cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

openat-syscall.c (2171B)


      1// SPDX-License-Identifier: GPL-2.0
      2#include <errno.h>
      3#include <inttypes.h>
      4#include <api/fs/tracing_path.h>
      5#include <linux/err.h>
      6#include <linux/string.h>
      7#include <sys/types.h>
      8#include <sys/stat.h>
      9#include <fcntl.h>
     10#include "thread_map.h"
     11#include "evsel.h"
     12#include "debug.h"
     13#include "tests.h"
     14#include "util/counts.h"
     15
     16static int test__openat_syscall_event(struct test_suite *test __maybe_unused,
     17				      int subtest __maybe_unused)
     18{
     19	int err = TEST_FAIL, fd;
     20	struct evsel *evsel;
     21	unsigned int nr_openat_calls = 111, i;
     22	struct perf_thread_map *threads = thread_map__new(-1, getpid(), UINT_MAX);
     23	char sbuf[STRERR_BUFSIZE];
     24	char errbuf[BUFSIZ];
     25
     26	if (threads == NULL) {
     27		pr_debug("thread_map__new\n");
     28		return TEST_FAIL;
     29	}
     30
     31	evsel = evsel__newtp("syscalls", "sys_enter_openat");
     32	if (IS_ERR(evsel)) {
     33		tracing_path__strerror_open_tp(errno, errbuf, sizeof(errbuf), "syscalls", "sys_enter_openat");
     34		pr_debug("%s\n", errbuf);
     35		err = TEST_SKIP;
     36		goto out_thread_map_delete;
     37	}
     38
     39	if (evsel__open_per_thread(evsel, threads) < 0) {
     40		pr_debug("failed to open counter: %s, "
     41			 "tweak /proc/sys/kernel/perf_event_paranoid?\n",
     42			 str_error_r(errno, sbuf, sizeof(sbuf)));
     43		err = TEST_SKIP;
     44		goto out_evsel_delete;
     45	}
     46
     47	for (i = 0; i < nr_openat_calls; ++i) {
     48		fd = openat(0, "/etc/passwd", O_RDONLY);
     49		close(fd);
     50	}
     51
     52	if (evsel__read_on_cpu(evsel, 0, 0) < 0) {
     53		pr_debug("evsel__read_on_cpu\n");
     54		goto out_close_fd;
     55	}
     56
     57	if (perf_counts(evsel->counts, 0, 0)->val != nr_openat_calls) {
     58		pr_debug("evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n",
     59			 nr_openat_calls, perf_counts(evsel->counts, 0, 0)->val);
     60		goto out_close_fd;
     61	}
     62
     63	err = TEST_OK;
     64out_close_fd:
     65	perf_evsel__close_fd(&evsel->core);
     66out_evsel_delete:
     67	evsel__delete(evsel);
     68out_thread_map_delete:
     69	perf_thread_map__put(threads);
     70	return err;
     71}
     72
     73static struct test_case tests__openat_syscall_event[] = {
     74	TEST_CASE_REASON("Detect openat syscall event",
     75			 openat_syscall_event,
     76			 "permissions"),
     77	{	.name = NULL, }
     78};
     79
     80struct test_suite suite__openat_syscall_event = {
     81	.desc = "Detect openat syscall event",
     82	.test_cases = tests__openat_syscall_event,
     83};