open-syscall.c 1.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. #include "thread_map.h"
  2. #include "evsel.h"
  3. #include "debug.h"
  4. #include "tests.h"
  5. int test__open_syscall_event(void)
  6. {
  7. int err = -1, fd;
  8. struct perf_evsel *evsel;
  9. unsigned int nr_open_calls = 111, i;
  10. struct thread_map *threads = thread_map__new(-1, getpid(), UINT_MAX);
  11. if (threads == NULL) {
  12. pr_debug("thread_map__new\n");
  13. return -1;
  14. }
  15. evsel = perf_evsel__newtp("syscalls", "sys_enter_open", 0);
  16. if (evsel == NULL) {
  17. pr_debug("is debugfs mounted on /sys/kernel/debug?\n");
  18. goto out_thread_map_delete;
  19. }
  20. if (perf_evsel__open_per_thread(evsel, threads) < 0) {
  21. pr_debug("failed to open counter: %s, "
  22. "tweak /proc/sys/kernel/perf_event_paranoid?\n",
  23. strerror(errno));
  24. goto out_evsel_delete;
  25. }
  26. for (i = 0; i < nr_open_calls; ++i) {
  27. fd = open("/etc/passwd", O_RDONLY);
  28. close(fd);
  29. }
  30. if (perf_evsel__read_on_cpu(evsel, 0, 0) < 0) {
  31. pr_debug("perf_evsel__read_on_cpu\n");
  32. goto out_close_fd;
  33. }
  34. if (evsel->counts->cpu[0].val != nr_open_calls) {
  35. pr_debug("perf_evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n",
  36. nr_open_calls, evsel->counts->cpu[0].val);
  37. goto out_close_fd;
  38. }
  39. err = 0;
  40. out_close_fd:
  41. perf_evsel__close_fd(evsel, 1, threads->nr);
  42. out_evsel_delete:
  43. perf_evsel__delete(evsel);
  44. out_thread_map_delete:
  45. thread_map__delete(threads);
  46. return err;
  47. }