|  | // SPDX-License-Identifier: GPL-2.0 | 
|  | #include <errno.h> | 
|  | #include <fcntl.h> | 
|  | #include <inttypes.h> | 
|  | #include <stdlib.h> | 
|  | #include <perf/cpumap.h> | 
|  |  | 
|  | #include "cpumap.h" | 
|  | #include "debug.h" | 
|  | #include "event.h" | 
|  | #include "evlist.h" | 
|  | #include "evsel.h" | 
|  | #include "thread_map.h" | 
|  | #include "tests.h" | 
|  | #include "util/affinity.h" | 
|  | #include "util/mmap.h" | 
|  | #include "util/sample.h" | 
|  | #include <linux/err.h> | 
|  | #include <linux/kernel.h> | 
|  | #include <linux/string.h> | 
|  | #include <perf/evlist.h> | 
|  | #include <perf/mmap.h> | 
|  |  | 
|  | /* | 
|  | * This test will generate random numbers of calls to some getpid syscalls, | 
|  | * then establish an mmap for a group of events that are created to monitor | 
|  | * the syscalls. | 
|  | * | 
|  | * It will receive the events, using mmap, use its PERF_SAMPLE_ID generated | 
|  | * sample.id field to map back to its respective perf_evsel instance. | 
|  | * | 
|  | * Then it checks if the number of syscalls reported as perf events by | 
|  | * the kernel corresponds to the number of syscalls made. | 
|  | */ | 
|  | static int test__basic_mmap(struct test_suite *test __maybe_unused, int subtest __maybe_unused) | 
|  | { | 
|  | int err = TEST_FAIL; | 
|  | union perf_event *event; | 
|  | struct perf_thread_map *threads; | 
|  | struct perf_cpu_map *cpus; | 
|  | struct evlist *evlist; | 
|  | cpu_set_t cpu_set; | 
|  | const char *syscall_names[] = { "getsid", "getppid", "getpgid", }; | 
|  | pid_t (*syscalls[])(void) = { (void *)getsid, getppid, (void*)getpgid }; | 
|  | #define nsyscalls ARRAY_SIZE(syscall_names) | 
|  | unsigned int nr_events[nsyscalls], | 
|  | expected_nr_events[nsyscalls], i, j; | 
|  | struct evsel *evsels[nsyscalls], *evsel; | 
|  | char sbuf[STRERR_BUFSIZE]; | 
|  | struct mmap *md; | 
|  |  | 
|  | threads = thread_map__new_by_tid(getpid()); | 
|  | if (threads == NULL) { | 
|  | pr_debug("thread_map__new\n"); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | cpus = perf_cpu_map__new_online_cpus(); | 
|  | if (cpus == NULL) { | 
|  | pr_debug("perf_cpu_map__new\n"); | 
|  | goto out_free_threads; | 
|  | } | 
|  |  | 
|  | CPU_ZERO(&cpu_set); | 
|  | CPU_SET(perf_cpu_map__cpu(cpus, 0).cpu, &cpu_set); | 
|  | sched_setaffinity(0, sizeof(cpu_set), &cpu_set); | 
|  | if (sched_setaffinity(0, sizeof(cpu_set), &cpu_set) < 0) { | 
|  | pr_debug("sched_setaffinity() failed on CPU %d: %s ", | 
|  | perf_cpu_map__cpu(cpus, 0).cpu, | 
|  | str_error_r(errno, sbuf, sizeof(sbuf))); | 
|  | goto out_free_cpus; | 
|  | } | 
|  |  | 
|  | evlist = evlist__new(); | 
|  | if (evlist == NULL) { | 
|  | pr_debug("evlist__new\n"); | 
|  | goto out_free_cpus; | 
|  | } | 
|  |  | 
|  | perf_evlist__set_maps(&evlist->core, cpus, threads); | 
|  |  | 
|  | for (i = 0; i < nsyscalls; ++i) { | 
|  | char name[64]; | 
|  |  | 
|  | snprintf(name, sizeof(name), "sys_enter_%s", syscall_names[i]); | 
|  | evsels[i] = evsel__newtp("syscalls", name); | 
|  | if (IS_ERR(evsels[i])) { | 
|  | pr_debug("evsel__new(%s)\n", name); | 
|  | if (PTR_ERR(evsels[i]) == -EACCES) { | 
|  | /* Permissions failure, flag the failure as a skip. */ | 
|  | err = TEST_SKIP; | 
|  | } | 
|  | goto out_delete_evlist; | 
|  | } | 
|  |  | 
|  | evsels[i]->core.attr.wakeup_events = 1; | 
|  | evsel__set_sample_id(evsels[i], false); | 
|  |  | 
|  | evlist__add(evlist, evsels[i]); | 
|  |  | 
|  | if (evsel__open(evsels[i], cpus, threads) < 0) { | 
|  | pr_debug("failed to open counter: %s, " | 
|  | "tweak /proc/sys/kernel/perf_event_paranoid?\n", | 
|  | str_error_r(errno, sbuf, sizeof(sbuf))); | 
|  | goto out_delete_evlist; | 
|  | } | 
|  |  | 
|  | nr_events[i] = 0; | 
|  | expected_nr_events[i] = 1 + rand() % 127; | 
|  | } | 
|  |  | 
|  | if (evlist__mmap(evlist, 128) < 0) { | 
|  | pr_debug("failed to mmap events: %d (%s)\n", errno, | 
|  | str_error_r(errno, sbuf, sizeof(sbuf))); | 
|  | goto out_delete_evlist; | 
|  | } | 
|  |  | 
|  | for (i = 0; i < nsyscalls; ++i) | 
|  | for (j = 0; j < expected_nr_events[i]; ++j) { | 
|  | syscalls[i](); | 
|  | } | 
|  |  | 
|  | md = &evlist->mmap[0]; | 
|  | if (perf_mmap__read_init(&md->core) < 0) | 
|  | goto out_init; | 
|  |  | 
|  | while ((event = perf_mmap__read_event(&md->core)) != NULL) { | 
|  | struct perf_sample sample; | 
|  |  | 
|  | if (event->header.type != PERF_RECORD_SAMPLE) { | 
|  | pr_debug("unexpected %s event\n", | 
|  | perf_event__name(event->header.type)); | 
|  | goto out_delete_evlist; | 
|  | } | 
|  |  | 
|  | perf_sample__init(&sample, /*all=*/false); | 
|  | err = evlist__parse_sample(evlist, event, &sample); | 
|  | if (err) { | 
|  | pr_err("Can't parse sample, err = %d\n", err); | 
|  | perf_sample__exit(&sample); | 
|  | goto out_delete_evlist; | 
|  | } | 
|  |  | 
|  | err = -1; | 
|  | evsel = evlist__id2evsel(evlist, sample.id); | 
|  | perf_sample__exit(&sample); | 
|  | if (evsel == NULL) { | 
|  | pr_debug("event with id %" PRIu64 | 
|  | " doesn't map to an evsel\n", sample.id); | 
|  | goto out_delete_evlist; | 
|  | } | 
|  | nr_events[evsel->core.idx]++; | 
|  | perf_mmap__consume(&md->core); | 
|  | } | 
|  | perf_mmap__read_done(&md->core); | 
|  |  | 
|  | out_init: | 
|  | err = 0; | 
|  | evlist__for_each_entry(evlist, evsel) { | 
|  | if (nr_events[evsel->core.idx] != expected_nr_events[evsel->core.idx]) { | 
|  | pr_debug("expected %d %s events, got %d\n", | 
|  | expected_nr_events[evsel->core.idx], | 
|  | evsel__name(evsel), nr_events[evsel->core.idx]); | 
|  | err = -1; | 
|  | goto out_delete_evlist; | 
|  | } | 
|  | } | 
|  |  | 
|  | out_delete_evlist: | 
|  | evlist__delete(evlist); | 
|  | out_free_cpus: | 
|  | perf_cpu_map__put(cpus); | 
|  | out_free_threads: | 
|  | perf_thread_map__put(threads); | 
|  | return err; | 
|  | } | 
|  |  | 
|  | enum user_read_state { | 
|  | USER_READ_ENABLED, | 
|  | USER_READ_DISABLED, | 
|  | USER_READ_UNKNOWN, | 
|  | }; | 
|  |  | 
|  | static enum user_read_state set_user_read(struct perf_pmu *pmu, enum user_read_state enabled) | 
|  | { | 
|  | char buf[2] = {0, '\n'}; | 
|  | ssize_t len; | 
|  | int events_fd, rdpmc_fd; | 
|  | enum user_read_state old_user_read = USER_READ_UNKNOWN; | 
|  |  | 
|  | if (enabled == USER_READ_UNKNOWN) | 
|  | return USER_READ_UNKNOWN; | 
|  |  | 
|  | events_fd = perf_pmu__event_source_devices_fd(); | 
|  | if (events_fd < 0) | 
|  | return USER_READ_UNKNOWN; | 
|  |  | 
|  | rdpmc_fd = perf_pmu__pathname_fd(events_fd, pmu->name, "rdpmc", O_RDWR); | 
|  | if (rdpmc_fd < 0) { | 
|  | close(events_fd); | 
|  | return USER_READ_UNKNOWN; | 
|  | } | 
|  |  | 
|  | len = read(rdpmc_fd, buf, sizeof(buf)); | 
|  | if (len != sizeof(buf)) | 
|  | pr_debug("%s read failed\n", __func__); | 
|  |  | 
|  | // Note, on Intel hybrid disabling on 1 PMU will implicitly disable on | 
|  | // all the core PMUs. | 
|  | old_user_read = (buf[0] == '1') ? USER_READ_ENABLED : USER_READ_DISABLED; | 
|  |  | 
|  | if (enabled != old_user_read) { | 
|  | buf[0] = (enabled == USER_READ_ENABLED) ? '1' : '0'; | 
|  | len = write(rdpmc_fd, buf, sizeof(buf)); | 
|  | if (len != sizeof(buf)) | 
|  | pr_debug("%s write failed\n", __func__); | 
|  | } | 
|  | close(rdpmc_fd); | 
|  | close(events_fd); | 
|  | return old_user_read; | 
|  | } | 
|  |  | 
|  | static int test_stat_user_read(u64 event, enum user_read_state enabled) | 
|  | { | 
|  | struct perf_pmu *pmu = NULL; | 
|  | struct perf_thread_map *threads = perf_thread_map__new_dummy(); | 
|  | int ret = TEST_OK; | 
|  |  | 
|  | pr_err("User space counter reading %" PRIu64 "\n", event); | 
|  | if (!threads) { | 
|  | pr_err("User space counter reading [Failed to create threads]\n"); | 
|  | return TEST_FAIL; | 
|  | } | 
|  | perf_thread_map__set_pid(threads, 0, 0); | 
|  |  | 
|  | while ((pmu = perf_pmus__scan_core(pmu)) != NULL) { | 
|  | enum user_read_state saved_user_read_state = set_user_read(pmu, enabled); | 
|  | struct perf_event_attr attr = { | 
|  | .type	= PERF_TYPE_HARDWARE, | 
|  | .config	= perf_pmus__supports_extended_type() | 
|  | ? event | ((u64)pmu->type << PERF_PMU_TYPE_SHIFT) | 
|  | : event, | 
|  | #ifdef __aarch64__ | 
|  | .config1 = 0x2,		/* Request user access */ | 
|  | #endif | 
|  | }; | 
|  | struct perf_evsel *evsel = NULL; | 
|  | int err; | 
|  | struct perf_event_mmap_page *pc; | 
|  | bool mapped = false, opened = false, rdpmc_supported; | 
|  | struct perf_counts_values counts = { .val = 0 }; | 
|  |  | 
|  |  | 
|  | pr_debug("User space counter reading for PMU %s\n", pmu->name); | 
|  | /* | 
|  | * Restrict scheduling to only use the rdpmc on the CPUs the | 
|  | * event can be on. If the test doesn't run on the CPU of the | 
|  | * event then the event will be disabled and the pc->index test | 
|  | * will fail. | 
|  | */ | 
|  | if (pmu->cpus != NULL) | 
|  | cpu_map__set_affinity(pmu->cpus); | 
|  |  | 
|  | /* Make the evsel. */ | 
|  | evsel = perf_evsel__new(&attr); | 
|  | if (!evsel) { | 
|  | pr_err("User space counter reading for PMU %s [Failed to allocate evsel]\n", | 
|  | pmu->name); | 
|  | ret = TEST_FAIL; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | err = perf_evsel__open(evsel, NULL, threads); | 
|  | if (err) { | 
|  | pr_err("User space counter reading for PMU %s [Failed to open evsel]\n", | 
|  | pmu->name); | 
|  | ret = TEST_SKIP; | 
|  | goto cleanup; | 
|  | } | 
|  | opened = true; | 
|  | err = perf_evsel__mmap(evsel, 0); | 
|  | if (err) { | 
|  | pr_err("User space counter reading for PMU %s [Failed to mmap evsel]\n", | 
|  | pmu->name); | 
|  | ret = TEST_FAIL; | 
|  | goto cleanup; | 
|  | } | 
|  | mapped = true; | 
|  |  | 
|  | pc = perf_evsel__mmap_base(evsel, 0, 0); | 
|  | if (!pc) { | 
|  | pr_err("User space counter reading for PMU %s [Failed to get mmaped address]\n", | 
|  | pmu->name); | 
|  | ret = TEST_FAIL; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | if (saved_user_read_state == USER_READ_UNKNOWN) | 
|  | rdpmc_supported = pc->cap_user_rdpmc && pc->index; | 
|  | else | 
|  | rdpmc_supported = (enabled == USER_READ_ENABLED); | 
|  |  | 
|  | if (rdpmc_supported && (!pc->cap_user_rdpmc || !pc->index)) { | 
|  | pr_err("User space counter reading for PMU %s [Failed unexpected supported counter access %d %d]\n", | 
|  | pmu->name, pc->cap_user_rdpmc, pc->index); | 
|  | ret = TEST_FAIL; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | if (!rdpmc_supported && pc->cap_user_rdpmc) { | 
|  | pr_err("User space counter reading for PMU %s [Failed unexpected unsupported counter access %d]\n", | 
|  | pmu->name, pc->cap_user_rdpmc); | 
|  | ret = TEST_FAIL; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | if (rdpmc_supported && pc->pmc_width < 32) { | 
|  | pr_err("User space counter reading for PMU %s [Failed width not set %d]\n", | 
|  | pmu->name, pc->pmc_width); | 
|  | ret = TEST_FAIL; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | perf_evsel__read(evsel, 0, 0, &counts); | 
|  | if (counts.val == 0) { | 
|  | pr_err("User space counter reading for PMU %s [Failed read]\n", pmu->name); | 
|  | ret = TEST_FAIL; | 
|  | goto cleanup; | 
|  | } | 
|  |  | 
|  | for (int i = 0; i < 5; i++) { | 
|  | volatile int count = 0x10000 << i; | 
|  | __u64 start, end, last = 0; | 
|  |  | 
|  | pr_debug("\tloop = %u, ", count); | 
|  |  | 
|  | perf_evsel__read(evsel, 0, 0, &counts); | 
|  | start = counts.val; | 
|  |  | 
|  | while (count--) ; | 
|  |  | 
|  | perf_evsel__read(evsel, 0, 0, &counts); | 
|  | end = counts.val; | 
|  |  | 
|  | if ((end - start) < last) { | 
|  | pr_err("User space counter reading for PMU %s [Failed invalid counter data: end=%llu start=%llu last= %llu]\n", | 
|  | pmu->name, end, start, last); | 
|  | ret = TEST_FAIL; | 
|  | goto cleanup; | 
|  | } | 
|  | last = end - start; | 
|  | pr_debug("count = %llu\n", last); | 
|  | } | 
|  | pr_debug("User space counter reading for PMU %s [Success]\n", pmu->name); | 
|  | cleanup: | 
|  | if (mapped) | 
|  | perf_evsel__munmap(evsel); | 
|  | if (opened) | 
|  | perf_evsel__close(evsel); | 
|  | perf_evsel__delete(evsel); | 
|  |  | 
|  | /* If the affinity was changed, then put it back to all CPUs. */ | 
|  | if (pmu->cpus != NULL) { | 
|  | struct perf_cpu_map *cpus = cpu_map__online(); | 
|  |  | 
|  | cpu_map__set_affinity(cpus); | 
|  | perf_cpu_map__put(cpus); | 
|  | } | 
|  | set_user_read(pmu, saved_user_read_state); | 
|  | } | 
|  | perf_thread_map__put(threads); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static int test__mmap_user_read_instr(struct test_suite *test __maybe_unused, | 
|  | int subtest __maybe_unused) | 
|  | { | 
|  | return test_stat_user_read(PERF_COUNT_HW_INSTRUCTIONS, USER_READ_ENABLED); | 
|  | } | 
|  |  | 
|  | static int test__mmap_user_read_cycles(struct test_suite *test __maybe_unused, | 
|  | int subtest __maybe_unused) | 
|  | { | 
|  | return test_stat_user_read(PERF_COUNT_HW_CPU_CYCLES, USER_READ_ENABLED); | 
|  | } | 
|  |  | 
|  | static int test__mmap_user_read_instr_disabled(struct test_suite *test __maybe_unused, | 
|  | int subtest __maybe_unused) | 
|  | { | 
|  | return test_stat_user_read(PERF_COUNT_HW_INSTRUCTIONS, USER_READ_DISABLED); | 
|  | } | 
|  |  | 
|  | static int test__mmap_user_read_cycles_disabled(struct test_suite *test __maybe_unused, | 
|  | int subtest __maybe_unused) | 
|  | { | 
|  | return test_stat_user_read(PERF_COUNT_HW_CPU_CYCLES, USER_READ_DISABLED); | 
|  | } | 
|  |  | 
|  | static struct test_case tests__basic_mmap[] = { | 
|  | TEST_CASE_REASON("Read samples using the mmap interface", | 
|  | basic_mmap, | 
|  | "permissions"), | 
|  | TEST_CASE_REASON_EXCLUSIVE("User space counter reading of instructions", | 
|  | mmap_user_read_instr, | 
|  | #if defined(__i386__) || defined(__x86_64__) || defined(__aarch64__) || \ | 
|  | (defined(__riscv) && __riscv_xlen == 64) | 
|  | "permissions" | 
|  | #else | 
|  | "unsupported" | 
|  | #endif | 
|  | ), | 
|  | TEST_CASE_REASON_EXCLUSIVE("User space counter reading of cycles", | 
|  | mmap_user_read_cycles, | 
|  | #if defined(__i386__) || defined(__x86_64__) || defined(__aarch64__) || \ | 
|  | (defined(__riscv) && __riscv_xlen == 64) | 
|  | "permissions" | 
|  | #else | 
|  | "unsupported" | 
|  | #endif | 
|  | ), | 
|  | TEST_CASE_REASON_EXCLUSIVE("User space counter disabling instructions", | 
|  | mmap_user_read_instr_disabled, | 
|  | #if defined(__i386__) || defined(__x86_64__) || defined(__aarch64__) || \ | 
|  | (defined(__riscv) && __riscv_xlen == 64) | 
|  | "permissions" | 
|  | #else | 
|  | "unsupported" | 
|  | #endif | 
|  | ), | 
|  | TEST_CASE_REASON_EXCLUSIVE("User space counter disabling cycles", | 
|  | mmap_user_read_cycles_disabled, | 
|  | #if defined(__i386__) || defined(__x86_64__) || defined(__aarch64__) || \ | 
|  | (defined(__riscv) && __riscv_xlen == 64) | 
|  | "permissions" | 
|  | #else | 
|  | "unsupported" | 
|  | #endif | 
|  | ), | 
|  | {	.name = NULL, } | 
|  | }; | 
|  |  | 
|  | struct test_suite suite__basic_mmap = { | 
|  | .desc = "mmap interface tests", | 
|  | .test_cases = tests__basic_mmap, | 
|  | }; |