1 // SPDX-License-Identifier: GPL-2.0 2 #include <stdbool.h> 3 #include <linux/err.h> 4 #include <linux/string.h> 5 #include <sys/types.h> 6 #include <sys/stat.h> 7 #include <fcntl.h> 8 #include "evlist.h" 9 #include "evsel.h" 10 #include "thread_map.h" 11 #include "record.h" 12 #include "tests.h" 13 #include "debug.h" 14 #include "util/mmap.h" 15 #include <errno.h> 16 #include <perf/mmap.h> 17 #include "util/sample.h" 18 19 #ifndef O_DIRECTORY 20 #define O_DIRECTORY 00200000 21 #endif 22 #ifndef AT_FDCWD 23 #define AT_FDCWD -100 24 #endif 25 26 static int test__syscall_openat_tp_fields(struct test_suite *test __maybe_unused, 27 int subtest __maybe_unused) 28 { 29 struct record_opts opts = { 30 .target = { 31 .uid = UINT_MAX, 32 .uses_mmap = true, 33 }, 34 .no_buffering = true, 35 .freq = 1, 36 .mmap_pages = 256, 37 .raw_samples = true, 38 }; 39 const char *filename = "/etc/passwd"; 40 int flags = O_RDONLY | O_DIRECTORY; 41 struct evlist *evlist = evlist__new(); 42 struct evsel *evsel; 43 int ret = TEST_FAIL, err, i, nr_events = 0, nr_polls = 0; 44 char sbuf[STRERR_BUFSIZE]; 45 46 if (evlist == NULL) { 47 pr_debug("%s: evlist__new\n", __func__); 48 goto out; 49 } 50 51 evsel = evsel__newtp("syscalls", "sys_enter_openat"); 52 if (IS_ERR(evsel)) { 53 pr_debug("%s: evsel__newtp\n", __func__); 54 ret = PTR_ERR(evsel) == -EACCES ? TEST_SKIP : TEST_FAIL; 55 goto out_delete_evlist; 56 } 57 58 evlist__add(evlist, evsel); 59 60 err = evlist__create_maps(evlist, &opts.target); 61 if (err < 0) { 62 pr_debug("%s: evlist__create_maps\n", __func__); 63 goto out_delete_evlist; 64 } 65 66 evsel__config(evsel, &opts, NULL); 67 68 perf_thread_map__set_pid(evlist->core.threads, 0, getpid()); 69 70 err = evlist__open(evlist); 71 if (err < 0) { 72 pr_debug("perf_evlist__open: %s\n", 73 str_error_r(errno, sbuf, sizeof(sbuf))); 74 goto out_delete_evlist; 75 } 76 77 err = evlist__mmap(evlist, UINT_MAX); 78 if (err < 0) { 79 pr_debug("evlist__mmap: %s\n", 80 str_error_r(errno, sbuf, sizeof(sbuf))); 81 goto out_delete_evlist; 82 } 83 84 evlist__enable(evlist); 85 86 /* 87 * Generate the event: 88 */ 89 openat(AT_FDCWD, filename, flags); 90 91 while (1) { 92 int before = nr_events; 93 94 for (i = 0; i < evlist->core.nr_mmaps; i++) { 95 union perf_event *event; 96 struct mmap *md; 97 98 md = &evlist->mmap[i]; 99 if (perf_mmap__read_init(&md->core) < 0) 100 continue; 101 102 while ((event = perf_mmap__read_event(&md->core)) != NULL) { 103 const u32 type = event->header.type; 104 int tp_flags; 105 struct perf_sample sample; 106 107 ++nr_events; 108 109 if (type != PERF_RECORD_SAMPLE) { 110 perf_mmap__consume(&md->core); 111 continue; 112 } 113 114 perf_sample__init(&sample, /*all=*/false); 115 err = evsel__parse_sample(evsel, event, &sample); 116 if (err) { 117 pr_debug("Can't parse sample, err = %d\n", err); 118 perf_sample__exit(&sample); 119 goto out_delete_evlist; 120 } 121 122 tp_flags = evsel__intval(evsel, &sample, "flags"); 123 perf_sample__exit(&sample); 124 if (flags != tp_flags) { 125 pr_debug("%s: Expected flags=%#x, got %#x\n", 126 __func__, flags, tp_flags); 127 goto out_delete_evlist; 128 } 129 130 goto out_ok; 131 } 132 perf_mmap__read_done(&md->core); 133 } 134 135 if (nr_events == before) 136 evlist__poll(evlist, 10); 137 138 if (++nr_polls > 5) { 139 pr_debug("%s: no events!\n", __func__); 140 goto out_delete_evlist; 141 } 142 } 143 out_ok: 144 ret = TEST_OK; 145 out_delete_evlist: 146 evlist__delete(evlist); 147 out: 148 return ret; 149 } 150 151 static struct test_case tests__syscall_openat_tp_fields[] = { 152 TEST_CASE_REASON("syscalls:sys_enter_openat event fields", 153 syscall_openat_tp_fields, 154 "permissions"), 155 { .name = NULL, } 156 }; 157 158 struct test_suite suite__syscall_openat_tp_fields = { 159 .desc = "syscalls:sys_enter_openat event fields", 160 .test_cases = tests__syscall_openat_tp_fields, 161 }; 162