Remove __P macros from src/usr.bin and src/usr.sbin.
[dragonfly.git] / usr.sbin / kgmon / kgmon.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1983, 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
1de703da
MD
32 *
33 * @(#) Copyright (c) 1983, 1992, 1993 The Regents of the University of California. All rights reserved.
34 * @(#)kgmon.c 8.1 (Berkeley) 6/6/93
35 * $FreeBSD: src/usr.sbin/kgmon/kgmon.c,v 1.9 1999/08/28 01:16:42 peter Exp $
2d8a3be7 36 * $DragonFly: src/usr.sbin/kgmon/kgmon.c,v 1.3 2003/11/03 19:31:38 eirikn Exp $
984263bc
MD
37 */
38
984263bc
MD
39#include <sys/param.h>
40#include <sys/file.h>
41#include <sys/time.h>
42#include <sys/sysctl.h>
43#include <sys/gmon.h>
44#include <ctype.h>
45#include <err.h>
46#include <errno.h>
47#include <kvm.h>
48#include <limits.h>
49#include <nlist.h>
50#include <paths.h>
51#include <stdio.h>
52#include <stdlib.h>
53#include <string.h>
54#include <unistd.h>
55
56struct nlist nl[] = {
57#define N_GMONPARAM 0
58 { "__gmonparam" },
59#define N_PROFHZ 1
60 { "_profhz" },
61 { NULL },
62};
63
64struct kvmvars {
65 kvm_t *kd;
66 struct gmonparam gpm;
67};
68
69int Bflag, bflag, hflag, kflag, rflag, pflag;
70int debug = 0;
2d8a3be7
EN
71int getprof(struct kvmvars *);
72int getprofhz(struct kvmvars *);
73void kern_readonly(int);
74int openfiles(char *, char *, struct kvmvars *);
75void setprof(struct kvmvars *kvp, int state);
76void dumpstate(struct kvmvars *kvp);
77void reset(struct kvmvars *kvp);
78static void usage(void);
984263bc
MD
79
80int
81main(int argc, char **argv)
82{
83 int ch, mode, disp, accessmode;
84 struct kvmvars kvmvars;
85 char *system, *kmemf;
86
87 seteuid(getuid());
88 kmemf = NULL;
89 system = NULL;
90 while ((ch = getopt(argc, argv, "M:N:Bbhpr")) != -1) {
91 switch((char)ch) {
92
93 case 'M':
94 kmemf = optarg;
95 kflag = 1;
96 break;
97
98 case 'N':
99 system = optarg;
100 break;
101
102 case 'B':
103 Bflag = 1;
104 break;
105
106 case 'b':
107 bflag = 1;
108 break;
109
110 case 'h':
111 hflag = 1;
112 break;
113
114 case 'p':
115 pflag = 1;
116 break;
117
118 case 'r':
119 rflag = 1;
120 break;
121
122 default:
123 usage();
124 }
125 }
126 argc -= optind;
127 argv += optind;
128
129#define BACKWARD_COMPATIBILITY
130#ifdef BACKWARD_COMPATIBILITY
131 if (*argv) {
132 system = *argv;
133 if (*++argv) {
134 kmemf = *argv;
135 ++kflag;
136 }
137 }
138#endif
139 if (system == NULL)
140 system = (char *)getbootfile();
141 accessmode = openfiles(system, kmemf, &kvmvars);
142 mode = getprof(&kvmvars);
143 if (hflag)
144 disp = GMON_PROF_OFF;
145 else if (Bflag)
146 disp = GMON_PROF_HIRES;
147 else if (bflag)
148 disp = GMON_PROF_ON;
149 else
150 disp = mode;
151 if (pflag)
152 dumpstate(&kvmvars);
153 if (rflag)
154 reset(&kvmvars);
155 if (accessmode == O_RDWR)
156 setprof(&kvmvars, disp);
157 (void)fprintf(stdout, "kgmon: kernel profiling is %s.\n",
158 disp == GMON_PROF_OFF ? "off" :
159 disp == GMON_PROF_HIRES ? "running (high resolution)" :
160 disp == GMON_PROF_ON ? "running" :
161 disp == GMON_PROF_BUSY ? "busy" :
162 disp == GMON_PROF_ERROR ? "off (error)" :
163 "in an unknown state");
164 return (0);
165}
166
167static void
168usage()
169{
170 fprintf(stderr, "usage: kgmon [-Bbhrp] [-M core] [-N system]\n");
171 exit(1);
172}
173
174/*
175 * Check that profiling is enabled and open any ncessary files.
176 */
177int
178openfiles(system, kmemf, kvp)
179 char *system;
180 char *kmemf;
181 struct kvmvars *kvp;
182{
183 int mib[3], state, size, openmode;
184 char errbuf[_POSIX2_LINE_MAX];
185
186 if (!kflag) {
187 mib[0] = CTL_KERN;
188 mib[1] = KERN_PROF;
189 mib[2] = GPROF_STATE;
190 size = sizeof state;
191 if (sysctl(mib, 3, &state, &size, NULL, 0) < 0)
192 errx(20, "profiling not defined in kernel");
193 if (!(Bflag || bflag || hflag || rflag ||
194 (pflag &&
195 (state == GMON_PROF_HIRES || state == GMON_PROF_ON))))
196 return (O_RDONLY);
197 (void)seteuid(0);
198 if (sysctl(mib, 3, NULL, NULL, &state, size) >= 0)
199 return (O_RDWR);
200 (void)seteuid(getuid());
201 kern_readonly(state);
202 return (O_RDONLY);
203 }
204 openmode = (Bflag || bflag || hflag || pflag || rflag)
205 ? O_RDWR : O_RDONLY;
206 kvp->kd = kvm_openfiles(system, kmemf, NULL, openmode, errbuf);
207 if (kvp->kd == NULL) {
208 if (openmode == O_RDWR) {
209 openmode = O_RDONLY;
210 kvp->kd = kvm_openfiles(system, kmemf, NULL, O_RDONLY,
211 errbuf);
212 }
213 if (kvp->kd == NULL)
214 errx(2, "kvm_openfiles: %s", errbuf);
215 kern_readonly(GMON_PROF_ON);
216 }
217 if (kvm_nlist(kvp->kd, nl) < 0)
218 errx(3, "%s: no namelist", system);
219 if (!nl[N_GMONPARAM].n_value)
220 errx(20, "profiling not defined in kernel");
221 return (openmode);
222}
223
224/*
225 * Suppress options that require a writable kernel.
226 */
227void
228kern_readonly(mode)
229 int mode;
230{
231
232 (void)fprintf(stderr, "kgmon: kernel read-only: ");
233 if (pflag && (mode == GMON_PROF_HIRES || mode == GMON_PROF_ON))
234 (void)fprintf(stderr, "data may be inconsistent\n");
235 if (rflag)
236 (void)fprintf(stderr, "-r supressed\n");
237 if (Bflag)
238 (void)fprintf(stderr, "-B supressed\n");
239 if (bflag)
240 (void)fprintf(stderr, "-b supressed\n");
241 if (hflag)
242 (void)fprintf(stderr, "-h supressed\n");
243 rflag = Bflag = bflag = hflag = 0;
244}
245
246/*
247 * Get the state of kernel profiling.
248 */
249int
250getprof(kvp)
251 struct kvmvars *kvp;
252{
253 int mib[3], size;
254
255 if (kflag) {
256 size = kvm_read(kvp->kd, nl[N_GMONPARAM].n_value, &kvp->gpm,
257 sizeof kvp->gpm);
258 } else {
259 mib[0] = CTL_KERN;
260 mib[1] = KERN_PROF;
261 mib[2] = GPROF_GMONPARAM;
262 size = sizeof kvp->gpm;
263 if (sysctl(mib, 3, &kvp->gpm, &size, NULL, 0) < 0)
264 size = 0;
265 }
266 if (size != sizeof kvp->gpm)
267 errx(4, "cannot get gmonparam: %s",
268 kflag ? kvm_geterr(kvp->kd) : strerror(errno));
269 return (kvp->gpm.state);
270}
271
272/*
273 * Enable or disable kernel profiling according to the state variable.
274 */
275void
276setprof(kvp, state)
277 struct kvmvars *kvp;
278 int state;
279{
280 struct gmonparam *p = (struct gmonparam *)nl[N_GMONPARAM].n_value;
281 int mib[3], sz, oldstate;
282
283 sz = sizeof(state);
284 if (!kflag) {
285 mib[0] = CTL_KERN;
286 mib[1] = KERN_PROF;
287 mib[2] = GPROF_STATE;
288 if (sysctl(mib, 3, &oldstate, &sz, NULL, 0) < 0)
289 goto bad;
290 if (oldstate == state)
291 return;
292 (void)seteuid(0);
293 if (sysctl(mib, 3, NULL, NULL, &state, sz) >= 0) {
294 (void)seteuid(getuid());
295 return;
296 }
297 (void)seteuid(getuid());
298 } else if (kvm_write(kvp->kd, (u_long)&p->state, (void *)&state, sz)
299 == sz)
300 return;
301bad:
302 warnx("warning: cannot turn profiling %s",
303 state == GMON_PROF_OFF ? "off" : "on");
304}
305
306/*
307 * Build the gmon.out file.
308 */
309void
310dumpstate(kvp)
311 struct kvmvars *kvp;
312{
313 register FILE *fp;
314 struct rawarc rawarc;
315 struct tostruct *tos;
316 u_long frompc;
317 u_short *froms, *tickbuf;
318 int mib[3], i;
319 struct gmonhdr h;
320 int fromindex, endfrom, toindex;
321
322 setprof(kvp, GMON_PROF_OFF);
323 fp = fopen("gmon.out", "w");
324 if (fp == 0) {
325 warn("gmon.out");
326 return;
327 }
328
329 /*
330 * Build the gmon header and write it to a file.
331 */
332 bzero(&h, sizeof(h));
333 h.lpc = kvp->gpm.lowpc;
334 h.hpc = kvp->gpm.highpc;
335 h.ncnt = kvp->gpm.kcountsize + sizeof(h);
336 h.version = GMONVERSION;
337 h.profrate = kvp->gpm.profrate;
338 if (h.profrate == 0)
339 h.profrate = getprofhz(kvp); /* ancient kernel */
340 fwrite((char *)&h, sizeof(h), 1, fp);
341
342 /*
343 * Write out the tick buffer.
344 */
345 mib[0] = CTL_KERN;
346 mib[1] = KERN_PROF;
347 if ((tickbuf = (u_short *)malloc(kvp->gpm.kcountsize)) == NULL)
348 errx(5, "cannot allocate kcount space");
349 if (kflag) {
350 i = kvm_read(kvp->kd, (u_long)kvp->gpm.kcount, (void *)tickbuf,
351 kvp->gpm.kcountsize);
352 } else {
353 mib[2] = GPROF_COUNT;
354 i = kvp->gpm.kcountsize;
355 if (sysctl(mib, 3, tickbuf, &i, NULL, 0) < 0)
356 i = 0;
357 }
358 if (i != kvp->gpm.kcountsize)
359 errx(6, "read ticks: read %u, got %d: %s",
360 kvp->gpm.kcountsize, i,
361 kflag ? kvm_geterr(kvp->kd) : strerror(errno));
362 if ((fwrite(tickbuf, kvp->gpm.kcountsize, 1, fp)) != 1)
363 err(7, "writing tocks to gmon.out");
364 free(tickbuf);
365
366 /*
367 * Write out the arc info.
368 */
369 if ((froms = (u_short *)malloc(kvp->gpm.fromssize)) == NULL)
370 errx(8, "cannot allocate froms space");
371 if (kflag) {
372 i = kvm_read(kvp->kd, (u_long)kvp->gpm.froms, (void *)froms,
373 kvp->gpm.fromssize);
374 } else {
375 mib[2] = GPROF_FROMS;
376 i = kvp->gpm.fromssize;
377 if (sysctl(mib, 3, froms, &i, NULL, 0) < 0)
378 i = 0;
379 }
380 if (i != kvp->gpm.fromssize)
381 errx(9, "read froms: read %u, got %d: %s",
382 kvp->gpm.fromssize, i,
383 kflag ? kvm_geterr(kvp->kd) : strerror(errno));
384 if ((tos = (struct tostruct *)malloc(kvp->gpm.tossize)) == NULL)
385 errx(10, "cannot allocate tos space");
386 if (kflag) {
387 i = kvm_read(kvp->kd, (u_long)kvp->gpm.tos, (void *)tos,
388 kvp->gpm.tossize);
389 } else {
390 mib[2] = GPROF_TOS;
391 i = kvp->gpm.tossize;
392 if (sysctl(mib, 3, tos, &i, NULL, 0) < 0)
393 i = 0;
394 }
395 if (i != kvp->gpm.tossize)
396 errx(11, "read tos: read %u, got %d: %s",
397 kvp->gpm.tossize, i,
398 kflag ? kvm_geterr(kvp->kd) : strerror(errno));
399 if (debug)
400 warnx("lowpc 0x%x, textsize 0x%x",
401 kvp->gpm.lowpc, kvp->gpm.textsize);
402 endfrom = kvp->gpm.fromssize / sizeof(*froms);
403 for (fromindex = 0; fromindex < endfrom; ++fromindex) {
404 if (froms[fromindex] == 0)
405 continue;
406 frompc = (u_long)kvp->gpm.lowpc +
407 (fromindex * kvp->gpm.hashfraction * sizeof(*froms));
408 for (toindex = froms[fromindex]; toindex != 0;
409 toindex = tos[toindex].link) {
410 if (debug)
411 warnx("[mcleanup] frompc 0x%x selfpc 0x%x count %d",
412 frompc, tos[toindex].selfpc,
413 tos[toindex].count);
414 rawarc.raw_frompc = frompc;
415 rawarc.raw_selfpc = (u_long)tos[toindex].selfpc;
416 rawarc.raw_count = tos[toindex].count;
417 fwrite((char *)&rawarc, sizeof(rawarc), 1, fp);
418 }
419 }
420 fclose(fp);
421}
422
423/*
424 * Get the profiling rate.
425 */
426int
427getprofhz(kvp)
428 struct kvmvars *kvp;
429{
430 int mib[2], size, profrate;
431 struct clockinfo clockrate;
432
433 if (kflag) {
434 profrate = 1;
435 if (kvm_read(kvp->kd, nl[N_PROFHZ].n_value, &profrate,
436 sizeof profrate) != sizeof profrate)
437 warnx("get clockrate: %s", kvm_geterr(kvp->kd));
438 return (profrate);
439 }
440 mib[0] = CTL_KERN;
441 mib[1] = KERN_CLOCKRATE;
442 clockrate.profhz = 1;
443 size = sizeof clockrate;
444 if (sysctl(mib, 2, &clockrate, &size, NULL, 0) < 0)
445 warn("get clockrate");
446 return (clockrate.profhz);
447}
448
449/*
450 * Reset the kernel profiling date structures.
451 */
452void
453reset(kvp)
454 struct kvmvars *kvp;
455{
456 char *zbuf;
457 u_long biggest;
458 int mib[3];
459
460 setprof(kvp, GMON_PROF_OFF);
461
462 biggest = kvp->gpm.kcountsize;
463 if (kvp->gpm.fromssize > biggest)
464 biggest = kvp->gpm.fromssize;
465 if (kvp->gpm.tossize > biggest)
466 biggest = kvp->gpm.tossize;
467 if ((zbuf = (char *)malloc(biggest)) == NULL)
468 errx(12, "cannot allocate zbuf space");
469 bzero(zbuf, biggest);
470 if (kflag) {
471 if (kvm_write(kvp->kd, (u_long)kvp->gpm.kcount, zbuf,
472 kvp->gpm.kcountsize) != kvp->gpm.kcountsize)
473 errx(13, "tickbuf zero: %s", kvm_geterr(kvp->kd));
474 if (kvm_write(kvp->kd, (u_long)kvp->gpm.froms, zbuf,
475 kvp->gpm.fromssize) != kvp->gpm.fromssize)
476 errx(14, "froms zero: %s", kvm_geterr(kvp->kd));
477 if (kvm_write(kvp->kd, (u_long)kvp->gpm.tos, zbuf,
478 kvp->gpm.tossize) != kvp->gpm.tossize)
479 errx(15, "tos zero: %s", kvm_geterr(kvp->kd));
480 return;
481 }
482 (void)seteuid(0);
483 mib[0] = CTL_KERN;
484 mib[1] = KERN_PROF;
485 mib[2] = GPROF_COUNT;
486 if (sysctl(mib, 3, NULL, NULL, zbuf, kvp->gpm.kcountsize) < 0)
487 err(13, "tickbuf zero");
488 mib[2] = GPROF_FROMS;
489 if (sysctl(mib, 3, NULL, NULL, zbuf, kvp->gpm.fromssize) < 0)
490 err(14, "froms zero");
491 mib[2] = GPROF_TOS;
492 if (sysctl(mib, 3, NULL, NULL, zbuf, kvp->gpm.tossize) < 0)
493 err(15, "tos zero");
494 (void)seteuid(getuid());
495 free(zbuf);
496}