Received: by 10.213.65.68 with SMTP id h4csp338199imn; Sat, 17 Mar 2018 05:54:12 -0700 (PDT) X-Google-Smtp-Source: AG47ELvYRax6OCdJiPU0uLNMuK3hOtRqkcmAeMiXN4mzbdxbKrxak0Wj8DhRxw2HI1hYSwIAG8rY X-Received: by 2002:a17:902:28e3:: with SMTP id f90-v6mr5776879plb.355.1521291252237; Sat, 17 Mar 2018 05:54:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521291252; cv=none; d=google.com; s=arc-20160816; b=kOlLMVbx8GyZI1M0vHbaCDfi2cbFs3XCd7wDCOoMtYCrV9dNWAWz4kPdmqAFzQkwlx aK7EizHOuAw40kmoq00dwu5xyRxjgjVsxAMsVLqJhLpuO/Asan5M+Qpr/PXgAttTHCgc 1sW6LWbb4+oBd5HCwX+FHWKD+92zdE0jUahPHdo/q0PwheQUL/tnXzZ6mK1afUrs2EMG t85ItrhUjDIL4v5v+vQAMoYelbiwtCbIuOnxIAtvKxV4NKY8DpiuQ+Enh8qQcLr7UhOH HAsOe3F6rGTX1imD0mb2erftindzGdbOwAmsWTpPMK0HkoaJ7rTEd7Blizb6rnZU4Vzq g5kA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dmarc-filter:arc-authentication-results; bh=CNwDFPigyWmwwcjhPW+8ZnIj2Q9Jr+bey02f7VfZkHA=; b=CnQj/91t9LBkzOA3TZWwBJ/kosFR89Gg9JAfggRvKO5AyJvBhvt+Ji8R1Ew9PdKTJt hu+PlrE+GgsMONV5KvnAK6F9gu77Dg0A6AijkNsj53rSluNfpto0Lo40ASUUtUQoyuUo ExNCT5m9TPJNvKGh29jodBlrJxvtjrNncS1ydu8b3Ir47BAaN+C6hS2R2O39kIEmE4r/ aagnpTjsMc8bCyNogcnEEjnfJsiOVv/SUMVEldJLo9WogGq0ey9f3pA/+HSfE2qx9EGQ ptY+AEFoEsEma+dtOEpMNzarX+vo6BqNdvN5Bd1zjBS8g0hKmCn4rNPpmlc2ZKV/6Wd9 H4VQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z19si7309764pfi.407.2018.03.17.05.53.57; Sat, 17 Mar 2018 05:54:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753056AbeCQMwZ (ORCPT + 99 others); Sat, 17 Mar 2018 08:52:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:52704 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752514AbeCQMwY (ORCPT ); Sat, 17 Mar 2018 08:52:24 -0400 Received: from localhost.localdomain (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E9AFF21720; Sat, 17 Mar 2018 12:52:09 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org E9AFF21720 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=mhiramat@kernel.org From: Masami Hiramatsu To: Steven Rostedt , linux-kernel@vger.kernel.org Cc: mhiramat@kernel.org, Ingo Molnar , Namhyung Kim , Tom Zanussi , Arnaldo Carvalho de Melo , linux-trace-users@vger.kernel.org, linux-kselftest@vger.kernel.org, shuah@kernel.org, Ravi Bangoria Subject: [PATCH v6 19/21] selftests: ftrace: Add a testcase for array type with kprobe_event Date: Sat, 17 Mar 2018 21:51:35 +0900 Message-Id: <152129109566.31874.6546174329596347746.stgit@devbox> X-Mailer: git-send-email 2.13.6 In-Reply-To: <152129024033.31874.15800253385376959274.stgit@devbox> References: <152129024033.31874.15800253385376959274.stgit@devbox> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add a testcase for array type with kprobe event. This tests good/bad syntax combinations and also the traced data is correct in several way. If the kernel doesn't support array type, it skips the test as UNSUPPORTED. Signed-off-by: Masami Hiramatsu --- Changes in v4: - Add format field tests. --- .../ftrace/test.d/kprobe/kprobe_args_array.tc | 92 ++++++++++++++++++++ 1 file changed, 92 insertions(+) create mode 100644 tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_array.tc diff --git a/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_array.tc b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_array.tc new file mode 100644 index 000000000000..0d0450b858fc --- /dev/null +++ b/tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_array.tc @@ -0,0 +1,92 @@ +#!/bin/sh +# SPDX-License-Identifier: GPL-2.0 +# description: Kprobe event array argument + +[ -f kprobe_events ] || exit_unsupported # this is configurable + +grep -q "\[\]" README || exit_unsupported # version issue + +GOODSYM="_sdata" +if ! grep -qw ${GOODSYM} /proc/kallsyms ; then + GOODSYM="create_trace_kprobe" +fi +case `uname -m` in +x86_64) + ARG2=%si + OFFS=8 + BITS=64 +;; +i[3456]86) + ARG2=%cx + OFFS=4 + BITS=32 +;; +aarch64) + ARG2=%x1 + OFFS=8 + BITS=64 +;; +arm*) + ARG2=%r1 + OFFS=4 + BITS=32 +;; +*) + echo "Please implement other architecture here" + exit_untested +esac + +create_testprobe() { # args + echo "p:testprobe create_trace_kprobe $*" > kprobe_events +} + +check_field() { # grep-pattern + grep -e "$*" events/kprobes/testprobe/format +} + +echo 0 > events/enable +echo > kprobe_events + +: "Syntax test" +create_testprobe "+0(${ARG2}):x8[1] +0(${ARG2}):s16[1] +0(${ARG2}):u32[1]" +check_field "field:u8 arg1\[1\];.*size:1;" +check_field "field:s16 arg2\[1\];.*size:2;" +check_field "field:u32 arg3\[1\];.*size:4;" +create_testprobe "+0(${ARG2}):x64[1] +0(${ARG2}):symbol[1]" +check_field "field:u64 arg1\[1\];.*size:8;" +check_field "field:u${BITS} arg2\[1\];.*size:${OFFS};" +create_testprobe "+0(${ARG2}):b2@3/8[1] +0(${ARG2}):string[1]" +check_field "field:u8 arg1\[1\];.*size:1;" +check_field "field:__data_loc char\[\]\[1\] arg2;.*size:4;" +create_testprobe "+0(${ARG2}):x8[64] @${GOODSYM}:x8[4]" +check_field "field:u8 arg1\[64\];.*size:64;" +check_field "field:u8 arg2\[4\];.*size:4;" + +! create_testprobe "${ARG2}:x8[1]" # Can not use array type on register +! create_testprobe "\$comm:x8[1]" # Can not use array type on \$comm +! create_testprobe "\$comm:string[1]" # No, even if it is string array +! create_testprobe "+0(${ARG2}):x64[0]" # array size >= 1 +! create_testprobe "+0(${ARG2}):x64[65]" # array size <= 64 + +: "Test get argument (1)" +create_testprobe "arg1=+0(${ARG2}):string[1]" > kprobe_events +echo 1 > events/kprobes/testprobe/enable +! echo test >> kprobe_events +tail -n 1 trace | grep -qe "testprobe.* arg1={\"test\"}" +echo 0 > events/kprobes/testprobe/enable + +: "Test get argument (2)" +create_testprobe "arg1=+0(${ARG2}):string[3]" > kprobe_events +echo 1 > events/kprobes/testprobe/enable +! echo foo bar buzz >> kprobe_events +tail -n 1 trace | grep -qe "testprobe.* arg1={\"foo\",\"bar\",\"buzz\"}" +echo 0 > events/kprobes/testprobe/enable + +: "Test get argument (3)" +create_testprobe "arg1=+0(+0(${ARG2})):u8[4]" > kprobe_events +echo 1 > events/kprobes/testprobe/enable +! echo 1234 >> kprobe_events +tail -n 1 trace | grep -qe "testprobe.* arg1={49,50,51,52}" # ascii code +echo 0 > events/kprobes/testprobe/enable + +echo > kprobe_events