1 // SPDX-License-Identifier: GPL-2.0 2 #include <stdbool.h> 3 #include <linux/err.h> 4 #include <linux/string.h> 5 #include <sys/types.h> 6 #include <sys/stat.h> 7 #include <fcntl.h> 8 #include "evlist.h" 9 #include "evsel.h" 10 #include "thread_map.h" 11 #include "record.h" 12 #include "tests.h" 13 #include "debug.h" 14 #include "util/mmap.h" 15 #include <errno.h> 16 #include <perf/mmap.h> 17 #include "util/sample.h" 18 19 #ifndef O_DIRECTORY 20 #define O_DIRECTORY 00200000 21 #endif 22 #ifndef AT_FDCWD 23 #define AT_FDCWD -100 24 #endif 25 26 static int test__syscall_openat_tp_fields(struct test_suite *test __maybe_unused, 27 int subtest __maybe_unused) 28 { 29 struct record_opts opts = { 30 .target = { 31 .uses_mmap = true, 32 }, 33 .no_buffering = true, 34 .freq = 1, 35 .mmap_pages = 256, 36 .raw_samples = true, 37 }; 38 const char *filename = "/etc/passwd"; 39 int flags = O_RDONLY | O_DIRECTORY; 40 struct evlist *evlist = evlist__new(); 41 struct evsel *evsel; 42 int ret = TEST_FAIL, err, i, nr_events = 0, nr_polls = 0; 43 char sbuf[STRERR_BUFSIZE]; 44 45 if (evlist == NULL) { 46 pr_debug("%s: evlist__new\n", __func__); 47 goto out; 48 } 49 50 evsel = evsel__newtp("syscalls", "sys_enter_openat"); 51 if (IS_ERR(evsel)) { 52 pr_debug("%s: evsel__newtp\n", __func__); 53 ret = PTR_ERR(evsel) == -EACCES ? TEST_SKIP : TEST_FAIL; 54 goto out_delete_evlist; 55 } 56 57 evlist__add(evlist, evsel); 58 59 err = evlist__create_maps(evlist, &opts.target); 60 if (err < 0) { 61 pr_debug("%s: evlist__create_maps\n", __func__); 62 goto out_delete_evlist; 63 } 64 65 evsel__config(evsel, &opts, NULL); 66 67 perf_thread_map__set_pid(evlist->core.threads, 0, getpid()); 68 69 err = evlist__open(evlist); 70 if (err < 0) { 71 pr_debug("perf_evlist__open: %s\n", 72 str_error_r(errno, sbuf, sizeof(sbuf))); 73 goto out_delete_evlist; 74 } 75 76 err = evlist__mmap(evlist, UINT_MAX); 77 if (err < 0) { 78 pr_debug("evlist__mmap: %s\n", 79 str_error_r(errno, sbuf, sizeof(sbuf))); 80 goto out_delete_evlist; 81 } 82 83 evlist__enable(evlist); 84 85 /* 86 * Generate the event: 87 */ 88 openat(AT_FDCWD, filename, flags); 89 90 while (1) { 91 int before = nr_events; 92 93 for (i = 0; i < evlist->core.nr_mmaps; i++) { 94 union perf_event *event; 95 struct mmap *md; 96 97 md = &evlist->mmap[i]; 98 if (perf_mmap__read_init(&md->core) < 0) 99 continue; 100 101 while ((event = perf_mmap__read_event(&md->core)) != NULL) { 102 const u32 type = event->header.type; 103 int tp_flags; 104 struct perf_sample sample; 105 106 ++nr_events; 107 108 if (type != PERF_RECORD_SAMPLE) { 109 perf_mmap__consume(&md->core); 110 continue; 111 } 112 113 perf_sample__init(&sample, /*all=*/false); 114 err = evsel__parse_sample(evsel, event, &sample); 115 if (err) { 116 pr_debug("Can't parse sample, err = %d\n", err); 117 perf_sample__exit(&sample); 118 goto out_delete_evlist; 119 } 120 121 tp_flags = evsel__intval(evsel, &sample, "flags"); 122 perf_sample__exit(&sample); 123 if (flags != tp_flags) { 124 pr_debug("%s: Expected flags=%#x, got %#x\n", 125 __func__, flags, tp_flags); 126 goto out_delete_evlist; 127 } 128 129 goto out_ok; 130 } 131 perf_mmap__read_done(&md->core); 132 } 133 134 if (nr_events == before) 135 evlist__poll(evlist, 10); 136 137 if (++nr_polls > 5) { 138 pr_debug("%s: no events!\n", __func__); 139 goto out_delete_evlist; 140 } 141 } 142 out_ok: 143 ret = TEST_OK; 144 out_delete_evlist: 145 evlist__delete(evlist); 146 out: 147 return ret; 148 } 149 150 static struct test_case tests__syscall_openat_tp_fields[] = { 151 TEST_CASE_REASON("syscalls:sys_enter_openat event fields", 152 syscall_openat_tp_fields, 153 "permissions"), 154 { .name = NULL, } 155 }; 156 157 struct test_suite suite__syscall_openat_tp_fields = { 158 .desc = "syscalls:sys_enter_openat event fields", 159 .test_cases = tests__syscall_openat_tp_fields, 160 }; 161