~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/testing/selftests/syscall_user_dispatch/sud_benchmark.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0-only
  2 /*
  3  * Copyright (c) 2020 Collabora Ltd.
  4  *
  5  * Benchmark and test syscall user dispatch
  6  */
  7 
  8 #define _GNU_SOURCE
  9 #include <stdio.h>
 10 #include <string.h>
 11 #include <stdlib.h>
 12 #include <signal.h>
 13 #include <errno.h>
 14 #include <time.h>
 15 #include <sys/time.h>
 16 #include <unistd.h>
 17 #include <sys/sysinfo.h>
 18 #include <sys/prctl.h>
 19 #include <sys/syscall.h>
 20 
 21 #ifndef PR_SET_SYSCALL_USER_DISPATCH
 22 # define PR_SET_SYSCALL_USER_DISPATCH   59
 23 # define PR_SYS_DISPATCH_OFF    0
 24 # define PR_SYS_DISPATCH_ON     1
 25 # define SYSCALL_DISPATCH_FILTER_ALLOW  0
 26 # define SYSCALL_DISPATCH_FILTER_BLOCK  1
 27 #endif
 28 
 29 #ifdef __NR_syscalls
 30 # define MAGIC_SYSCALL_1 (__NR_syscalls + 1) /* Bad Linux syscall number */
 31 #else
 32 # define MAGIC_SYSCALL_1 (0xff00)  /* Bad Linux syscall number */
 33 #endif
 34 
 35 /*
 36  * To test returning from a sigsys with selector blocked, the test
 37  * requires some per-architecture support (i.e. knowledge about the
 38  * signal trampoline address).  On i386, we know it is on the vdso, and
 39  * a small trampoline is open-coded for x86_64.  Other architectures
 40  * that have a trampoline in the vdso will support TEST_BLOCKED_RETURN
 41  * out of the box, but don't enable them until they support syscall user
 42  * dispatch.
 43  */
 44 #if defined(__x86_64__) || defined(__i386__)
 45 #define TEST_BLOCKED_RETURN
 46 #endif
 47 
 48 #ifdef __x86_64__
 49 void* (syscall_dispatcher_start)(void);
 50 void* (syscall_dispatcher_end)(void);
 51 #else
 52 unsigned long syscall_dispatcher_start = 0;
 53 unsigned long syscall_dispatcher_end = 0;
 54 #endif
 55 
 56 unsigned long trapped_call_count = 0;
 57 unsigned long native_call_count = 0;
 58 
 59 char selector;
 60 #define SYSCALL_BLOCK   (selector = SYSCALL_DISPATCH_FILTER_BLOCK)
 61 #define SYSCALL_UNBLOCK (selector = SYSCALL_DISPATCH_FILTER_ALLOW)
 62 
 63 #define CALIBRATION_STEP 100000
 64 #define CALIBRATE_TO_SECS 5
 65 int factor;
 66 
 67 static double one_sysinfo_step(void)
 68 {
 69         struct timespec t1, t2;
 70         int i;
 71         struct sysinfo info;
 72 
 73         clock_gettime(CLOCK_MONOTONIC, &t1);
 74         for (i = 0; i < CALIBRATION_STEP; i++)
 75                 sysinfo(&info);
 76         clock_gettime(CLOCK_MONOTONIC, &t2);
 77         return (t2.tv_sec - t1.tv_sec) + 1.0e-9 * (t2.tv_nsec - t1.tv_nsec);
 78 }
 79 
 80 static void calibrate_set(void)
 81 {
 82         double elapsed = 0;
 83 
 84         printf("Calibrating test set to last ~%d seconds...\n", CALIBRATE_TO_SECS);
 85 
 86         while (elapsed < 1) {
 87                 elapsed += one_sysinfo_step();
 88                 factor += CALIBRATE_TO_SECS;
 89         }
 90 
 91         printf("test iterations = %d\n", CALIBRATION_STEP * factor);
 92 }
 93 
 94 static double perf_syscall(void)
 95 {
 96         unsigned int i;
 97         double partial = 0;
 98 
 99         for (i = 0; i < factor; ++i)
100                 partial += one_sysinfo_step()/(CALIBRATION_STEP*factor);
101         return partial;
102 }
103 
104 static void handle_sigsys(int sig, siginfo_t *info, void *ucontext)
105 {
106         char buf[1024];
107         int len;
108 
109         SYSCALL_UNBLOCK;
110 
111         /* printf and friends are not signal-safe. */
112         len = snprintf(buf, 1024, "Caught sys_%x\n", info->si_syscall);
113         write(1, buf, len);
114 
115         if (info->si_syscall == MAGIC_SYSCALL_1)
116                 trapped_call_count++;
117         else
118                 native_call_count++;
119 
120 #ifdef TEST_BLOCKED_RETURN
121         SYSCALL_BLOCK;
122 #endif
123 
124 #ifdef __x86_64__
125         __asm__ volatile("movq $0xf, %rax");
126         __asm__ volatile("leaveq");
127         __asm__ volatile("add $0x8, %rsp");
128         __asm__ volatile("syscall_dispatcher_start:");
129         __asm__ volatile("syscall");
130         __asm__ volatile("nop"); /* Landing pad within dispatcher area */
131         __asm__ volatile("syscall_dispatcher_end:");
132 #endif
133 
134 }
135 
136 int main(void)
137 {
138         struct sigaction act;
139         double time1, time2;
140         int ret;
141         sigset_t mask;
142 
143         memset(&act, 0, sizeof(act));
144         sigemptyset(&mask);
145 
146         act.sa_sigaction = handle_sigsys;
147         act.sa_flags = SA_SIGINFO;
148         act.sa_mask = mask;
149 
150         calibrate_set();
151 
152         time1 = perf_syscall();
153         printf("Avg syscall time %.0lfns.\n", time1 * 1.0e9);
154 
155         ret = sigaction(SIGSYS, &act, NULL);
156         if (ret) {
157                 perror("Error sigaction:");
158                 exit(-1);
159         }
160 
161         fprintf(stderr, "Enabling syscall trapping.\n");
162 
163         if (prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON,
164                   syscall_dispatcher_start,
165                   (syscall_dispatcher_end - syscall_dispatcher_start + 1),
166                   &selector)) {
167                 perror("prctl failed\n");
168                 exit(-1);
169         }
170 
171         SYSCALL_BLOCK;
172         syscall(MAGIC_SYSCALL_1);
173 
174 #ifdef TEST_BLOCKED_RETURN
175         if (selector == SYSCALL_DISPATCH_FILTER_ALLOW) {
176                 fprintf(stderr, "Failed to return with selector blocked.\n");
177                 exit(-1);
178         }
179 #endif
180 
181         SYSCALL_UNBLOCK;
182 
183         if (!trapped_call_count) {
184                 fprintf(stderr, "syscall trapping does not work.\n");
185                 exit(-1);
186         }
187 
188         time2 = perf_syscall();
189 
190         if (native_call_count) {
191                 perror("syscall trapping intercepted more syscalls than expected\n");
192                 exit(-1);
193         }
194 
195         printf("trapped_call_count %lu, native_call_count %lu.\n",
196                trapped_call_count, native_call_count);
197         printf("Avg syscall time %.0lfns.\n", time2 * 1.0e9);
198         printf("Interception overhead: %.1lf%% (+%.0lfns).\n",
199                100.0 * (time2 / time1 - 1.0), 1.0e9 * (time2 - time1));
200         return 0;
201 
202 }
203 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php