~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/perf/tests/mmap-basic.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 #include <errno.h>
  3 #include <inttypes.h>
  4 #include <stdlib.h>
  5 #include <perf/cpumap.h>
  6 
  7 #include "debug.h"
  8 #include "event.h"
  9 #include "evlist.h"
 10 #include "evsel.h"
 11 #include "thread_map.h"
 12 #include "tests.h"
 13 #include "util/mmap.h"
 14 #include "util/sample.h"
 15 #include <linux/err.h>
 16 #include <linux/kernel.h>
 17 #include <linux/string.h>
 18 #include <perf/evlist.h>
 19 #include <perf/mmap.h>
 20 
 21 /*
 22  * This test will generate random numbers of calls to some getpid syscalls,
 23  * then establish an mmap for a group of events that are created to monitor
 24  * the syscalls.
 25  *
 26  * It will receive the events, using mmap, use its PERF_SAMPLE_ID generated
 27  * sample.id field to map back to its respective perf_evsel instance.
 28  *
 29  * Then it checks if the number of syscalls reported as perf events by
 30  * the kernel corresponds to the number of syscalls made.
 31  */
 32 static int test__basic_mmap(struct test_suite *test __maybe_unused, int subtest __maybe_unused)
 33 {
 34         int err = TEST_FAIL;
 35         union perf_event *event;
 36         struct perf_thread_map *threads;
 37         struct perf_cpu_map *cpus;
 38         struct evlist *evlist;
 39         cpu_set_t cpu_set;
 40         const char *syscall_names[] = { "getsid", "getppid", "getpgid", };
 41         pid_t (*syscalls[])(void) = { (void *)getsid, getppid, (void*)getpgid };
 42 #define nsyscalls ARRAY_SIZE(syscall_names)
 43         unsigned int nr_events[nsyscalls],
 44                      expected_nr_events[nsyscalls], i, j;
 45         struct evsel *evsels[nsyscalls], *evsel;
 46         char sbuf[STRERR_BUFSIZE];
 47         struct mmap *md;
 48 
 49         threads = thread_map__new(-1, getpid(), UINT_MAX);
 50         if (threads == NULL) {
 51                 pr_debug("thread_map__new\n");
 52                 return -1;
 53         }
 54 
 55         cpus = perf_cpu_map__new_online_cpus();
 56         if (cpus == NULL) {
 57                 pr_debug("perf_cpu_map__new\n");
 58                 goto out_free_threads;
 59         }
 60 
 61         CPU_ZERO(&cpu_set);
 62         CPU_SET(perf_cpu_map__cpu(cpus, 0).cpu, &cpu_set);
 63         sched_setaffinity(0, sizeof(cpu_set), &cpu_set);
 64         if (sched_setaffinity(0, sizeof(cpu_set), &cpu_set) < 0) {
 65                 pr_debug("sched_setaffinity() failed on CPU %d: %s ",
 66                          perf_cpu_map__cpu(cpus, 0).cpu,
 67                          str_error_r(errno, sbuf, sizeof(sbuf)));
 68                 goto out_free_cpus;
 69         }
 70 
 71         evlist = evlist__new();
 72         if (evlist == NULL) {
 73                 pr_debug("evlist__new\n");
 74                 goto out_free_cpus;
 75         }
 76 
 77         perf_evlist__set_maps(&evlist->core, cpus, threads);
 78 
 79         for (i = 0; i < nsyscalls; ++i) {
 80                 char name[64];
 81 
 82                 snprintf(name, sizeof(name), "sys_enter_%s", syscall_names[i]);
 83                 evsels[i] = evsel__newtp("syscalls", name);
 84                 if (IS_ERR(evsels[i])) {
 85                         pr_debug("evsel__new(%s)\n", name);
 86                         if (PTR_ERR(evsels[i]) == -EACCES) {
 87                                 /* Permissions failure, flag the failure as a skip. */
 88                                 err = TEST_SKIP;
 89                         }
 90                         goto out_delete_evlist;
 91                 }
 92 
 93                 evsels[i]->core.attr.wakeup_events = 1;
 94                 evsel__set_sample_id(evsels[i], false);
 95 
 96                 evlist__add(evlist, evsels[i]);
 97 
 98                 if (evsel__open(evsels[i], cpus, threads) < 0) {
 99                         pr_debug("failed to open counter: %s, "
100                                  "tweak /proc/sys/kernel/perf_event_paranoid?\n",
101                                  str_error_r(errno, sbuf, sizeof(sbuf)));
102                         goto out_delete_evlist;
103                 }
104 
105                 nr_events[i] = 0;
106                 expected_nr_events[i] = 1 + rand() % 127;
107         }
108 
109         if (evlist__mmap(evlist, 128) < 0) {
110                 pr_debug("failed to mmap events: %d (%s)\n", errno,
111                          str_error_r(errno, sbuf, sizeof(sbuf)));
112                 goto out_delete_evlist;
113         }
114 
115         for (i = 0; i < nsyscalls; ++i)
116                 for (j = 0; j < expected_nr_events[i]; ++j) {
117                         syscalls[i]();
118                 }
119 
120         md = &evlist->mmap[0];
121         if (perf_mmap__read_init(&md->core) < 0)
122                 goto out_init;
123 
124         while ((event = perf_mmap__read_event(&md->core)) != NULL) {
125                 struct perf_sample sample;
126 
127                 if (event->header.type != PERF_RECORD_SAMPLE) {
128                         pr_debug("unexpected %s event\n",
129                                  perf_event__name(event->header.type));
130                         goto out_delete_evlist;
131                 }
132 
133                 err = evlist__parse_sample(evlist, event, &sample);
134                 if (err) {
135                         pr_err("Can't parse sample, err = %d\n", err);
136                         goto out_delete_evlist;
137                 }
138 
139                 err = -1;
140                 evsel = evlist__id2evsel(evlist, sample.id);
141                 if (evsel == NULL) {
142                         pr_debug("event with id %" PRIu64
143                                  " doesn't map to an evsel\n", sample.id);
144                         goto out_delete_evlist;
145                 }
146                 nr_events[evsel->core.idx]++;
147                 perf_mmap__consume(&md->core);
148         }
149         perf_mmap__read_done(&md->core);
150 
151 out_init:
152         err = 0;
153         evlist__for_each_entry(evlist, evsel) {
154                 if (nr_events[evsel->core.idx] != expected_nr_events[evsel->core.idx]) {
155                         pr_debug("expected %d %s events, got %d\n",
156                                  expected_nr_events[evsel->core.idx],
157                                  evsel__name(evsel), nr_events[evsel->core.idx]);
158                         err = -1;
159                         goto out_delete_evlist;
160                 }
161         }
162 
163 out_delete_evlist:
164         evlist__delete(evlist);
165 out_free_cpus:
166         perf_cpu_map__put(cpus);
167 out_free_threads:
168         perf_thread_map__put(threads);
169         return err;
170 }
171 
172 static int test_stat_user_read(int event)
173 {
174         struct perf_counts_values counts = { .val = 0 };
175         struct perf_thread_map *threads;
176         struct perf_evsel *evsel;
177         struct perf_event_mmap_page *pc;
178         struct perf_event_attr attr = {
179                 .type   = PERF_TYPE_HARDWARE,
180                 .config = event,
181 #ifdef __aarch64__
182                 .config1 = 0x2,         /* Request user access */
183 #endif
184         };
185         int err, i, ret = TEST_FAIL;
186         bool opened = false, mapped = false;
187 
188         threads = perf_thread_map__new_dummy();
189         TEST_ASSERT_VAL("failed to create threads", threads);
190 
191         perf_thread_map__set_pid(threads, 0, 0);
192 
193         evsel = perf_evsel__new(&attr);
194         TEST_ASSERT_VAL("failed to create evsel", evsel);
195 
196         err = perf_evsel__open(evsel, NULL, threads);
197         if (err) {
198                 pr_err("failed to open evsel: %s\n", strerror(-err));
199                 ret = TEST_SKIP;
200                 goto out;
201         }
202         opened = true;
203 
204         err = perf_evsel__mmap(evsel, 0);
205         if (err) {
206                 pr_err("failed to mmap evsel: %s\n", strerror(-err));
207                 goto out;
208         }
209         mapped = true;
210 
211         pc = perf_evsel__mmap_base(evsel, 0, 0);
212         if (!pc) {
213                 pr_err("failed to get mmapped address\n");
214                 goto out;
215         }
216 
217         if (!pc->cap_user_rdpmc || !pc->index) {
218                 pr_err("userspace counter access not %s\n",
219                         !pc->cap_user_rdpmc ? "supported" : "enabled");
220                 ret = TEST_SKIP;
221                 goto out;
222         }
223         if (pc->pmc_width < 32) {
224                 pr_err("userspace counter width not set (%d)\n", pc->pmc_width);
225                 goto out;
226         }
227 
228         perf_evsel__read(evsel, 0, 0, &counts);
229         if (counts.val == 0) {
230                 pr_err("failed to read value for evsel\n");
231                 goto out;
232         }
233 
234         for (i = 0; i < 5; i++) {
235                 volatile int count = 0x10000 << i;
236                 __u64 start, end, last = 0;
237 
238                 pr_debug("\tloop = %u, ", count);
239 
240                 perf_evsel__read(evsel, 0, 0, &counts);
241                 start = counts.val;
242 
243                 while (count--) ;
244 
245                 perf_evsel__read(evsel, 0, 0, &counts);
246                 end = counts.val;
247 
248                 if ((end - start) < last) {
249                         pr_err("invalid counter data: end=%llu start=%llu last= %llu\n",
250                                 end, start, last);
251                         goto out;
252                 }
253                 last = end - start;
254                 pr_debug("count = %llu\n", end - start);
255         }
256         ret = TEST_OK;
257 
258 out:
259         if (mapped)
260                 perf_evsel__munmap(evsel);
261         if (opened)
262                 perf_evsel__close(evsel);
263         perf_evsel__delete(evsel);
264 
265         perf_thread_map__put(threads);
266         return ret;
267 }
268 
269 static int test__mmap_user_read_instr(struct test_suite *test __maybe_unused,
270                                       int subtest __maybe_unused)
271 {
272         return test_stat_user_read(PERF_COUNT_HW_INSTRUCTIONS);
273 }
274 
275 static int test__mmap_user_read_cycles(struct test_suite *test __maybe_unused,
276                                        int subtest __maybe_unused)
277 {
278         return test_stat_user_read(PERF_COUNT_HW_CPU_CYCLES);
279 }
280 
281 static struct test_case tests__basic_mmap[] = {
282         TEST_CASE_REASON("Read samples using the mmap interface",
283                          basic_mmap,
284                          "permissions"),
285         TEST_CASE_REASON("User space counter reading of instructions",
286                          mmap_user_read_instr,
287 #if defined(__i386__) || defined(__x86_64__) || defined(__aarch64__) || \
288                          (defined(__riscv) && __riscv_xlen == 64)
289                          "permissions"
290 #else
291                          "unsupported"
292 #endif
293                 ),
294         TEST_CASE_REASON("User space counter reading of cycles",
295                          mmap_user_read_cycles,
296 #if defined(__i386__) || defined(__x86_64__) || defined(__aarch64__) || \
297                          (defined(__riscv) && __riscv_xlen == 64)
298                          "permissions"
299 #else
300                          "unsupported"
301 #endif
302                 ),
303         {       .name = NULL, }
304 };
305 
306 struct test_suite suite__basic_mmap = {
307         .desc = "mmap interface tests",
308         .test_cases = tests__basic_mmap,
309 };
310 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php