:09:01 +00:00
|
|
|
time_t curr = time(NULL);
|
2021-02-08 20:08:54 +00:00
|
|
|
|
|
|
|
if (csv_sep) {
|
|
|
|
fprintf(out, "%d%c%s%c%s%c%s/%s",
|
|
|
|
/* pid daemon */
|
|
|
|
getpid(), csv_sep, "daemon",
|
|
|
|
/* base */
|
|
|
|
csv_sep, daemon->base,
|
|
|
|
/* output */
|
|
|
|
csv_sep, daemon->base, SESSION_OUTPUT);
|
|
|
|
|
2021-02-08 20:08:57 +00:00
|
|
|
fprintf(out, "%c%s/%s",
|
|
|
|
/* lock */
|
|
|
|
csv_sep, daemon->base, "lock");
|
|
|
|
|
2021-02-08 20:09:01 +00:00
|
|
|
fprintf(out, "%c%lu",
|
|
|
|
/* session up time */
|
|
|
|
csv_sep, (curr - daemon->start) / 60);
|
|
|
|
|
2021-02-08 20:08:54 +00:00
|
|
|
fprintf(out, "\n");
|
|
|
|
} else {
|
|
|
|
fprintf(out, "[%d:daemon] base: %s\n", getpid(), daemon->base);
|
|
|
|
if (cmd->list.verbose) {
|
|
|
|
fprintf(out, " output: %s/%s\n",
|
|
|
|
daemon->base, SESSION_OUTPUT);
|
2021-02-08 20:08:57 +00:00
|
|
|
fprintf(out, " lock: %s/lock\n",
|
|
|
|
daemon->base);
|
2021-02-08 20:09:01 +00:00
|
|
|
fprintf(out, " up: %lu minutes\n",
|
|
|
|
(curr - daemon->start) / 60);
|
2021-02-08 20:08:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list) {
|
|
|
|
if (csv_sep) {
|
|
|
|
fprintf(out, "%d%c%s%c%s",
|
|
|
|
/* pid */
|
|
|
|
session->pid,
|
|
|
|
/* name */
|
|
|
|
csv_sep, session->name,
|
|
|
|
/* base */
|
|
|
|
csv_sep, session->run);
|
|
|
|
|
|
|
|
fprintf(out, "%c%s%c%s/%s",
|
|
|
|
/* session dir */
|
|
|
|
csv_sep, session->base,
|
|
|
|
/* session output */
|
|
|
|
csv_sep, session->base, SESSION_OUTPUT);
|
|
|
|
|
2021-02-08 20:08:58 +00:00
|
|
|
fprintf(out, "%c%s/%s%c%s/%s",
|
|
|
|
/* session control */
|
|
|
|
csv_sep, session->base, SESSION_CONTROL,
|
|
|
|
/* session ack */
|
|
|
|
csv_sep, session->base, SESSION_ACK);
|
|
|
|
|
2021-02-08 20:09:01 +00:00
|
|
|
fprintf(out, "%c%lu",
|
|
|
|
/* session up time */
|
|
|
|
csv_sep, (curr - session->start) / 60);
|
|
|
|
|
2021-02-08 20:08:54 +00:00
|
|
|
fprintf(out, "\n");
|
|
|
|
} else {
|
|
|
|
fprintf(out, "[%d:%s] perf record %s\n",
|
|
|
|
session->pid, session->name, session->run);
|
|
|
|
if (!cmd->list.verbose)
|
|
|
|
continue;
|
|
|
|
fprintf(out, " base: %s\n",
|
|
|
|
session->base);
|
|
|
|
fprintf(out, " output: %s/%s\n",
|
|
|
|
session->base, SESSION_OUTPUT);
|
2021-02-08 20:08:58 +00:00
|
|
|
fprintf(out, " control: %s/%s\n",
|
|
|
|
session->base, SESSION_CONTROL);
|
|
|
|
fprintf(out, " ack: %s/%s\n",
|
|
|
|
session->base, SESSION_ACK);
|
2021-02-08 20:09:01 +00:00
|
|
|
fprintf(out, " up: %lu minutes\n",
|
|
|
|
(curr - session->start) / 60);
|
2021-02-08 20:08:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:55 +00:00
|
|
|
static int daemon_session__signal(struct daemon_session *session, int sig)
|
|
|
|
{
|
|
|
|
if (session->pid < 0)
|
|
|
|
return -1;
|
|
|
|
return kill(session->pid, sig);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cmd_session_kill(struct daemon *daemon, union cmd *cmd, FILE *out)
|
|
|
|
{
|
|
|
|
struct daemon_session *session;
|
|
|
|
bool all = false;
|
|
|
|
|
|
|
|
all = !strcmp(cmd->signal.name, "all");
|
|
|
|
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list) {
|
|
|
|
if (all || !strcmp(cmd->signal.name, session->name)) {
|
|
|
|
daemon_session__signal(session, cmd->signal.sig);
|
|
|
|
fprintf(out, "signal %d sent to session '%s [%d]'\n",
|
|
|
|
cmd->signal.sig, session->name, session->pid);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:59 +00:00
|
|
|
static const char *ping_str[PING_MAX] = {
|
|
|
|
[PING_OK] = "OK",
|
|
|
|
[PING_FAIL] = "FAIL",
|
|
|
|
};
|
|
|
|
|
|
|
|
static int cmd_session_ping(struct daemon *daemon, union cmd *cmd, FILE *out)
|
|
|
|
{
|
|
|
|
struct daemon_session *session;
|
|
|
|
bool all = false, found = false;
|
|
|
|
|
|
|
|
all = !strcmp(cmd->ping.name, "all");
|
|
|
|
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list) {
|
|
|
|
if (all || !strcmp(cmd->ping.name, session->name)) {
|
|
|
|
int state = daemon_session__ping(session);
|
|
|
|
|
|
|
|
fprintf(out, "%-4s %s\n", ping_str[state], session->name);
|
|
|
|
found = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!found && !all) {
|
|
|
|
fprintf(out, "%-4s %s (not found)\n",
|
|
|
|
ping_str[PING_FAIL], cmd->ping.name);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:54 +00:00
|
|
|
static int handle_server_socket(struct daemon *daemon, int sock_fd)
|
2021-02-08 20:08:48 +00:00
|
|
|
{
|
|
|
|
int ret = -1, fd;
|
|
|
|
FILE *out = NULL;
|
|
|
|
union cmd cmd;
|
|
|
|
|
|
|
|
fd = accept(sock_fd, NULL, NULL);
|
|
|
|
if (fd < 0) {
|
|
|
|
perror("failed: accept");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sizeof(cmd) != readn(fd, &cmd, sizeof(cmd))) {
|
|
|
|
perror("failed: read");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out = fdopen(fd, "w");
|
|
|
|
if (!out) {
|
|
|
|
perror("failed: fdopen");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (cmd.cmd) {
|
2021-02-08 20:08:54 +00:00
|
|
|
case CMD_LIST:
|
|
|
|
ret = cmd_session_list(daemon, &cmd, out);
|
|
|
|
break;
|
2021-02-08 20:08:55 +00:00
|
|
|
case CMD_SIGNAL:
|
|
|
|
ret = cmd_session_kill(daemon, &cmd, out);
|
|
|
|
break;
|
2021-02-08 20:08:56 +00:00
|
|
|
case CMD_STOP:
|
|
|
|
done = 1;
|
|
|
|
ret = 0;
|
|
|
|
pr_debug("perf daemon is exciting\n");
|
|
|
|
break;
|
2021-02-08 20:08:59 +00:00
|
|
|
case CMD_PING:
|
|
|
|
ret = cmd_session_ping(daemon, &cmd, out);
|
|
|
|
break;
|
2021-02-08 20:08:48 +00:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
fclose(out);
|
|
|
|
out:
|
|
|
|
/* If out is defined, then fd is closed via fclose. */
|
|
|
|
if (!out)
|
|
|
|
close(fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:49 +00:00
|
|
|
static int setup_client_socket(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct sockaddr_un addr;
|
|
|
|
char path[PATH_MAX];
|
|
|
|
int fd = socket(AF_UNIX, SOCK_STREAM, 0);
|
|
|
|
|
|
|
|
if (fd == -1) {
|
|
|
|
perror("failed: socket");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
scnprintf(path, sizeof(path), "%s/control", daemon->base);
|
|
|
|
|
|
|
|
if (strlen(path) + 1 >= sizeof(addr.sun_path)) {
|
|
|
|
pr_err("failed: control path too long '%s'\n", path);
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
|
|
addr.sun_family = AF_UNIX;
|
|
|
|
strlcpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
|
|
|
|
|
|
|
|
if (connect(fd, (struct sockaddr *) &addr, sizeof(addr)) == -1) {
|
|
|
|
perror("failed: connect");
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:53 +00:00
|
|
|
static void daemon_session__kill(struct daemon_session *session,
|
|
|
|
struct daemon *daemon)
|
2021-02-08 20:08:50 +00:00
|
|
|
{
|
2021-02-08 20:09:00 +00:00
|
|
|
int how = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
switch (how) {
|
|
|
|
case 0:
|
|
|
|
daemon_session__control(session, "stop", false);
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
daemon_session__signal(session, SIGTERM);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
daemon_session__signal(session, SIGKILL);
|
|
|
|
break;
|
|
|
|
default:
|
2021-03-20 22:10:13 +00:00
|
|
|
pr_err("failed to wait for session %s\n",
|
|
|
|
session->name);
|
|
|
|
return;
|
2021-02-08 20:09:00 +00:00
|
|
|
}
|
|
|
|
how++;
|
|
|
|
|
|
|
|
} while (daemon_session__wait(session, daemon, 10));
|
2021-02-08 20:08:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void daemon__signal(struct daemon *daemon, int sig)
|
|
|
|
{
|
|
|
|
struct daemon_session *session;
|
|
|
|
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list)
|
|
|
|
daemon_session__signal(session, sig);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void daemon_session__delete(struct daemon_session *session)
|
|
|
|
{
|
2023-04-12 12:50:08 +00:00
|
|
|
zfree(&session->base);
|
|
|
|
zfree(&session->name);
|
|
|
|
zfree(&session->run);
|
2021-02-08 20:08:50 +00:00
|
|
|
free(session);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void daemon_session__remove(struct daemon_session *session)
|
|
|
|
{
|
|
|
|
list_del(&session->list);
|
|
|
|
daemon_session__delete(session);
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:09:00 +00:00
|
|
|
static void daemon__stop(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct daemon_session *session;
|
|
|
|
|
|
|
|
list_for_each_entry(session, &daemon->sessions, list)
|
|
|
|
daemon_session__control(session, "stop", false);
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
static void daemon__kill(struct daemon *daemon)
|
|
|
|
{
|
2021-02-08 20:09:00 +00:00
|
|
|
int how = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
switch (how) {
|
|
|
|
case 0:
|
|
|
|
daemon__stop(daemon);
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
daemon__signal(daemon, SIGTERM);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
daemon__signal(daemon, SIGKILL);
|
|
|
|
break;
|
|
|
|
default:
|
2021-03-20 22:10:13 +00:00
|
|
|
pr_err("failed to wait for sessions\n");
|
|
|
|
return;
|
2021-02-08 20:09:00 +00:00
|
|
|
}
|
|
|
|
how++;
|
|
|
|
|
|
|
|
} while (daemon__wait(daemon, 10));
|
2021-02-08 20:08:50 +00:00
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:46 +00:00
|
|
|
static void daemon__exit(struct daemon *daemon)
|
|
|
|
{
|
2021-02-08 20:08:50 +00:00
|
|
|
struct daemon_session *session, *h;
|
|
|
|
|
|
|
|
list_for_each_entry_safe(session, h, &daemon->sessions, list)
|
|
|
|
daemon_session__remove(session);
|
|
|
|
|
2023-04-12 12:50:08 +00:00
|
|
|
zfree(&daemon->config_real);
|
|
|
|
zfree(&daemon->config_base);
|
|
|
|
zfree(&daemon->base);
|
2021-02-08 20:08:46 +00:00
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
static int daemon__reconfig(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
struct daemon_session *session, *n;
|
|
|
|
|
|
|
|
list_for_each_entry_safe(session, n, &daemon->sessions, list) {
|
|
|
|
/* No change. */
|
|
|
|
if (session->state == OK)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Remove session. */
|
|
|
|
if (session->state == KILL) {
|
|
|
|
if (session->pid > 0) {
|
2021-02-08 20:08:53 +00:00
|
|
|
daemon_session__kill(session, daemon);
|
2021-02-08 20:08:50 +00:00
|
|
|
pr_info("reconfig: session '%s' killed\n", session->name);
|
|
|
|
}
|
|
|
|
daemon_session__remove(session);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Reconfig session. */
|
|
|
|
if (session->pid > 0) {
|
2021-02-08 20:08:53 +00:00
|
|
|
daemon_session__kill(session, daemon);
|
2021-02-08 20:08:50 +00:00
|
|
|
pr_info("reconfig: session '%s' killed\n", session->name);
|
|
|
|
}
|
|
|
|
if (daemon_session__run(session, daemon))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
session->state = OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:51 +00:00
|
|
|
static int setup_config_changes(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
char *basen = strdup(daemon->config_real);
|
|
|
|
char *dirn = strdup(daemon->config_real);
|
|
|
|
char *base, *dir;
|
|
|
|
int fd, wd = -1;
|
|
|
|
|
|
|
|
if (!dirn || !basen)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
fd = inotify_init1(IN_NONBLOCK|O_CLOEXEC);
|
|
|
|
if (fd < 0) {
|
|
|
|
perror("failed: inotify_init");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
dir = dirname(dirn);
|
|
|
|
base = basename(basen);
|
|
|
|
pr_debug("config file: %s, dir: %s\n", base, dir);
|
|
|
|
|
|
|
|
wd = inotify_add_watch(fd, dir, IN_CLOSE_WRITE);
|
|
|
|
if (wd >= 0) {
|
|
|
|
daemon->config_base = strdup(base);
|
|
|
|
if (!daemon->config_base) {
|
|
|
|
close(fd);
|
|
|
|
wd = -1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
perror("failed: inotify_add_watch");
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
free(basen);
|
|
|
|
free(dirn);
|
|
|
|
return wd < 0 ? -1 : fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool process_inotify_event(struct daemon *daemon, char *buf, ssize_t len)
|
|
|
|
{
|
|
|
|
char *p = buf;
|
|
|
|
|
|
|
|
while (p < (buf + len)) {
|
|
|
|
struct inotify_event *event = (struct inotify_event *) p;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We monitor config directory, check if our
|
|
|
|
* config file was changes.
|
|
|
|
*/
|
|
|
|
if ((event->mask & IN_CLOSE_WRITE) &&
|
|
|
|
!(event->mask & IN_ISDIR)) {
|
|
|
|
if (!strcmp(event->name, daemon->config_base))
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
p += sizeof(*event) + event->len;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int handle_config_changes(struct daemon *daemon, int conf_fd,
|
|
|
|
bool *config_changed)
|
|
|
|
{
|
|
|
|
char buf[4096];
|
|
|
|
ssize_t len;
|
|
|
|
|
|
|
|
while (!(*config_changed)) {
|
|
|
|
len = read(conf_fd, buf, sizeof(buf));
|
|
|
|
if (len == -1) {
|
|
|
|
if (errno != EAGAIN) {
|
|
|
|
perror("failed: read");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
*config_changed = process_inotify_event(daemon, buf, len);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:46 +00:00
|
|
|
static int setup_config(struct daemon *daemon)
|
|
|
|
{
|
2021-02-08 20:08:47 +00:00
|
|
|
if (daemon->base_user) {
|
|
|
|
daemon->base = strdup(daemon->base_user);
|
|
|
|
if (!daemon->base)
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:46 +00:00
|
|
|
if (daemon->config) {
|
|
|
|
char *real = realpath(daemon->config, NULL);
|
|
|
|
|
|
|
|
if (!real) {
|
|
|
|
perror("failed: realpath");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
daemon->config_real = real;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (perf_config_system() && !access(perf_etc_perfconfig(), R_OK))
|
|
|
|
daemon->config_real = strdup(perf_etc_perfconfig());
|
|
|
|
else if (perf_config_global() && perf_home_perfconfig())
|
|
|
|
daemon->config_real = strdup(perf_home_perfconfig());
|
|
|
|
|
|
|
|
return daemon->config_real ? 0 : -1;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:57 +00:00
|
|
|
#ifndef F_TLOCK
|
|
|
|
#define F_TLOCK 2
|
|
|
|
|
|
|
|
static int lockf(int fd, int cmd, off_t len)
|
|
|
|
{
|
|
|
|
if (cmd != F_TLOCK || len != 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return flock(fd, LOCK_EX | LOCK_NB);
|
|
|
|
}
|
|
|
|
#endif // F_TLOCK
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Each daemon tries to create and lock BASE/lock file,
|
|
|
|
* if it's successful we are sure we're the only daemon
|
|
|
|
* running over the BASE.
|
|
|
|
*
|
|
|
|
* Once daemon is finished, file descriptor to lock file
|
|
|
|
* is closed and lock is released.
|
|
|
|
*/
|
|
|
|
static int check_lock(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
char path[PATH_MAX];
|
|
|
|
char buf[20];
|
|
|
|
int fd, pid;
|
|
|
|
ssize_t len;
|
|
|
|
|
|
|
|
scnprintf(path, sizeof(path), "%s/lock", daemon->base);
|
|
|
|
|
|
|
|
fd = open(path, O_RDWR|O_CREAT|O_CLOEXEC, 0640);
|
|
|
|
if (fd < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (lockf(fd, F_TLOCK, 0) < 0) {
|
|
|
|
filename__read_int(path, &pid);
|
|
|
|
fprintf(stderr, "failed: another perf daemon (pid %d) owns %s\n",
|
|
|
|
pid, daemon->base);
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
scnprintf(buf, sizeof(buf), "%d", getpid());
|
|
|
|
len = strlen(buf);
|
|
|
|
|
|
|
|
if (write(fd, buf, len) != len) {
|
|
|
|
perror("failed: write");
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ftruncate(fd, len)) {
|
|
|
|
perror("failed: ftruncate");
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:52 +00:00
|
|
|
static int go_background(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
int pid, fd;
|
|
|
|
|
|
|
|
pid = fork();
|
|
|
|
if (pid < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (pid > 0)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (setsid() < 0)
|
|
|
|
return -1;
|
|
|
|
|
2021-02-08 20:08:57 +00:00
|
|
|
if (check_lock(daemon))
|
|
|
|
return -1;
|
|
|
|
|
2021-02-08 20:08:52 +00:00
|
|
|
umask(0);
|
|
|
|
|
|
|
|
if (chdir(daemon->base)) {
|
|
|
|
perror("failed: chdir");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
fd = open("output", O_RDWR|O_CREAT|O_TRUNC, 0644);
|
|
|
|
if (fd < 0) {
|
|
|
|
perror("failed: open");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fcntl(fd, F_SETFD, FD_CLOEXEC)) {
|
|
|
|
perror("failed: fcntl FD_CLOEXEC");
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(0);
|
|
|
|
dup2(fd, 1);
|
|
|
|
dup2(fd, 2);
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
daemon->out = fdopen(1, "w");
|
|
|
|
if (!daemon->out) {
|
|
|
|
close(1);
|
|
|
|
close(2);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
setbuf(daemon->out, NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:53 +00:00
|
|
|
static int setup_signalfd(struct daemon *daemon)
|
|
|
|
{
|
|
|
|
sigset_t mask;
|
|
|
|
|
|
|
|
sigemptyset(&mask);
|
|
|
|
sigaddset(&mask, SIGCHLD);
|
|
|
|
|
|
|
|
if (sigprocmask(SIG_BLOCK, &mask, NULL) == -1)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
daemon->signal_fd = signalfd(-1, &mask, SFD_NONBLOCK|SFD_CLOEXEC);
|
|
|
|
return daemon->signal_fd;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:45 +00:00
|
|
|
static int __cmd_start(struct daemon *daemon, struct option parent_options[],
|
|
|
|
int argc, const char **argv)
|
|
|
|
{
|
2021-02-08 20:08:52 +00:00
|
|
|
bool foreground = false;
|
2021-02-08 20:08:45 +00:00
|
|
|
struct option start_options[] = {
|
2021-02-08 20:08:52 +00:00
|
|
|
OPT_BOOLEAN('f', "foreground", &foreground, "stay on console"),
|
2021-02-08 20:08:45 +00:00
|
|
|
OPT_PARENT(parent_options),
|
|
|
|
OPT_END()
|
|
|
|
};
|
2021-02-08 20:08:53 +00:00
|
|
|
int sock_fd = -1, conf_fd = -1, signal_fd = -1;
|
|
|
|
int sock_pos, file_pos, signal_pos;
|
2021-02-08 20:08:48 +00:00
|
|
|
struct fdarray fda;
|
2021-02-08 20:08:45 +00:00
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
argc = parse_options(argc, argv, start_options, daemon_usage, 0);
|
|
|
|
if (argc)
|
|
|
|
usage_with_options(daemon_usage, start_options);
|
|
|
|
|
2021-02-08 20:09:01 +00:00
|
|
|
daemon->start = time(NULL);
|
|
|
|
|
2021-02-08 20:08:46 +00:00
|
|
|
if (setup_config(daemon)) {
|
|
|
|
pr_err("failed: config not found\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
if (setup_server_config(daemon))
|
|
|
|
return -1;
|
|
|
|
|
2021-02-08 20:08:57 +00:00
|
|
|
if (foreground && check_lock(daemon))
|
|
|
|
return -1;
|
|
|
|
|
2021-02-08 20:08:52 +00:00
|
|
|
if (!foreground) {
|
|
|
|
err = go_background(daemon);
|
|
|
|
if (err) {
|
|
|
|
/* original process, exit normally */
|
|
|
|
if (err == 1)
|
|
|
|
err = 0;
|
|
|
|
daemon__exit(daemon);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:45 +00:00
|
|
|
debug_set_file(daemon->out);
|
|
|
|
debug_set_display_time(true);
|
|
|
|
|
|
|
|
pr_info("daemon started (pid %d)\n", getpid());
|
|
|
|
|
2021-02-08 20:08:53 +00:00
|
|
|
fdarray__init(&fda, 3);
|
2021-02-08 20:08:48 +00:00
|
|
|
|
|
|
|
sock_fd = setup_server_socket(daemon);
|
|
|
|
if (sock_fd < 0)
|
|
|
|
goto out;
|
|
|
|
|
2021-02-08 20:08:51 +00:00
|
|
|
conf_fd = setup_config_changes(daemon);
|
|
|
|
if (conf_fd < 0)
|
|
|
|
goto out;
|
|
|
|
|
2021-02-08 20:08:53 +00:00
|
|
|
signal_fd = setup_signalfd(daemon);
|
|
|
|
if (signal_fd < 0)
|
|
|
|
goto out;
|
|
|
|
|
2021-02-08 20:08:48 +00:00
|
|
|
sock_pos = fdarray__add(&fda, sock_fd, POLLIN|POLLERR|POLLHUP, 0);
|
|
|
|
if (sock_pos < 0)
|
|
|
|
goto out;
|
|
|
|
|
2021-02-08 20:08:51 +00:00
|
|
|
file_pos = fdarray__add(&fda, conf_fd, POLLIN|POLLERR|POLLHUP, 0);
|
|
|
|
if (file_pos < 0)
|
|
|
|
goto out;
|
|
|
|
|
2021-02-08 20:08:53 +00:00
|
|
|
signal_pos = fdarray__add(&fda, signal_fd, POLLIN|POLLERR|POLLHUP, 0);
|
|
|
|
if (signal_pos < 0)
|
|
|
|
goto out;
|
|
|
|
|
2021-02-08 20:08:45 +00:00
|
|
|
signal(SIGINT, sig_handler);
|
|
|
|
signal(SIGTERM, sig_handler);
|
2021-02-08 20:08:59 +00:00
|
|
|
signal(SIGPIPE, SIG_IGN);
|
2021-02-08 20:08:45 +00:00
|
|
|
|
|
|
|
while (!done && !err) {
|
2021-02-08 20:08:50 +00:00
|
|
|
err = daemon__reconfig(daemon);
|
|
|
|
|
|
|
|
if (!err && fdarray__poll(&fda, -1)) {
|
|
|
|
bool reconfig = false;
|
|
|
|
|
2021-02-08 20:08:48 +00:00
|
|
|
if (fda.entries[sock_pos].revents & POLLIN)
|
|
|
|
err = handle_server_socket(daemon, sock_fd);
|
2021-02-08 20:08:51 +00:00
|
|
|
if (fda.entries[file_pos].revents & POLLIN)
|
|
|
|
err = handle_config_changes(daemon, conf_fd, &reconfig);
|
2021-02-08 20:08:53 +00:00
|
|
|
if (fda.entries[signal_pos].revents & POLLIN)
|
|
|
|
err = handle_signalfd(daemon) < 0;
|
2021-02-08 20:08:50 +00:00
|
|
|
|
|
|
|
if (reconfig)
|
|
|
|
err = setup_server_config(daemon);
|
2021-02-08 20:08:48 +00:00
|
|
|
}
|
2021-02-08 20:08:45 +00:00
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:48 +00:00
|
|
|
out:
|
|
|
|
fdarray__exit(&fda);
|
|
|
|
|
2021-02-08 20:08:50 +00:00
|
|
|
daemon__kill(daemon);
|
2021-02-08 20:08:46 +00:00
|
|
|
daemon__exit(daemon);
|
|
|
|
|
2021-02-08 20:08:48 +00:00
|
|
|
if (sock_fd != -1)
|
|
|
|
close(sock_fd);
|
2021-02-08 20:08:51 +00:00
|
|
|
if (conf_fd != -1)
|
|
|
|
close(conf_fd);
|
2021-03-20 22:10:12 +00:00
|
|
|
if (signal_fd != -1)
|
2021-02-08 20:08:53 +00:00
|
|
|
close(signal_fd);
|
2021-02-08 20:08:48 +00:00
|
|
|
|
2021-02-08 20:08:45 +00:00
|
|
|
pr_info("daemon exited\n");
|
|
|
|
fclose(daemon->out);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:49 +00:00
|
|
|
static int send_cmd(struct daemon *daemon, union cmd *cmd)
|
|
|
|
{
|
|
|
|
int ret = -1, fd;
|
|
|
|
char *line = NULL;
|
|
|
|
size_t len = 0;
|
|
|
|
ssize_t nread;
|
|
|
|
FILE *in = NULL;
|
|
|
|
|
|
|
|
if (setup_client_config(daemon))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
fd = setup_client_socket(daemon);
|
|
|
|
if (fd < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (sizeof(*cmd) != writen(fd, cmd, sizeof(*cmd))) {
|
|
|
|
perror("failed: write");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
in = fdopen(fd, "r");
|
|
|
|
if (!in) {
|
|
|
|
perror("failed: fdopen");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
while ((nread = getline(&line, &len, in)) != -1) {
|
|
|
|
if (fwrite(line, nread, 1, stdout) != 1)
|
|
|
|
goto out_fclose;
|
|
|
|
fflush(stdout);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
out_fclose:
|
|
|
|
fclose(in);
|
|
|
|
free(line);
|
|
|
|
out:
|
|
|
|
/* If in is defined, then fd is closed via fclose. */
|
|
|
|
if (!in)
|
|
|
|
close(fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:54 +00:00
|
|
|
static int send_cmd_list(struct daemon *daemon)
|
|
|
|
{
|
2021-06-17 05:55:54 +00:00
|
|
|
union cmd cmd;
|
2021-02-08 20:08:54 +00:00
|
|
|
|
2021-06-17 05:55:54 +00:00
|
|
|
memset(&cmd, 0, sizeof(cmd));
|
|
|
|
cmd.list.cmd = CMD_LIST;
|
2021-02-08 20:08:54 +00:00
|
|
|
cmd.list.verbose = verbose;
|
|
|
|
cmd.list.csv_sep = daemon->csv_sep ? *daemon->csv_sep : 0;
|
|
|
|
|
|
|
|
return send_cmd(daemon, &cmd);
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:55 +00:00
|
|
|
static int __cmd_signal(struct daemon *daemon, struct option parent_options[],
|
|
|
|
int argc, const char **argv)
|
|
|
|
{
|
|
|
|
const char *name = "all";
|
|
|
|
struct option start_options[] = {
|
|
|
|
OPT_STRING(0, "session", &name, "session",
|
|
|
|
"Sent signal to specific session"),
|
|
|
|
OPT_PARENT(parent_options),
|
|
|
|
OPT_END()
|
|
|
|
};
|
|
|
|
union cmd cmd;
|
|
|
|
|
|
|
|
argc = parse_options(argc, argv, start_options, daemon_usage, 0);
|
|
|
|
if (argc)
|
|
|
|
usage_with_options(daemon_usage, start_options);
|
|
|
|
|
|
|
|
if (setup_config(daemon)) {
|
|
|
|
pr_err("failed: config not found\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-06-17 05:55:54 +00:00
|
|
|
memset(&cmd, 0, sizeof(cmd));
|
2021-02-08 20:08:55 +00:00
|
|
|
cmd.signal.cmd = CMD_SIGNAL,
|
|
|
|
cmd.signal.sig = SIGUSR2;
|
|
|
|
strncpy(cmd.signal.name, name, sizeof(cmd.signal.name) - 1);
|
|
|
|
|
|
|
|
return send_cmd(daemon, &cmd);
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:56 +00:00
|
|
|
static int __cmd_stop(struct daemon *daemon, struct option parent_options[],
|
|
|
|
int argc, const char **argv)
|
|
|
|
{
|
|
|
|
struct option start_options[] = {
|
|
|
|
OPT_PARENT(parent_options),
|
|
|
|
OPT_END()
|
|
|
|
};
|
2021-06-17 05:55:54 +00:00
|
|
|
union cmd cmd;
|
2021-02-08 20:08:56 +00:00
|
|
|
|
|
|
|
argc = parse_options(argc, argv, start_options, daemon_usage, 0);
|
|
|
|
if (argc)
|
|
|
|
usage_with_options(daemon_usage, start_options);
|
|
|
|
|
|
|
|
if (setup_config(daemon)) {
|
|
|
|
pr_err("failed: config not found\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-06-17 05:55:54 +00:00
|
|
|
memset(&cmd, 0, sizeof(cmd));
|
|
|
|
cmd.cmd = CMD_STOP;
|
2021-02-08 20:08:56 +00:00
|
|
|
return send_cmd(daemon, &cmd);
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:59 +00:00
|
|
|
static int __cmd_ping(struct daemon *daemon, struct option parent_options[],
|
|
|
|
int argc, const char **argv)
|
|
|
|
{
|
|
|
|
const char *name = "all";
|
|
|
|
struct option ping_options[] = {
|
|
|
|
OPT_STRING(0, "session", &name, "session",
|
|
|
|
"Ping to specific session"),
|
|
|
|
OPT_PARENT(parent_options),
|
|
|
|
OPT_END()
|
|
|
|
};
|
2021-06-17 05:55:54 +00:00
|
|
|
union cmd cmd;
|
2021-02-08 20:08:59 +00:00
|
|
|
|
|
|
|
argc = parse_options(argc, argv, ping_options, daemon_usage, 0);
|
|
|
|
if (argc)
|
|
|
|
usage_with_options(daemon_usage, ping_options);
|
|
|
|
|
|
|
|
if (setup_config(daemon)) {
|
|
|
|
pr_err("failed: config not found\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-06-17 05:55:54 +00:00
|
|
|
memset(&cmd, 0, sizeof(cmd));
|
|
|
|
cmd.cmd = CMD_PING;
|
2021-02-08 20:08:59 +00:00
|
|
|
scnprintf(cmd.ping.name, sizeof(cmd.ping.name), "%s", name);
|
|
|
|
return send_cmd(daemon, &cmd);
|
|
|
|
}
|
|
|
|
|
2023-05-26 18:33:53 +00:00
|
|
|
static char *alloc_perf_exe_path(void)
|
|
|
|
{
|
|
|
|
char path[PATH_MAX];
|
|
|
|
|
|
|
|
perf_exe(path, sizeof(path));
|
|
|
|
return strdup(path);
|
|
|
|
}
|
|
|
|
|
2021-02-08 20:08:45 +00:00
|
|
|
int cmd_daemon(int argc, const char **argv)
|
|
|
|
{
|
|
|
|
struct option daemon_options[] = {
|
|
|
|
OPT_INCR('v', "verbose", &verbose, "be more verbose"),
|
2021-02-08 20:08:46 +00:00
|
|
|
OPT_STRING(0, "config", &__daemon.config,
|
|
|
|
"config file", "config file path"),
|
2021-02-08 20:08:47 +00:00
|
|
|
OPT_STRING(0, "base", &__daemon.base_user,
|
|
|
|
"directory", "base directory"),
|
2021-02-08 20:08:54 +00:00
|
|
|
OPT_STRING_OPTARG('x', "field-separator", &__daemon.csv_sep,
|
|
|
|
"field separator", "print counts with custom separator", ","),
|
2021-02-08 20:08:45 +00:00
|
|
|
OPT_END()
|
|
|
|
};
|
2023-05-26 18:33:53 +00:00
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
__daemon.perf = alloc_perf_exe_path();
|
|
|
|
if (!__daemon.perf)
|
|
|
|
return -ENOMEM;
|
2021-02-08 20:08:45 +00:00
|
|
|
|
|
|
|
__daemon.out = stdout;
|
|
|
|
|
|
|
|
argc = parse_options(argc, argv, daemon_options, daemon_usage,
|
|
|
|
PARSE_OPT_STOP_AT_NON_OPTION);
|
|
|
|
|
|
|
|
if (argc) {
|
|
|
|
if (!strcmp(argv[0], "start"))
|
2023-05-26 18:33:53 +00:00
|
|
|
ret = __cmd_start(&__daemon, daemon_options, argc, argv);
|
2023-06-26 20:16:05 +00:00
|
|
|
else if (!strcmp(argv[0], "signal"))
|
2023-05-26 18:33:53 +00:00
|
|
|
ret = __cmd_signal(&__daemon, daemon_options, argc, argv);
|
2021-02-08 20:08:56 +00:00
|
|
|
else if (!strcmp(argv[0], "stop"))
|
2023-05-26 18:33:53 +00:00
|
|
|
ret = __cmd_stop(&__daemon, daemon_options, argc, argv);
|
2021-02-08 20:08:59 +00:00
|
|
|
else if (!strcmp(argv[0], "ping"))
|
2023-05-26 18:33:53 +00:00
|
|
|
ret = __cmd_ping(&__daemon, daemon_options, argc, argv);
|
|
|
|
else
|
|
|
|
pr_err("failed: unknown command '%s'\n", argv[0]);
|
|
|
|
} else {
|
|
|
|
ret = setup_config(&__daemon);
|
|
|
|
if (ret)
|
|
|
|
pr_err("failed: config not found\n");
|
|
|
|
else
|
|
|
|
ret = send_cmd_list(&__daemon);
|
2021-02-08 20:08:46 +00:00
|
|
|
}
|
2023-05-26 18:33:53 +00:00
|
|
|
zfree(&__daemon.perf);
|
|
|
|
return ret;
|
2021-02-08 20:08:45 +00:00
|
|
|
}
|