Received: by 2002:a05:6359:6284:b0:131:369:b2a3 with SMTP id se4csp680430rwb; Fri, 4 Aug 2023 21:49:44 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEWCSZQrEeWd/R+T2ppLvuD3QNOOTCfpaUEyUQvzbCqeVPaPcKa6MX8bS91sTh+9k5lz6St X-Received: by 2002:a17:902:f7c9:b0:1bb:b91b:2b40 with SMTP id h9-20020a170902f7c900b001bbb91b2b40mr3802085plw.60.1691210983800; Fri, 04 Aug 2023 21:49:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691210983; cv=none; d=google.com; s=arc-20160816; b=UqQGq44GB6IuJDp32GZAQMF8l0yezom83la9trV/NAWFZGkv0EHI8tbvczI3Nn2kL9 nMr6ZNf979fVg7gf3tzEK5NE3vMpovKftjBb0rsMwocPEqPgscfFsYxAXr7jjiOMw7/A pqUOgXBTkFw3q0TDiGrdI8EvgeCZQX8w6+Qtam4HAk2BgRQwiRiCMj9CC+JV1B9tcB/Y w09szfQudwCAvr+to/a0Y1a3L+WyTF7nO/MOIXKbWOCA95jjIo82/jEPt92K/l5jnuW6 /lo1SrZQupPYkbGj0zmBFeosu3lyWc3D7/v6G+L14pYP1u9yBKhyEOkXt4XifRN53xRg q3RQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=7mzhH9CcDQt1KrmN2/0Wykq86AG8JhhNqlJJhaigJTc=; fh=6BCBHd+wd9sM5I7f3nZwXI5uSly3s62mQle808OwsEg=; b=hH/8KLR4L5JpxxahK9OUmGr8lVr1cPlvId/4YWbWrYA4fvPY968OFjreA0qGzrc1F8 DZ2SEkwdEld68a8CThoYugFLSMuPAoy2uxV7BlfTTkHaCK0jjzyo6ipKHbCuXRuCvIIp R7gQJ7HYcRZQvbSlLOUpSqTEjT3GkDJTIp7qJ27VVkF4pSudWkKo/632glNeLK/pCMm/ kDAnPIDuQt+ZMyKy0hsSrZzvQKPZSowxyTw/qv0vWv9Hl6SL0xbMd6llJD1Da1+SIkyX JrFJGGIVJlTeysOjjU1Ifl+v8HJC4nidN8mes5vQ8buAS4iQI1J7fsyLkLVziJIW5q3l vVyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jx3-20020a170903138300b001bb9a1cf6casi2568368plb.405.2023.08.04.21.49.31; Fri, 04 Aug 2023 21:49:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229653AbjHEDjB (ORCPT + 99 others); Fri, 4 Aug 2023 23:39:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43608 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229379AbjHEDi4 (ORCPT ); Fri, 4 Aug 2023 23:38:56 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BDB594ED7; Fri, 4 Aug 2023 20:38:54 -0700 (PDT) Received: from dggpeml500012.china.huawei.com (unknown [172.30.72.54]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4RHpF63703zrS5n; Sat, 5 Aug 2023 11:37:46 +0800 (CST) Received: from localhost.localdomain (10.67.175.61) by dggpeml500012.china.huawei.com (7.185.36.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Sat, 5 Aug 2023 11:38:52 +0800 From: Zheng Yejian To: , , , CC: , , Subject: [PATCH v2 2/2] selftests/ftrace: Add a basic testcase for snapshot Date: Sat, 5 Aug 2023 11:38:16 +0800 Message-ID: <20230805033816.3284594-3-zhengyejian1@huawei.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230805033816.3284594-1-zhengyejian1@huawei.com> References: <20230805033816.3284594-1-zhengyejian1@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.175.61] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpeml500012.china.huawei.com (7.185.36.15) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This testcase is constrived to reproduce a problem that the cpu buffers become unavailable which is due to 'record_disabled' of array_buffer and max_buffer being messed up. Local test result after bugfix: # ./ftracetest test.d/00basic/snapshot1.tc === Ftrace unit tests === [1] Snapshot and tracing_cpumask [PASS] [2] (instance) Snapshot and tracing_cpumask [PASS] # of passed: 2 # of failed: 0 # of unresolved: 0 # of untested: 0 # of unsupported: 0 # of xfailed: 0 # of undefined(test bug): 0 Signed-off-by: Zheng Yejian --- .../ftrace/test.d/00basic/snapshot1.tc | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 tools/testing/selftests/ftrace/test.d/00basic/snapshot1.tc diff --git a/tools/testing/selftests/ftrace/test.d/00basic/snapshot1.tc b/tools/testing/selftests/ftrace/test.d/00basic/snapshot1.tc new file mode 100644 index 000000000000..63b76cf2a360 --- /dev/null +++ b/tools/testing/selftests/ftrace/test.d/00basic/snapshot1.tc @@ -0,0 +1,31 @@ +#!/bin/sh +# SPDX-License-Identifier: GPL-2.0 +# description: Snapshot and tracing_cpumask +# requires: trace_marker tracing_cpumask snapshot +# flags: instance + +# This testcase is constrived to reproduce a problem that the cpu buffers +# become unavailable which is due to 'record_disabled' of array_buffer and +# max_buffer being messed up. + +# Store origin cpumask +ORIG_CPUMASK=`cat tracing_cpumask` + +# Stop tracing all cpu +echo 0 > tracing_cpumask + +# Take a snapshot of the main buffer +echo 1 > snapshot + +# Restore origin cpumask, note that there should be some cpus being traced +echo ${ORIG_CPUMASK} > tracing_cpumask + +# Set tracing on +echo 1 > tracing_on + +# Write a log into buffer +echo "test input 1" > trace_marker + +# Ensure the log writed so that cpu buffers are still available +grep -q "test input 1" trace +exit 0 -- 2.25.1