open-syscall.c 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556
  1. #include "thread_map.h"
  2. #include "evsel.h"
  3. #include "debug.h"
  4. #include "tests.h"
  5. int test__open_syscall_event(void)
  6. {
  7. int err = -1, fd;
  8. struct perf_evsel *evsel;
  9. unsigned int nr_open_calls = 111, i;
  10. struct thread_map *threads = thread_map__new(-1, getpid(), UINT_MAX);
  11. char sbuf[STRERR_BUFSIZE];
  12. if (threads == NULL) {
  13. pr_debug("thread_map__new\n");
  14. return -1;
  15. }
  16. evsel = perf_evsel__newtp("syscalls", "sys_enter_open");
  17. if (evsel == NULL) {
  18. pr_debug("is debugfs mounted on /sys/kernel/debug?\n");
  19. goto out_thread_map_delete;
  20. }
  21. if (perf_evsel__open_per_thread(evsel, threads) < 0) {
  22. pr_debug("failed to open counter: %s, "
  23. "tweak /proc/sys/kernel/perf_event_paranoid?\n",
  24. strerror_r(errno, sbuf, sizeof(sbuf)));
  25. goto out_evsel_delete;
  26. }
  27. for (i = 0; i < nr_open_calls; ++i) {
  28. fd = open("/etc/passwd", O_RDONLY);
  29. close(fd);
  30. }
  31. if (perf_evsel__read_on_cpu(evsel, 0, 0) < 0) {
  32. pr_debug("perf_evsel__read_on_cpu\n");
  33. goto out_close_fd;
  34. }
  35. if (evsel->counts->cpu[0].val != nr_open_calls) {
  36. pr_debug("perf_evsel__read_on_cpu: expected to intercept %d calls, got %" PRIu64 "\n",
  37. nr_open_calls, evsel->counts->cpu[0].val);
  38. goto out_close_fd;
  39. }
  40. err = 0;
  41. out_close_fd:
  42. perf_evsel__close_fd(evsel, 1, threads->nr);
  43. out_evsel_delete:
  44. perf_evsel__delete(evsel);
  45. out_thread_map_delete:
  46. thread_map__delete(threads);
  47. return err;
  48. }