[TMP] enable load_prefer_newer
[bpt/emacs.git] / src / profiler.c
CommitLineData
0efc778b 1/* Profiler implementation.
c2d7786e 2
ba318903 3Copyright (C) 2012-2014 Free Software Foundation, Inc.
c2d7786e
TM
4
5This file is part of GNU Emacs.
6
7GNU Emacs is free software: you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation, either version 3 of the License, or
10(at your option) any later version.
11
12GNU Emacs is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with GNU Emacs. If not, see <http://www.gnu.org/licenses/>. */
19
20#include <config.h>
c2d7786e 21#include "lisp.h"
704d3f45 22#include "syssignal.h"
d89460ed
PE
23#include "systime.h"
24
25/* Return A + B, but return the maximum fixnum if the result would overflow.
26 Assume A and B are nonnegative and in fixnum range. */
27
28static EMACS_INT
29saturated_add (EMACS_INT a, EMACS_INT b)
30{
31 return min (a + b, MOST_POSITIVE_FIXNUM);
32}
c2d7786e 33
3d80c99f 34/* Logs. */
c2d7786e 35
3d80c99f 36typedef struct Lisp_Hash_Table log_t;
c2d7786e 37
b782773b 38static Lisp_Object Qautomatic_gc;
b7432bb2
SM
39static Lisp_Object Qprofiler_backtrace_equal;
40static struct hash_table_test hashtest_profiler;
41
c2d7786e 42static Lisp_Object
3d80c99f
SM
43make_log (int heap_size, int max_stack_depth)
44{
45 /* We use a standard Elisp hash-table object, but we use it in
46 a special way. This is OK as long as the object is not exposed
47 to Elisp, i.e. until it is returned by *-profiler-log, after which
48 it can't be used any more. */
b7432bb2
SM
49 Lisp_Object log = make_hash_table (hashtest_profiler,
50 make_number (heap_size),
3d80c99f
SM
51 make_float (DEFAULT_REHASH_SIZE),
52 make_float (DEFAULT_REHASH_THRESHOLD),
b7432bb2 53 Qnil);
3d80c99f
SM
54 struct Lisp_Hash_Table *h = XHASH_TABLE (log);
55
56 /* What is special about our hash-tables is that the keys are pre-filled
57 with the vectors we'll put in them. */
58 int i = ASIZE (h->key_and_value) / 2;
908589fd 59 while (i > 0)
3d80c99f
SM
60 set_hash_key_slot (h, --i,
61 Fmake_vector (make_number (max_stack_depth), Qnil));
62 return log;
c2d7786e
TM
63}
64
3d80c99f 65/* Evict the least used half of the hash_table.
c2d7786e 66
3d80c99f
SM
67 When the table is full, we have to evict someone.
68 The easiest and most efficient is to evict the value we're about to add
69 (i.e. once the table is full, stop sampling).
c2d7786e 70
3d80c99f
SM
71 We could also pick the element with the lowest count and evict it,
72 but finding it is O(N) and for that amount of work we get very
73 little in return: for the next sample, this latest sample will have
74 count==1 and will hence be a prime candidate for eviction :-(
c2d7786e 75
3d80c99f
SM
76 So instead, we take O(N) time to eliminate more or less half of the
77 entries (the half with the lowest counts). So we get an amortized
78 cost of O(1) and we get O(N) time for a new entry to grow larger
79 than the other least counts before a new round of eviction. */
c2d7786e 80
3d80c99f
SM
81static EMACS_INT approximate_median (log_t *log,
82 ptrdiff_t start, ptrdiff_t size)
c2d7786e 83{
3d80c99f
SM
84 eassert (size > 0);
85 if (size < 2)
86 return XINT (HASH_VALUE (log, start));
87 if (size < 3)
88 /* Not an actual median, but better for our application than
89 choosing either of the two numbers. */
90 return ((XINT (HASH_VALUE (log, start))
91 + XINT (HASH_VALUE (log, start + 1)))
92 / 2);
c2d7786e 93 else
c2d7786e 94 {
3d80c99f
SM
95 ptrdiff_t newsize = size / 3;
96 ptrdiff_t start2 = start + newsize;
97 EMACS_INT i1 = approximate_median (log, start, newsize);
98 EMACS_INT i2 = approximate_median (log, start2, newsize);
99 EMACS_INT i3 = approximate_median (log, start2 + newsize,
100 size - 2 * newsize);
101 return (i1 < i2
102 ? (i2 < i3 ? i2 : (i1 < i3 ? i3 : i1))
103 : (i1 < i3 ? i1 : (i2 < i3 ? i3 : i2)));
c2d7786e 104 }
c2d7786e
TM
105}
106
3d80c99f 107static void evict_lower_half (log_t *log)
c2d7786e 108{
3d80c99f
SM
109 ptrdiff_t size = ASIZE (log->key_and_value) / 2;
110 EMACS_INT median = approximate_median (log, 0, size);
111 ptrdiff_t i;
c2d7786e 112
c2d7786e 113 for (i = 0; i < size; i++)
3d80c99f
SM
114 /* Evict not only values smaller but also values equal to the median,
115 so as to make sure we evict something no matter what. */
116 if (XINT (HASH_VALUE (log, i)) <= median)
117 {
118 Lisp_Object key = HASH_KEY (log, i);
119 { /* FIXME: we could make this more efficient. */
120 Lisp_Object tmp;
121 XSET_HASH_TABLE (tmp, log); /* FIXME: Use make_lisp_ptr. */
122 Fremhash (key, tmp);
123 }
124 eassert (EQ (log->next_free, make_number (i)));
125 {
126 int j;
127 eassert (VECTORP (key));
128 for (j = 0; j < ASIZE (key); j++)
ad942b63 129 ASET (key, j, Qnil);
3d80c99f
SM
130 }
131 set_hash_key_slot (log, i, key);
132 }
c2d7786e
TM
133}
134
d89460ed 135/* Record the current backtrace in LOG. COUNT is the weight of this
b3ecad33
PE
136 current backtrace: interrupt counts for CPU, and the allocation
137 size for memory. */
0efc778b 138
c2d7786e 139static void
d89460ed 140record_backtrace (log_t *log, EMACS_INT count)
c2d7786e 141{
3d80c99f 142 Lisp_Object backtrace;
2f592f95 143 ptrdiff_t index;
c2d7786e 144
3d80c99f 145 if (!INTEGERP (log->next_free))
611b7507
JB
146 /* FIXME: transfer the evicted counts to a special entry rather
147 than dropping them on the floor. */
3d80c99f
SM
148 evict_lower_half (log);
149 index = XINT (log->next_free);
c2d7786e 150
3d80c99f
SM
151 /* Get a "working memory" vector. */
152 backtrace = HASH_KEY (log, index);
2f592f95 153 get_backtrace (backtrace);
c2d7786e 154
3d80c99f
SM
155 { /* We basically do a `gethash+puthash' here, except that we have to be
156 careful to avoid memory allocation since we're in a signal
157 handler, and we optimize the code to try and avoid computing the
158 hash+lookup twice. See fns.c:Fputhash for reference. */
159 EMACS_UINT hash;
160 ptrdiff_t j = hash_lookup (log, backtrace, &hash);
161 if (j >= 0)
d89460ed
PE
162 {
163 EMACS_INT old_val = XINT (HASH_VALUE (log, j));
164 EMACS_INT new_val = saturated_add (old_val, count);
165 set_hash_value_slot (log, j, make_number (new_val));
166 }
3d80c99f
SM
167 else
168 { /* BEWARE! hash_put in general can allocate memory.
169 But currently it only does that if log->next_free is nil. */
170 int j;
171 eassert (!NILP (log->next_free));
172 j = hash_put (log, backtrace, make_number (count), hash);
173 /* Let's make sure we've put `backtrace' right where it
174 already was to start with. */
175 eassert (index == j);
176
177 /* FIXME: If the hash-table is almost full, we should set
178 some global flag so that some Elisp code can offload its
611b7507
JB
179 data elsewhere, so as to avoid the eviction code.
180 There are 2 ways to do that, AFAICT:
181 - Set a flag checked in QUIT, such that QUIT can then call
182 Fprofiler_cpu_log and stash the full log for later use.
183 - Set a flag check in post-gc-hook, so that Elisp code can call
184 profiler-cpu-log. That gives us more flexibility since that
185 Elisp code can then do all kinds of fun stuff like write
186 the log to disk. Or turn it right away into a call tree.
187 Of course, using Elisp is generally preferable, but it may
188 take longer until we get a chance to run the Elisp code, so
189 there's more risk that the table will get full before we
190 get there. */
3d80c99f
SM
191 }
192 }
c2d7786e 193}
c2d7786e 194\f
c22bac2c 195/* Sampling profiler. */
c2d7786e 196
d89460ed
PE
197#ifdef PROFILER_CPU_SUPPORT
198
199/* The profiler timer and whether it was properly initialized, if
200 POSIX timers are available. */
2b794d69 201#ifdef HAVE_ITIMERSPEC
d89460ed
PE
202static timer_t profiler_timer;
203static bool profiler_timer_ok;
204#endif
ad942b63 205
d89460ed
PE
206/* Status of sampling profiler. */
207static enum profiler_cpu_running
208 { NOT_RUNNING, TIMER_SETTIME_RUNNING, SETITIMER_RUNNING }
209 profiler_cpu_running;
6521894d 210
d89460ed 211/* Hash-table log of CPU profiler. */
3d80c99f 212static Lisp_Object cpu_log;
d89460ed 213
3d80c99f
SM
214/* Separate counter for the time spent in the GC. */
215static EMACS_INT cpu_gc_count;
0efc778b 216
b3ecad33 217/* The current sampling interval in nanoseconds. */
c22bac2c 218static EMACS_INT current_sampling_interval;
c2d7786e 219
c22bac2c 220/* Signal handler for sampling profiler. */
6521894d
SM
221
222static void
d89460ed 223handle_profiler_signal (int signal)
6521894d 224{
2f592f95 225 if (EQ (backtrace_top_function (), Qautomatic_gc))
6521894d
SM
226 /* Special case the time-count inside GC because the hash-table
227 code is not prepared to be used while the GC is running.
228 More specifically it uses ASIZE at many places where it does
229 not expect the ARRAY_MARK_FLAG to be set. We could try and
230 harden the hash-table code, but it doesn't seem worth the
231 effort. */
b3ecad33 232 cpu_gc_count = saturated_add (cpu_gc_count, 1);
6521894d 233 else
d89460ed 234 {
b3ecad33 235 EMACS_INT count = 1;
2b794d69 236#ifdef HAVE_ITIMERSPEC
b3ecad33
PE
237 if (profiler_timer_ok)
238 {
239 int overruns = timer_getoverrun (profiler_timer);
908589fd 240 eassert (overruns >= 0);
b3ecad33
PE
241 count += overruns;
242 }
243#endif
d89460ed 244 eassert (HASH_TABLE_P (cpu_log));
b3ecad33 245 record_backtrace (XHASH_TABLE (cpu_log), count);
d89460ed 246 }
6521894d
SM
247}
248
704d3f45 249static void
d89460ed
PE
250deliver_profiler_signal (int signal)
251{
252 deliver_process_signal (signal, handle_profiler_signal);
253}
254
255static enum profiler_cpu_running
c22bac2c 256setup_cpu_timer (Lisp_Object sampling_interval)
704d3f45 257{
d89460ed
PE
258 struct sigaction action;
259 struct itimerval timer;
260 struct timespec interval;
b3ecad33 261 int billion = 1000000000;
d89460ed 262
c22bac2c 263 if (! RANGED_INTEGERP (1, sampling_interval,
b3ecad33
PE
264 (TYPE_MAXIMUM (time_t) < EMACS_INT_MAX / billion
265 ? ((EMACS_INT) TYPE_MAXIMUM (time_t) * billion
266 + (billion - 1))
d89460ed
PE
267 : EMACS_INT_MAX)))
268 return NOT_RUNNING;
269
c22bac2c 270 current_sampling_interval = XINT (sampling_interval);
43aac990
PE
271 interval = make_timespec (current_sampling_interval / billion,
272 current_sampling_interval % billion);
d89460ed
PE
273 emacs_sigaction_init (&action, deliver_profiler_signal);
274 sigaction (SIGPROF, &action, 0);
275
2b794d69 276#ifdef HAVE_ITIMERSPEC
d89460ed
PE
277 if (! profiler_timer_ok)
278 {
279 /* System clocks to try, in decreasing order of desirability. */
280 static clockid_t const system_clock[] = {
281#ifdef CLOCK_THREAD_CPUTIME_ID
282 CLOCK_THREAD_CPUTIME_ID,
283#endif
284#ifdef CLOCK_PROCESS_CPUTIME_ID
285 CLOCK_PROCESS_CPUTIME_ID,
286#endif
287#ifdef CLOCK_MONOTONIC
288 CLOCK_MONOTONIC,
289#endif
290 CLOCK_REALTIME
291 };
292 int i;
293 struct sigevent sigev;
294 sigev.sigev_value.sival_ptr = &profiler_timer;
295 sigev.sigev_signo = SIGPROF;
296 sigev.sigev_notify = SIGEV_SIGNAL;
297
faa52174 298 for (i = 0; i < ARRAYELTS (system_clock); i++)
d89460ed
PE
299 if (timer_create (system_clock[i], &sigev, &profiler_timer) == 0)
300 {
301 profiler_timer_ok = 1;
302 break;
303 }
304 }
305
306 if (profiler_timer_ok)
307 {
308 struct itimerspec ispec;
309 ispec.it_value = ispec.it_interval = interval;
2b794d69
PE
310 if (timer_settime (profiler_timer, 0, &ispec, 0) == 0)
311 return TIMER_SETTIME_RUNNING;
d89460ed
PE
312 }
313#endif
314
2b794d69 315#ifdef HAVE_SETITIMER
d89460ed 316 timer.it_value = timer.it_interval = make_timeval (interval);
2b794d69
PE
317 if (setitimer (ITIMER_PROF, &timer, 0) == 0)
318 return SETITIMER_RUNNING;
319#endif
320
321 return NOT_RUNNING;
704d3f45
TM
322}
323
6521894d 324DEFUN ("profiler-cpu-start", Fprofiler_cpu_start, Sprofiler_cpu_start,
c2d7786e 325 1, 1, 0,
6521894d 326 doc: /* Start or restart the cpu profiler.
b3ecad33 327It takes call-stack samples each SAMPLING-INTERVAL nanoseconds, approximately.
6521894d 328See also `profiler-log-size' and `profiler-max-stack-depth'. */)
c22bac2c 329 (Lisp_Object sampling_interval)
c2d7786e 330{
6521894d 331 if (profiler_cpu_running)
c22bac2c 332 error ("CPU profiler is already running");
c2d7786e 333
3d80c99f
SM
334 if (NILP (cpu_log))
335 {
336 cpu_gc_count = 0;
6521894d 337 cpu_log = make_log (profiler_log_size,
3d80c99f
SM
338 profiler_max_stack_depth);
339 }
c2d7786e 340
c22bac2c 341 profiler_cpu_running = setup_cpu_timer (sampling_interval);
d89460ed 342 if (! profiler_cpu_running)
c22bac2c 343 error ("Invalid sampling interval");
c2d7786e
TM
344
345 return Qt;
346}
347
6521894d 348DEFUN ("profiler-cpu-stop", Fprofiler_cpu_stop, Sprofiler_cpu_stop,
c2d7786e 349 0, 0, 0,
234148bf
SM
350 doc: /* Stop the cpu profiler. The profiler log is not affected.
351Return non-nil if the profiler was running. */)
c2d7786e
TM
352 (void)
353{
d89460ed
PE
354 switch (profiler_cpu_running)
355 {
356 case NOT_RUNNING:
357 return Qnil;
358
2b794d69 359#ifdef HAVE_ITIMERSPEC
d89460ed
PE
360 case TIMER_SETTIME_RUNNING:
361 {
362 struct itimerspec disable;
363 memset (&disable, 0, sizeof disable);
364 timer_settime (profiler_timer, 0, &disable, 0);
365 }
366 break;
84f72efd 367#endif
c2d7786e 368
2b794d69 369#ifdef HAVE_SETITIMER
d89460ed
PE
370 case SETITIMER_RUNNING:
371 {
372 struct itimerval disable;
373 memset (&disable, 0, sizeof disable);
374 setitimer (ITIMER_PROF, &disable, 0);
375 }
376 break;
2b794d69 377#endif
d89460ed 378 }
c2d7786e 379
d89460ed
PE
380 signal (SIGPROF, SIG_IGN);
381 profiler_cpu_running = NOT_RUNNING;
c2d7786e
TM
382 return Qt;
383}
384
6521894d
SM
385DEFUN ("profiler-cpu-running-p",
386 Fprofiler_cpu_running_p, Sprofiler_cpu_running_p,
c2d7786e 387 0, 0, 0,
d136f184 388 doc: /* Return non-nil if cpu profiler is running. */)
c2d7786e
TM
389 (void)
390{
6521894d 391 return profiler_cpu_running ? Qt : Qnil;
c2d7786e
TM
392}
393
6521894d 394DEFUN ("profiler-cpu-log", Fprofiler_cpu_log, Sprofiler_cpu_log,
c2d7786e 395 0, 0, 0,
6521894d
SM
396 doc: /* Return the current cpu profiler log.
397The log is a hash-table mapping backtraces to counters which represent
398the amount of time spent at those points. Every backtrace is a vector
399of functions, where the last few elements may be nil.
400Before returning, a new log is allocated for future samples. */)
c2d7786e
TM
401 (void)
402{
3d80c99f 403 Lisp_Object result = cpu_log;
d89460ed 404 /* Here we're making the log visible to Elisp, so it's not safe any
3d80c99f
SM
405 more for our use afterwards since we can't rely on its special
406 pre-allocated keys anymore. So we have to allocate a new one. */
6521894d
SM
407 cpu_log = (profiler_cpu_running
408 ? make_log (profiler_log_size, profiler_max_stack_depth)
3d80c99f
SM
409 : Qnil);
410 Fputhash (Fmake_vector (make_number (1), Qautomatic_gc),
411 make_number (cpu_gc_count),
412 result);
413 cpu_gc_count = 0;
c2d7786e
TM
414 return result;
415}
d89460ed 416#endif /* PROFILER_CPU_SUPPORT */
c2d7786e 417\f
0efc778b 418/* Memory profiler. */
c2d7786e 419
6521894d
SM
420/* True if memory profiler is running. */
421bool profiler_memory_running;
422
3d80c99f 423static Lisp_Object memory_log;
c2d7786e 424
6521894d 425DEFUN ("profiler-memory-start", Fprofiler_memory_start, Sprofiler_memory_start,
c2d7786e 426 0, 0, 0,
6521894d
SM
427 doc: /* Start/restart the memory profiler.
428The memory profiler will take samples of the call-stack whenever a new
429allocation takes place. Note that most small allocations only trigger
430the profiler occasionally.
431See also `profiler-log-size' and `profiler-max-stack-depth'. */)
c2d7786e
TM
432 (void)
433{
6521894d 434 if (profiler_memory_running)
c2d7786e
TM
435 error ("Memory profiler is already running");
436
3d80c99f 437 if (NILP (memory_log))
6521894d 438 memory_log = make_log (profiler_log_size,
c2d7786e
TM
439 profiler_max_stack_depth);
440
234148bf 441 profiler_memory_running = true;
c2d7786e
TM
442
443 return Qt;
444}
445
6521894d
SM
446DEFUN ("profiler-memory-stop",
447 Fprofiler_memory_stop, Sprofiler_memory_stop,
c2d7786e 448 0, 0, 0,
234148bf
SM
449 doc: /* Stop the memory profiler. The profiler log is not affected.
450Return non-nil if the profiler was running. */)
c2d7786e
TM
451 (void)
452{
6521894d 453 if (!profiler_memory_running)
234148bf
SM
454 return Qnil;
455 profiler_memory_running = false;
c2d7786e
TM
456 return Qt;
457}
458
6521894d
SM
459DEFUN ("profiler-memory-running-p",
460 Fprofiler_memory_running_p, Sprofiler_memory_running_p,
c2d7786e 461 0, 0, 0,
6521894d 462 doc: /* Return non-nil if memory profiler is running. */)
c2d7786e
TM
463 (void)
464{
6521894d 465 return profiler_memory_running ? Qt : Qnil;
c2d7786e
TM
466}
467
6521894d
SM
468DEFUN ("profiler-memory-log",
469 Fprofiler_memory_log, Sprofiler_memory_log,
c2d7786e 470 0, 0, 0,
6521894d
SM
471 doc: /* Return the current memory profiler log.
472The log is a hash-table mapping backtraces to counters which represent
473the amount of memory allocated at those points. Every backtrace is a vector
474of functions, where the last few elements may be nil.
475Before returning, a new log is allocated for future samples. */)
c2d7786e
TM
476 (void)
477{
3d80c99f
SM
478 Lisp_Object result = memory_log;
479 /* Here we're making the log visible to Elisp , so it's not safe any
480 more for our use afterwards since we can't rely on its special
481 pre-allocated keys anymore. So we have to allocate a new one. */
6521894d
SM
482 memory_log = (profiler_memory_running
483 ? make_log (profiler_log_size, profiler_max_stack_depth)
3d80c99f 484 : Qnil);
c2d7786e
TM
485 return result;
486}
487
488\f
0efc778b 489/* Signals and probes. */
c2d7786e 490
0efc778b 491/* Record that the current backtrace allocated SIZE bytes. */
c2d7786e
TM
492void
493malloc_probe (size_t size)
494{
ad942b63 495 eassert (HASH_TABLE_P (memory_log));
d89460ed 496 record_backtrace (XHASH_TABLE (memory_log), min (size, MOST_POSITIVE_FIXNUM));
c2d7786e
TM
497}
498
b7432bb2
SM
499DEFUN ("function-equal", Ffunction_equal, Sfunction_equal, 2, 2, 0,
500 doc: /* Return non-nil if F1 and F2 come from the same source.
501Used to determine if different closures are just different instances of
502the same lambda expression, or are really unrelated function. */)
503 (Lisp_Object f1, Lisp_Object f2)
504{
505 bool res;
506 if (EQ (f1, f2))
507 res = true;
508 else if (COMPILEDP (f1) && COMPILEDP (f2))
509 res = EQ (AREF (f1, COMPILED_BYTECODE), AREF (f2, COMPILED_BYTECODE));
510 else if (CONSP (f1) && CONSP (f2) && CONSP (XCDR (f1)) && CONSP (XCDR (f2))
511 && EQ (Qclosure, XCAR (f1))
512 && EQ (Qclosure, XCAR (f2)))
513 res = EQ (XCDR (XCDR (f1)), XCDR (XCDR (f2)));
514 else
515 res = false;
516 return res ? Qt : Qnil;
517}
518
519static bool
520cmpfn_profiler (struct hash_table_test *t,
521 Lisp_Object bt1, Lisp_Object bt2)
522{
523 if (VECTORP (bt1) && VECTORP (bt2))
524 {
525 ptrdiff_t i, l = ASIZE (bt1);
526 if (l != ASIZE (bt2))
527 return false;
528 for (i = 0; i < l; i++)
529 if (NILP (Ffunction_equal (AREF (bt1, i), AREF (bt2, i))))
530 return false;
531 return true;
532 }
533 else
534 return EQ (bt1, bt2);
535}
536
537static EMACS_UINT
538hashfn_profiler (struct hash_table_test *ht, Lisp_Object bt)
539{
540 if (VECTORP (bt))
541 {
542 EMACS_UINT hash = 0;
543 ptrdiff_t i, l = ASIZE (bt);
544 for (i = 0; i < l; i++)
545 {
546 Lisp_Object f = AREF (bt, i);
547 EMACS_UINT hash1
61ddb1b9 548 = (COMPILEDP (f) ? XHASH (AREF (f, COMPILED_BYTECODE))
b7432bb2 549 : (CONSP (f) && CONSP (XCDR (f)) && EQ (Qclosure, XCAR (f)))
61ddb1b9 550 ? XHASH (XCDR (XCDR (f))) : XHASH (f));
04a2d0d3 551 hash = sxhash_combine (hash, hash1);
b7432bb2 552 }
eff1c190 553 return SXHASH_REDUCE (hash);
b7432bb2
SM
554 }
555 else
61ddb1b9 556 return XHASH (bt);
b7432bb2
SM
557}
558
c2d7786e
TM
559void
560syms_of_profiler (void)
561{
fe6aa7a1
BT
562#include "profiler.x"
563
c2d7786e 564 DEFVAR_INT ("profiler-max-stack-depth", profiler_max_stack_depth,
6521894d 565 doc: /* Number of elements from the call-stack recorded in the log. */);
c2d7786e 566 profiler_max_stack_depth = 16;
6521894d
SM
567 DEFVAR_INT ("profiler-log-size", profiler_log_size,
568 doc: /* Number of distinct call-stacks that can be recorded in a profiler log.
569If the log gets full, some of the least-seen call-stacks will be evicted
570to make room for new entries. */);
571 profiler_log_size = 10000;
c2d7786e 572
b782773b 573 DEFSYM (Qautomatic_gc, "Automatic GC");
b7432bb2 574 DEFSYM (Qprofiler_backtrace_equal, "profiler-backtrace-equal");
29abe551
PE
575
576 hashtest_profiler.name = Qprofiler_backtrace_equal;
577 hashtest_profiler.user_hash_function = Qnil;
578 hashtest_profiler.user_cmp_function = Qnil;
579 hashtest_profiler.cmpfn = cmpfn_profiler;
580 hashtest_profiler.hashfn = hashfn_profiler;
b7432bb2 581
ad942b63 582#ifdef PROFILER_CPU_SUPPORT
d89460ed 583 profiler_cpu_running = NOT_RUNNING;
ad942b63
SM
584 cpu_log = Qnil;
585 staticpro (&cpu_log);
ad942b63 586#endif
234148bf 587 profiler_memory_running = false;
ad942b63
SM
588 memory_log = Qnil;
589 staticpro (&memory_log);
c2d7786e 590}