Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp5998833rwb; Wed, 7 Sep 2022 11:03:27 -0700 (PDT) X-Google-Smtp-Source: AA6agR4wuJKohjvpVaPvqSLcyadkBWEhdLK46s3LfOUKIHs++XSGb2zU73thLdrGmzN95RFIoRzA X-Received: by 2002:a17:902:e750:b0:176:b0fb:9683 with SMTP id p16-20020a170902e75000b00176b0fb9683mr4895396plf.71.1662573807611; Wed, 07 Sep 2022 11:03:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662573807; cv=none; d=google.com; s=arc-20160816; b=Lx7mLjXB2yNbNR9CdTW7zfheWp+COQf3dnD/YlrkTOBLdX+hhebnw0b7G3Q/px5knV lvNkHbXnJP2/O37VI1tZDsEoktAdjGq4fqxb/RKvCW1Pnrk49p2uX6wz2Ro3kc5u2kuh ei0X7VrLhosOj8vW5lpFqhgvNAuEFG9iALG29/qEGTTd0Fe75hU/RKgxY0qecGhnd0vC kyfA9ACRyoYddNC1l/44tzLaBdwdQ6InxzRsXr2LWlL9g6VR3RYXR4lKEeE9dF59p2va /bB2+AAxIci3scw3Iifc0yqPZDUBmt7uwLNd4d55wVAdOT0/1QGLcF2AIX/v7PXJLcJE ep3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version; bh=ATQFV9UxDijnVCKvjh8wgAiSEZcUIEydhgrlvOLLULw=; b=g9X3uGDPWXLcDOt0BZcNydpusx3G75VNYQzCm/iUQ37wqGJL8fNao2oGYWxtc6wuZn VLP0qEYDOkgilhebxLgPReL5cnEm0hxVwklZP7Ti2Q/30CiXvuiCe6kDZGnUmxMaeIpp TbsC9KjDh9CxSOzP0QzJ8Wm7/gfRClzsEscyEit55dl1o21L0844FLF837RyRQRlKy9n fkAAywm7R3qjr8K08bP6Joclp2UmLMRw/uF4WE7MruNdmmE7HSEL9HCUJNAGNi1kVXJe GiNHYtYyBt+zzpi8kDbFhWqCjL2LqGNeaCQ4tRcTeS0awmako1c8EC88moy2XJXDZjdI TVWg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n6-20020a632706000000b0043542246596si344697pgn.196.2022.09.07.11.03.13; Wed, 07 Sep 2022 11:03:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230062AbiIGRvp (ORCPT + 99 others); Wed, 7 Sep 2022 13:51:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34582 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229808AbiIGRvk (ORCPT ); Wed, 7 Sep 2022 13:51:40 -0400 Received: from mail-oa1-f53.google.com (mail-oa1-f53.google.com [209.85.160.53]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3218C71726; Wed, 7 Sep 2022 10:51:39 -0700 (PDT) Received: by mail-oa1-f53.google.com with SMTP id 586e51a60fabf-1279948d93dso18096307fac.10; Wed, 07 Sep 2022 10:51:39 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=ATQFV9UxDijnVCKvjh8wgAiSEZcUIEydhgrlvOLLULw=; b=IPPnEI6ako2KxEoPezfb6EpSdHRThfPVTNFafi0v7VP7ENGEn3YOWHFxl9ZN2+aLDQ V5SvjdKhizUpk+OO8q/5VJfr/wHpwY1FAW1iNvtcWYjuukw9YL8mUeNdpbzAEWUmP4sI vuT8NfC28SzHexZnkl0iFSjku1jOiZ34tAiNWCVoypT/TVGKeS1Vf54cYLkpQdYV5MaI xnqK/vmiA+vE9FIyhGuXVHlD8IT6Lylx2CaNc8tivzJsnvjZsKCLgmL85AGF0p6nFcyo IYyEe7oFhG2A6Gars/09jz/WsDmr+nwxu93pBXr4LCE3JeK5N1NPU6KnQcB9kbZ7VQIj Tt5w== X-Gm-Message-State: ACgBeo2QVgWNy2IfMhGrp6UCX5InuKsYTHYNhxzsLlmY5w5ULb45ogRb yuocNvtWRpyTS8KTMXNpUAO8V+j5XoRRXoaGrrY= X-Received: by 2002:a05:6808:302a:b0:345:ec04:8f11 with SMTP id ay42-20020a056808302a00b00345ec048f11mr12709479oib.5.1662573098429; Wed, 07 Sep 2022 10:51:38 -0700 (PDT) MIME-Version: 1.0 References: <20220907071203.2729746-1-namhyung@kernel.org> In-Reply-To: From: Namhyung Kim Date: Wed, 7 Sep 2022 10:51:27 -0700 Message-ID: Subject: Re: [PATCH v3] perf test: Skip sigtrap test on old kernels To: Ian Rogers Cc: Arnaldo Carvalho de Melo , Jiri Olsa , Ingo Molnar , Peter Zijlstra , LKML , linux-perf-users , Marco Elver , Song Liu Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.4 required=5.0 tests=BAYES_00, FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ian, On Wed, Sep 7, 2022 at 8:48 AM Ian Rogers wrote: > > On Wed, Sep 7, 2022 at 12:12 AM Namhyung Kim wrote: > > > > If it runs on an old kernel, perf_event_open would fail because of the > > new fields sigtrap and sig_data. Just skipping the test could miss an > > actual bug in the kernel. > > > > Let's check BTF if it has the perf_event_attr.sigtrap field. > > > > Cc: Marco Elver > > Acked-by: Song Liu > > Signed-off-by: Namhyung Kim > > --- > > * move #include under #ifdef > > * return true when BPF is not supported > > * update comment > > > > tools/perf/tests/sigtrap.c | 50 +++++++++++++++++++++++++++++++++++++- > > 1 file changed, 49 insertions(+), 1 deletion(-) > > > > diff --git a/tools/perf/tests/sigtrap.c b/tools/perf/tests/sigtrap.c > > index e32ece90e164..cdf75eab6a8a 100644 > > --- a/tools/perf/tests/sigtrap.c > > +++ b/tools/perf/tests/sigtrap.c > > @@ -54,6 +54,48 @@ static struct perf_event_attr make_event_attr(void) > > return attr; > > } > > > > +#ifdef HAVE_BPF_SKEL > > +#include > > + > > +static bool attr_has_sigtrap(void) > > +{ > > + bool ret = false; > > + struct btf *btf; > > + const struct btf_type *t; > > + const struct btf_member *m; > > + const char *name; > > + int i, id; > > + > > + btf = btf__load_vmlinux_btf(); > > + if (btf == NULL) { > > + /* should be an old kernel */ > > + return false; > > + } > > + > > + id = btf__find_by_name_kind(btf, "perf_event_attr", BTF_KIND_STRUCT); > > + if (id < 0) > > + goto out; > > + > > + t = btf__type_by_id(btf, id); > > + for (i = 0, m = btf_members(t); i < btf_vlen(t); i++, m++) { > > + name = btf__name_by_offset(btf, m->name_off); > > + if (!strcmp(name, "sigtrap")) { > > + ret = true; > > + break; > > + } > > + } > > +out: > > + btf__free(btf); > > + return ret; > > +} > > +#else /* !HAVE_BPF_SKEL */ > > +static bool attr_has_sigtrap(void) > > +{ > > + /* to maintain current behavior */ > > nit: I don't think this comment will age well and the behavior of the > function is a bit counterintuitive. Perhaps: > > /* If we don't have libbpf then guess we're on a newer kernel with > sigtrap support. This will mean the test will fail on older kernels. > */ Thanks for the clarification, will update! Namhyung