Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp691992iob; Thu, 12 May 2022 02:36:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJySAzVRcolHR8ac8onAXTJrsYowITN42kVnuZBb7Dx0fRzg3ICN7b/KEpmMuZN4LZ1vC0S0 X-Received: by 2002:a63:4384:0:b0:3ab:9d95:a30a with SMTP id q126-20020a634384000000b003ab9d95a30amr24224780pga.68.1652348186642; Thu, 12 May 2022 02:36:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652348186; cv=none; d=google.com; s=arc-20160816; b=dz0IexhxROmdL5vjzNWo9ljbPaVinKcojS7IwVXX0Yxo91fmgshyz8RV7mvTiJtVgP +N5Na//y8WyJjjMCueGdqfurZVBoZAAY3Sp9YwOfqZmlbY1ymusRd6Zdr5z9m1zPY1nZ KTagc5gywqNapMd5I4PhFAS9mu34fuCie6gm+fTkg+uc6vu/PdGUqw1IsW5aPVj81xB4 5LM5zd/N4ipS//G9BACZtw5gvGVlX5sLoBazp0VFieXDxOLX/Ul7qCDCRlzKkl0ggT47 lCyaL2PeWhbd2Ds1pu9J3cY26fH6kbzMbZZCmKgGDUG9aenOGw2W6Pul0jLMXdzhNTEA WQLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=NudwX7sU85HRRBrYZaMBSL3irNjl43Vs21KTknBK9co=; b=zg3k69rjc5W1uRFNPsZWCNhEeCpJ86HWQesEuVV8qyqQA08JgyPXOfx9b84Ln0a1+V +sev2v2ldJDqb1OE1G8EfNlAXh2PhGked6Fy+aQngU4v7ByBl46v4HEhh97MC0Cu+Z3X Pee333vKpIjj1+WsHlK7fubC2ZSBhJqkYzQ2J1z1kaFBxcKWFkU12SMCttxJQOukfdBr dxD5VRzF2anul0bGxJPKG1+TFA5KF7vTpneuI+uphP2XxXOcrpzRHr69iOR2MdsLkMXD C8QXqTZjltJzeOswtLuk2fdm78TfAC510fuQH8+gYO25iQWmEImETklGorirsYUzkiAz zcKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w186-20020a6382c3000000b003c65dfe3d5asi2741866pgd.779.2022.05.12.02.36.14; Thu, 12 May 2022 02:36:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240040AbiEKLte (ORCPT + 99 others); Wed, 11 May 2022 07:49:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233701AbiEKLtb (ORCPT ); Wed, 11 May 2022 07:49:31 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 115E62438C7; Wed, 11 May 2022 04:49:27 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8E882ED1; Wed, 11 May 2022 04:49:27 -0700 (PDT) Received: from [10.57.65.69] (unknown [10.57.65.69]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CDE243F73D; Wed, 11 May 2022 04:49:24 -0700 (PDT) Subject: Re: [PATCH 1/4] perf pmu: Add function to check if a pmu file exists To: Arnaldo Carvalho de Melo Cc: linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Mike Leach , Leo Yan , John Garry , Will Deacon , Mathieu Poirier , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , coresight@lists.linaro.org, linux-arm-kernel@lists.infradead.org References: <20220504150216.581281-1-german.gomez@arm.com> <20220504150216.581281-2-german.gomez@arm.com> From: German Gomez Message-ID: Date: Wed, 11 May 2022 12:49:18 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Arnaldo, thanks for the review On 10/05/2022 17:41, Arnaldo Carvalho de Melo wrote: > Em Wed, May 04, 2022 at 04:02:12PM +0100, German Gomez escreveu: >> Add a utility function perf_pmu__file_exists() to check if a given pmu >> file exists in the sysfs filesystem. > While reviewing this I noticed: > > int perf_pmu__caps_parse(struct perf_pmu *pmu) > { > struct stat st; > char caps_path[PATH_MAX]; > const char *sysfs = sysfs__mountpoint(); > DIR *caps_dir; > struct dirent *evt_ent; > int nr_caps = 0; > > if (!sysfs) > return -1; > > snprintf(caps_path, PATH_MAX, > "%s" EVENT_SOURCE_DEVICE_PATH "%s/caps", sysfs, pmu->name); > > if (stat(caps_path, &st) < 0) > return 0; /* no error if caps does not exist */ > > > ------------------------ > > Shouldn't we introduce a: > > const int perf__pmu_pathname_scnprintf(struct perf_pmu *pmu, char *pathname, size_t size, char *filename) > { > > return scnprintf(pathname, size, "%s" EVENT_SOURCE_DEVICE_PATH "%s/%s", sysfs, pmu->name, filename); > } > > And use in your perf_pmu__file_exists() and in the other places where > this open coded pattern appears? I agree. If nobody else has done it before me, I will send the refactor in the next respin. Thanks, German > > I'm waiting for reviews for the ARM specific bits. > > - Arnaldo > >> Signed-off-by: German Gomez >> --- >> tools/perf/util/pmu.c | 17 +++++++++++++++++ >> tools/perf/util/pmu.h | 2 ++ >> 2 files changed, 19 insertions(+) >> >> diff --git a/tools/perf/util/pmu.c b/tools/perf/util/pmu.c >> index 9a1c7e63e663..9479e9a4da54 100644 >> --- a/tools/perf/util/pmu.c >> +++ b/tools/perf/util/pmu.c >> @@ -1854,6 +1854,23 @@ int perf_pmu__scan_file(struct perf_pmu *pmu, const char *name, const char *fmt, >> return ret; >> } >> >> +bool perf_pmu__file_exists(struct perf_pmu *pmu, const char *name) >> +{ >> + char path[PATH_MAX]; >> + struct stat statbuf; >> + const char *sysfs = sysfs__mountpoint(); >> + >> + if (!sysfs) >> + return false; >> + >> + snprintf(path, PATH_MAX, >> + "%s" EVENT_SOURCE_DEVICE_PATH "%s/%s", sysfs, pmu->name, name); >> + if (!file_available(path)) >> + return false; >> + >> + return stat(path, &statbuf) == 0; >> +} >> + >> static int perf_pmu__new_caps(struct list_head *list, char *name, char *value) >> { >> struct perf_pmu_caps *caps = zalloc(sizeof(*caps)); >> diff --git a/tools/perf/util/pmu.h b/tools/perf/util/pmu.h >> index 541889fa9f9c..ab728eaf13b6 100644 >> --- a/tools/perf/util/pmu.h >> +++ b/tools/perf/util/pmu.h >> @@ -120,6 +120,8 @@ bool pmu_have_event(const char *pname, const char *name); >> >> int perf_pmu__scan_file(struct perf_pmu *pmu, const char *name, const char *fmt, ...) __scanf(3, 4); >> >> +bool perf_pmu__file_exists(struct perf_pmu *pmu, const char *name); >> + >> int perf_pmu__test(void); >> >> struct perf_event_attr *perf_pmu__get_default_config(struct perf_pmu *pmu); >> -- >> 2.25.1