1 // SPDX-License-Identifier: GPL-2.0
2 #include <internal/lib.h>
3 #include <subcmd/parse-options.h>
4 #include <api/fd/array.h>
6 #include <linux/zalloc.h>
7 #include <linux/string.h>
8 #include <linux/limits.h>
9 #include <linux/string.h>
18 #include <sys/inotify.h>
20 #include <sys/types.h>
21 #include <sys/socket.h>
24 #include <sys/signalfd.h>
34 #define SESSION_OUTPUT "output"
35 #define SESSION_CONTROL "control"
36 #define SESSION_ACK "ack"
41 * OK - session is up and running
42 * RECONFIG - session is pending for reconfiguration,
43 * new values are already loaded in session object
44 * KILL - session is pending to be killed
46 * Session object life and its state is maintained by
47 * following functions:
50 * - reads config file and setup session objects
51 * with following states:
53 * OK - no change needed
54 * RECONFIG - session needs to be changed
55 * (run variable changed)
56 * KILL - session needs to be killed
57 * (session is no longer in config file)
60 * - scans session objects and does following actions
64 * RECONFIG - session is killed and re-run with new config
65 * KILL - session is killed
67 * - all sessions have OK state on the function exit
69 enum daemon_session_state {
75 struct daemon_session {
81 struct list_head list;
82 enum daemon_session_state state;
90 const char *base_user;
92 struct list_head sessions;
98 static struct daemon __daemon = {
99 .sessions = LIST_HEAD_INIT(__daemon.sessions),
102 static const char * const daemon_usage[] = {
103 "perf daemon start [<options>]",
104 "perf daemon [<options>]",
110 static void sig_handler(int sig __maybe_unused)
115 static struct daemon_session *daemon__add_session(struct daemon *config, char *name)
117 struct daemon_session *session = zalloc(sizeof(*session));
122 session->name = strdup(name);
123 if (!session->name) {
129 list_add_tail(&session->list, &config->sessions);
133 static struct daemon_session *daemon__find_session(struct daemon *daemon, char *name)
135 struct daemon_session *session;
137 list_for_each_entry(session, &daemon->sessions, list) {
138 if (!strcmp(session->name, name))
145 static int get_session_name(const char *var, char *session, int len)
147 const char *p = var + sizeof("session-") - 1;
149 while (*p != '.' && *p != 0x0 && len--)
153 return *p == '.' ? 0 : -EINVAL;
156 static int session_config(struct daemon *daemon, const char *var, const char *value)
158 struct daemon_session *session;
161 if (get_session_name(var, name, sizeof(name)))
164 var = strchr(var, '.');
170 session = daemon__find_session(daemon, name);
173 /* New session is defined. */
174 session = daemon__add_session(daemon, name);
178 pr_debug("reconfig: found new session %s\n", name);
180 /* Trigger reconfig to start it. */
181 session->state = RECONFIG;
182 } else if (session->state == KILL) {
183 /* Current session is defined, no action needed. */
184 pr_debug("reconfig: found current session %s\n", name);
188 if (!strcmp(var, "run")) {
192 same = !strcmp(session->run, value);
197 pr_debug("reconfig: session %s is changed\n", name);
200 session->run = strdup(value);
205 * Either new or changed run value is defined,
206 * trigger reconfig for the session.
208 session->state = RECONFIG;
215 static int server_config(const char *var, const char *value, void *cb)
217 struct daemon *daemon = cb;
219 if (strstarts(var, "session-")) {
220 return session_config(daemon, var, value);
221 } else if (!strcmp(var, "daemon.base") && !daemon->base_user) {
222 if (daemon->base && strcmp(daemon->base, value)) {
223 pr_err("failed: can't redefine base, bailing out\n");
226 daemon->base = strdup(value);
234 static int client_config(const char *var, const char *value, void *cb)
236 struct daemon *daemon = cb;
238 if (!strcmp(var, "daemon.base") && !daemon->base_user) {
239 daemon->base = strdup(value);
247 static int check_base(struct daemon *daemon)
252 pr_err("failed: base not defined\n");
256 if (stat(daemon->base, &st)) {
259 pr_err("failed: permission denied for '%s' base\n",
263 pr_err("failed: base '%s' does not exists\n",
267 pr_err("failed: can't access base '%s': %s\n",
268 daemon->base, strerror(errno));
273 if ((st.st_mode & S_IFMT) != S_IFDIR) {
274 pr_err("failed: base '%s' is not directory\n",
282 static int setup_client_config(struct daemon *daemon)
284 struct perf_config_set *set = perf_config_set__load_file(daemon->config_real);
288 err = perf_config_set(set, client_config, daemon);
289 perf_config_set__delete(set);
292 return err ?: check_base(daemon);
295 static int setup_server_config(struct daemon *daemon)
297 struct perf_config_set *set;
298 struct daemon_session *session;
301 pr_debug("reconfig: started\n");
304 * Mark all sessions for kill, the server config
305 * will set following states, see explanation at
306 * enum daemon_session_state declaration.
308 list_for_each_entry(session, &daemon->sessions, list)
309 session->state = KILL;
311 set = perf_config_set__load_file(daemon->config_real);
313 err = perf_config_set(set, server_config, daemon);
314 perf_config_set__delete(set);
317 return err ?: check_base(daemon);
320 static int daemon_session__run(struct daemon_session *session,
321 struct daemon *daemon)
327 if (asprintf(&session->base, "%s/session-%s",
328 daemon->base, session->name) < 0) {
329 perror("failed: asprintf");
333 if (mkdir(session->base, 0755) && errno != EEXIST) {
334 perror("failed: mkdir");
338 session->pid = fork();
339 if (session->pid < 0)
341 if (session->pid > 0) {
342 pr_info("reconfig: ruining session [%s:%d]: %s\n",
343 session->name, session->pid, session->run);
347 if (chdir(session->base)) {
348 perror("failed: chdir");
352 fd = open("/dev/null", O_RDONLY);
354 perror("failed: open /dev/null");
361 fd = open(SESSION_OUTPUT, O_RDWR|O_CREAT|O_TRUNC, 0644);
363 perror("failed: open session output");
371 if (mkfifo(SESSION_CONTROL, O_RDWR) && errno != EEXIST) {
372 perror("failed: create control fifo");
376 if (mkfifo(SESSION_ACK, O_RDWR) && errno != EEXIST) {
377 perror("failed: create ack fifo");
381 scnprintf(buf, sizeof(buf), "%s record --control=fifo:%s,%s %s",
382 daemon->perf, SESSION_CONTROL, SESSION_ACK, session->run);
384 argv = argv_split(buf, &argc);
388 exit(execve(daemon->perf, argv, NULL));
392 static pid_t handle_signalfd(struct daemon *daemon)
394 struct daemon_session *session;
395 struct signalfd_siginfo si;
400 err = read(daemon->signal_fd, &si, sizeof(struct signalfd_siginfo));
401 if (err != sizeof(struct signalfd_siginfo))
404 list_for_each_entry(session, &daemon->sessions, list) {
406 if (session->pid != (int) si.ssi_pid)
409 pid = waitpid(session->pid, &status, 0);
410 if (pid == session->pid) {
411 if (WIFEXITED(status)) {
412 pr_info("session '%s' exited, status=%d\n",
413 session->name, WEXITSTATUS(status));
414 } else if (WIFSIGNALED(status)) {
415 pr_info("session '%s' killed (signal %d)\n",
416 session->name, WTERMSIG(status));
417 } else if (WIFSTOPPED(status)) {
418 pr_info("session '%s' stopped (signal %d)\n",
419 session->name, WSTOPSIG(status));
421 pr_info("session '%s' Unexpected status (0x%x)\n",
422 session->name, status);
426 session->state = KILL;
434 static int daemon_session__wait(struct daemon_session *session, struct daemon *daemon,
437 struct pollfd pollfd = {
438 .fd = daemon->signal_fd,
441 pid_t wpid = 0, pid = session->pid;
447 int err = poll(&pollfd, 1, 1000);
450 wpid = handle_signalfd(daemon);
451 } else if (err < 0) {
452 perror("failed: poll\n");
456 if (start + secs < time(NULL))
458 } while (wpid != pid);
463 static bool daemon__has_alive_session(struct daemon *daemon)
465 struct daemon_session *session;
467 list_for_each_entry(session, &daemon->sessions, list) {
468 if (session->pid != -1)
475 static int daemon__wait(struct daemon *daemon, int secs)
477 struct pollfd pollfd = {
478 .fd = daemon->signal_fd,
486 int err = poll(&pollfd, 1, 1000);
489 handle_signalfd(daemon);
490 } else if (err < 0) {
491 perror("failed: poll\n");
495 if (start + secs < time(NULL))
497 } while (daemon__has_alive_session(daemon));
502 static int daemon_session__control(struct daemon_session *session,
503 const char *msg, bool do_ack)
505 struct pollfd pollfd = { .events = POLLIN, };
506 char control_path[PATH_MAX];
507 char ack_path[PATH_MAX];
508 int control, ack = -1, len;
513 /* open the control file */
514 scnprintf(control_path, sizeof(control_path), "%s/%s",
515 session->base, SESSION_CONTROL);
517 control = open(control_path, O_WRONLY|O_NONBLOCK);
522 /* open the ack file */
523 scnprintf(ack_path, sizeof(ack_path), "%s/%s",
524 session->base, SESSION_ACK);
526 ack = open(ack_path, O_RDONLY, O_NONBLOCK);
533 /* write the command */
536 err = writen(control, msg, len);
538 pr_err("failed: write to control pipe: %d (%s)\n",
539 errno, control_path);
546 /* wait for an ack */
549 if (!poll(&pollfd, 1, 2000)) {
550 pr_err("failed: control ack timeout\n");
554 if (!(pollfd.revents & POLLIN)) {
555 pr_err("failed: did not received an ack\n");
559 err = read(ack, buf, sizeof(buf));
561 ret = strcmp(buf, "ack\n");
563 perror("failed: read ack %d\n");
573 static int setup_server_socket(struct daemon *daemon)
575 struct sockaddr_un addr;
577 int fd = socket(AF_UNIX, SOCK_STREAM, 0);
580 fprintf(stderr, "socket: %s\n", strerror(errno));
584 if (fcntl(fd, F_SETFD, FD_CLOEXEC)) {
585 perror("failed: fcntl FD_CLOEXEC");
590 scnprintf(path, sizeof(path), "%s/control", daemon->base);
592 if (strlen(path) + 1 >= sizeof(addr.sun_path)) {
593 pr_err("failed: control path too long '%s'\n", path);
598 memset(&addr, 0, sizeof(addr));
599 addr.sun_family = AF_UNIX;
601 strlcpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
604 if (bind(fd, (struct sockaddr *)&addr, sizeof(addr)) == -1) {
605 perror("failed: bind");
610 if (listen(fd, 1) == -1) {
611 perror("failed: listen");
627 #define SESSION_MAX 64
643 char name[SESSION_MAX];
649 char name[SESSION_MAX];
659 static int daemon_session__ping(struct daemon_session *session)
661 return daemon_session__control(session, "ping", true) ? PING_FAIL : PING_OK;
664 static int cmd_session_list(struct daemon *daemon, union cmd *cmd, FILE *out)
666 char csv_sep = cmd->list.csv_sep;
667 struct daemon_session *session;
670 fprintf(out, "%d%c%s%c%s%c%s/%s",
672 getpid(), csv_sep, "daemon",
674 csv_sep, daemon->base,
676 csv_sep, daemon->base, SESSION_OUTPUT);
678 fprintf(out, "%c%s/%s",
680 csv_sep, daemon->base, "lock");
684 fprintf(out, "[%d:daemon] base: %s\n", getpid(), daemon->base);
685 if (cmd->list.verbose) {
686 fprintf(out, " output: %s/%s\n",
687 daemon->base, SESSION_OUTPUT);
688 fprintf(out, " lock: %s/lock\n",
693 list_for_each_entry(session, &daemon->sessions, list) {
695 fprintf(out, "%d%c%s%c%s",
699 csv_sep, session->name,
701 csv_sep, session->run);
703 fprintf(out, "%c%s%c%s/%s",
705 csv_sep, session->base,
707 csv_sep, session->base, SESSION_OUTPUT);
709 fprintf(out, "%c%s/%s%c%s/%s",
710 /* session control */
711 csv_sep, session->base, SESSION_CONTROL,
713 csv_sep, session->base, SESSION_ACK);
717 fprintf(out, "[%d:%s] perf record %s\n",
718 session->pid, session->name, session->run);
719 if (!cmd->list.verbose)
721 fprintf(out, " base: %s\n",
723 fprintf(out, " output: %s/%s\n",
724 session->base, SESSION_OUTPUT);
725 fprintf(out, " control: %s/%s\n",
726 session->base, SESSION_CONTROL);
727 fprintf(out, " ack: %s/%s\n",
728 session->base, SESSION_ACK);
735 static int daemon_session__signal(struct daemon_session *session, int sig)
737 if (session->pid < 0)
739 return kill(session->pid, sig);
742 static int cmd_session_kill(struct daemon *daemon, union cmd *cmd, FILE *out)
744 struct daemon_session *session;
747 all = !strcmp(cmd->signal.name, "all");
749 list_for_each_entry(session, &daemon->sessions, list) {
750 if (all || !strcmp(cmd->signal.name, session->name)) {
751 daemon_session__signal(session, cmd->signal.sig);
752 fprintf(out, "signal %d sent to session '%s [%d]'\n",
753 cmd->signal.sig, session->name, session->pid);
760 static const char *ping_str[PING_MAX] = {
762 [PING_FAIL] = "FAIL",
765 static int cmd_session_ping(struct daemon *daemon, union cmd *cmd, FILE *out)
767 struct daemon_session *session;
768 bool all = false, found = false;
770 all = !strcmp(cmd->ping.name, "all");
772 list_for_each_entry(session, &daemon->sessions, list) {
773 if (all || !strcmp(cmd->ping.name, session->name)) {
774 int state = daemon_session__ping(session);
776 fprintf(out, "%-4s %s\n", ping_str[state], session->name);
781 if (!found && !all) {
782 fprintf(out, "%-4s %s (not found)\n",
783 ping_str[PING_FAIL], cmd->ping.name);
788 static int handle_server_socket(struct daemon *daemon, int sock_fd)
794 fd = accept(sock_fd, NULL, NULL);
796 perror("failed: accept");
800 if (sizeof(cmd) != readn(fd, &cmd, sizeof(cmd))) {
801 perror("failed: read");
805 out = fdopen(fd, "w");
807 perror("failed: fdopen");
813 ret = cmd_session_list(daemon, &cmd, out);
816 ret = cmd_session_kill(daemon, &cmd, out);
821 pr_debug("perf daemon is exciting\n");
824 ret = cmd_session_ping(daemon, &cmd, out);
832 /* If out is defined, then fd is closed via fclose. */
838 static int setup_client_socket(struct daemon *daemon)
840 struct sockaddr_un addr;
842 int fd = socket(AF_UNIX, SOCK_STREAM, 0);
845 perror("failed: socket");
849 scnprintf(path, sizeof(path), "%s/control", daemon->base);
851 if (strlen(path) + 1 >= sizeof(addr.sun_path)) {
852 pr_err("failed: control path too long '%s'\n", path);
857 memset(&addr, 0, sizeof(addr));
858 addr.sun_family = AF_UNIX;
859 strlcpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
861 if (connect(fd, (struct sockaddr *) &addr, sizeof(addr)) == -1) {
862 perror("failed: connect");
870 static void daemon_session__kill(struct daemon_session *session,
871 struct daemon *daemon)
873 daemon_session__signal(session, SIGTERM);
874 if (daemon_session__wait(session, daemon, 10)) {
875 daemon_session__signal(session, SIGKILL);
876 daemon_session__wait(session, daemon, 10);
880 static void daemon__signal(struct daemon *daemon, int sig)
882 struct daemon_session *session;
884 list_for_each_entry(session, &daemon->sessions, list)
885 daemon_session__signal(session, sig);
888 static void daemon_session__delete(struct daemon_session *session)
896 static void daemon_session__remove(struct daemon_session *session)
898 list_del(&session->list);
899 daemon_session__delete(session);
902 static void daemon__kill(struct daemon *daemon)
904 daemon__signal(daemon, SIGTERM);
905 if (daemon__wait(daemon, 10)) {
906 daemon__signal(daemon, SIGKILL);
907 daemon__wait(daemon, 10);
911 static void daemon__exit(struct daemon *daemon)
913 struct daemon_session *session, *h;
915 list_for_each_entry_safe(session, h, &daemon->sessions, list)
916 daemon_session__remove(session);
918 free(daemon->config_real);
919 free(daemon->config_base);
923 static int daemon__reconfig(struct daemon *daemon)
925 struct daemon_session *session, *n;
927 list_for_each_entry_safe(session, n, &daemon->sessions, list) {
929 if (session->state == OK)
932 /* Remove session. */
933 if (session->state == KILL) {
934 if (session->pid > 0) {
935 daemon_session__kill(session, daemon);
936 pr_info("reconfig: session '%s' killed\n", session->name);
938 daemon_session__remove(session);
942 /* Reconfig session. */
943 if (session->pid > 0) {
944 daemon_session__kill(session, daemon);
945 pr_info("reconfig: session '%s' killed\n", session->name);
947 if (daemon_session__run(session, daemon))
956 static int setup_config_changes(struct daemon *daemon)
958 char *basen = strdup(daemon->config_real);
959 char *dirn = strdup(daemon->config_real);
966 fd = inotify_init1(IN_NONBLOCK|O_CLOEXEC);
968 perror("failed: inotify_init");
973 base = basename(basen);
974 pr_debug("config file: %s, dir: %s\n", base, dir);
976 wd = inotify_add_watch(fd, dir, IN_CLOSE_WRITE);
978 daemon->config_base = strdup(base);
979 if (!daemon->config_base) {
984 perror("failed: inotify_add_watch");
990 return wd < 0 ? -1 : fd;
993 static bool process_inotify_event(struct daemon *daemon, char *buf, ssize_t len)
997 while (p < (buf + len)) {
998 struct inotify_event *event = (struct inotify_event *) p;
1001 * We monitor config directory, check if our
1002 * config file was changes.
1004 if ((event->mask & IN_CLOSE_WRITE) &&
1005 !(event->mask & IN_ISDIR)) {
1006 if (!strcmp(event->name, daemon->config_base))
1009 p += sizeof(*event) + event->len;
1014 static int handle_config_changes(struct daemon *daemon, int conf_fd,
1015 bool *config_changed)
1020 while (!(*config_changed)) {
1021 len = read(conf_fd, buf, sizeof(buf));
1023 if (errno != EAGAIN) {
1024 perror("failed: read");
1029 *config_changed = process_inotify_event(daemon, buf, len);
1034 static int setup_config(struct daemon *daemon)
1036 if (daemon->base_user) {
1037 daemon->base = strdup(daemon->base_user);
1042 if (daemon->config) {
1043 char *real = realpath(daemon->config, NULL);
1046 perror("failed: realpath");
1049 daemon->config_real = real;
1053 if (perf_config_system() && !access(perf_etc_perfconfig(), R_OK))
1054 daemon->config_real = strdup(perf_etc_perfconfig());
1055 else if (perf_config_global() && perf_home_perfconfig())
1056 daemon->config_real = strdup(perf_home_perfconfig());
1058 return daemon->config_real ? 0 : -1;
1064 #include <sys/file.h>
1066 static int lockf(int fd, int cmd, off_t len)
1068 if (cmd != F_TLOCK || len != 0)
1071 return flock(fd, LOCK_EX | LOCK_NB);
1076 * Each daemon tries to create and lock BASE/lock file,
1077 * if it's successful we are sure we're the only daemon
1078 * running over the BASE.
1080 * Once daemon is finished, file descriptor to lock file
1081 * is closed and lock is released.
1083 static int check_lock(struct daemon *daemon)
1085 char path[PATH_MAX];
1090 scnprintf(path, sizeof(path), "%s/lock", daemon->base);
1092 fd = open(path, O_RDWR|O_CREAT|O_CLOEXEC, 0640);
1096 if (lockf(fd, F_TLOCK, 0) < 0) {
1097 filename__read_int(path, &pid);
1098 fprintf(stderr, "failed: another perf daemon (pid %d) owns %s\n",
1104 scnprintf(buf, sizeof(buf), "%d", getpid());
1107 if (write(fd, buf, len) != len) {
1108 perror("failed: write");
1113 if (ftruncate(fd, len)) {
1114 perror("failed: ftruncate");
1122 static int go_background(struct daemon *daemon)
1136 if (check_lock(daemon))
1141 if (chdir(daemon->base)) {
1142 perror("failed: chdir");
1146 fd = open("output", O_RDWR|O_CREAT|O_TRUNC, 0644);
1148 perror("failed: open");
1152 if (fcntl(fd, F_SETFD, FD_CLOEXEC)) {
1153 perror("failed: fcntl FD_CLOEXEC");
1163 daemon->out = fdopen(1, "w");
1170 setbuf(daemon->out, NULL);
1174 static int setup_signalfd(struct daemon *daemon)
1179 sigaddset(&mask, SIGCHLD);
1181 if (sigprocmask(SIG_BLOCK, &mask, NULL) == -1)
1184 daemon->signal_fd = signalfd(-1, &mask, SFD_NONBLOCK|SFD_CLOEXEC);
1185 return daemon->signal_fd;
1188 static int __cmd_start(struct daemon *daemon, struct option parent_options[],
1189 int argc, const char **argv)
1191 bool foreground = false;
1192 struct option start_options[] = {
1193 OPT_BOOLEAN('f', "foreground", &foreground, "stay on console"),
1194 OPT_PARENT(parent_options),
1197 int sock_fd = -1, conf_fd = -1, signal_fd = -1;
1198 int sock_pos, file_pos, signal_pos;
1202 argc = parse_options(argc, argv, start_options, daemon_usage, 0);
1204 usage_with_options(daemon_usage, start_options);
1206 if (setup_config(daemon)) {
1207 pr_err("failed: config not found\n");
1211 if (setup_server_config(daemon))
1214 if (foreground && check_lock(daemon))
1218 err = go_background(daemon);
1220 /* original process, exit normally */
1223 daemon__exit(daemon);
1228 debug_set_file(daemon->out);
1229 debug_set_display_time(true);
1231 pr_info("daemon started (pid %d)\n", getpid());
1233 fdarray__init(&fda, 3);
1235 sock_fd = setup_server_socket(daemon);
1239 conf_fd = setup_config_changes(daemon);
1243 signal_fd = setup_signalfd(daemon);
1247 sock_pos = fdarray__add(&fda, sock_fd, POLLIN|POLLERR|POLLHUP, 0);
1251 file_pos = fdarray__add(&fda, conf_fd, POLLIN|POLLERR|POLLHUP, 0);
1255 signal_pos = fdarray__add(&fda, signal_fd, POLLIN|POLLERR|POLLHUP, 0);
1259 signal(SIGINT, sig_handler);
1260 signal(SIGTERM, sig_handler);
1261 signal(SIGPIPE, SIG_IGN);
1263 while (!done && !err) {
1264 err = daemon__reconfig(daemon);
1266 if (!err && fdarray__poll(&fda, -1)) {
1267 bool reconfig = false;
1269 if (fda.entries[sock_pos].revents & POLLIN)
1270 err = handle_server_socket(daemon, sock_fd);
1271 if (fda.entries[file_pos].revents & POLLIN)
1272 err = handle_config_changes(daemon, conf_fd, &reconfig);
1273 if (fda.entries[signal_pos].revents & POLLIN)
1274 err = handle_signalfd(daemon) < 0;
1277 err = setup_server_config(daemon);
1282 fdarray__exit(&fda);
1284 daemon__kill(daemon);
1285 daemon__exit(daemon);
1294 pr_info("daemon exited\n");
1295 fclose(daemon->out);
1299 static int send_cmd(struct daemon *daemon, union cmd *cmd)
1307 if (setup_client_config(daemon))
1310 fd = setup_client_socket(daemon);
1314 if (sizeof(*cmd) != writen(fd, cmd, sizeof(*cmd))) {
1315 perror("failed: write");
1319 in = fdopen(fd, "r");
1321 perror("failed: fdopen");
1325 while ((nread = getline(&line, &len, in)) != -1) {
1326 if (fwrite(line, nread, 1, stdout) != 1)
1336 /* If in is defined, then fd is closed via fclose. */
1342 static int send_cmd_list(struct daemon *daemon)
1344 union cmd cmd = { .cmd = CMD_LIST, };
1346 cmd.list.verbose = verbose;
1347 cmd.list.csv_sep = daemon->csv_sep ? *daemon->csv_sep : 0;
1349 return send_cmd(daemon, &cmd);
1352 static int __cmd_signal(struct daemon *daemon, struct option parent_options[],
1353 int argc, const char **argv)
1355 const char *name = "all";
1356 struct option start_options[] = {
1357 OPT_STRING(0, "session", &name, "session",
1358 "Sent signal to specific session"),
1359 OPT_PARENT(parent_options),
1364 argc = parse_options(argc, argv, start_options, daemon_usage, 0);
1366 usage_with_options(daemon_usage, start_options);
1368 if (setup_config(daemon)) {
1369 pr_err("failed: config not found\n");
1373 cmd.signal.cmd = CMD_SIGNAL,
1374 cmd.signal.sig = SIGUSR2;
1375 strncpy(cmd.signal.name, name, sizeof(cmd.signal.name) - 1);
1377 return send_cmd(daemon, &cmd);
1380 static int __cmd_stop(struct daemon *daemon, struct option parent_options[],
1381 int argc, const char **argv)
1383 struct option start_options[] = {
1384 OPT_PARENT(parent_options),
1387 union cmd cmd = { .cmd = CMD_STOP, };
1389 argc = parse_options(argc, argv, start_options, daemon_usage, 0);
1391 usage_with_options(daemon_usage, start_options);
1393 if (setup_config(daemon)) {
1394 pr_err("failed: config not found\n");
1398 return send_cmd(daemon, &cmd);
1401 static int __cmd_ping(struct daemon *daemon, struct option parent_options[],
1402 int argc, const char **argv)
1404 const char *name = "all";
1405 struct option ping_options[] = {
1406 OPT_STRING(0, "session", &name, "session",
1407 "Ping to specific session"),
1408 OPT_PARENT(parent_options),
1411 union cmd cmd = { .cmd = CMD_PING, };
1413 argc = parse_options(argc, argv, ping_options, daemon_usage, 0);
1415 usage_with_options(daemon_usage, ping_options);
1417 if (setup_config(daemon)) {
1418 pr_err("failed: config not found\n");
1422 scnprintf(cmd.ping.name, sizeof(cmd.ping.name), "%s", name);
1423 return send_cmd(daemon, &cmd);
1426 int cmd_daemon(int argc, const char **argv)
1428 struct option daemon_options[] = {
1429 OPT_INCR('v', "verbose", &verbose, "be more verbose"),
1430 OPT_STRING(0, "config", &__daemon.config,
1431 "config file", "config file path"),
1432 OPT_STRING(0, "base", &__daemon.base_user,
1433 "directory", "base directory"),
1434 OPT_STRING_OPTARG('x', "field-separator", &__daemon.csv_sep,
1435 "field separator", "print counts with custom separator", ","),
1439 perf_exe(__daemon.perf, sizeof(__daemon.perf));
1440 __daemon.out = stdout;
1442 argc = parse_options(argc, argv, daemon_options, daemon_usage,
1443 PARSE_OPT_STOP_AT_NON_OPTION);
1446 if (!strcmp(argv[0], "start"))
1447 return __cmd_start(&__daemon, daemon_options, argc, argv);
1448 if (!strcmp(argv[0], "signal"))
1449 return __cmd_signal(&__daemon, daemon_options, argc, argv);
1450 else if (!strcmp(argv[0], "stop"))
1451 return __cmd_stop(&__daemon, daemon_options, argc, argv);
1452 else if (!strcmp(argv[0], "ping"))
1453 return __cmd_ping(&__daemon, daemon_options, argc, argv);
1455 pr_err("failed: unknown command '%s'\n", argv[0]);
1459 if (setup_config(&__daemon)) {
1460 pr_err("failed: config not found\n");
1464 return send_cmd_list(&__daemon);