mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-27 14:14:24 +08:00
e25ebda78e
Remove dependence on libcap. libcap is only used to query whether a capability is supported, which is just 1 capget system call. If the capget system call fails, fall back on root permission checking. Previously if libcap fails then the permission is assumed not present which may be pessimistic/wrong. Add a used_root out argument to perf_cap__capable to say whether the fall back root check was used. This allows the correct error message, "root" vs "users with the CAP_PERFMON or CAP_SYS_ADMIN capability", to be selected. Tidy uses of perf_cap__capable so that tests aren't repeated if capget isn't supported. Signed-off-by: Ian Rogers <irogers@google.com> Cc: Adrian Hunter <adrian.hunter@intel.com> Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com> Cc: Athira Rajeev <atrajeev@linux.vnet.ibm.com> Cc: Changbin Du <changbin.du@huawei.com> Cc: Ingo Molnar <mingo@redhat.com> Cc: James Clark <james.clark@arm.com> Cc: Jiri Olsa <jolsa@kernel.org> Cc: Kan Liang <kan.liang@linux.intel.com> Cc: Leo Yan <leo.yan@linux.dev> Cc: Mark Rutland <mark.rutland@arm.com> Cc: Namhyung Kim <namhyung@kernel.org> Cc: Oliver Upton <oliver.upton@linux.dev> Cc: Peter Zijlstra <peterz@infradead.org> Link: https://lore.kernel.org/r/20240806220614.831914-1-irogers@google.com Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
580 lines
11 KiB
C
580 lines
11 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include "util.h"
|
|
#include "debug.h"
|
|
#include "event.h"
|
|
#include <api/fs/fs.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/utsname.h>
|
|
#include <dirent.h>
|
|
#include <fcntl.h>
|
|
#include <inttypes.h>
|
|
#include <signal.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <limits.h>
|
|
#include <linux/capability.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/log2.h>
|
|
#include <linux/time64.h>
|
|
#include <linux/overflow.h>
|
|
#include <unistd.h>
|
|
#include "cap.h"
|
|
#include "strlist.h"
|
|
#include "string2.h"
|
|
|
|
/*
|
|
* XXX We need to find a better place for these things...
|
|
*/
|
|
|
|
const char *input_name;
|
|
|
|
bool perf_singlethreaded = true;
|
|
|
|
void perf_set_singlethreaded(void)
|
|
{
|
|
perf_singlethreaded = true;
|
|
}
|
|
|
|
void perf_set_multithreaded(void)
|
|
{
|
|
perf_singlethreaded = false;
|
|
}
|
|
|
|
int sysctl_perf_event_max_stack = PERF_MAX_STACK_DEPTH;
|
|
int sysctl_perf_event_max_contexts_per_stack = PERF_MAX_CONTEXTS_PER_STACK;
|
|
|
|
int sysctl__max_stack(void)
|
|
{
|
|
int value;
|
|
|
|
if (sysctl__read_int("kernel/perf_event_max_stack", &value) == 0)
|
|
sysctl_perf_event_max_stack = value;
|
|
|
|
if (sysctl__read_int("kernel/perf_event_max_contexts_per_stack", &value) == 0)
|
|
sysctl_perf_event_max_contexts_per_stack = value;
|
|
|
|
return sysctl_perf_event_max_stack;
|
|
}
|
|
|
|
bool sysctl__nmi_watchdog_enabled(void)
|
|
{
|
|
static bool cached;
|
|
static bool nmi_watchdog;
|
|
int value;
|
|
|
|
if (cached)
|
|
return nmi_watchdog;
|
|
|
|
if (sysctl__read_int("kernel/nmi_watchdog", &value) < 0)
|
|
return false;
|
|
|
|
nmi_watchdog = (value > 0) ? true : false;
|
|
cached = true;
|
|
|
|
return nmi_watchdog;
|
|
}
|
|
|
|
bool test_attr__enabled;
|
|
|
|
bool perf_host = true;
|
|
bool perf_guest = false;
|
|
|
|
void event_attr_init(struct perf_event_attr *attr)
|
|
{
|
|
if (!perf_host)
|
|
attr->exclude_host = 1;
|
|
if (!perf_guest)
|
|
attr->exclude_guest = 1;
|
|
/* to capture ABI version */
|
|
attr->size = sizeof(*attr);
|
|
}
|
|
|
|
int mkdir_p(char *path, mode_t mode)
|
|
{
|
|
struct stat st;
|
|
int err;
|
|
char *d = path;
|
|
|
|
if (*d != '/')
|
|
return -1;
|
|
|
|
if (stat(path, &st) == 0)
|
|
return 0;
|
|
|
|
while (*++d == '/');
|
|
|
|
while ((d = strchr(d, '/'))) {
|
|
*d = '\0';
|
|
err = stat(path, &st) && mkdir(path, mode);
|
|
*d++ = '/';
|
|
if (err)
|
|
return -1;
|
|
while (*d == '/')
|
|
++d;
|
|
}
|
|
return (stat(path, &st) && mkdir(path, mode)) ? -1 : 0;
|
|
}
|
|
|
|
static bool match_pat(char *file, const char **pat)
|
|
{
|
|
int i = 0;
|
|
|
|
if (!pat)
|
|
return true;
|
|
|
|
while (pat[i]) {
|
|
if (strglobmatch(file, pat[i]))
|
|
return true;
|
|
|
|
i++;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* The depth specify how deep the removal will go.
|
|
* 0 - will remove only files under the 'path' directory
|
|
* 1 .. x - will dive in x-level deep under the 'path' directory
|
|
*
|
|
* If specified the pat is array of string patterns ended with NULL,
|
|
* which are checked upon every file/directory found. Only matching
|
|
* ones are removed.
|
|
*
|
|
* The function returns:
|
|
* 0 on success
|
|
* -1 on removal failure with errno set
|
|
* -2 on pattern failure
|
|
*/
|
|
static int rm_rf_depth_pat(const char *path, int depth, const char **pat)
|
|
{
|
|
DIR *dir;
|
|
int ret;
|
|
struct dirent *d;
|
|
char namebuf[PATH_MAX];
|
|
struct stat statbuf;
|
|
|
|
/* Do not fail if there's no file. */
|
|
ret = lstat(path, &statbuf);
|
|
if (ret)
|
|
return 0;
|
|
|
|
/* Try to remove any file we get. */
|
|
if (!(statbuf.st_mode & S_IFDIR))
|
|
return unlink(path);
|
|
|
|
/* We have directory in path. */
|
|
dir = opendir(path);
|
|
if (dir == NULL)
|
|
return -1;
|
|
|
|
while ((d = readdir(dir)) != NULL && !ret) {
|
|
|
|
if (!strcmp(d->d_name, ".") || !strcmp(d->d_name, ".."))
|
|
continue;
|
|
|
|
if (!match_pat(d->d_name, pat)) {
|
|
ret = -2;
|
|
break;
|
|
}
|
|
|
|
scnprintf(namebuf, sizeof(namebuf), "%s/%s",
|
|
path, d->d_name);
|
|
|
|
/* We have to check symbolic link itself */
|
|
ret = lstat(namebuf, &statbuf);
|
|
if (ret < 0) {
|
|
pr_debug("stat failed: %s\n", namebuf);
|
|
break;
|
|
}
|
|
|
|
if (S_ISDIR(statbuf.st_mode))
|
|
ret = depth ? rm_rf_depth_pat(namebuf, depth - 1, pat) : 0;
|
|
else
|
|
ret = unlink(namebuf);
|
|
}
|
|
closedir(dir);
|
|
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
return rmdir(path);
|
|
}
|
|
|
|
static int rm_rf_a_kcore_dir(const char *path, const char *name)
|
|
{
|
|
char kcore_dir_path[PATH_MAX];
|
|
const char *pat[] = {
|
|
"kcore",
|
|
"kallsyms",
|
|
"modules",
|
|
NULL,
|
|
};
|
|
|
|
snprintf(kcore_dir_path, sizeof(kcore_dir_path), "%s/%s", path, name);
|
|
|
|
return rm_rf_depth_pat(kcore_dir_path, 0, pat);
|
|
}
|
|
|
|
static bool kcore_dir_filter(const char *name __maybe_unused, struct dirent *d)
|
|
{
|
|
const char *pat[] = {
|
|
"kcore_dir",
|
|
"kcore_dir__[1-9]*",
|
|
NULL,
|
|
};
|
|
|
|
return match_pat(d->d_name, pat);
|
|
}
|
|
|
|
static int rm_rf_kcore_dir(const char *path)
|
|
{
|
|
struct strlist *kcore_dirs;
|
|
struct str_node *nd;
|
|
int ret;
|
|
|
|
kcore_dirs = lsdir(path, kcore_dir_filter);
|
|
|
|
if (!kcore_dirs)
|
|
return 0;
|
|
|
|
strlist__for_each_entry(nd, kcore_dirs) {
|
|
ret = rm_rf_a_kcore_dir(path, nd->s);
|
|
if (ret)
|
|
return ret;
|
|
}
|
|
|
|
strlist__delete(kcore_dirs);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int rm_rf_perf_data(const char *path)
|
|
{
|
|
const char *pat[] = {
|
|
"data",
|
|
"data.*",
|
|
NULL,
|
|
};
|
|
|
|
rm_rf_kcore_dir(path);
|
|
|
|
return rm_rf_depth_pat(path, 0, pat);
|
|
}
|
|
|
|
int rm_rf(const char *path)
|
|
{
|
|
return rm_rf_depth_pat(path, INT_MAX, NULL);
|
|
}
|
|
|
|
/* A filter which removes dot files */
|
|
bool lsdir_no_dot_filter(const char *name __maybe_unused, struct dirent *d)
|
|
{
|
|
return d->d_name[0] != '.';
|
|
}
|
|
|
|
/* lsdir reads a directory and store it in strlist */
|
|
struct strlist *lsdir(const char *name,
|
|
bool (*filter)(const char *, struct dirent *))
|
|
{
|
|
struct strlist *list = NULL;
|
|
DIR *dir;
|
|
struct dirent *d;
|
|
|
|
dir = opendir(name);
|
|
if (!dir)
|
|
return NULL;
|
|
|
|
list = strlist__new(NULL, NULL);
|
|
if (!list) {
|
|
errno = ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
while ((d = readdir(dir)) != NULL) {
|
|
if (!filter || filter(name, d))
|
|
strlist__add(list, d->d_name);
|
|
}
|
|
|
|
out:
|
|
closedir(dir);
|
|
return list;
|
|
}
|
|
|
|
size_t hex_width(u64 v)
|
|
{
|
|
size_t n = 1;
|
|
|
|
while ((v >>= 4))
|
|
++n;
|
|
|
|
return n;
|
|
}
|
|
|
|
int perf_event_paranoid(void)
|
|
{
|
|
int value;
|
|
|
|
if (sysctl__read_int("kernel/perf_event_paranoid", &value))
|
|
return INT_MAX;
|
|
|
|
return value;
|
|
}
|
|
|
|
bool perf_event_paranoid_check(int max_level)
|
|
{
|
|
bool used_root;
|
|
|
|
if (perf_cap__capable(CAP_SYS_ADMIN, &used_root))
|
|
return true;
|
|
|
|
if (!used_root && perf_cap__capable(CAP_PERFMON, &used_root))
|
|
return true;
|
|
|
|
return perf_event_paranoid() <= max_level;
|
|
}
|
|
|
|
static int
|
|
fetch_ubuntu_kernel_version(unsigned int *puint)
|
|
{
|
|
ssize_t len;
|
|
size_t line_len = 0;
|
|
char *ptr, *line = NULL;
|
|
int version, patchlevel, sublevel, err;
|
|
FILE *vsig;
|
|
|
|
if (!puint)
|
|
return 0;
|
|
|
|
vsig = fopen("/proc/version_signature", "r");
|
|
if (!vsig) {
|
|
pr_debug("Open /proc/version_signature failed: %s\n",
|
|
strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
len = getline(&line, &line_len, vsig);
|
|
fclose(vsig);
|
|
err = -1;
|
|
if (len <= 0) {
|
|
pr_debug("Reading from /proc/version_signature failed: %s\n",
|
|
strerror(errno));
|
|
goto errout;
|
|
}
|
|
|
|
ptr = strrchr(line, ' ');
|
|
if (!ptr) {
|
|
pr_debug("Parsing /proc/version_signature failed: %s\n", line);
|
|
goto errout;
|
|
}
|
|
|
|
err = sscanf(ptr + 1, "%d.%d.%d",
|
|
&version, &patchlevel, &sublevel);
|
|
if (err != 3) {
|
|
pr_debug("Unable to get kernel version from /proc/version_signature '%s'\n",
|
|
line);
|
|
goto errout;
|
|
}
|
|
|
|
*puint = (version << 16) + (patchlevel << 8) + sublevel;
|
|
err = 0;
|
|
errout:
|
|
free(line);
|
|
return err;
|
|
}
|
|
|
|
int
|
|
fetch_kernel_version(unsigned int *puint, char *str,
|
|
size_t str_size)
|
|
{
|
|
struct utsname utsname;
|
|
int version, patchlevel, sublevel, err;
|
|
bool int_ver_ready = false;
|
|
|
|
if (access("/proc/version_signature", R_OK) == 0)
|
|
if (!fetch_ubuntu_kernel_version(puint))
|
|
int_ver_ready = true;
|
|
|
|
if (uname(&utsname))
|
|
return -1;
|
|
|
|
if (str && str_size) {
|
|
strncpy(str, utsname.release, str_size);
|
|
str[str_size - 1] = '\0';
|
|
}
|
|
|
|
if (!puint || int_ver_ready)
|
|
return 0;
|
|
|
|
err = sscanf(utsname.release, "%d.%d.%d",
|
|
&version, &patchlevel, &sublevel);
|
|
|
|
if (err != 3) {
|
|
pr_debug("Unable to get kernel version from uname '%s'\n",
|
|
utsname.release);
|
|
return -1;
|
|
}
|
|
|
|
*puint = (version << 16) + (patchlevel << 8) + sublevel;
|
|
return 0;
|
|
}
|
|
|
|
int perf_tip(char **strp, const char *dirpath)
|
|
{
|
|
struct strlist *tips;
|
|
struct str_node *node;
|
|
struct strlist_config conf = {
|
|
.dirname = dirpath,
|
|
.file_only = true,
|
|
};
|
|
int ret = 0;
|
|
|
|
*strp = NULL;
|
|
tips = strlist__new("tips.txt", &conf);
|
|
if (tips == NULL)
|
|
return -errno;
|
|
|
|
if (strlist__nr_entries(tips) == 0)
|
|
goto out;
|
|
|
|
node = strlist__entry(tips, random() % strlist__nr_entries(tips));
|
|
if (asprintf(strp, "Tip: %s", node->s) < 0)
|
|
ret = -ENOMEM;
|
|
|
|
out:
|
|
strlist__delete(tips);
|
|
|
|
return ret;
|
|
}
|
|
|
|
char *perf_exe(char *buf, int len)
|
|
{
|
|
int n = readlink("/proc/self/exe", buf, len);
|
|
if (n > 0) {
|
|
buf[n] = 0;
|
|
return buf;
|
|
}
|
|
return strcpy(buf, "perf");
|
|
}
|
|
|
|
void perf_debuginfod_setup(struct perf_debuginfod *di)
|
|
{
|
|
/*
|
|
* By default '!di->set' we clear DEBUGINFOD_URLS, so debuginfod
|
|
* processing is not triggered, otherwise we set it to 'di->urls'
|
|
* value. If 'di->urls' is "system" we keep DEBUGINFOD_URLS value.
|
|
*/
|
|
if (!di->set)
|
|
setenv("DEBUGINFOD_URLS", "", 1);
|
|
else if (di->urls && strcmp(di->urls, "system"))
|
|
setenv("DEBUGINFOD_URLS", di->urls, 1);
|
|
|
|
pr_debug("DEBUGINFOD_URLS=%s\n", getenv("DEBUGINFOD_URLS"));
|
|
|
|
#ifndef HAVE_DEBUGINFOD_SUPPORT
|
|
if (di->set)
|
|
pr_warning("WARNING: debuginfod support requested, but perf is not built with it\n");
|
|
#endif
|
|
}
|
|
|
|
/*
|
|
* Return a new filename prepended with task's root directory if it's in
|
|
* a chroot. Callers should free the returned string.
|
|
*/
|
|
char *filename_with_chroot(int pid, const char *filename)
|
|
{
|
|
char buf[PATH_MAX];
|
|
char proc_root[32];
|
|
char *new_name = NULL;
|
|
int ret;
|
|
|
|
scnprintf(proc_root, sizeof(proc_root), "/proc/%d/root", pid);
|
|
ret = readlink(proc_root, buf, sizeof(buf) - 1);
|
|
if (ret <= 0)
|
|
return NULL;
|
|
|
|
/* readlink(2) does not append a null byte to buf */
|
|
buf[ret] = '\0';
|
|
|
|
if (!strcmp(buf, "/"))
|
|
return NULL;
|
|
|
|
if (strstr(buf, "(deleted)"))
|
|
return NULL;
|
|
|
|
if (asprintf(&new_name, "%s/%s", buf, filename) < 0)
|
|
return NULL;
|
|
|
|
return new_name;
|
|
}
|
|
|
|
/*
|
|
* Reallocate an array *arr of size *arr_sz so that it is big enough to contain
|
|
* x elements of size msz, initializing new entries to *init_val or zero if
|
|
* init_val is NULL
|
|
*/
|
|
int do_realloc_array_as_needed(void **arr, size_t *arr_sz, size_t x, size_t msz, const void *init_val)
|
|
{
|
|
size_t new_sz = *arr_sz;
|
|
void *new_arr;
|
|
size_t i;
|
|
|
|
if (!new_sz)
|
|
new_sz = msz >= 64 ? 1 : roundup(64, msz); /* Start with at least 64 bytes */
|
|
while (x >= new_sz) {
|
|
if (check_mul_overflow(new_sz, (size_t)2, &new_sz))
|
|
return -ENOMEM;
|
|
}
|
|
if (new_sz == *arr_sz)
|
|
return 0;
|
|
new_arr = calloc(new_sz, msz);
|
|
if (!new_arr)
|
|
return -ENOMEM;
|
|
if (*arr_sz)
|
|
memcpy(new_arr, *arr, *arr_sz * msz);
|
|
if (init_val) {
|
|
for (i = *arr_sz; i < new_sz; i++)
|
|
memcpy(new_arr + (i * msz), init_val, msz);
|
|
}
|
|
*arr = new_arr;
|
|
*arr_sz = new_sz;
|
|
return 0;
|
|
}
|
|
|
|
#ifndef HAVE_SCHED_GETCPU_SUPPORT
|
|
int sched_getcpu(void)
|
|
{
|
|
#ifdef __NR_getcpu
|
|
unsigned int cpu;
|
|
int err = syscall(__NR_getcpu, &cpu, NULL, NULL);
|
|
|
|
if (!err)
|
|
return cpu;
|
|
#else
|
|
errno = ENOSYS;
|
|
#endif
|
|
return -1;
|
|
}
|
|
#endif
|
|
|
|
#ifndef HAVE_SCANDIRAT_SUPPORT
|
|
int scandirat(int dirfd, const char *dirp,
|
|
struct dirent ***namelist,
|
|
int (*filter)(const struct dirent *),
|
|
int (*compar)(const struct dirent **, const struct dirent **))
|
|
{
|
|
char path[PATH_MAX];
|
|
int err, fd = openat(dirfd, dirp, O_PATH);
|
|
|
|
if (fd < 0)
|
|
return fd;
|
|
|
|
snprintf(path, sizeof(path), "/proc/%d/fd/%d", getpid(), fd);
|
|
err = scandir(path, namelist, filter, compar);
|
|
close(fd);
|
|
return err;
|
|
}
|
|
#endif
|