Linux Audio

Check our new training course

Loading...
v6.2
  1// SPDX-License-Identifier: GPL-2.0
  2#include "util.h"
  3#include "debug.h"
  4#include "event.h"
  5#include <api/fs/fs.h>
  6#include <sys/stat.h>
  7#include <sys/utsname.h>
  8#include <dirent.h>
  9#include <fcntl.h>
 10#include <inttypes.h>
 11#include <signal.h>
 12#include <stdio.h>
 13#include <stdlib.h>
 14#include <string.h>
 15#include <errno.h>
 16#include <limits.h>
 17#include <linux/capability.h>
 18#include <linux/kernel.h>
 19#include <linux/log2.h>
 20#include <linux/time64.h>
 21#include <linux/overflow.h>
 22#include <unistd.h>
 23#include "cap.h"
 24#include "strlist.h"
 25#include "string2.h"
 26
 27/*
 28 * XXX We need to find a better place for these things...
 29 */
 30
 
 
 31bool perf_singlethreaded = true;
 32
 33void perf_set_singlethreaded(void)
 34{
 35	perf_singlethreaded = true;
 36}
 37
 38void perf_set_multithreaded(void)
 39{
 40	perf_singlethreaded = false;
 41}
 42
 43int sysctl_perf_event_max_stack = PERF_MAX_STACK_DEPTH;
 44int sysctl_perf_event_max_contexts_per_stack = PERF_MAX_CONTEXTS_PER_STACK;
 45
 46int sysctl__max_stack(void)
 47{
 48	int value;
 49
 50	if (sysctl__read_int("kernel/perf_event_max_stack", &value) == 0)
 51		sysctl_perf_event_max_stack = value;
 52
 53	if (sysctl__read_int("kernel/perf_event_max_contexts_per_stack", &value) == 0)
 54		sysctl_perf_event_max_contexts_per_stack = value;
 55
 56	return sysctl_perf_event_max_stack;
 57}
 58
 59bool sysctl__nmi_watchdog_enabled(void)
 60{
 61	static bool cached;
 62	static bool nmi_watchdog;
 63	int value;
 64
 65	if (cached)
 66		return nmi_watchdog;
 67
 68	if (sysctl__read_int("kernel/nmi_watchdog", &value) < 0)
 69		return false;
 70
 71	nmi_watchdog = (value > 0) ? true : false;
 72	cached = true;
 73
 74	return nmi_watchdog;
 75}
 76
 77bool test_attr__enabled;
 78
 
 
 79bool perf_host  = true;
 80bool perf_guest = false;
 81
 82void event_attr_init(struct perf_event_attr *attr)
 83{
 
 
 
 
 
 
 84	if (!perf_host)
 85		attr->exclude_host  = 1;
 86	if (!perf_guest)
 87		attr->exclude_guest = 1;
 88	/* to capture ABI version */
 89	attr->size = sizeof(*attr);
 90}
 91
 92int mkdir_p(char *path, mode_t mode)
 93{
 94	struct stat st;
 95	int err;
 96	char *d = path;
 97
 98	if (*d != '/')
 99		return -1;
100
101	if (stat(path, &st) == 0)
102		return 0;
103
104	while (*++d == '/');
105
106	while ((d = strchr(d, '/'))) {
107		*d = '\0';
108		err = stat(path, &st) && mkdir(path, mode);
109		*d++ = '/';
110		if (err)
111			return -1;
112		while (*d == '/')
113			++d;
114	}
115	return (stat(path, &st) && mkdir(path, mode)) ? -1 : 0;
116}
117
118static bool match_pat(char *file, const char **pat)
119{
120	int i = 0;
121
122	if (!pat)
123		return true;
124
125	while (pat[i]) {
126		if (strglobmatch(file, pat[i]))
127			return true;
128
129		i++;
130	}
131
132	return false;
133}
134
135/*
136 * The depth specify how deep the removal will go.
137 * 0       - will remove only files under the 'path' directory
138 * 1 .. x  - will dive in x-level deep under the 'path' directory
139 *
140 * If specified the pat is array of string patterns ended with NULL,
141 * which are checked upon every file/directory found. Only matching
142 * ones are removed.
143 *
144 * The function returns:
145 *    0 on success
146 *   -1 on removal failure with errno set
147 *   -2 on pattern failure
148 */
149static int rm_rf_depth_pat(const char *path, int depth, const char **pat)
150{
151	DIR *dir;
152	int ret;
153	struct dirent *d;
154	char namebuf[PATH_MAX];
155	struct stat statbuf;
156
157	/* Do not fail if there's no file. */
158	ret = lstat(path, &statbuf);
159	if (ret)
160		return 0;
161
162	/* Try to remove any file we get. */
163	if (!(statbuf.st_mode & S_IFDIR))
164		return unlink(path);
165
166	/* We have directory in path. */
167	dir = opendir(path);
168	if (dir == NULL)
169		return -1;
170
171	while ((d = readdir(dir)) != NULL && !ret) {
172
173		if (!strcmp(d->d_name, ".") || !strcmp(d->d_name, ".."))
174			continue;
175
176		if (!match_pat(d->d_name, pat)) {
177			ret =  -2;
178			break;
179		}
180
181		scnprintf(namebuf, sizeof(namebuf), "%s/%s",
182			  path, d->d_name);
183
184		/* We have to check symbolic link itself */
185		ret = lstat(namebuf, &statbuf);
186		if (ret < 0) {
187			pr_debug("stat failed: %s\n", namebuf);
188			break;
189		}
190
191		if (S_ISDIR(statbuf.st_mode))
192			ret = depth ? rm_rf_depth_pat(namebuf, depth - 1, pat) : 0;
193		else
194			ret = unlink(namebuf);
195	}
196	closedir(dir);
197
198	if (ret < 0)
199		return ret;
200
201	return rmdir(path);
202}
203
204static int rm_rf_a_kcore_dir(const char *path, const char *name)
205{
206	char kcore_dir_path[PATH_MAX];
207	const char *pat[] = {
208		"kcore",
209		"kallsyms",
210		"modules",
211		NULL,
212	};
213
214	snprintf(kcore_dir_path, sizeof(kcore_dir_path), "%s/%s", path, name);
215
216	return rm_rf_depth_pat(kcore_dir_path, 0, pat);
217}
218
219static bool kcore_dir_filter(const char *name __maybe_unused, struct dirent *d)
220{
221	const char *pat[] = {
222		"kcore_dir",
223		"kcore_dir__[1-9]*",
224		NULL,
225	};
226
227	return match_pat(d->d_name, pat);
228}
229
230static int rm_rf_kcore_dir(const char *path)
231{
232	struct strlist *kcore_dirs;
233	struct str_node *nd;
234	int ret;
235
236	kcore_dirs = lsdir(path, kcore_dir_filter);
237
238	if (!kcore_dirs)
239		return 0;
240
241	strlist__for_each_entry(nd, kcore_dirs) {
242		ret = rm_rf_a_kcore_dir(path, nd->s);
243		if (ret)
244			return ret;
245	}
246
247	strlist__delete(kcore_dirs);
248
249	return 0;
250}
251
252int rm_rf_perf_data(const char *path)
253{
254	const char *pat[] = {
255		"data",
256		"data.*",
257		NULL,
258	};
259
260	rm_rf_kcore_dir(path);
261
262	return rm_rf_depth_pat(path, 0, pat);
263}
264
265int rm_rf(const char *path)
266{
267	return rm_rf_depth_pat(path, INT_MAX, NULL);
268}
269
270/* A filter which removes dot files */
271bool lsdir_no_dot_filter(const char *name __maybe_unused, struct dirent *d)
272{
273	return d->d_name[0] != '.';
274}
275
276/* lsdir reads a directory and store it in strlist */
277struct strlist *lsdir(const char *name,
278		      bool (*filter)(const char *, struct dirent *))
279{
280	struct strlist *list = NULL;
281	DIR *dir;
282	struct dirent *d;
283
284	dir = opendir(name);
285	if (!dir)
286		return NULL;
287
288	list = strlist__new(NULL, NULL);
289	if (!list) {
290		errno = ENOMEM;
291		goto out;
292	}
293
294	while ((d = readdir(dir)) != NULL) {
295		if (!filter || filter(name, d))
296			strlist__add(list, d->d_name);
297	}
298
299out:
300	closedir(dir);
301	return list;
302}
303
304size_t hex_width(u64 v)
305{
306	size_t n = 1;
307
308	while ((v >>= 4))
309		++n;
310
311	return n;
312}
313
314int perf_event_paranoid(void)
315{
316	int value;
317
318	if (sysctl__read_int("kernel/perf_event_paranoid", &value))
319		return INT_MAX;
320
321	return value;
322}
323
324bool perf_event_paranoid_check(int max_level)
325{
326	return perf_cap__capable(CAP_SYS_ADMIN) ||
327			perf_cap__capable(CAP_PERFMON) ||
328			perf_event_paranoid() <= max_level;
329}
330
331static int
332fetch_ubuntu_kernel_version(unsigned int *puint)
333{
334	ssize_t len;
335	size_t line_len = 0;
336	char *ptr, *line = NULL;
337	int version, patchlevel, sublevel, err;
338	FILE *vsig;
339
340	if (!puint)
341		return 0;
342
343	vsig = fopen("/proc/version_signature", "r");
344	if (!vsig) {
345		pr_debug("Open /proc/version_signature failed: %s\n",
346			 strerror(errno));
347		return -1;
348	}
349
350	len = getline(&line, &line_len, vsig);
351	fclose(vsig);
352	err = -1;
353	if (len <= 0) {
354		pr_debug("Reading from /proc/version_signature failed: %s\n",
355			 strerror(errno));
356		goto errout;
357	}
358
359	ptr = strrchr(line, ' ');
360	if (!ptr) {
361		pr_debug("Parsing /proc/version_signature failed: %s\n", line);
362		goto errout;
363	}
364
365	err = sscanf(ptr + 1, "%d.%d.%d",
366		     &version, &patchlevel, &sublevel);
367	if (err != 3) {
368		pr_debug("Unable to get kernel version from /proc/version_signature '%s'\n",
369			 line);
370		goto errout;
371	}
372
373	*puint = (version << 16) + (patchlevel << 8) + sublevel;
374	err = 0;
375errout:
376	free(line);
377	return err;
378}
379
380int
381fetch_kernel_version(unsigned int *puint, char *str,
382		     size_t str_size)
383{
384	struct utsname utsname;
385	int version, patchlevel, sublevel, err;
386	bool int_ver_ready = false;
387
388	if (access("/proc/version_signature", R_OK) == 0)
389		if (!fetch_ubuntu_kernel_version(puint))
390			int_ver_ready = true;
391
392	if (uname(&utsname))
393		return -1;
394
395	if (str && str_size) {
396		strncpy(str, utsname.release, str_size);
397		str[str_size - 1] = '\0';
398	}
399
400	if (!puint || int_ver_ready)
401		return 0;
402
403	err = sscanf(utsname.release, "%d.%d.%d",
404		     &version, &patchlevel, &sublevel);
405
406	if (err != 3) {
407		pr_debug("Unable to get kernel version from uname '%s'\n",
408			 utsname.release);
409		return -1;
410	}
411
412	*puint = (version << 16) + (patchlevel << 8) + sublevel;
413	return 0;
414}
415
416int perf_tip(char **strp, const char *dirpath)
417{
418	struct strlist *tips;
419	struct str_node *node;
420	struct strlist_config conf = {
421		.dirname = dirpath,
422		.file_only = true,
423	};
424	int ret = 0;
425
426	*strp = NULL;
427	tips = strlist__new("tips.txt", &conf);
428	if (tips == NULL)
429		return -errno;
430
431	if (strlist__nr_entries(tips) == 0)
432		goto out;
433
434	node = strlist__entry(tips, random() % strlist__nr_entries(tips));
435	if (asprintf(strp, "Tip: %s", node->s) < 0)
436		ret = -ENOMEM;
437
438out:
439	strlist__delete(tips);
440
441	return ret;
442}
443
444char *perf_exe(char *buf, int len)
445{
446	int n = readlink("/proc/self/exe", buf, len);
447	if (n > 0) {
448		buf[n] = 0;
449		return buf;
450	}
451	return strcpy(buf, "perf");
452}
453
454void perf_debuginfod_setup(struct perf_debuginfod *di)
455{
456	/*
457	 * By default '!di->set' we clear DEBUGINFOD_URLS, so debuginfod
458	 * processing is not triggered, otherwise we set it to 'di->urls'
459	 * value. If 'di->urls' is "system" we keep DEBUGINFOD_URLS value.
460	 */
461	if (!di->set)
462		setenv("DEBUGINFOD_URLS", "", 1);
463	else if (di->urls && strcmp(di->urls, "system"))
464		setenv("DEBUGINFOD_URLS", di->urls, 1);
465
466	pr_debug("DEBUGINFOD_URLS=%s\n", getenv("DEBUGINFOD_URLS"));
467
468#ifndef HAVE_DEBUGINFOD_SUPPORT
469	if (di->set)
470		pr_warning("WARNING: debuginfod support requested, but perf is not built with it\n");
471#endif
472}
473
474/*
475 * Return a new filename prepended with task's root directory if it's in
476 * a chroot.  Callers should free the returned string.
477 */
478char *filename_with_chroot(int pid, const char *filename)
479{
480	char buf[PATH_MAX];
481	char proc_root[32];
482	char *new_name = NULL;
483	int ret;
484
485	scnprintf(proc_root, sizeof(proc_root), "/proc/%d/root", pid);
486	ret = readlink(proc_root, buf, sizeof(buf) - 1);
487	if (ret <= 0)
488		return NULL;
489
490	/* readlink(2) does not append a null byte to buf */
491	buf[ret] = '\0';
492
493	if (!strcmp(buf, "/"))
494		return NULL;
495
496	if (strstr(buf, "(deleted)"))
497		return NULL;
498
499	if (asprintf(&new_name, "%s/%s", buf, filename) < 0)
500		return NULL;
501
502	return new_name;
503}
504
505/*
506 * Reallocate an array *arr of size *arr_sz so that it is big enough to contain
507 * x elements of size msz, initializing new entries to *init_val or zero if
508 * init_val is NULL
509 */
510int do_realloc_array_as_needed(void **arr, size_t *arr_sz, size_t x, size_t msz, const void *init_val)
511{
512	size_t new_sz = *arr_sz;
513	void *new_arr;
514	size_t i;
515
516	if (!new_sz)
517		new_sz = msz >= 64 ? 1 : roundup(64, msz); /* Start with at least 64 bytes */
518	while (x >= new_sz) {
519		if (check_mul_overflow(new_sz, (size_t)2, &new_sz))
520			return -ENOMEM;
521	}
522	if (new_sz == *arr_sz)
523		return 0;
524	new_arr = calloc(new_sz, msz);
525	if (!new_arr)
526		return -ENOMEM;
527	memcpy(new_arr, *arr, *arr_sz * msz);
 
528	if (init_val) {
529		for (i = *arr_sz; i < new_sz; i++)
530			memcpy(new_arr + (i * msz), init_val, msz);
531	}
532	*arr = new_arr;
533	*arr_sz = new_sz;
534	return 0;
535}
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2#include "util.h"
  3#include "debug.h"
  4#include "event.h"
  5#include <api/fs/fs.h>
  6#include <sys/stat.h>
  7#include <sys/utsname.h>
  8#include <dirent.h>
  9#include <fcntl.h>
 10#include <inttypes.h>
 11#include <signal.h>
 12#include <stdio.h>
 13#include <stdlib.h>
 14#include <string.h>
 15#include <errno.h>
 16#include <limits.h>
 17#include <linux/capability.h>
 18#include <linux/kernel.h>
 19#include <linux/log2.h>
 20#include <linux/time64.h>
 21#include <linux/overflow.h>
 22#include <unistd.h>
 23#include "cap.h"
 24#include "strlist.h"
 25#include "string2.h"
 26
 27/*
 28 * XXX We need to find a better place for these things...
 29 */
 30
 31const char *input_name;
 32
 33bool perf_singlethreaded = true;
 34
 35void perf_set_singlethreaded(void)
 36{
 37	perf_singlethreaded = true;
 38}
 39
 40void perf_set_multithreaded(void)
 41{
 42	perf_singlethreaded = false;
 43}
 44
 45int sysctl_perf_event_max_stack = PERF_MAX_STACK_DEPTH;
 46int sysctl_perf_event_max_contexts_per_stack = PERF_MAX_CONTEXTS_PER_STACK;
 47
 48int sysctl__max_stack(void)
 49{
 50	int value;
 51
 52	if (sysctl__read_int("kernel/perf_event_max_stack", &value) == 0)
 53		sysctl_perf_event_max_stack = value;
 54
 55	if (sysctl__read_int("kernel/perf_event_max_contexts_per_stack", &value) == 0)
 56		sysctl_perf_event_max_contexts_per_stack = value;
 57
 58	return sysctl_perf_event_max_stack;
 59}
 60
 61bool sysctl__nmi_watchdog_enabled(void)
 62{
 63	static bool cached;
 64	static bool nmi_watchdog;
 65	int value;
 66
 67	if (cached)
 68		return nmi_watchdog;
 69
 70	if (sysctl__read_int("kernel/nmi_watchdog", &value) < 0)
 71		return false;
 72
 73	nmi_watchdog = (value > 0) ? true : false;
 74	cached = true;
 75
 76	return nmi_watchdog;
 77}
 78
 79bool test_attr__enabled;
 80
 81bool exclude_GH_default;
 82
 83bool perf_host  = true;
 84bool perf_guest = false;
 85
 86void event_attr_init(struct perf_event_attr *attr)
 87{
 88	/* to capture ABI version */
 89	attr->size = sizeof(*attr);
 90
 91	if (!exclude_GH_default)
 92		return;
 93
 94	if (!perf_host)
 95		attr->exclude_host  = 1;
 96	if (!perf_guest)
 97		attr->exclude_guest = 1;
 
 
 98}
 99
100int mkdir_p(char *path, mode_t mode)
101{
102	struct stat st;
103	int err;
104	char *d = path;
105
106	if (*d != '/')
107		return -1;
108
109	if (stat(path, &st) == 0)
110		return 0;
111
112	while (*++d == '/');
113
114	while ((d = strchr(d, '/'))) {
115		*d = '\0';
116		err = stat(path, &st) && mkdir(path, mode);
117		*d++ = '/';
118		if (err)
119			return -1;
120		while (*d == '/')
121			++d;
122	}
123	return (stat(path, &st) && mkdir(path, mode)) ? -1 : 0;
124}
125
126static bool match_pat(char *file, const char **pat)
127{
128	int i = 0;
129
130	if (!pat)
131		return true;
132
133	while (pat[i]) {
134		if (strglobmatch(file, pat[i]))
135			return true;
136
137		i++;
138	}
139
140	return false;
141}
142
143/*
144 * The depth specify how deep the removal will go.
145 * 0       - will remove only files under the 'path' directory
146 * 1 .. x  - will dive in x-level deep under the 'path' directory
147 *
148 * If specified the pat is array of string patterns ended with NULL,
149 * which are checked upon every file/directory found. Only matching
150 * ones are removed.
151 *
152 * The function returns:
153 *    0 on success
154 *   -1 on removal failure with errno set
155 *   -2 on pattern failure
156 */
157static int rm_rf_depth_pat(const char *path, int depth, const char **pat)
158{
159	DIR *dir;
160	int ret;
161	struct dirent *d;
162	char namebuf[PATH_MAX];
163	struct stat statbuf;
164
165	/* Do not fail if there's no file. */
166	ret = lstat(path, &statbuf);
167	if (ret)
168		return 0;
169
170	/* Try to remove any file we get. */
171	if (!(statbuf.st_mode & S_IFDIR))
172		return unlink(path);
173
174	/* We have directory in path. */
175	dir = opendir(path);
176	if (dir == NULL)
177		return -1;
178
179	while ((d = readdir(dir)) != NULL && !ret) {
180
181		if (!strcmp(d->d_name, ".") || !strcmp(d->d_name, ".."))
182			continue;
183
184		if (!match_pat(d->d_name, pat)) {
185			ret =  -2;
186			break;
187		}
188
189		scnprintf(namebuf, sizeof(namebuf), "%s/%s",
190			  path, d->d_name);
191
192		/* We have to check symbolic link itself */
193		ret = lstat(namebuf, &statbuf);
194		if (ret < 0) {
195			pr_debug("stat failed: %s\n", namebuf);
196			break;
197		}
198
199		if (S_ISDIR(statbuf.st_mode))
200			ret = depth ? rm_rf_depth_pat(namebuf, depth - 1, pat) : 0;
201		else
202			ret = unlink(namebuf);
203	}
204	closedir(dir);
205
206	if (ret < 0)
207		return ret;
208
209	return rmdir(path);
210}
211
212static int rm_rf_a_kcore_dir(const char *path, const char *name)
213{
214	char kcore_dir_path[PATH_MAX];
215	const char *pat[] = {
216		"kcore",
217		"kallsyms",
218		"modules",
219		NULL,
220	};
221
222	snprintf(kcore_dir_path, sizeof(kcore_dir_path), "%s/%s", path, name);
223
224	return rm_rf_depth_pat(kcore_dir_path, 0, pat);
225}
226
227static bool kcore_dir_filter(const char *name __maybe_unused, struct dirent *d)
228{
229	const char *pat[] = {
230		"kcore_dir",
231		"kcore_dir__[1-9]*",
232		NULL,
233	};
234
235	return match_pat(d->d_name, pat);
236}
237
238static int rm_rf_kcore_dir(const char *path)
239{
240	struct strlist *kcore_dirs;
241	struct str_node *nd;
242	int ret;
243
244	kcore_dirs = lsdir(path, kcore_dir_filter);
245
246	if (!kcore_dirs)
247		return 0;
248
249	strlist__for_each_entry(nd, kcore_dirs) {
250		ret = rm_rf_a_kcore_dir(path, nd->s);
251		if (ret)
252			return ret;
253	}
254
255	strlist__delete(kcore_dirs);
256
257	return 0;
258}
259
260int rm_rf_perf_data(const char *path)
261{
262	const char *pat[] = {
263		"data",
264		"data.*",
265		NULL,
266	};
267
268	rm_rf_kcore_dir(path);
269
270	return rm_rf_depth_pat(path, 0, pat);
271}
272
273int rm_rf(const char *path)
274{
275	return rm_rf_depth_pat(path, INT_MAX, NULL);
276}
277
278/* A filter which removes dot files */
279bool lsdir_no_dot_filter(const char *name __maybe_unused, struct dirent *d)
280{
281	return d->d_name[0] != '.';
282}
283
284/* lsdir reads a directory and store it in strlist */
285struct strlist *lsdir(const char *name,
286		      bool (*filter)(const char *, struct dirent *))
287{
288	struct strlist *list = NULL;
289	DIR *dir;
290	struct dirent *d;
291
292	dir = opendir(name);
293	if (!dir)
294		return NULL;
295
296	list = strlist__new(NULL, NULL);
297	if (!list) {
298		errno = ENOMEM;
299		goto out;
300	}
301
302	while ((d = readdir(dir)) != NULL) {
303		if (!filter || filter(name, d))
304			strlist__add(list, d->d_name);
305	}
306
307out:
308	closedir(dir);
309	return list;
310}
311
312size_t hex_width(u64 v)
313{
314	size_t n = 1;
315
316	while ((v >>= 4))
317		++n;
318
319	return n;
320}
321
322int perf_event_paranoid(void)
323{
324	int value;
325
326	if (sysctl__read_int("kernel/perf_event_paranoid", &value))
327		return INT_MAX;
328
329	return value;
330}
331
332bool perf_event_paranoid_check(int max_level)
333{
334	bool used_root;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
335
336	if (perf_cap__capable(CAP_SYS_ADMIN, &used_root))
337		return true;
338
339	if (!used_root && perf_cap__capable(CAP_PERFMON, &used_root))
340		return true;
 
 
 
341
342	return perf_event_paranoid() <= max_level;
 
343}
344
345int perf_tip(char **strp, const char *dirpath)
346{
347	struct strlist *tips;
348	struct str_node *node;
349	struct strlist_config conf = {
350		.dirname = dirpath,
351		.file_only = true,
352	};
353	int ret = 0;
354
355	*strp = NULL;
356	tips = strlist__new("tips.txt", &conf);
357	if (tips == NULL)
358		return -errno;
359
360	if (strlist__nr_entries(tips) == 0)
361		goto out;
362
363	node = strlist__entry(tips, random() % strlist__nr_entries(tips));
364	if (asprintf(strp, "Tip: %s", node->s) < 0)
365		ret = -ENOMEM;
366
367out:
368	strlist__delete(tips);
369
370	return ret;
371}
372
373char *perf_exe(char *buf, int len)
374{
375	int n = readlink("/proc/self/exe", buf, len);
376	if (n > 0) {
377		buf[n] = 0;
378		return buf;
379	}
380	return strcpy(buf, "perf");
381}
382
383void perf_debuginfod_setup(struct perf_debuginfod *di)
384{
385	/*
386	 * By default '!di->set' we clear DEBUGINFOD_URLS, so debuginfod
387	 * processing is not triggered, otherwise we set it to 'di->urls'
388	 * value. If 'di->urls' is "system" we keep DEBUGINFOD_URLS value.
389	 */
390	if (!di->set)
391		setenv("DEBUGINFOD_URLS", "", 1);
392	else if (di->urls && strcmp(di->urls, "system"))
393		setenv("DEBUGINFOD_URLS", di->urls, 1);
394
395	pr_debug("DEBUGINFOD_URLS=%s\n", getenv("DEBUGINFOD_URLS"));
396
397#ifndef HAVE_DEBUGINFOD_SUPPORT
398	if (di->set)
399		pr_warning("WARNING: debuginfod support requested, but perf is not built with it\n");
400#endif
401}
402
403/*
404 * Return a new filename prepended with task's root directory if it's in
405 * a chroot.  Callers should free the returned string.
406 */
407char *filename_with_chroot(int pid, const char *filename)
408{
409	char buf[PATH_MAX];
410	char proc_root[32];
411	char *new_name = NULL;
412	int ret;
413
414	scnprintf(proc_root, sizeof(proc_root), "/proc/%d/root", pid);
415	ret = readlink(proc_root, buf, sizeof(buf) - 1);
416	if (ret <= 0)
417		return NULL;
418
419	/* readlink(2) does not append a null byte to buf */
420	buf[ret] = '\0';
421
422	if (!strcmp(buf, "/"))
423		return NULL;
424
425	if (strstr(buf, "(deleted)"))
426		return NULL;
427
428	if (asprintf(&new_name, "%s/%s", buf, filename) < 0)
429		return NULL;
430
431	return new_name;
432}
433
434/*
435 * Reallocate an array *arr of size *arr_sz so that it is big enough to contain
436 * x elements of size msz, initializing new entries to *init_val or zero if
437 * init_val is NULL
438 */
439int do_realloc_array_as_needed(void **arr, size_t *arr_sz, size_t x, size_t msz, const void *init_val)
440{
441	size_t new_sz = *arr_sz;
442	void *new_arr;
443	size_t i;
444
445	if (!new_sz)
446		new_sz = msz >= 64 ? 1 : roundup(64, msz); /* Start with at least 64 bytes */
447	while (x >= new_sz) {
448		if (check_mul_overflow(new_sz, (size_t)2, &new_sz))
449			return -ENOMEM;
450	}
451	if (new_sz == *arr_sz)
452		return 0;
453	new_arr = calloc(new_sz, msz);
454	if (!new_arr)
455		return -ENOMEM;
456	if (*arr_sz)
457		memcpy(new_arr, *arr, *arr_sz * msz);
458	if (init_val) {
459		for (i = *arr_sz; i < new_sz; i++)
460			memcpy(new_arr + (i * msz), init_val, msz);
461	}
462	*arr = new_arr;
463	*arr_sz = new_sz;
464	return 0;
465}
466
467#ifndef HAVE_SCHED_GETCPU_SUPPORT
468int sched_getcpu(void)
469{
470#ifdef __NR_getcpu
471	unsigned int cpu;
472	int err = syscall(__NR_getcpu, &cpu, NULL, NULL);
473
474	if (!err)
475		return cpu;
476#else
477	errno = ENOSYS;
478#endif
479	return -1;
480}
481#endif
482
483#ifndef HAVE_SCANDIRAT_SUPPORT
484int scandirat(int dirfd, const char *dirp,
485	      struct dirent ***namelist,
486	      int (*filter)(const struct dirent *),
487	      int (*compar)(const struct dirent **, const struct dirent **))
488{
489	char path[PATH_MAX];
490	int err, fd = openat(dirfd, dirp, O_PATH);
491
492	if (fd < 0)
493		return fd;
494
495	snprintf(path, sizeof(path), "/proc/%d/fd/%d", getpid(), fd);
496	err = scandir(path, namelist, filter, compar);
497	close(fd);
498	return err;
499}
500#endif