builtin-test.c 28 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226
  1. /*
  2. * builtin-test.c
  3. *
  4. * Builtin regression testing command: ever growing number of sanity tests
  5. */
  6. #include "builtin.h"
  7. #include "util/cache.h"
  8. #include "util/debug.h"
  9. #include "util/debugfs.h"
  10. #include "util/evlist.h"
  11. #include "util/parse-options.h"
  12. #include "util/parse-events.h"
  13. #include "util/symbol.h"
  14. #include "util/thread_map.h"
  15. #include "util/pmu.h"
  16. #include "../../include/linux/hw_breakpoint.h"
  17. #include <sys/mman.h>
  18. static int vmlinux_matches_kallsyms_filter(struct map *map __used, struct symbol *sym)
  19. {
  20. bool *visited = symbol__priv(sym);
  21. *visited = true;
  22. return 0;
  23. }
  24. static int test__vmlinux_matches_kallsyms(void)
  25. {
  26. int err = -1;
  27. struct rb_node *nd;
  28. struct symbol *sym;
  29. struct map *kallsyms_map, *vmlinux_map;
  30. struct machine kallsyms, vmlinux;
  31. enum map_type type = MAP__FUNCTION;
  32. long page_size = sysconf(_SC_PAGE_SIZE);
  33. struct ref_reloc_sym ref_reloc_sym = { .name = "_stext", };
  34. /*
  35. * Step 1:
  36. *
  37. * Init the machines that will hold kernel, modules obtained from
  38. * both vmlinux + .ko files and from /proc/kallsyms split by modules.
  39. */
  40. machine__init(&kallsyms, "", HOST_KERNEL_ID);
  41. machine__init(&vmlinux, "", HOST_KERNEL_ID);
  42. /*
  43. * Step 2:
  44. *
  45. * Create the kernel maps for kallsyms and the DSO where we will then
  46. * load /proc/kallsyms. Also create the modules maps from /proc/modules
  47. * and find the .ko files that match them in /lib/modules/`uname -r`/.
  48. */
  49. if (machine__create_kernel_maps(&kallsyms) < 0) {
  50. pr_debug("machine__create_kernel_maps ");
  51. return -1;
  52. }
  53. /*
  54. * Step 3:
  55. *
  56. * Load and split /proc/kallsyms into multiple maps, one per module.
  57. */
  58. if (machine__load_kallsyms(&kallsyms, "/proc/kallsyms", type, NULL) <= 0) {
  59. pr_debug("dso__load_kallsyms ");
  60. goto out;
  61. }
  62. /*
  63. * Step 4:
  64. *
  65. * kallsyms will be internally on demand sorted by name so that we can
  66. * find the reference relocation * symbol, i.e. the symbol we will use
  67. * to see if the running kernel was relocated by checking if it has the
  68. * same value in the vmlinux file we load.
  69. */
  70. kallsyms_map = machine__kernel_map(&kallsyms, type);
  71. sym = map__find_symbol_by_name(kallsyms_map, ref_reloc_sym.name, NULL);
  72. if (sym == NULL) {
  73. pr_debug("dso__find_symbol_by_name ");
  74. goto out;
  75. }
  76. ref_reloc_sym.addr = sym->start;
  77. /*
  78. * Step 5:
  79. *
  80. * Now repeat step 2, this time for the vmlinux file we'll auto-locate.
  81. */
  82. if (machine__create_kernel_maps(&vmlinux) < 0) {
  83. pr_debug("machine__create_kernel_maps ");
  84. goto out;
  85. }
  86. vmlinux_map = machine__kernel_map(&vmlinux, type);
  87. map__kmap(vmlinux_map)->ref_reloc_sym = &ref_reloc_sym;
  88. /*
  89. * Step 6:
  90. *
  91. * Locate a vmlinux file in the vmlinux path that has a buildid that
  92. * matches the one of the running kernel.
  93. *
  94. * While doing that look if we find the ref reloc symbol, if we find it
  95. * we'll have its ref_reloc_symbol.unrelocated_addr and then
  96. * maps__reloc_vmlinux will notice and set proper ->[un]map_ip routines
  97. * to fixup the symbols.
  98. */
  99. if (machine__load_vmlinux_path(&vmlinux, type,
  100. vmlinux_matches_kallsyms_filter) <= 0) {
  101. pr_debug("machine__load_vmlinux_path ");
  102. goto out;
  103. }
  104. err = 0;
  105. /*
  106. * Step 7:
  107. *
  108. * Now look at the symbols in the vmlinux DSO and check if we find all of them
  109. * in the kallsyms dso. For the ones that are in both, check its names and
  110. * end addresses too.
  111. */
  112. for (nd = rb_first(&vmlinux_map->dso->symbols[type]); nd; nd = rb_next(nd)) {
  113. struct symbol *pair, *first_pair;
  114. bool backwards = true;
  115. sym = rb_entry(nd, struct symbol, rb_node);
  116. if (sym->start == sym->end)
  117. continue;
  118. first_pair = machine__find_kernel_symbol(&kallsyms, type, sym->start, NULL, NULL);
  119. pair = first_pair;
  120. if (pair && pair->start == sym->start) {
  121. next_pair:
  122. if (strcmp(sym->name, pair->name) == 0) {
  123. /*
  124. * kallsyms don't have the symbol end, so we
  125. * set that by using the next symbol start - 1,
  126. * in some cases we get this up to a page
  127. * wrong, trace_kmalloc when I was developing
  128. * this code was one such example, 2106 bytes
  129. * off the real size. More than that and we
  130. * _really_ have a problem.
  131. */
  132. s64 skew = sym->end - pair->end;
  133. if (llabs(skew) < page_size)
  134. continue;
  135. pr_debug("%#" PRIx64 ": diff end addr for %s v: %#" PRIx64 " k: %#" PRIx64 "\n",
  136. sym->start, sym->name, sym->end, pair->end);
  137. } else {
  138. struct rb_node *nnd;
  139. detour:
  140. nnd = backwards ? rb_prev(&pair->rb_node) :
  141. rb_next(&pair->rb_node);
  142. if (nnd) {
  143. struct symbol *next = rb_entry(nnd, struct symbol, rb_node);
  144. if (next->start == sym->start) {
  145. pair = next;
  146. goto next_pair;
  147. }
  148. }
  149. if (backwards) {
  150. backwards = false;
  151. pair = first_pair;
  152. goto detour;
  153. }
  154. pr_debug("%#" PRIx64 ": diff name v: %s k: %s\n",
  155. sym->start, sym->name, pair->name);
  156. }
  157. } else
  158. pr_debug("%#" PRIx64 ": %s not on kallsyms\n", sym->start, sym->name);
  159. err = -1;
  160. }
  161. if (!verbose)
  162. goto out;
  163. pr_info("Maps only in vmlinux:\n");
  164. for (nd = rb_first(&vmlinux.kmaps.maps[type]); nd; nd = rb_next(nd)) {
  165. struct map *pos = rb_entry(nd, struct map, rb_node), *pair;
  166. /*
  167. * If it is the kernel, kallsyms is always "[kernel.kallsyms]", while
  168. * the kernel will have the path for the vmlinux file being used,
  169. * so use the short name, less descriptive but the same ("[kernel]" in
  170. * both cases.
  171. */
  172. pair = map_groups__find_by_name(&kallsyms.kmaps, type,
  173. (pos->dso->kernel ?
  174. pos->dso->short_name :
  175. pos->dso->name));
  176. if (pair)
  177. pair->priv = 1;
  178. else
  179. map__fprintf(pos, stderr);
  180. }
  181. pr_info("Maps in vmlinux with a different name in kallsyms:\n");
  182. for (nd = rb_first(&vmlinux.kmaps.maps[type]); nd; nd = rb_next(nd)) {
  183. struct map *pos = rb_entry(nd, struct map, rb_node), *pair;
  184. pair = map_groups__find(&kallsyms.kmaps, type, pos->start);
  185. if (pair == NULL || pair->priv)
  186. continue;
  187. if (pair->start == pos->start) {
  188. pair->priv = 1;
  189. pr_info(" %" PRIx64 "-%" PRIx64 " %" PRIx64 " %s in kallsyms as",
  190. pos->start, pos->end, pos->pgoff, pos->dso->name);
  191. if (pos->pgoff != pair->pgoff || pos->end != pair->end)
  192. pr_info(": \n*%" PRIx64 "-%" PRIx64 " %" PRIx64 "",
  193. pair->start, pair->end, pair->pgoff);
  194. pr_info(" %s\n", pair->dso->name);
  195. pair->priv = 1;
  196. }
  197. }
  198. pr_info("Maps only in kallsyms:\n");
  199. for (nd = rb_first(&kallsyms.kmaps.maps[type]);
  200. nd; nd = rb_next(nd)) {
  201. struct map *pos = rb_entry(nd, struct map, rb_node);
  202. if (!pos->priv)
  203. map__fprintf(pos, stderr);
  204. }
  205. out:
  206. return err;
  207. }
  208. #include "util/cpumap.h"
  209. #include "util/evsel.h"
  210. #include <sys/types.h>
  211. static int trace_event__id(const char *evname)
  212. {
  213. char *filename;
  214. int err = -1, fd;
  215. if (asprintf(&filename,
  216. "%s/syscalls/%s/id",
  217. tracing_events_path, evname) < 0)
  218. return -1;
  219. fd = open(filename, O_RDONLY);
  220. if (fd >= 0) {
  221. char id[16];
  222. if (read(fd, id, sizeof(id)) > 0)
  223. err = atoi(id);
  224. close(fd);
  225. }
  226. free(filename);
  227. return err;
  228. }
  229. static int test__open_syscall_event(void)
  230. {
  231. int err = -1, fd;
  232. struct thread_map *threads;
  233. struct perf_evsel *evsel;
  234. struct perf_event_attr attr;
  235. unsigned int nr_open_calls = 111, i;
  236. int id = trace_event__id("sys_enter_open");
  237. if (id < 0) {
  238. pr_debug("is debugfs mounted on /sys/kernel/debug?\n");
  239. return -1;
  240. }
  241. threads = thread_map__new(-1, getpid(), UINT_MAX);
  242. if (threads == NULL) {
  243. pr_debug("thread_map__new\n");
  244. return -1;
  245. }
  246. memset(&attr, 0, sizeof(attr));
  247. attr.type = PERF_TYPE_TRACEPOINT;
  248. attr.config = id;
  249. evsel = perf_evsel__new(&attr, 0);
  250. if (evsel == NULL) {
  251. pr_debug("perf_evsel__new\n");
  252. goto out_thread_map_delete;
  253. }
  254. if (perf_evsel__open_per_thread(evsel, threads, false, NULL) < 0) {
  255. pr_debug("failed to open counter: %s, "
  256. "tweak /proc/sys/kernel/perf_event_paranoid?\n",
  257. strerror(errno));
  258. goto out_evsel_delete;
  259. }
  260. for (i = 0; i < nr_open_calls; ++i) {
  261. fd = open("/etc/passwd", O_RDONLY);
  262. close(fd);
  263. }
  264. if (perf_evsel__read_on_cpu(evsel, 0, 0) < 0) {
  265. pr_debug("perf_evsel__read_on_cpu\n");
  266. goto out_close_fd;
  267. }
  268. if (evsel->counts->cpu[0].val != nr_open_calls) {
  269. pr_debug("perf_evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n",
  270. nr_open_calls, evsel->counts->cpu[0].val);
  271. goto out_close_fd;
  272. }
  273. err = 0;
  274. out_close_fd:
  275. perf_evsel__close_fd(evsel, 1, threads->nr);
  276. out_evsel_delete:
  277. perf_evsel__delete(evsel);
  278. out_thread_map_delete:
  279. thread_map__delete(threads);
  280. return err;
  281. }
  282. #include <sched.h>
  283. static int test__open_syscall_event_on_all_cpus(void)
  284. {
  285. int err = -1, fd, cpu;
  286. struct thread_map *threads;
  287. struct cpu_map *cpus;
  288. struct perf_evsel *evsel;
  289. struct perf_event_attr attr;
  290. unsigned int nr_open_calls = 111, i;
  291. cpu_set_t cpu_set;
  292. int id = trace_event__id("sys_enter_open");
  293. if (id < 0) {
  294. pr_debug("is debugfs mounted on /sys/kernel/debug?\n");
  295. return -1;
  296. }
  297. threads = thread_map__new(-1, getpid(), UINT_MAX);
  298. if (threads == NULL) {
  299. pr_debug("thread_map__new\n");
  300. return -1;
  301. }
  302. cpus = cpu_map__new(NULL);
  303. if (cpus == NULL) {
  304. pr_debug("cpu_map__new\n");
  305. goto out_thread_map_delete;
  306. }
  307. CPU_ZERO(&cpu_set);
  308. memset(&attr, 0, sizeof(attr));
  309. attr.type = PERF_TYPE_TRACEPOINT;
  310. attr.config = id;
  311. evsel = perf_evsel__new(&attr, 0);
  312. if (evsel == NULL) {
  313. pr_debug("perf_evsel__new\n");
  314. goto out_thread_map_delete;
  315. }
  316. if (perf_evsel__open(evsel, cpus, threads, false, NULL) < 0) {
  317. pr_debug("failed to open counter: %s, "
  318. "tweak /proc/sys/kernel/perf_event_paranoid?\n",
  319. strerror(errno));
  320. goto out_evsel_delete;
  321. }
  322. for (cpu = 0; cpu < cpus->nr; ++cpu) {
  323. unsigned int ncalls = nr_open_calls + cpu;
  324. /*
  325. * XXX eventually lift this restriction in a way that
  326. * keeps perf building on older glibc installations
  327. * without CPU_ALLOC. 1024 cpus in 2010 still seems
  328. * a reasonable upper limit tho :-)
  329. */
  330. if (cpus->map[cpu] >= CPU_SETSIZE) {
  331. pr_debug("Ignoring CPU %d\n", cpus->map[cpu]);
  332. continue;
  333. }
  334. CPU_SET(cpus->map[cpu], &cpu_set);
  335. if (sched_setaffinity(0, sizeof(cpu_set), &cpu_set) < 0) {
  336. pr_debug("sched_setaffinity() failed on CPU %d: %s ",
  337. cpus->map[cpu],
  338. strerror(errno));
  339. goto out_close_fd;
  340. }
  341. for (i = 0; i < ncalls; ++i) {
  342. fd = open("/etc/passwd", O_RDONLY);
  343. close(fd);
  344. }
  345. CPU_CLR(cpus->map[cpu], &cpu_set);
  346. }
  347. /*
  348. * Here we need to explicitely preallocate the counts, as if
  349. * we use the auto allocation it will allocate just for 1 cpu,
  350. * as we start by cpu 0.
  351. */
  352. if (perf_evsel__alloc_counts(evsel, cpus->nr) < 0) {
  353. pr_debug("perf_evsel__alloc_counts(ncpus=%d)\n", cpus->nr);
  354. goto out_close_fd;
  355. }
  356. err = 0;
  357. for (cpu = 0; cpu < cpus->nr; ++cpu) {
  358. unsigned int expected;
  359. if (cpus->map[cpu] >= CPU_SETSIZE)
  360. continue;
  361. if (perf_evsel__read_on_cpu(evsel, cpu, 0) < 0) {
  362. pr_debug("perf_evsel__read_on_cpu\n");
  363. err = -1;
  364. break;
  365. }
  366. expected = nr_open_calls + cpu;
  367. if (evsel->counts->cpu[cpu].val != expected) {
  368. pr_debug("perf_evsel__read_on_cpu: expected to intercept %d calls on cpu %d, got %" PRIu64 "\n",
  369. expected, cpus->map[cpu], evsel->counts->cpu[cpu].val);
  370. err = -1;
  371. }
  372. }
  373. out_close_fd:
  374. perf_evsel__close_fd(evsel, 1, threads->nr);
  375. out_evsel_delete:
  376. perf_evsel__delete(evsel);
  377. out_thread_map_delete:
  378. thread_map__delete(threads);
  379. return err;
  380. }
  381. /*
  382. * This test will generate random numbers of calls to some getpid syscalls,
  383. * then establish an mmap for a group of events that are created to monitor
  384. * the syscalls.
  385. *
  386. * It will receive the events, using mmap, use its PERF_SAMPLE_ID generated
  387. * sample.id field to map back to its respective perf_evsel instance.
  388. *
  389. * Then it checks if the number of syscalls reported as perf events by
  390. * the kernel corresponds to the number of syscalls made.
  391. */
  392. static int test__basic_mmap(void)
  393. {
  394. int err = -1;
  395. union perf_event *event;
  396. struct thread_map *threads;
  397. struct cpu_map *cpus;
  398. struct perf_evlist *evlist;
  399. struct perf_event_attr attr = {
  400. .type = PERF_TYPE_TRACEPOINT,
  401. .read_format = PERF_FORMAT_ID,
  402. .sample_type = PERF_SAMPLE_ID,
  403. .watermark = 0,
  404. };
  405. cpu_set_t cpu_set;
  406. const char *syscall_names[] = { "getsid", "getppid", "getpgrp",
  407. "getpgid", };
  408. pid_t (*syscalls[])(void) = { (void *)getsid, getppid, getpgrp,
  409. (void*)getpgid };
  410. #define nsyscalls ARRAY_SIZE(syscall_names)
  411. int ids[nsyscalls];
  412. unsigned int nr_events[nsyscalls],
  413. expected_nr_events[nsyscalls], i, j;
  414. struct perf_evsel *evsels[nsyscalls], *evsel;
  415. for (i = 0; i < nsyscalls; ++i) {
  416. char name[64];
  417. snprintf(name, sizeof(name), "sys_enter_%s", syscall_names[i]);
  418. ids[i] = trace_event__id(name);
  419. if (ids[i] < 0) {
  420. pr_debug("Is debugfs mounted on /sys/kernel/debug?\n");
  421. return -1;
  422. }
  423. nr_events[i] = 0;
  424. expected_nr_events[i] = random() % 257;
  425. }
  426. threads = thread_map__new(-1, getpid(), UINT_MAX);
  427. if (threads == NULL) {
  428. pr_debug("thread_map__new\n");
  429. return -1;
  430. }
  431. cpus = cpu_map__new(NULL);
  432. if (cpus == NULL) {
  433. pr_debug("cpu_map__new\n");
  434. goto out_free_threads;
  435. }
  436. CPU_ZERO(&cpu_set);
  437. CPU_SET(cpus->map[0], &cpu_set);
  438. sched_setaffinity(0, sizeof(cpu_set), &cpu_set);
  439. if (sched_setaffinity(0, sizeof(cpu_set), &cpu_set) < 0) {
  440. pr_debug("sched_setaffinity() failed on CPU %d: %s ",
  441. cpus->map[0], strerror(errno));
  442. goto out_free_cpus;
  443. }
  444. evlist = perf_evlist__new(cpus, threads);
  445. if (evlist == NULL) {
  446. pr_debug("perf_evlist__new\n");
  447. goto out_free_cpus;
  448. }
  449. /* anonymous union fields, can't be initialized above */
  450. attr.wakeup_events = 1;
  451. attr.sample_period = 1;
  452. for (i = 0; i < nsyscalls; ++i) {
  453. attr.config = ids[i];
  454. evsels[i] = perf_evsel__new(&attr, i);
  455. if (evsels[i] == NULL) {
  456. pr_debug("perf_evsel__new\n");
  457. goto out_free_evlist;
  458. }
  459. perf_evlist__add(evlist, evsels[i]);
  460. if (perf_evsel__open(evsels[i], cpus, threads, false, NULL) < 0) {
  461. pr_debug("failed to open counter: %s, "
  462. "tweak /proc/sys/kernel/perf_event_paranoid?\n",
  463. strerror(errno));
  464. goto out_close_fd;
  465. }
  466. }
  467. if (perf_evlist__mmap(evlist, 128, true) < 0) {
  468. pr_debug("failed to mmap events: %d (%s)\n", errno,
  469. strerror(errno));
  470. goto out_close_fd;
  471. }
  472. for (i = 0; i < nsyscalls; ++i)
  473. for (j = 0; j < expected_nr_events[i]; ++j) {
  474. int foo = syscalls[i]();
  475. ++foo;
  476. }
  477. while ((event = perf_evlist__mmap_read(evlist, 0)) != NULL) {
  478. struct perf_sample sample;
  479. if (event->header.type != PERF_RECORD_SAMPLE) {
  480. pr_debug("unexpected %s event\n",
  481. perf_event__name(event->header.type));
  482. goto out_munmap;
  483. }
  484. err = perf_evlist__parse_sample(evlist, event, &sample, false);
  485. if (err) {
  486. pr_err("Can't parse sample, err = %d\n", err);
  487. goto out_munmap;
  488. }
  489. evsel = perf_evlist__id2evsel(evlist, sample.id);
  490. if (evsel == NULL) {
  491. pr_debug("event with id %" PRIu64
  492. " doesn't map to an evsel\n", sample.id);
  493. goto out_munmap;
  494. }
  495. nr_events[evsel->idx]++;
  496. }
  497. list_for_each_entry(evsel, &evlist->entries, node) {
  498. if (nr_events[evsel->idx] != expected_nr_events[evsel->idx]) {
  499. pr_debug("expected %d %s events, got %d\n",
  500. expected_nr_events[evsel->idx],
  501. perf_evsel__name(evsel), nr_events[evsel->idx]);
  502. goto out_munmap;
  503. }
  504. }
  505. err = 0;
  506. out_munmap:
  507. perf_evlist__munmap(evlist);
  508. out_close_fd:
  509. for (i = 0; i < nsyscalls; ++i)
  510. perf_evsel__close_fd(evsels[i], 1, threads->nr);
  511. out_free_evlist:
  512. perf_evlist__delete(evlist);
  513. out_free_cpus:
  514. cpu_map__delete(cpus);
  515. out_free_threads:
  516. thread_map__delete(threads);
  517. return err;
  518. #undef nsyscalls
  519. }
  520. static int sched__get_first_possible_cpu(pid_t pid, cpu_set_t **maskp,
  521. size_t *sizep)
  522. {
  523. cpu_set_t *mask;
  524. size_t size;
  525. int i, cpu = -1, nrcpus = 1024;
  526. realloc:
  527. mask = CPU_ALLOC(nrcpus);
  528. size = CPU_ALLOC_SIZE(nrcpus);
  529. CPU_ZERO_S(size, mask);
  530. if (sched_getaffinity(pid, size, mask) == -1) {
  531. CPU_FREE(mask);
  532. if (errno == EINVAL && nrcpus < (1024 << 8)) {
  533. nrcpus = nrcpus << 2;
  534. goto realloc;
  535. }
  536. perror("sched_getaffinity");
  537. return -1;
  538. }
  539. for (i = 0; i < nrcpus; i++) {
  540. if (CPU_ISSET_S(i, size, mask)) {
  541. if (cpu == -1) {
  542. cpu = i;
  543. *maskp = mask;
  544. *sizep = size;
  545. } else
  546. CPU_CLR_S(i, size, mask);
  547. }
  548. }
  549. if (cpu == -1)
  550. CPU_FREE(mask);
  551. return cpu;
  552. }
  553. static int test__PERF_RECORD(void)
  554. {
  555. struct perf_record_opts opts = {
  556. .target = {
  557. .uid = UINT_MAX,
  558. .uses_mmap = true,
  559. },
  560. .no_delay = true,
  561. .freq = 10,
  562. .mmap_pages = 256,
  563. };
  564. cpu_set_t *cpu_mask = NULL;
  565. size_t cpu_mask_size = 0;
  566. struct perf_evlist *evlist = perf_evlist__new(NULL, NULL);
  567. struct perf_evsel *evsel;
  568. struct perf_sample sample;
  569. const char *cmd = "sleep";
  570. const char *argv[] = { cmd, "1", NULL, };
  571. char *bname;
  572. u64 prev_time = 0;
  573. bool found_cmd_mmap = false,
  574. found_libc_mmap = false,
  575. found_vdso_mmap = false,
  576. found_ld_mmap = false;
  577. int err = -1, errs = 0, i, wakeups = 0;
  578. u32 cpu;
  579. int total_events = 0, nr_events[PERF_RECORD_MAX] = { 0, };
  580. if (evlist == NULL || argv == NULL) {
  581. pr_debug("Not enough memory to create evlist\n");
  582. goto out;
  583. }
  584. /*
  585. * We need at least one evsel in the evlist, use the default
  586. * one: "cycles".
  587. */
  588. err = perf_evlist__add_default(evlist);
  589. if (err < 0) {
  590. pr_debug("Not enough memory to create evsel\n");
  591. goto out_delete_evlist;
  592. }
  593. /*
  594. * Create maps of threads and cpus to monitor. In this case
  595. * we start with all threads and cpus (-1, -1) but then in
  596. * perf_evlist__prepare_workload we'll fill in the only thread
  597. * we're monitoring, the one forked there.
  598. */
  599. err = perf_evlist__create_maps(evlist, &opts.target);
  600. if (err < 0) {
  601. pr_debug("Not enough memory to create thread/cpu maps\n");
  602. goto out_delete_evlist;
  603. }
  604. /*
  605. * Prepare the workload in argv[] to run, it'll fork it, and then wait
  606. * for perf_evlist__start_workload() to exec it. This is done this way
  607. * so that we have time to open the evlist (calling sys_perf_event_open
  608. * on all the fds) and then mmap them.
  609. */
  610. err = perf_evlist__prepare_workload(evlist, &opts, argv);
  611. if (err < 0) {
  612. pr_debug("Couldn't run the workload!\n");
  613. goto out_delete_evlist;
  614. }
  615. /*
  616. * Config the evsels, setting attr->comm on the first one, etc.
  617. */
  618. evsel = list_entry(evlist->entries.next, struct perf_evsel, node);
  619. evsel->attr.sample_type |= PERF_SAMPLE_CPU;
  620. evsel->attr.sample_type |= PERF_SAMPLE_TID;
  621. evsel->attr.sample_type |= PERF_SAMPLE_TIME;
  622. perf_evlist__config_attrs(evlist, &opts);
  623. err = sched__get_first_possible_cpu(evlist->workload.pid, &cpu_mask,
  624. &cpu_mask_size);
  625. if (err < 0) {
  626. pr_debug("sched__get_first_possible_cpu: %s\n", strerror(errno));
  627. goto out_delete_evlist;
  628. }
  629. cpu = err;
  630. /*
  631. * So that we can check perf_sample.cpu on all the samples.
  632. */
  633. if (sched_setaffinity(evlist->workload.pid, cpu_mask_size, cpu_mask) < 0) {
  634. pr_debug("sched_setaffinity: %s\n", strerror(errno));
  635. goto out_free_cpu_mask;
  636. }
  637. /*
  638. * Call sys_perf_event_open on all the fds on all the evsels,
  639. * grouping them if asked to.
  640. */
  641. err = perf_evlist__open(evlist, opts.group);
  642. if (err < 0) {
  643. pr_debug("perf_evlist__open: %s\n", strerror(errno));
  644. goto out_delete_evlist;
  645. }
  646. /*
  647. * mmap the first fd on a given CPU and ask for events for the other
  648. * fds in the same CPU to be injected in the same mmap ring buffer
  649. * (using ioctl(PERF_EVENT_IOC_SET_OUTPUT)).
  650. */
  651. err = perf_evlist__mmap(evlist, opts.mmap_pages, false);
  652. if (err < 0) {
  653. pr_debug("perf_evlist__mmap: %s\n", strerror(errno));
  654. goto out_delete_evlist;
  655. }
  656. /*
  657. * Now that all is properly set up, enable the events, they will
  658. * count just on workload.pid, which will start...
  659. */
  660. perf_evlist__enable(evlist);
  661. /*
  662. * Now!
  663. */
  664. perf_evlist__start_workload(evlist);
  665. while (1) {
  666. int before = total_events;
  667. for (i = 0; i < evlist->nr_mmaps; i++) {
  668. union perf_event *event;
  669. while ((event = perf_evlist__mmap_read(evlist, i)) != NULL) {
  670. const u32 type = event->header.type;
  671. const char *name = perf_event__name(type);
  672. ++total_events;
  673. if (type < PERF_RECORD_MAX)
  674. nr_events[type]++;
  675. err = perf_evlist__parse_sample(evlist, event, &sample, false);
  676. if (err < 0) {
  677. if (verbose)
  678. perf_event__fprintf(event, stderr);
  679. pr_debug("Couldn't parse sample\n");
  680. goto out_err;
  681. }
  682. if (verbose) {
  683. pr_info("%" PRIu64" %d ", sample.time, sample.cpu);
  684. perf_event__fprintf(event, stderr);
  685. }
  686. if (prev_time > sample.time) {
  687. pr_debug("%s going backwards in time, prev=%" PRIu64 ", curr=%" PRIu64 "\n",
  688. name, prev_time, sample.time);
  689. ++errs;
  690. }
  691. prev_time = sample.time;
  692. if (sample.cpu != cpu) {
  693. pr_debug("%s with unexpected cpu, expected %d, got %d\n",
  694. name, cpu, sample.cpu);
  695. ++errs;
  696. }
  697. if ((pid_t)sample.pid != evlist->workload.pid) {
  698. pr_debug("%s with unexpected pid, expected %d, got %d\n",
  699. name, evlist->workload.pid, sample.pid);
  700. ++errs;
  701. }
  702. if ((pid_t)sample.tid != evlist->workload.pid) {
  703. pr_debug("%s with unexpected tid, expected %d, got %d\n",
  704. name, evlist->workload.pid, sample.tid);
  705. ++errs;
  706. }
  707. if ((type == PERF_RECORD_COMM ||
  708. type == PERF_RECORD_MMAP ||
  709. type == PERF_RECORD_FORK ||
  710. type == PERF_RECORD_EXIT) &&
  711. (pid_t)event->comm.pid != evlist->workload.pid) {
  712. pr_debug("%s with unexpected pid/tid\n", name);
  713. ++errs;
  714. }
  715. if ((type == PERF_RECORD_COMM ||
  716. type == PERF_RECORD_MMAP) &&
  717. event->comm.pid != event->comm.tid) {
  718. pr_debug("%s with different pid/tid!\n", name);
  719. ++errs;
  720. }
  721. switch (type) {
  722. case PERF_RECORD_COMM:
  723. if (strcmp(event->comm.comm, cmd)) {
  724. pr_debug("%s with unexpected comm!\n", name);
  725. ++errs;
  726. }
  727. break;
  728. case PERF_RECORD_EXIT:
  729. goto found_exit;
  730. case PERF_RECORD_MMAP:
  731. bname = strrchr(event->mmap.filename, '/');
  732. if (bname != NULL) {
  733. if (!found_cmd_mmap)
  734. found_cmd_mmap = !strcmp(bname + 1, cmd);
  735. if (!found_libc_mmap)
  736. found_libc_mmap = !strncmp(bname + 1, "libc", 4);
  737. if (!found_ld_mmap)
  738. found_ld_mmap = !strncmp(bname + 1, "ld", 2);
  739. } else if (!found_vdso_mmap)
  740. found_vdso_mmap = !strcmp(event->mmap.filename, "[vdso]");
  741. break;
  742. case PERF_RECORD_SAMPLE:
  743. /* Just ignore samples for now */
  744. break;
  745. default:
  746. pr_debug("Unexpected perf_event->header.type %d!\n",
  747. type);
  748. ++errs;
  749. }
  750. }
  751. }
  752. /*
  753. * We don't use poll here because at least at 3.1 times the
  754. * PERF_RECORD_{!SAMPLE} events don't honour
  755. * perf_event_attr.wakeup_events, just PERF_EVENT_SAMPLE does.
  756. */
  757. if (total_events == before && false)
  758. poll(evlist->pollfd, evlist->nr_fds, -1);
  759. sleep(1);
  760. if (++wakeups > 5) {
  761. pr_debug("No PERF_RECORD_EXIT event!\n");
  762. break;
  763. }
  764. }
  765. found_exit:
  766. if (nr_events[PERF_RECORD_COMM] > 1) {
  767. pr_debug("Excessive number of PERF_RECORD_COMM events!\n");
  768. ++errs;
  769. }
  770. if (nr_events[PERF_RECORD_COMM] == 0) {
  771. pr_debug("Missing PERF_RECORD_COMM for %s!\n", cmd);
  772. ++errs;
  773. }
  774. if (!found_cmd_mmap) {
  775. pr_debug("PERF_RECORD_MMAP for %s missing!\n", cmd);
  776. ++errs;
  777. }
  778. if (!found_libc_mmap) {
  779. pr_debug("PERF_RECORD_MMAP for %s missing!\n", "libc");
  780. ++errs;
  781. }
  782. if (!found_ld_mmap) {
  783. pr_debug("PERF_RECORD_MMAP for %s missing!\n", "ld");
  784. ++errs;
  785. }
  786. if (!found_vdso_mmap) {
  787. pr_debug("PERF_RECORD_MMAP for %s missing!\n", "[vdso]");
  788. ++errs;
  789. }
  790. out_err:
  791. perf_evlist__munmap(evlist);
  792. out_free_cpu_mask:
  793. CPU_FREE(cpu_mask);
  794. out_delete_evlist:
  795. perf_evlist__delete(evlist);
  796. out:
  797. return (err < 0 || errs > 0) ? -1 : 0;
  798. }
  799. #if defined(__x86_64__) || defined(__i386__)
  800. #define barrier() asm volatile("" ::: "memory")
  801. static u64 rdpmc(unsigned int counter)
  802. {
  803. unsigned int low, high;
  804. asm volatile("rdpmc" : "=a" (low), "=d" (high) : "c" (counter));
  805. return low | ((u64)high) << 32;
  806. }
  807. static u64 rdtsc(void)
  808. {
  809. unsigned int low, high;
  810. asm volatile("rdtsc" : "=a" (low), "=d" (high));
  811. return low | ((u64)high) << 32;
  812. }
  813. static u64 mmap_read_self(void *addr)
  814. {
  815. struct perf_event_mmap_page *pc = addr;
  816. u32 seq, idx, time_mult = 0, time_shift = 0;
  817. u64 count, cyc = 0, time_offset = 0, enabled, running, delta;
  818. do {
  819. seq = pc->lock;
  820. barrier();
  821. enabled = pc->time_enabled;
  822. running = pc->time_running;
  823. if (enabled != running) {
  824. cyc = rdtsc();
  825. time_mult = pc->time_mult;
  826. time_shift = pc->time_shift;
  827. time_offset = pc->time_offset;
  828. }
  829. idx = pc->index;
  830. count = pc->offset;
  831. if (idx)
  832. count += rdpmc(idx - 1);
  833. barrier();
  834. } while (pc->lock != seq);
  835. if (enabled != running) {
  836. u64 quot, rem;
  837. quot = (cyc >> time_shift);
  838. rem = cyc & ((1 << time_shift) - 1);
  839. delta = time_offset + quot * time_mult +
  840. ((rem * time_mult) >> time_shift);
  841. enabled += delta;
  842. if (idx)
  843. running += delta;
  844. quot = count / running;
  845. rem = count % running;
  846. count = quot * enabled + (rem * enabled) / running;
  847. }
  848. return count;
  849. }
  850. /*
  851. * If the RDPMC instruction faults then signal this back to the test parent task:
  852. */
  853. static void segfault_handler(int sig __used, siginfo_t *info __used, void *uc __used)
  854. {
  855. exit(-1);
  856. }
  857. static int __test__rdpmc(void)
  858. {
  859. long page_size = sysconf(_SC_PAGE_SIZE);
  860. volatile int tmp = 0;
  861. u64 i, loops = 1000;
  862. int n;
  863. int fd;
  864. void *addr;
  865. struct perf_event_attr attr = {
  866. .type = PERF_TYPE_HARDWARE,
  867. .config = PERF_COUNT_HW_INSTRUCTIONS,
  868. .exclude_kernel = 1,
  869. };
  870. u64 delta_sum = 0;
  871. struct sigaction sa;
  872. sigfillset(&sa.sa_mask);
  873. sa.sa_sigaction = segfault_handler;
  874. sigaction(SIGSEGV, &sa, NULL);
  875. fd = sys_perf_event_open(&attr, 0, -1, -1, 0);
  876. if (fd < 0) {
  877. die("Error: sys_perf_event_open() syscall returned "
  878. "with %d (%s)\n", fd, strerror(errno));
  879. }
  880. addr = mmap(NULL, page_size, PROT_READ, MAP_SHARED, fd, 0);
  881. if (addr == (void *)(-1)) {
  882. die("Error: mmap() syscall returned "
  883. "with (%s)\n", strerror(errno));
  884. }
  885. for (n = 0; n < 6; n++) {
  886. u64 stamp, now, delta;
  887. stamp = mmap_read_self(addr);
  888. for (i = 0; i < loops; i++)
  889. tmp++;
  890. now = mmap_read_self(addr);
  891. loops *= 10;
  892. delta = now - stamp;
  893. pr_debug("%14d: %14Lu\n", n, (long long)delta);
  894. delta_sum += delta;
  895. }
  896. munmap(addr, page_size);
  897. close(fd);
  898. pr_debug(" ");
  899. if (!delta_sum)
  900. return -1;
  901. return 0;
  902. }
  903. static int test__rdpmc(void)
  904. {
  905. int status = 0;
  906. int wret = 0;
  907. int ret;
  908. int pid;
  909. pid = fork();
  910. if (pid < 0)
  911. return -1;
  912. if (!pid) {
  913. ret = __test__rdpmc();
  914. exit(ret);
  915. }
  916. wret = waitpid(pid, &status, 0);
  917. if (wret < 0 || status)
  918. return -1;
  919. return 0;
  920. }
  921. #endif
  922. static int test__perf_pmu(void)
  923. {
  924. return perf_pmu__test();
  925. }
  926. static struct test {
  927. const char *desc;
  928. int (*func)(void);
  929. } tests[] = {
  930. {
  931. .desc = "vmlinux symtab matches kallsyms",
  932. .func = test__vmlinux_matches_kallsyms,
  933. },
  934. {
  935. .desc = "detect open syscall event",
  936. .func = test__open_syscall_event,
  937. },
  938. {
  939. .desc = "detect open syscall event on all cpus",
  940. .func = test__open_syscall_event_on_all_cpus,
  941. },
  942. {
  943. .desc = "read samples using the mmap interface",
  944. .func = test__basic_mmap,
  945. },
  946. {
  947. .desc = "parse events tests",
  948. .func = parse_events__test,
  949. },
  950. #if defined(__x86_64__) || defined(__i386__)
  951. {
  952. .desc = "x86 rdpmc test",
  953. .func = test__rdpmc,
  954. },
  955. #endif
  956. {
  957. .desc = "Validate PERF_RECORD_* events & perf_sample fields",
  958. .func = test__PERF_RECORD,
  959. },
  960. {
  961. .desc = "Test perf pmu format parsing",
  962. .func = test__perf_pmu,
  963. },
  964. {
  965. .desc = "Test dso data interface",
  966. .func = dso__test_data,
  967. },
  968. {
  969. .func = NULL,
  970. },
  971. };
  972. static bool perf_test__matches(int curr, int argc, const char *argv[])
  973. {
  974. int i;
  975. if (argc == 0)
  976. return true;
  977. for (i = 0; i < argc; ++i) {
  978. char *end;
  979. long nr = strtoul(argv[i], &end, 10);
  980. if (*end == '\0') {
  981. if (nr == curr + 1)
  982. return true;
  983. continue;
  984. }
  985. if (strstr(tests[curr].desc, argv[i]))
  986. return true;
  987. }
  988. return false;
  989. }
  990. static int __cmd_test(int argc, const char *argv[])
  991. {
  992. int i = 0;
  993. while (tests[i].func) {
  994. int curr = i++, err;
  995. if (!perf_test__matches(curr, argc, argv))
  996. continue;
  997. pr_info("%2d: %s:", i, tests[curr].desc);
  998. pr_debug("\n--- start ---\n");
  999. err = tests[curr].func();
  1000. pr_debug("---- end ----\n%s:", tests[curr].desc);
  1001. pr_info(" %s\n", err ? "FAILED!\n" : "Ok");
  1002. }
  1003. return 0;
  1004. }
  1005. static int perf_test__list(int argc, const char **argv)
  1006. {
  1007. int i = 0;
  1008. while (tests[i].func) {
  1009. int curr = i++;
  1010. if (argc > 1 && !strstr(tests[curr].desc, argv[1]))
  1011. continue;
  1012. pr_info("%2d: %s\n", i, tests[curr].desc);
  1013. }
  1014. return 0;
  1015. }
  1016. int cmd_test(int argc, const char **argv, const char *prefix __used)
  1017. {
  1018. const char * const test_usage[] = {
  1019. "perf test [<options>] [{list <test-name-fragment>|[<test-name-fragments>|<test-numbers>]}]",
  1020. NULL,
  1021. };
  1022. const struct option test_options[] = {
  1023. OPT_INCR('v', "verbose", &verbose,
  1024. "be more verbose (show symbol address, etc)"),
  1025. OPT_END()
  1026. };
  1027. argc = parse_options(argc, argv, test_options, test_usage, 0);
  1028. if (argc >= 1 && !strcmp(argv[0], "list"))
  1029. return perf_test__list(argc, argv);
  1030. symbol_conf.priv_size = sizeof(int);
  1031. symbol_conf.sort_by_name = true;
  1032. symbol_conf.try_vmlinux_path = true;
  1033. if (symbol__init() < 0)
  1034. return -1;
  1035. return __cmd_test(argc, argv);
  1036. }