Merge tag 'trace-printf-v6.13' of git://git.kernel.org/pub/scm/linux/kernel/git/trace...
[drm/drm-misc.git] / tools / perf / tests / openat-syscall-tp-fields.c
blob3943da441979c0fcd7e90333512681cb3a0dc7ca
1 // SPDX-License-Identifier: GPL-2.0
2 #include <stdbool.h>
3 #include <linux/err.h>
4 #include <linux/string.h>
5 #include <sys/types.h>
6 #include <sys/stat.h>
7 #include <fcntl.h>
8 #include "evlist.h"
9 #include "evsel.h"
10 #include "thread_map.h"
11 #include "record.h"
12 #include "tests.h"
13 #include "debug.h"
14 #include "util/mmap.h"
15 #include <errno.h>
16 #include <perf/mmap.h>
17 #include "util/sample.h"
19 #ifndef O_DIRECTORY
20 #define O_DIRECTORY 00200000
21 #endif
22 #ifndef AT_FDCWD
23 #define AT_FDCWD -100
24 #endif
26 static int test__syscall_openat_tp_fields(struct test_suite *test __maybe_unused,
27 int subtest __maybe_unused)
29 struct record_opts opts = {
30 .target = {
31 .uid = UINT_MAX,
32 .uses_mmap = true,
34 .no_buffering = true,
35 .freq = 1,
36 .mmap_pages = 256,
37 .raw_samples = true,
39 const char *filename = "/etc/passwd";
40 int flags = O_RDONLY | O_DIRECTORY;
41 struct evlist *evlist = evlist__new();
42 struct evsel *evsel;
43 int ret = TEST_FAIL, err, i, nr_events = 0, nr_polls = 0;
44 char sbuf[STRERR_BUFSIZE];
46 if (evlist == NULL) {
47 pr_debug("%s: evlist__new\n", __func__);
48 goto out;
51 evsel = evsel__newtp("syscalls", "sys_enter_openat");
52 if (IS_ERR(evsel)) {
53 pr_debug("%s: evsel__newtp\n", __func__);
54 ret = PTR_ERR(evsel) == -EACCES ? TEST_SKIP : TEST_FAIL;
55 goto out_delete_evlist;
58 evlist__add(evlist, evsel);
60 err = evlist__create_maps(evlist, &opts.target);
61 if (err < 0) {
62 pr_debug("%s: evlist__create_maps\n", __func__);
63 goto out_delete_evlist;
66 evsel__config(evsel, &opts, NULL);
68 perf_thread_map__set_pid(evlist->core.threads, 0, getpid());
70 err = evlist__open(evlist);
71 if (err < 0) {
72 pr_debug("perf_evlist__open: %s\n",
73 str_error_r(errno, sbuf, sizeof(sbuf)));
74 goto out_delete_evlist;
77 err = evlist__mmap(evlist, UINT_MAX);
78 if (err < 0) {
79 pr_debug("evlist__mmap: %s\n",
80 str_error_r(errno, sbuf, sizeof(sbuf)));
81 goto out_delete_evlist;
84 evlist__enable(evlist);
87 * Generate the event:
89 openat(AT_FDCWD, filename, flags);
91 while (1) {
92 int before = nr_events;
94 for (i = 0; i < evlist->core.nr_mmaps; i++) {
95 union perf_event *event;
96 struct mmap *md;
98 md = &evlist->mmap[i];
99 if (perf_mmap__read_init(&md->core) < 0)
100 continue;
102 while ((event = perf_mmap__read_event(&md->core)) != NULL) {
103 const u32 type = event->header.type;
104 int tp_flags;
105 struct perf_sample sample;
107 ++nr_events;
109 if (type != PERF_RECORD_SAMPLE) {
110 perf_mmap__consume(&md->core);
111 continue;
114 err = evsel__parse_sample(evsel, event, &sample);
115 if (err) {
116 pr_debug("Can't parse sample, err = %d\n", err);
117 goto out_delete_evlist;
120 tp_flags = evsel__intval(evsel, &sample, "flags");
122 if (flags != tp_flags) {
123 pr_debug("%s: Expected flags=%#x, got %#x\n",
124 __func__, flags, tp_flags);
125 goto out_delete_evlist;
128 goto out_ok;
130 perf_mmap__read_done(&md->core);
133 if (nr_events == before)
134 evlist__poll(evlist, 10);
136 if (++nr_polls > 5) {
137 pr_debug("%s: no events!\n", __func__);
138 goto out_delete_evlist;
141 out_ok:
142 ret = TEST_OK;
143 out_delete_evlist:
144 evlist__delete(evlist);
145 out:
146 return ret;
149 static struct test_case tests__syscall_openat_tp_fields[] = {
150 TEST_CASE_REASON("syscalls:sys_enter_openat event fields",
151 syscall_openat_tp_fields,
152 "permissions"),
153 { .name = NULL, }
156 struct test_suite suite__syscall_openat_tp_fields = {
157 .desc = "syscalls:sys_enter_openat event fields",
158 .test_cases = tests__syscall_openat_tp_fields,