Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include <errno.h>
3#include <inttypes.h>
4#include <api/fs/tracing_path.h>
5#include <linux/err.h>
6#include <sys/types.h>
7#include <sys/stat.h>
8#include <fcntl.h>
9#include "thread_map.h"
10#include "evsel.h"
11#include "debug.h"
12#include "tests.h"
13
14int test__openat_syscall_event(struct test *test __maybe_unused, int subtest __maybe_unused)
15{
16 int err = -1, fd;
17 struct perf_evsel *evsel;
18 unsigned int nr_openat_calls = 111, i;
19 struct thread_map *threads = thread_map__new(-1, getpid(), UINT_MAX);
20 char sbuf[STRERR_BUFSIZE];
21 char errbuf[BUFSIZ];
22
23 if (threads == NULL) {
24 pr_debug("thread_map__new\n");
25 return -1;
26 }
27
28 evsel = perf_evsel__newtp("syscalls", "sys_enter_openat");
29 if (IS_ERR(evsel)) {
30 tracing_path__strerror_open_tp(errno, errbuf, sizeof(errbuf), "syscalls", "sys_enter_openat");
31 pr_debug("%s\n", errbuf);
32 goto out_thread_map_delete;
33 }
34
35 if (perf_evsel__open_per_thread(evsel, threads) < 0) {
36 pr_debug("failed to open counter: %s, "
37 "tweak /proc/sys/kernel/perf_event_paranoid?\n",
38 str_error_r(errno, sbuf, sizeof(sbuf)));
39 goto out_evsel_delete;
40 }
41
42 for (i = 0; i < nr_openat_calls; ++i) {
43 fd = openat(0, "/etc/passwd", O_RDONLY);
44 close(fd);
45 }
46
47 if (perf_evsel__read_on_cpu(evsel, 0, 0) < 0) {
48 pr_debug("perf_evsel__read_on_cpu\n");
49 goto out_close_fd;
50 }
51
52 if (perf_counts(evsel->counts, 0, 0)->val != nr_openat_calls) {
53 pr_debug("perf_evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n",
54 nr_openat_calls, perf_counts(evsel->counts, 0, 0)->val);
55 goto out_close_fd;
56 }
57
58 err = 0;
59out_close_fd:
60 perf_evsel__close_fd(evsel);
61out_evsel_delete:
62 perf_evsel__delete(evsel);
63out_thread_map_delete:
64 thread_map__put(threads);
65 return err;
66}
1#include <api/fs/tracing_path.h>
2#include <linux/err.h>
3#include "thread_map.h"
4#include "evsel.h"
5#include "debug.h"
6#include "tests.h"
7
8int test__openat_syscall_event(int subtest __maybe_unused)
9{
10 int err = -1, fd;
11 struct perf_evsel *evsel;
12 unsigned int nr_openat_calls = 111, i;
13 struct thread_map *threads = thread_map__new(-1, getpid(), UINT_MAX);
14 char sbuf[STRERR_BUFSIZE];
15 char errbuf[BUFSIZ];
16
17 if (threads == NULL) {
18 pr_debug("thread_map__new\n");
19 return -1;
20 }
21
22 evsel = perf_evsel__newtp("syscalls", "sys_enter_openat");
23 if (IS_ERR(evsel)) {
24 tracing_path__strerror_open_tp(errno, errbuf, sizeof(errbuf), "syscalls", "sys_enter_openat");
25 pr_debug("%s\n", errbuf);
26 goto out_thread_map_delete;
27 }
28
29 if (perf_evsel__open_per_thread(evsel, threads) < 0) {
30 pr_debug("failed to open counter: %s, "
31 "tweak /proc/sys/kernel/perf_event_paranoid?\n",
32 str_error_r(errno, sbuf, sizeof(sbuf)));
33 goto out_evsel_delete;
34 }
35
36 for (i = 0; i < nr_openat_calls; ++i) {
37 fd = openat(0, "/etc/passwd", O_RDONLY);
38 close(fd);
39 }
40
41 if (perf_evsel__read_on_cpu(evsel, 0, 0) < 0) {
42 pr_debug("perf_evsel__read_on_cpu\n");
43 goto out_close_fd;
44 }
45
46 if (perf_counts(evsel->counts, 0, 0)->val != nr_openat_calls) {
47 pr_debug("perf_evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n",
48 nr_openat_calls, perf_counts(evsel->counts, 0, 0)->val);
49 goto out_close_fd;
50 }
51
52 err = 0;
53out_close_fd:
54 perf_evsel__close_fd(evsel, 1, threads->nr);
55out_evsel_delete:
56 perf_evsel__delete(evsel);
57out_thread_map_delete:
58 thread_map__put(threads);
59 return err;
60}