cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

openat-syscall-tp-fields.c (3156B)


      1// SPDX-License-Identifier: GPL-2.0
      2#include <stdbool.h>
      3#include <linux/err.h>
      4#include <linux/string.h>
      5#include <sys/types.h>
      6#include <sys/stat.h>
      7#include <fcntl.h>
      8#include "evlist.h"
      9#include "evsel.h"
     10#include "thread_map.h"
     11#include "record.h"
     12#include "tests.h"
     13#include "debug.h"
     14#include "util/mmap.h"
     15#include <errno.h>
     16#include <perf/mmap.h>
     17
     18#ifndef O_DIRECTORY
     19#define O_DIRECTORY    00200000
     20#endif
     21#ifndef AT_FDCWD
     22#define AT_FDCWD       -100
     23#endif
     24
     25static int test__syscall_openat_tp_fields(struct test_suite *test __maybe_unused,
     26					  int subtest __maybe_unused)
     27{
     28	struct record_opts opts = {
     29		.target = {
     30			.uid = UINT_MAX,
     31			.uses_mmap = true,
     32		},
     33		.no_buffering = true,
     34		.freq	      = 1,
     35		.mmap_pages   = 256,
     36		.raw_samples  = true,
     37	};
     38	const char *filename = "/etc/passwd";
     39	int flags = O_RDONLY | O_DIRECTORY;
     40	struct evlist *evlist = evlist__new();
     41	struct evsel *evsel;
     42	int err = -1, i, nr_events = 0, nr_polls = 0;
     43	char sbuf[STRERR_BUFSIZE];
     44
     45	if (evlist == NULL) {
     46		pr_debug("%s: evlist__new\n", __func__);
     47		goto out;
     48	}
     49
     50	evsel = evsel__newtp("syscalls", "sys_enter_openat");
     51	if (IS_ERR(evsel)) {
     52		pr_debug("%s: evsel__newtp\n", __func__);
     53		goto out_delete_evlist;
     54	}
     55
     56	evlist__add(evlist, evsel);
     57
     58	err = evlist__create_maps(evlist, &opts.target);
     59	if (err < 0) {
     60		pr_debug("%s: evlist__create_maps\n", __func__);
     61		goto out_delete_evlist;
     62	}
     63
     64	evsel__config(evsel, &opts, NULL);
     65
     66	perf_thread_map__set_pid(evlist->core.threads, 0, getpid());
     67
     68	err = evlist__open(evlist);
     69	if (err < 0) {
     70		pr_debug("perf_evlist__open: %s\n",
     71			 str_error_r(errno, sbuf, sizeof(sbuf)));
     72		goto out_delete_evlist;
     73	}
     74
     75	err = evlist__mmap(evlist, UINT_MAX);
     76	if (err < 0) {
     77		pr_debug("evlist__mmap: %s\n",
     78			 str_error_r(errno, sbuf, sizeof(sbuf)));
     79		goto out_delete_evlist;
     80	}
     81
     82	evlist__enable(evlist);
     83
     84	/*
     85	 * Generate the event:
     86	 */
     87	openat(AT_FDCWD, filename, flags);
     88
     89	while (1) {
     90		int before = nr_events;
     91
     92		for (i = 0; i < evlist->core.nr_mmaps; i++) {
     93			union perf_event *event;
     94			struct mmap *md;
     95
     96			md = &evlist->mmap[i];
     97			if (perf_mmap__read_init(&md->core) < 0)
     98				continue;
     99
    100			while ((event = perf_mmap__read_event(&md->core)) != NULL) {
    101				const u32 type = event->header.type;
    102				int tp_flags;
    103				struct perf_sample sample;
    104
    105				++nr_events;
    106
    107				if (type != PERF_RECORD_SAMPLE) {
    108					perf_mmap__consume(&md->core);
    109					continue;
    110				}
    111
    112				err = evsel__parse_sample(evsel, event, &sample);
    113				if (err) {
    114					pr_debug("Can't parse sample, err = %d\n", err);
    115					goto out_delete_evlist;
    116				}
    117
    118				tp_flags = evsel__intval(evsel, &sample, "flags");
    119
    120				if (flags != tp_flags) {
    121					pr_debug("%s: Expected flags=%#x, got %#x\n",
    122						 __func__, flags, tp_flags);
    123					goto out_delete_evlist;
    124				}
    125
    126				goto out_ok;
    127			}
    128			perf_mmap__read_done(&md->core);
    129		}
    130
    131		if (nr_events == before)
    132			evlist__poll(evlist, 10);
    133
    134		if (++nr_polls > 5) {
    135			pr_debug("%s: no events!\n", __func__);
    136			goto out_delete_evlist;
    137		}
    138	}
    139out_ok:
    140	err = 0;
    141out_delete_evlist:
    142	evlist__delete(evlist);
    143out:
    144	return err;
    145}
    146
    147DEFINE_SUITE("syscalls:sys_enter_openat event fields", syscall_openat_tp_fields);