mirror of
https://github.com/FEX-Emu/linux.git
synced 2024-12-16 14:02:10 +00:00
c286c419c7
We have to deal with the TUI mode in perf top, so that we don't end up with a garbled screen when, say, a non root user on a machine with a paranoid setting (the default) tries to use 'perf top'. Introduce a ui__warning_paranoid() routine shared by top and record that tells the user the valid values for /proc/sys/kernel/perf_event_paranoid. Cc: David Ahern <daahern@cisco.com> Cc: Frederic Weisbecker <fweisbec@gmail.com> Cc: Ingo Molnar <mingo@elte.hu> Cc: Mike Galbraith <efault@gmx.de> Cc: Paul Mackerras <paulus@samba.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Stephane Eranian <eranian@google.com> Cc: Tom Zanussi <tzanussi@gmail.com> LKML-Reference: <new-submission> Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
105 lines
2.0 KiB
C
105 lines
2.0 KiB
C
/* For general debugging purposes */
|
|
|
|
#include "../perf.h"
|
|
|
|
#include <string.h>
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
|
|
#include "cache.h"
|
|
#include "color.h"
|
|
#include "event.h"
|
|
#include "debug.h"
|
|
#include "util.h"
|
|
|
|
int verbose;
|
|
bool dump_trace = false, quiet = false;
|
|
|
|
int eprintf(int level, const char *fmt, ...)
|
|
{
|
|
va_list args;
|
|
int ret = 0;
|
|
|
|
if (verbose >= level) {
|
|
va_start(args, fmt);
|
|
if (use_browser > 0)
|
|
ret = ui_helpline__show_help(fmt, args);
|
|
else
|
|
ret = vfprintf(stderr, fmt, args);
|
|
va_end(args);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int dump_printf(const char *fmt, ...)
|
|
{
|
|
va_list args;
|
|
int ret = 0;
|
|
|
|
if (dump_trace) {
|
|
va_start(args, fmt);
|
|
ret = vprintf(fmt, args);
|
|
va_end(args);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#ifdef NO_NEWT_SUPPORT
|
|
void ui__warning(const char *format, ...)
|
|
{
|
|
va_list args;
|
|
|
|
va_start(args, format);
|
|
vfprintf(stderr, format, args);
|
|
va_end(args);
|
|
}
|
|
#endif
|
|
|
|
void ui__warning_paranoid(void)
|
|
{
|
|
ui__warning("Permission error - are you root?\n"
|
|
"Consider tweaking /proc/sys/kernel/perf_event_paranoid:\n"
|
|
" -1 - Not paranoid at all\n"
|
|
" 0 - Disallow raw tracepoint access for unpriv\n"
|
|
" 1 - Disallow cpu events for unpriv\n"
|
|
" 2 - Disallow kernel profiling for unpriv\n");
|
|
}
|
|
|
|
void trace_event(union perf_event *event)
|
|
{
|
|
unsigned char *raw_event = (void *)event;
|
|
const char *color = PERF_COLOR_BLUE;
|
|
int i, j;
|
|
|
|
if (!dump_trace)
|
|
return;
|
|
|
|
printf(".");
|
|
color_fprintf(stdout, color, "\n. ... raw event: size %d bytes\n",
|
|
event->header.size);
|
|
|
|
for (i = 0; i < event->header.size; i++) {
|
|
if ((i & 15) == 0) {
|
|
printf(".");
|
|
color_fprintf(stdout, color, " %04x: ", i);
|
|
}
|
|
|
|
color_fprintf(stdout, color, " %02x", raw_event[i]);
|
|
|
|
if (((i & 15) == 15) || i == event->header.size-1) {
|
|
color_fprintf(stdout, color, " ");
|
|
for (j = 0; j < 15-(i & 15); j++)
|
|
color_fprintf(stdout, color, " ");
|
|
for (j = i & ~15; j <= i; j++) {
|
|
color_fprintf(stdout, color, "%c",
|
|
isprint(raw_event[j]) ?
|
|
raw_event[j] : '.');
|
|
}
|
|
color_fprintf(stdout, color, "\n");
|
|
}
|
|
}
|
|
printf(".\n");
|
|
}
|