Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include "util.h"
3#include "debug.h"
4#include "event.h"
5#include <api/fs/fs.h>
6#include <sys/stat.h>
7#include <sys/utsname.h>
8#include <dirent.h>
9#include <fcntl.h>
10#include <inttypes.h>
11#include <signal.h>
12#include <stdio.h>
13#include <stdlib.h>
14#include <string.h>
15#include <errno.h>
16#include <limits.h>
17#include <linux/capability.h>
18#include <linux/kernel.h>
19#include <linux/log2.h>
20#include <linux/time64.h>
21#include <linux/overflow.h>
22#include <unistd.h>
23#include "cap.h"
24#include "strlist.h"
25#include "string2.h"
26
27/*
28 * XXX We need to find a better place for these things...
29 */
30
31bool perf_singlethreaded = true;
32
33void perf_set_singlethreaded(void)
34{
35 perf_singlethreaded = true;
36}
37
38void perf_set_multithreaded(void)
39{
40 perf_singlethreaded = false;
41}
42
43int sysctl_perf_event_max_stack = PERF_MAX_STACK_DEPTH;
44int sysctl_perf_event_max_contexts_per_stack = PERF_MAX_CONTEXTS_PER_STACK;
45
46int sysctl__max_stack(void)
47{
48 int value;
49
50 if (sysctl__read_int("kernel/perf_event_max_stack", &value) == 0)
51 sysctl_perf_event_max_stack = value;
52
53 if (sysctl__read_int("kernel/perf_event_max_contexts_per_stack", &value) == 0)
54 sysctl_perf_event_max_contexts_per_stack = value;
55
56 return sysctl_perf_event_max_stack;
57}
58
59bool sysctl__nmi_watchdog_enabled(void)
60{
61 static bool cached;
62 static bool nmi_watchdog;
63 int value;
64
65 if (cached)
66 return nmi_watchdog;
67
68 if (sysctl__read_int("kernel/nmi_watchdog", &value) < 0)
69 return false;
70
71 nmi_watchdog = (value > 0) ? true : false;
72 cached = true;
73
74 return nmi_watchdog;
75}
76
77bool test_attr__enabled;
78
79bool perf_host = true;
80bool perf_guest = false;
81
82void event_attr_init(struct perf_event_attr *attr)
83{
84 if (!perf_host)
85 attr->exclude_host = 1;
86 if (!perf_guest)
87 attr->exclude_guest = 1;
88 /* to capture ABI version */
89 attr->size = sizeof(*attr);
90}
91
92int mkdir_p(char *path, mode_t mode)
93{
94 struct stat st;
95 int err;
96 char *d = path;
97
98 if (*d != '/')
99 return -1;
100
101 if (stat(path, &st) == 0)
102 return 0;
103
104 while (*++d == '/');
105
106 while ((d = strchr(d, '/'))) {
107 *d = '\0';
108 err = stat(path, &st) && mkdir(path, mode);
109 *d++ = '/';
110 if (err)
111 return -1;
112 while (*d == '/')
113 ++d;
114 }
115 return (stat(path, &st) && mkdir(path, mode)) ? -1 : 0;
116}
117
118static bool match_pat(char *file, const char **pat)
119{
120 int i = 0;
121
122 if (!pat)
123 return true;
124
125 while (pat[i]) {
126 if (strglobmatch(file, pat[i]))
127 return true;
128
129 i++;
130 }
131
132 return false;
133}
134
135/*
136 * The depth specify how deep the removal will go.
137 * 0 - will remove only files under the 'path' directory
138 * 1 .. x - will dive in x-level deep under the 'path' directory
139 *
140 * If specified the pat is array of string patterns ended with NULL,
141 * which are checked upon every file/directory found. Only matching
142 * ones are removed.
143 *
144 * The function returns:
145 * 0 on success
146 * -1 on removal failure with errno set
147 * -2 on pattern failure
148 */
149static int rm_rf_depth_pat(const char *path, int depth, const char **pat)
150{
151 DIR *dir;
152 int ret;
153 struct dirent *d;
154 char namebuf[PATH_MAX];
155 struct stat statbuf;
156
157 /* Do not fail if there's no file. */
158 ret = lstat(path, &statbuf);
159 if (ret)
160 return 0;
161
162 /* Try to remove any file we get. */
163 if (!(statbuf.st_mode & S_IFDIR))
164 return unlink(path);
165
166 /* We have directory in path. */
167 dir = opendir(path);
168 if (dir == NULL)
169 return -1;
170
171 while ((d = readdir(dir)) != NULL && !ret) {
172
173 if (!strcmp(d->d_name, ".") || !strcmp(d->d_name, ".."))
174 continue;
175
176 if (!match_pat(d->d_name, pat)) {
177 ret = -2;
178 break;
179 }
180
181 scnprintf(namebuf, sizeof(namebuf), "%s/%s",
182 path, d->d_name);
183
184 /* We have to check symbolic link itself */
185 ret = lstat(namebuf, &statbuf);
186 if (ret < 0) {
187 pr_debug("stat failed: %s\n", namebuf);
188 break;
189 }
190
191 if (S_ISDIR(statbuf.st_mode))
192 ret = depth ? rm_rf_depth_pat(namebuf, depth - 1, pat) : 0;
193 else
194 ret = unlink(namebuf);
195 }
196 closedir(dir);
197
198 if (ret < 0)
199 return ret;
200
201 return rmdir(path);
202}
203
204static int rm_rf_a_kcore_dir(const char *path, const char *name)
205{
206 char kcore_dir_path[PATH_MAX];
207 const char *pat[] = {
208 "kcore",
209 "kallsyms",
210 "modules",
211 NULL,
212 };
213
214 snprintf(kcore_dir_path, sizeof(kcore_dir_path), "%s/%s", path, name);
215
216 return rm_rf_depth_pat(kcore_dir_path, 0, pat);
217}
218
219static bool kcore_dir_filter(const char *name __maybe_unused, struct dirent *d)
220{
221 const char *pat[] = {
222 "kcore_dir",
223 "kcore_dir__[1-9]*",
224 NULL,
225 };
226
227 return match_pat(d->d_name, pat);
228}
229
230static int rm_rf_kcore_dir(const char *path)
231{
232 struct strlist *kcore_dirs;
233 struct str_node *nd;
234 int ret;
235
236 kcore_dirs = lsdir(path, kcore_dir_filter);
237
238 if (!kcore_dirs)
239 return 0;
240
241 strlist__for_each_entry(nd, kcore_dirs) {
242 ret = rm_rf_a_kcore_dir(path, nd->s);
243 if (ret)
244 return ret;
245 }
246
247 strlist__delete(kcore_dirs);
248
249 return 0;
250}
251
252int rm_rf_perf_data(const char *path)
253{
254 const char *pat[] = {
255 "data",
256 "data.*",
257 NULL,
258 };
259
260 rm_rf_kcore_dir(path);
261
262 return rm_rf_depth_pat(path, 0, pat);
263}
264
265int rm_rf(const char *path)
266{
267 return rm_rf_depth_pat(path, INT_MAX, NULL);
268}
269
270/* A filter which removes dot files */
271bool lsdir_no_dot_filter(const char *name __maybe_unused, struct dirent *d)
272{
273 return d->d_name[0] != '.';
274}
275
276/* lsdir reads a directory and store it in strlist */
277struct strlist *lsdir(const char *name,
278 bool (*filter)(const char *, struct dirent *))
279{
280 struct strlist *list = NULL;
281 DIR *dir;
282 struct dirent *d;
283
284 dir = opendir(name);
285 if (!dir)
286 return NULL;
287
288 list = strlist__new(NULL, NULL);
289 if (!list) {
290 errno = ENOMEM;
291 goto out;
292 }
293
294 while ((d = readdir(dir)) != NULL) {
295 if (!filter || filter(name, d))
296 strlist__add(list, d->d_name);
297 }
298
299out:
300 closedir(dir);
301 return list;
302}
303
304size_t hex_width(u64 v)
305{
306 size_t n = 1;
307
308 while ((v >>= 4))
309 ++n;
310
311 return n;
312}
313
314int perf_event_paranoid(void)
315{
316 int value;
317
318 if (sysctl__read_int("kernel/perf_event_paranoid", &value))
319 return INT_MAX;
320
321 return value;
322}
323
324bool perf_event_paranoid_check(int max_level)
325{
326 return perf_cap__capable(CAP_SYS_ADMIN) ||
327 perf_cap__capable(CAP_PERFMON) ||
328 perf_event_paranoid() <= max_level;
329}
330
331static int
332fetch_ubuntu_kernel_version(unsigned int *puint)
333{
334 ssize_t len;
335 size_t line_len = 0;
336 char *ptr, *line = NULL;
337 int version, patchlevel, sublevel, err;
338 FILE *vsig;
339
340 if (!puint)
341 return 0;
342
343 vsig = fopen("/proc/version_signature", "r");
344 if (!vsig) {
345 pr_debug("Open /proc/version_signature failed: %s\n",
346 strerror(errno));
347 return -1;
348 }
349
350 len = getline(&line, &line_len, vsig);
351 fclose(vsig);
352 err = -1;
353 if (len <= 0) {
354 pr_debug("Reading from /proc/version_signature failed: %s\n",
355 strerror(errno));
356 goto errout;
357 }
358
359 ptr = strrchr(line, ' ');
360 if (!ptr) {
361 pr_debug("Parsing /proc/version_signature failed: %s\n", line);
362 goto errout;
363 }
364
365 err = sscanf(ptr + 1, "%d.%d.%d",
366 &version, &patchlevel, &sublevel);
367 if (err != 3) {
368 pr_debug("Unable to get kernel version from /proc/version_signature '%s'\n",
369 line);
370 goto errout;
371 }
372
373 *puint = (version << 16) + (patchlevel << 8) + sublevel;
374 err = 0;
375errout:
376 free(line);
377 return err;
378}
379
380int
381fetch_kernel_version(unsigned int *puint, char *str,
382 size_t str_size)
383{
384 struct utsname utsname;
385 int version, patchlevel, sublevel, err;
386 bool int_ver_ready = false;
387
388 if (access("/proc/version_signature", R_OK) == 0)
389 if (!fetch_ubuntu_kernel_version(puint))
390 int_ver_ready = true;
391
392 if (uname(&utsname))
393 return -1;
394
395 if (str && str_size) {
396 strncpy(str, utsname.release, str_size);
397 str[str_size - 1] = '\0';
398 }
399
400 if (!puint || int_ver_ready)
401 return 0;
402
403 err = sscanf(utsname.release, "%d.%d.%d",
404 &version, &patchlevel, &sublevel);
405
406 if (err != 3) {
407 pr_debug("Unable to get kernel version from uname '%s'\n",
408 utsname.release);
409 return -1;
410 }
411
412 *puint = (version << 16) + (patchlevel << 8) + sublevel;
413 return 0;
414}
415
416int perf_tip(char **strp, const char *dirpath)
417{
418 struct strlist *tips;
419 struct str_node *node;
420 struct strlist_config conf = {
421 .dirname = dirpath,
422 .file_only = true,
423 };
424 int ret = 0;
425
426 *strp = NULL;
427 tips = strlist__new("tips.txt", &conf);
428 if (tips == NULL)
429 return -errno;
430
431 if (strlist__nr_entries(tips) == 0)
432 goto out;
433
434 node = strlist__entry(tips, random() % strlist__nr_entries(tips));
435 if (asprintf(strp, "Tip: %s", node->s) < 0)
436 ret = -ENOMEM;
437
438out:
439 strlist__delete(tips);
440
441 return ret;
442}
443
444char *perf_exe(char *buf, int len)
445{
446 int n = readlink("/proc/self/exe", buf, len);
447 if (n > 0) {
448 buf[n] = 0;
449 return buf;
450 }
451 return strcpy(buf, "perf");
452}
453
454void perf_debuginfod_setup(struct perf_debuginfod *di)
455{
456 /*
457 * By default '!di->set' we clear DEBUGINFOD_URLS, so debuginfod
458 * processing is not triggered, otherwise we set it to 'di->urls'
459 * value. If 'di->urls' is "system" we keep DEBUGINFOD_URLS value.
460 */
461 if (!di->set)
462 setenv("DEBUGINFOD_URLS", "", 1);
463 else if (di->urls && strcmp(di->urls, "system"))
464 setenv("DEBUGINFOD_URLS", di->urls, 1);
465
466 pr_debug("DEBUGINFOD_URLS=%s\n", getenv("DEBUGINFOD_URLS"));
467
468#ifndef HAVE_DEBUGINFOD_SUPPORT
469 if (di->set)
470 pr_warning("WARNING: debuginfod support requested, but perf is not built with it\n");
471#endif
472}
473
474/*
475 * Return a new filename prepended with task's root directory if it's in
476 * a chroot. Callers should free the returned string.
477 */
478char *filename_with_chroot(int pid, const char *filename)
479{
480 char buf[PATH_MAX];
481 char proc_root[32];
482 char *new_name = NULL;
483 int ret;
484
485 scnprintf(proc_root, sizeof(proc_root), "/proc/%d/root", pid);
486 ret = readlink(proc_root, buf, sizeof(buf) - 1);
487 if (ret <= 0)
488 return NULL;
489
490 /* readlink(2) does not append a null byte to buf */
491 buf[ret] = '\0';
492
493 if (!strcmp(buf, "/"))
494 return NULL;
495
496 if (strstr(buf, "(deleted)"))
497 return NULL;
498
499 if (asprintf(&new_name, "%s/%s", buf, filename) < 0)
500 return NULL;
501
502 return new_name;
503}
504
505/*
506 * Reallocate an array *arr of size *arr_sz so that it is big enough to contain
507 * x elements of size msz, initializing new entries to *init_val or zero if
508 * init_val is NULL
509 */
510int do_realloc_array_as_needed(void **arr, size_t *arr_sz, size_t x, size_t msz, const void *init_val)
511{
512 size_t new_sz = *arr_sz;
513 void *new_arr;
514 size_t i;
515
516 if (!new_sz)
517 new_sz = msz >= 64 ? 1 : roundup(64, msz); /* Start with at least 64 bytes */
518 while (x >= new_sz) {
519 if (check_mul_overflow(new_sz, (size_t)2, &new_sz))
520 return -ENOMEM;
521 }
522 if (new_sz == *arr_sz)
523 return 0;
524 new_arr = calloc(new_sz, msz);
525 if (!new_arr)
526 return -ENOMEM;
527 memcpy(new_arr, *arr, *arr_sz * msz);
528 if (init_val) {
529 for (i = *arr_sz; i < new_sz; i++)
530 memcpy(new_arr + (i * msz), init_val, msz);
531 }
532 *arr = new_arr;
533 *arr_sz = new_sz;
534 return 0;
535}
1#include "../perf.h"
2#include "util.h"
3#include <api/fs/fs.h>
4#include <sys/mman.h>
5#ifdef HAVE_BACKTRACE_SUPPORT
6#include <execinfo.h>
7#endif
8#include <stdio.h>
9#include <stdlib.h>
10#include <string.h>
11#include <errno.h>
12#include <limits.h>
13#include <byteswap.h>
14#include <linux/kernel.h>
15
16/*
17 * XXX We need to find a better place for these things...
18 */
19unsigned int page_size;
20
21bool test_attr__enabled;
22
23bool perf_host = true;
24bool perf_guest = false;
25
26char tracing_events_path[PATH_MAX + 1] = "/sys/kernel/debug/tracing/events";
27
28void event_attr_init(struct perf_event_attr *attr)
29{
30 if (!perf_host)
31 attr->exclude_host = 1;
32 if (!perf_guest)
33 attr->exclude_guest = 1;
34 /* to capture ABI version */
35 attr->size = sizeof(*attr);
36}
37
38int mkdir_p(char *path, mode_t mode)
39{
40 struct stat st;
41 int err;
42 char *d = path;
43
44 if (*d != '/')
45 return -1;
46
47 if (stat(path, &st) == 0)
48 return 0;
49
50 while (*++d == '/');
51
52 while ((d = strchr(d, '/'))) {
53 *d = '\0';
54 err = stat(path, &st) && mkdir(path, mode);
55 *d++ = '/';
56 if (err)
57 return -1;
58 while (*d == '/')
59 ++d;
60 }
61 return (stat(path, &st) && mkdir(path, mode)) ? -1 : 0;
62}
63
64static int slow_copyfile(const char *from, const char *to, mode_t mode)
65{
66 int err = -1;
67 char *line = NULL;
68 size_t n;
69 FILE *from_fp = fopen(from, "r"), *to_fp;
70 mode_t old_umask;
71
72 if (from_fp == NULL)
73 goto out;
74
75 old_umask = umask(mode ^ 0777);
76 to_fp = fopen(to, "w");
77 umask(old_umask);
78 if (to_fp == NULL)
79 goto out_fclose_from;
80
81 while (getline(&line, &n, from_fp) > 0)
82 if (fputs(line, to_fp) == EOF)
83 goto out_fclose_to;
84 err = 0;
85out_fclose_to:
86 fclose(to_fp);
87 free(line);
88out_fclose_from:
89 fclose(from_fp);
90out:
91 return err;
92}
93
94int copyfile_mode(const char *from, const char *to, mode_t mode)
95{
96 int fromfd, tofd;
97 struct stat st;
98 void *addr;
99 int err = -1;
100
101 if (stat(from, &st))
102 goto out;
103
104 if (st.st_size == 0) /* /proc? do it slowly... */
105 return slow_copyfile(from, to, mode);
106
107 fromfd = open(from, O_RDONLY);
108 if (fromfd < 0)
109 goto out;
110
111 tofd = creat(to, mode);
112 if (tofd < 0)
113 goto out_close_from;
114
115 addr = mmap(NULL, st.st_size, PROT_READ, MAP_PRIVATE, fromfd, 0);
116 if (addr == MAP_FAILED)
117 goto out_close_to;
118
119 if (write(tofd, addr, st.st_size) == st.st_size)
120 err = 0;
121
122 munmap(addr, st.st_size);
123out_close_to:
124 close(tofd);
125 if (err)
126 unlink(to);
127out_close_from:
128 close(fromfd);
129out:
130 return err;
131}
132
133int copyfile(const char *from, const char *to)
134{
135 return copyfile_mode(from, to, 0755);
136}
137
138unsigned long convert_unit(unsigned long value, char *unit)
139{
140 *unit = ' ';
141
142 if (value > 1000) {
143 value /= 1000;
144 *unit = 'K';
145 }
146
147 if (value > 1000) {
148 value /= 1000;
149 *unit = 'M';
150 }
151
152 if (value > 1000) {
153 value /= 1000;
154 *unit = 'G';
155 }
156
157 return value;
158}
159
160static ssize_t ion(bool is_read, int fd, void *buf, size_t n)
161{
162 void *buf_start = buf;
163 size_t left = n;
164
165 while (left) {
166 ssize_t ret = is_read ? read(fd, buf, left) :
167 write(fd, buf, left);
168
169 if (ret <= 0)
170 return ret;
171
172 left -= ret;
173 buf += ret;
174 }
175
176 BUG_ON((size_t)(buf - buf_start) != n);
177 return n;
178}
179
180/*
181 * Read exactly 'n' bytes or return an error.
182 */
183ssize_t readn(int fd, void *buf, size_t n)
184{
185 return ion(true, fd, buf, n);
186}
187
188/*
189 * Write exactly 'n' bytes or return an error.
190 */
191ssize_t writen(int fd, void *buf, size_t n)
192{
193 return ion(false, fd, buf, n);
194}
195
196size_t hex_width(u64 v)
197{
198 size_t n = 1;
199
200 while ((v >>= 4))
201 ++n;
202
203 return n;
204}
205
206static int hex(char ch)
207{
208 if ((ch >= '0') && (ch <= '9'))
209 return ch - '0';
210 if ((ch >= 'a') && (ch <= 'f'))
211 return ch - 'a' + 10;
212 if ((ch >= 'A') && (ch <= 'F'))
213 return ch - 'A' + 10;
214 return -1;
215}
216
217/*
218 * While we find nice hex chars, build a long_val.
219 * Return number of chars processed.
220 */
221int hex2u64(const char *ptr, u64 *long_val)
222{
223 const char *p = ptr;
224 *long_val = 0;
225
226 while (*p) {
227 const int hex_val = hex(*p);
228
229 if (hex_val < 0)
230 break;
231
232 *long_val = (*long_val << 4) | hex_val;
233 p++;
234 }
235
236 return p - ptr;
237}
238
239/* Obtain a backtrace and print it to stdout. */
240#ifdef HAVE_BACKTRACE_SUPPORT
241void dump_stack(void)
242{
243 void *array[16];
244 size_t size = backtrace(array, ARRAY_SIZE(array));
245 char **strings = backtrace_symbols(array, size);
246 size_t i;
247
248 printf("Obtained %zd stack frames.\n", size);
249
250 for (i = 0; i < size; i++)
251 printf("%s\n", strings[i]);
252
253 free(strings);
254}
255#else
256void dump_stack(void) {}
257#endif
258
259void get_term_dimensions(struct winsize *ws)
260{
261 char *s = getenv("LINES");
262
263 if (s != NULL) {
264 ws->ws_row = atoi(s);
265 s = getenv("COLUMNS");
266 if (s != NULL) {
267 ws->ws_col = atoi(s);
268 if (ws->ws_row && ws->ws_col)
269 return;
270 }
271 }
272#ifdef TIOCGWINSZ
273 if (ioctl(1, TIOCGWINSZ, ws) == 0 &&
274 ws->ws_row && ws->ws_col)
275 return;
276#endif
277 ws->ws_row = 25;
278 ws->ws_col = 80;
279}
280
281static void set_tracing_events_path(const char *mountpoint)
282{
283 snprintf(tracing_events_path, sizeof(tracing_events_path), "%s/%s",
284 mountpoint, "tracing/events");
285}
286
287const char *perf_debugfs_mount(const char *mountpoint)
288{
289 const char *mnt;
290
291 mnt = debugfs_mount(mountpoint);
292 if (!mnt)
293 return NULL;
294
295 set_tracing_events_path(mnt);
296
297 return mnt;
298}
299
300void perf_debugfs_set_path(const char *mntpt)
301{
302 snprintf(debugfs_mountpoint, strlen(debugfs_mountpoint), "%s", mntpt);
303 set_tracing_events_path(mntpt);
304}
305
306static const char *find_debugfs(void)
307{
308 const char *path = perf_debugfs_mount(NULL);
309
310 if (!path)
311 fprintf(stderr, "Your kernel does not support the debugfs filesystem");
312
313 return path;
314}
315
316/*
317 * Finds the path to the debugfs/tracing
318 * Allocates the string and stores it.
319 */
320const char *find_tracing_dir(void)
321{
322 static char *tracing;
323 static int tracing_found;
324 const char *debugfs;
325
326 if (tracing_found)
327 return tracing;
328
329 debugfs = find_debugfs();
330 if (!debugfs)
331 return NULL;
332
333 tracing = malloc(strlen(debugfs) + 9);
334 if (!tracing)
335 return NULL;
336
337 sprintf(tracing, "%s/tracing", debugfs);
338
339 tracing_found = 1;
340 return tracing;
341}
342
343char *get_tracing_file(const char *name)
344{
345 const char *tracing;
346 char *file;
347
348 tracing = find_tracing_dir();
349 if (!tracing)
350 return NULL;
351
352 file = malloc(strlen(tracing) + strlen(name) + 2);
353 if (!file)
354 return NULL;
355
356 sprintf(file, "%s/%s", tracing, name);
357 return file;
358}
359
360void put_tracing_file(char *file)
361{
362 free(file);
363}
364
365int parse_nsec_time(const char *str, u64 *ptime)
366{
367 u64 time_sec, time_nsec;
368 char *end;
369
370 time_sec = strtoul(str, &end, 10);
371 if (*end != '.' && *end != '\0')
372 return -1;
373
374 if (*end == '.') {
375 int i;
376 char nsec_buf[10];
377
378 if (strlen(++end) > 9)
379 return -1;
380
381 strncpy(nsec_buf, end, 9);
382 nsec_buf[9] = '\0';
383
384 /* make it nsec precision */
385 for (i = strlen(nsec_buf); i < 9; i++)
386 nsec_buf[i] = '0';
387
388 time_nsec = strtoul(nsec_buf, &end, 10);
389 if (*end != '\0')
390 return -1;
391 } else
392 time_nsec = 0;
393
394 *ptime = time_sec * NSEC_PER_SEC + time_nsec;
395 return 0;
396}
397
398unsigned long parse_tag_value(const char *str, struct parse_tag *tags)
399{
400 struct parse_tag *i = tags;
401
402 while (i->tag) {
403 char *s;
404
405 s = strchr(str, i->tag);
406 if (s) {
407 unsigned long int value;
408 char *endptr;
409
410 value = strtoul(str, &endptr, 10);
411 if (s != endptr)
412 break;
413
414 if (value > ULONG_MAX / i->mult)
415 break;
416 value *= i->mult;
417 return value;
418 }
419 i++;
420 }
421
422 return (unsigned long) -1;
423}
424
425int filename__read_int(const char *filename, int *value)
426{
427 char line[64];
428 int fd = open(filename, O_RDONLY), err = -1;
429
430 if (fd < 0)
431 return -1;
432
433 if (read(fd, line, sizeof(line)) > 0) {
434 *value = atoi(line);
435 err = 0;
436 }
437
438 close(fd);
439 return err;
440}
441
442int filename__read_str(const char *filename, char **buf, size_t *sizep)
443{
444 size_t size = 0, alloc_size = 0;
445 void *bf = NULL, *nbf;
446 int fd, n, err = 0;
447
448 fd = open(filename, O_RDONLY);
449 if (fd < 0)
450 return -errno;
451
452 do {
453 if (size == alloc_size) {
454 alloc_size += BUFSIZ;
455 nbf = realloc(bf, alloc_size);
456 if (!nbf) {
457 err = -ENOMEM;
458 break;
459 }
460
461 bf = nbf;
462 }
463
464 n = read(fd, bf + size, alloc_size - size);
465 if (n < 0) {
466 if (size) {
467 pr_warning("read failed %d: %s\n",
468 errno, strerror(errno));
469 err = 0;
470 } else
471 err = -errno;
472
473 break;
474 }
475
476 size += n;
477 } while (n > 0);
478
479 if (!err) {
480 *sizep = size;
481 *buf = bf;
482 } else
483 free(bf);
484
485 close(fd);
486 return err;
487}
488
489const char *get_filename_for_perf_kvm(void)
490{
491 const char *filename;
492
493 if (perf_host && !perf_guest)
494 filename = strdup("perf.data.host");
495 else if (!perf_host && perf_guest)
496 filename = strdup("perf.data.guest");
497 else
498 filename = strdup("perf.data.kvm");
499
500 return filename;
501}
502
503int perf_event_paranoid(void)
504{
505 char path[PATH_MAX];
506 const char *procfs = procfs__mountpoint();
507 int value;
508
509 if (!procfs)
510 return INT_MAX;
511
512 scnprintf(path, PATH_MAX, "%s/sys/kernel/perf_event_paranoid", procfs);
513
514 if (filename__read_int(path, &value))
515 return INT_MAX;
516
517 return value;
518}
519
520void mem_bswap_32(void *src, int byte_size)
521{
522 u32 *m = src;
523 while (byte_size > 0) {
524 *m = bswap_32(*m);
525 byte_size -= sizeof(u32);
526 ++m;
527 }
528}
529
530void mem_bswap_64(void *src, int byte_size)
531{
532 u64 *m = src;
533
534 while (byte_size > 0) {
535 *m = bswap_64(*m);
536 byte_size -= sizeof(u64);
537 ++m;
538 }
539}