mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2026-04-08 12:02:33 +02:00
[ Upstream commit4bd5bd8dbd] Modify test behavior to skip if BPF calls fail with "Operation not permitted". Fixes:d66763fed3("perf test trace_btf_enum: Add regression test for the BTF augmentation of enums in 'perf trace'") Reviewed-by: James Clark <james.clark@linaro.org> Signed-off-by: Ian Rogers <irogers@google.com> Acked-by: Namhyung Kim <namhyung@kernel.org> Cc: Adrian Hunter <adrian.hunter@intel.com> Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com> Cc: Athira Rajeev <atrajeev@linux.ibm.com> Cc: Blake Jones <blakejones@google.com> Cc: Chun-Tse Shao <ctshao@google.com> Cc: Collin Funk <collin.funk1@gmail.com> Cc: Howard Chu <howardchu95@gmail.com> Cc: Ingo Molnar <mingo@redhat.com> Cc: Jan Polensky <japo@linux.ibm.com> Cc: Jiri Olsa <jolsa@kernel.org> Cc: Kan Liang <kan.liang@linux.intel.com> Cc: Li Huafei <lihuafei1@huawei.com> Cc: Mark Rutland <mark.rutland@arm.com> Cc: Nam Cao <namcao@linutronix.de> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Steinar H. Gunderson <sesse@google.com> Cc: Thomas Gleixner <tglx@linutronix.de> Link: https://lore.kernel.org/r/20250821163820.1132977-3-irogers@google.com Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com> Signed-off-by: Sasha Levin <sashal@kernel.org>
78 lines
1.6 KiB
Bash
Executable File
78 lines
1.6 KiB
Bash
Executable File
#!/bin/sh
|
|
# perf trace enum augmentation tests
|
|
# SPDX-License-Identifier: GPL-2.0
|
|
|
|
err=0
|
|
set -e
|
|
|
|
syscall="landlock_add_rule"
|
|
non_syscall="timer:hrtimer_init,timer:hrtimer_start"
|
|
|
|
TESTPROG="perf test -w landlock"
|
|
|
|
# shellcheck source=lib/probe.sh
|
|
. "$(dirname $0)"/lib/probe.sh
|
|
skip_if_no_perf_trace || exit 2
|
|
|
|
check_vmlinux() {
|
|
echo "Checking if vmlinux exists"
|
|
if ! ls /sys/kernel/btf/vmlinux 1>/dev/null 2>&1
|
|
then
|
|
echo "trace+enum test [Skipped missing vmlinux BTF support]"
|
|
err=2
|
|
fi
|
|
}
|
|
|
|
check_permissions() {
|
|
if perf trace -e $syscall $TESTPROG 2>&1 | grep -q "Operation not permitted"
|
|
then
|
|
echo "trace+enum test [Skipped permissions]"
|
|
err=2
|
|
fi
|
|
}
|
|
|
|
trace_landlock() {
|
|
echo "Tracing syscall ${syscall}"
|
|
|
|
# test flight just to see if landlock_add_rule is available
|
|
if ! perf trace $TESTPROG 2>&1 | grep -q landlock
|
|
then
|
|
echo "No landlock system call found, skipping to non-syscall tracing."
|
|
return
|
|
fi
|
|
|
|
if perf trace -e $syscall $TESTPROG 2>&1 | \
|
|
grep -q -E ".*landlock_add_rule\(ruleset_fd: 11, rule_type: (LANDLOCK_RULE_PATH_BENEATH|LANDLOCK_RULE_NET_PORT), rule_attr: 0x[a-f0-9]+, flags: 45\) = -1.*"
|
|
then
|
|
err=0
|
|
else
|
|
err=1
|
|
fi
|
|
}
|
|
|
|
trace_non_syscall() {
|
|
echo "Tracing non-syscall tracepoint ${non-syscall}"
|
|
if perf trace -e $non_syscall --max-events=1 2>&1 | \
|
|
grep -q -E '.*timer:hrtimer_.*\(.*mode: HRTIMER_MODE_.*\)$'
|
|
then
|
|
err=0
|
|
else
|
|
err=1
|
|
fi
|
|
}
|
|
|
|
check_vmlinux
|
|
if [ $err = 0 ]; then
|
|
check_permissions
|
|
fi
|
|
|
|
if [ $err = 0 ]; then
|
|
trace_landlock
|
|
fi
|
|
|
|
if [ $err = 0 ]; then
|
|
trace_non_syscall
|
|
fi
|
|
|
|
exit $err
|