tests/tcg: add a system test to check memory instrumentation
At first I thought I could compile the user-mode test for system mode however we already have a fairly comprehensive test case for system mode in "memory" so lets use that. As tracking every access will quickly build up with "print-access" we add a new mode to track groups of reads and writes to regions. Because the test_data is 16k aligned we can be sure all accesses to it are ones we can count. First we extend the test to report where the test_data region is. Then we expand the pdot() function to track the total number of reads and writes to the region. We have to add some addition pdot() calls to take into account multiple reads/writes in the test loops. Finally we add a python script to integrate the data from the plugin and the output of the test and validate they both agree on the total counts. As some boot codes clear the bss we also add a flag to add a regions worth of writes to the expected total. Signed-off-by: Alex Bennée <alex.bennee@linaro.org> Reviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org> Message-Id: <20240916085400.1046925-14-alex.bennee@linaro.org>
This commit is contained in:
parent
3b2899e3dd
commit
ecbcc9ead2
@ -28,7 +28,7 @@ LDFLAGS+=-static -nostdlib $(CRT_OBJS) $(MINILIB_OBJS) -lgcc
|
||||
%: %.c $(LINK_SCRIPT) $(CRT_OBJS) $(MINILIB_OBJS)
|
||||
$(CC) $(CFLAGS) $(EXTRA_CFLAGS) $< -o $@ $(LDFLAGS)
|
||||
|
||||
memory: CFLAGS+=-DCHECK_UNALIGNED=0
|
||||
memory: CFLAGS+=-DCHECK_UNALIGNED=0 -mbwx
|
||||
|
||||
# Running
|
||||
QEMU_OPTS+=-serial chardev:output -kernel
|
||||
|
@ -65,3 +65,9 @@ endif
|
||||
|
||||
MULTIARCH_RUNS += run-gdbstub-memory run-gdbstub-interrupt \
|
||||
run-gdbstub-untimely-packet run-gdbstub-registers
|
||||
|
||||
# Test plugin memory access instrumentation
|
||||
run-plugin-memory-with-libmem.so: \
|
||||
PLUGIN_ARGS=$(COMMA)region-summary=true
|
||||
run-plugin-memory-with-libmem.so: \
|
||||
CHECK_PLUGIN_OUTPUT_COMMAND=$(MULTIARCH_SYSTEM_SRC)/validate-memory-counts.py $@.out
|
||||
|
@ -14,26 +14,35 @@
|
||||
|
||||
#include <stdint.h>
|
||||
#include <stdbool.h>
|
||||
#include <inttypes.h>
|
||||
#include <minilib.h>
|
||||
|
||||
#ifndef CHECK_UNALIGNED
|
||||
# error "Target does not specify CHECK_UNALIGNED"
|
||||
#endif
|
||||
|
||||
uint32_t test_read_count;
|
||||
uint32_t test_write_count;
|
||||
|
||||
#define MEM_PAGE_SIZE 4096 /* nominal 4k "pages" */
|
||||
#define TEST_SIZE (MEM_PAGE_SIZE * 4) /* 4 pages */
|
||||
|
||||
#define ARRAY_SIZE(x) ((sizeof(x) / sizeof((x)[0])))
|
||||
|
||||
__attribute__((aligned(MEM_PAGE_SIZE)))
|
||||
__attribute__((aligned(TEST_SIZE)))
|
||||
static uint8_t test_data[TEST_SIZE];
|
||||
|
||||
typedef void (*init_ufn) (int offset);
|
||||
typedef bool (*read_ufn) (int offset);
|
||||
typedef bool (*read_sfn) (int offset, bool nf);
|
||||
|
||||
static void pdot(int count)
|
||||
static void pdot(int count, bool write)
|
||||
{
|
||||
if (write) {
|
||||
test_write_count++;
|
||||
} else {
|
||||
test_read_count++;
|
||||
}
|
||||
if (count % 128 == 0) {
|
||||
ml_printf(".");
|
||||
}
|
||||
@ -67,7 +76,7 @@ static void init_test_data_u8(int unused_offset)
|
||||
|
||||
for (i = 0; i < TEST_SIZE; i++) {
|
||||
*ptr++ = BYTE_NEXT(count);
|
||||
pdot(i);
|
||||
pdot(i, true);
|
||||
}
|
||||
|
||||
ml_printf("done %d @ %p\n", i, ptr);
|
||||
@ -93,8 +102,9 @@ static void init_test_data_s8(bool neg_first)
|
||||
neg_first ? "neg first" : "pos first");
|
||||
for (i = 0; i < TEST_SIZE / 2; i++) {
|
||||
*ptr++ = get_byte(i, neg_first);
|
||||
pdot(i, true);
|
||||
*ptr++ = get_byte(i, !neg_first);
|
||||
pdot(i);
|
||||
pdot(i, true);
|
||||
}
|
||||
ml_printf("done %d @ %p\n", i * 2, ptr);
|
||||
}
|
||||
@ -116,6 +126,7 @@ static void reset_start_data(int offset)
|
||||
|
||||
for (i = 0; i < offset; i++) {
|
||||
*ptr++ = 0;
|
||||
pdot(i, true);
|
||||
}
|
||||
|
||||
ml_printf("done %d @ %p\n", i, ptr);
|
||||
@ -136,7 +147,7 @@ static void init_test_data_u16(int offset)
|
||||
uint16_t low = BYTE_NEXT(count), high = BYTE_NEXT(count);
|
||||
word = BYTE_SHIFT(high, 1) | BYTE_SHIFT(low, 0);
|
||||
*ptr++ = word;
|
||||
pdot(i);
|
||||
pdot(i, true);
|
||||
}
|
||||
ml_printf("done %d @ %p\n", i, ptr);
|
||||
}
|
||||
@ -158,7 +169,7 @@ static void init_test_data_u32(int offset)
|
||||
word = BYTE_SHIFT(b1, 3) | BYTE_SHIFT(b2, 2) | BYTE_SHIFT(b3, 1) |
|
||||
BYTE_SHIFT(b4, 0);
|
||||
*ptr++ = word;
|
||||
pdot(i);
|
||||
pdot(i, true);
|
||||
}
|
||||
ml_printf("done %d @ %p\n", i, ptr);
|
||||
}
|
||||
@ -184,7 +195,7 @@ static void init_test_data_u64(int offset)
|
||||
BYTE_SHIFT(b4, 4) | BYTE_SHIFT(b5, 3) | BYTE_SHIFT(b6, 2) |
|
||||
BYTE_SHIFT(b7, 1) | BYTE_SHIFT(b8, 0);
|
||||
*ptr++ = word;
|
||||
pdot(i);
|
||||
pdot(i, true);
|
||||
}
|
||||
ml_printf("done %d @ %p\n", i, ptr);
|
||||
}
|
||||
@ -207,7 +218,7 @@ static bool read_test_data_u16(int offset)
|
||||
ml_printf("Error %d < %d\n", high, low);
|
||||
return false;
|
||||
} else {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
}
|
||||
|
||||
}
|
||||
@ -249,7 +260,7 @@ static bool read_test_data_u32(int offset)
|
||||
ml_printf("Error %d, %d, %d, %d", b1, b2, b3, b4);
|
||||
return false;
|
||||
} else {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
}
|
||||
}
|
||||
ml_printf("done %d @ %p\n", i, ptr);
|
||||
@ -304,7 +315,7 @@ static bool read_test_data_u64(int offset)
|
||||
b1, b2, b3, b4, b5, b6, b7, b8);
|
||||
return false;
|
||||
} else {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
}
|
||||
}
|
||||
ml_printf("done %d @ %p\n", i, ptr);
|
||||
@ -376,9 +387,11 @@ static bool read_test_data_s8(int offset, bool neg_first)
|
||||
second = *ptr++;
|
||||
|
||||
if (neg_first && first < 0 && second > 0) {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
pdot(i, false);
|
||||
} else if (!neg_first && first > 0 && second < 0) {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
pdot(i, false);
|
||||
} else {
|
||||
ml_printf("Error %d %c %d\n", first, neg_first ? '<' : '>', second);
|
||||
return false;
|
||||
@ -409,9 +422,9 @@ static bool read_test_data_s16(int offset, bool neg_first)
|
||||
int32_t data = *ptr++;
|
||||
|
||||
if (neg_first && data < 0) {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
} else if (!neg_first && data > 0) {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
} else {
|
||||
ml_printf("Error %d %c 0\n", data, neg_first ? '<' : '>');
|
||||
return false;
|
||||
@ -442,9 +455,9 @@ static bool read_test_data_s32(int offset, bool neg_first)
|
||||
int64_t data = *ptr++;
|
||||
|
||||
if (neg_first && data < 0) {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
} else if (!neg_first && data > 0) {
|
||||
pdot(i);
|
||||
pdot(i, false);
|
||||
} else {
|
||||
ml_printf("Error %d %c 0\n", data, neg_first ? '<' : '>');
|
||||
return false;
|
||||
@ -498,6 +511,9 @@ int main(void)
|
||||
int i;
|
||||
bool ok = true;
|
||||
|
||||
ml_printf("Test data start: 0x%"PRIxPTR"\n", &test_data[0]);
|
||||
ml_printf("Test data end: 0x%"PRIxPTR"\n", &test_data[TEST_SIZE]);
|
||||
|
||||
/* Run through the unsigned tests first */
|
||||
for (i = 0; i < ARRAY_SIZE(init_ufns) && ok; i++) {
|
||||
ok = do_unsigned_test(init_ufns[i]);
|
||||
@ -513,6 +529,8 @@ int main(void)
|
||||
ok = do_signed_reads(true);
|
||||
}
|
||||
|
||||
ml_printf("Test data read: %"PRId32"\n", test_read_count);
|
||||
ml_printf("Test data write: %"PRId32"\n", test_write_count);
|
||||
ml_printf("Test complete: %s\n", ok ? "PASSED" : "FAILED");
|
||||
return ok ? 0 : -1;
|
||||
}
|
||||
|
130
tests/tcg/multiarch/system/validate-memory-counts.py
Executable file
130
tests/tcg/multiarch/system/validate-memory-counts.py
Executable file
@ -0,0 +1,130 @@
|
||||
#!/usr/bin/env python3
|
||||
#
|
||||
# validate-memory-counts.py: check we instrumented memory properly
|
||||
#
|
||||
# This program takes two inputs:
|
||||
# - the mem plugin output
|
||||
# - the memory binary output
|
||||
#
|
||||
# Copyright (C) 2024 Linaro Ltd
|
||||
#
|
||||
# SPDX-License-Identifier: GPL-2.0-or-later
|
||||
|
||||
import sys
|
||||
from argparse import ArgumentParser
|
||||
|
||||
def extract_counts(path):
|
||||
"""
|
||||
Load the output from path and extract the lines containing:
|
||||
|
||||
Test data start: 0x40214000
|
||||
Test data end: 0x40218001
|
||||
Test data read: 2522280
|
||||
Test data write: 262111
|
||||
|
||||
From the stream of data. Extract the values for use in the
|
||||
validation function.
|
||||
"""
|
||||
start_address = None
|
||||
end_address = None
|
||||
read_count = 0
|
||||
write_count = 0
|
||||
with open(path, 'r') as f:
|
||||
for line in f:
|
||||
if line.startswith("Test data start:"):
|
||||
start_address = int(line.split(':')[1].strip(), 16)
|
||||
elif line.startswith("Test data end:"):
|
||||
end_address = int(line.split(':')[1].strip(), 16)
|
||||
elif line.startswith("Test data read:"):
|
||||
read_count = int(line.split(':')[1].strip())
|
||||
elif line.startswith("Test data write:"):
|
||||
write_count = int(line.split(':')[1].strip())
|
||||
return start_address, end_address, read_count, write_count
|
||||
|
||||
|
||||
def parse_plugin_output(path, start, end):
|
||||
"""
|
||||
Load the plugin output from path in the form of:
|
||||
|
||||
Region Base, Reads, Writes, Seen all
|
||||
0x0000000040004000, 31093, 0, false
|
||||
0x0000000040214000, 2522280, 278579, true
|
||||
0x0000000040000000, 137398, 0, false
|
||||
0x0000000040210000, 54727397, 33721956, false
|
||||
|
||||
And extract the ranges that match test data start and end and
|
||||
return the results.
|
||||
"""
|
||||
total_reads = 0
|
||||
total_writes = 0
|
||||
seen_all = False
|
||||
|
||||
with open(path, 'r') as f:
|
||||
next(f) # Skip the header
|
||||
for line in f:
|
||||
|
||||
if line.startswith("Region Base"):
|
||||
continue
|
||||
|
||||
parts = line.strip().split(', ')
|
||||
if len(parts) != 4:
|
||||
continue
|
||||
|
||||
region_base = int(parts[0], 16)
|
||||
reads = int(parts[1])
|
||||
writes = int(parts[2])
|
||||
|
||||
if start <= region_base < end: # Checking if within range
|
||||
total_reads += reads
|
||||
total_writes += writes
|
||||
seen_all = parts[3] == "true"
|
||||
|
||||
return total_reads, total_writes, seen_all
|
||||
|
||||
def main() -> None:
|
||||
"""
|
||||
Process the arguments, injest the program and plugin out and
|
||||
verify they match up and report if they do not.
|
||||
"""
|
||||
parser = ArgumentParser(description="Validate memory instrumentation")
|
||||
parser.add_argument('test_output',
|
||||
help="The output from the test itself")
|
||||
parser.add_argument('plugin_output',
|
||||
help="The output from memory plugin")
|
||||
parser.add_argument('--bss-cleared',
|
||||
action='store_true',
|
||||
help='Assume bss was cleared (and adjusts counts).')
|
||||
|
||||
args = parser.parse_args()
|
||||
|
||||
# Extract counts from memory binary
|
||||
start, end, exp_reads, exp_writes = extract_counts(args.test_output)
|
||||
|
||||
# Some targets clear BSS before running but the test doesn't know
|
||||
# that so we adjust it by the size of the test region.
|
||||
if args.bss_cleared:
|
||||
exp_writes += 16384
|
||||
|
||||
if start is None or end is None:
|
||||
print("Failed to test_data boundaries from output.")
|
||||
sys.exit(1)
|
||||
|
||||
# Parse plugin output
|
||||
preads, pwrites, seen_all = parse_plugin_output(args.plugin_output,
|
||||
start, end)
|
||||
|
||||
if not seen_all:
|
||||
print("Fail: didn't instrument all accesses to test_data.")
|
||||
sys.exit(1)
|
||||
|
||||
# Compare and report
|
||||
if preads == exp_reads and pwrites == exp_writes:
|
||||
sys.exit(0)
|
||||
else:
|
||||
print("Fail: The memory reads and writes count does not match.")
|
||||
print(f"Expected Reads: {exp_reads}, Actual Reads: {preads}")
|
||||
print(f"Expected Writes: {exp_writes}, Actual Writes: {pwrites}")
|
||||
sys.exit(1)
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
@ -12,6 +12,15 @@
|
||||
#include <stdio.h>
|
||||
#include <glib.h>
|
||||
|
||||
/*
|
||||
* plugins should not include anything from QEMU aside from the
|
||||
* API header. However as this is a test plugin to exercise the
|
||||
* internals of QEMU and we want to avoid needless code duplication we
|
||||
* do so here. bswap.h is pretty self-contained although it needs a
|
||||
* few things provided by compiler.h.
|
||||
*/
|
||||
#include <compiler.h>
|
||||
#include <bswap.h>
|
||||
#include <qemu-plugin.h>
|
||||
|
||||
QEMU_PLUGIN_EXPORT int qemu_plugin_version = QEMU_PLUGIN_VERSION;
|
||||
@ -26,13 +35,47 @@ typedef struct {
|
||||
const char *sym;
|
||||
} InsnInfo;
|
||||
|
||||
/*
|
||||
* For the "memory" system test we need to track accesses to
|
||||
* individual regions. We mirror the data written to the region and
|
||||
* then check when it is read that it matches up.
|
||||
*
|
||||
* We do this as regions rather than pages to save on complications
|
||||
* with page crossing and the fact the test only cares about the
|
||||
* test_data region.
|
||||
*/
|
||||
static uint64_t region_size = 4096 * 4;
|
||||
static uint64_t region_mask;
|
||||
|
||||
typedef struct {
|
||||
uint64_t region_address;
|
||||
uint64_t reads;
|
||||
uint64_t writes;
|
||||
uint8_t *data;
|
||||
/* Did we see every write and read with correct values? */
|
||||
bool seen_all;
|
||||
} RegionInfo;
|
||||
|
||||
static struct qemu_plugin_scoreboard *counts;
|
||||
static qemu_plugin_u64 mem_count;
|
||||
static qemu_plugin_u64 io_count;
|
||||
static bool do_inline, do_callback, do_print_accesses;
|
||||
static bool do_inline, do_callback, do_print_accesses, do_region_summary;
|
||||
static bool do_haddr;
|
||||
static enum qemu_plugin_mem_rw rw = QEMU_PLUGIN_MEM_RW;
|
||||
|
||||
|
||||
static GMutex lock;
|
||||
static GHashTable *regions;
|
||||
|
||||
static gint addr_order(gconstpointer a, gconstpointer b)
|
||||
{
|
||||
RegionInfo *na = (RegionInfo *) a;
|
||||
RegionInfo *nb = (RegionInfo *) b;
|
||||
|
||||
return na->region_address > nb->region_address ? 1 : -1;
|
||||
}
|
||||
|
||||
|
||||
static void plugin_exit(qemu_plugin_id_t id, void *p)
|
||||
{
|
||||
g_autoptr(GString) out = g_string_new("");
|
||||
@ -46,9 +89,145 @@ static void plugin_exit(qemu_plugin_id_t id, void *p)
|
||||
qemu_plugin_u64_sum(io_count));
|
||||
}
|
||||
qemu_plugin_outs(out->str);
|
||||
|
||||
|
||||
if (do_region_summary) {
|
||||
GList *counts = g_hash_table_get_values(regions);
|
||||
|
||||
counts = g_list_sort(counts, addr_order);
|
||||
|
||||
g_string_printf(out, "Region Base, Reads, Writes, Seen all\n");
|
||||
|
||||
if (counts && g_list_next(counts)) {
|
||||
for (/* counts */; counts; counts = counts->next) {
|
||||
RegionInfo *ri = (RegionInfo *) counts->data;
|
||||
|
||||
g_string_append_printf(out,
|
||||
"0x%016"PRIx64", "
|
||||
"%"PRId64", %"PRId64", %s\n",
|
||||
ri->region_address,
|
||||
ri->reads,
|
||||
ri->writes,
|
||||
ri->seen_all ? "true" : "false");
|
||||
}
|
||||
}
|
||||
qemu_plugin_outs(out->str);
|
||||
}
|
||||
|
||||
qemu_plugin_scoreboard_free(counts);
|
||||
}
|
||||
|
||||
/*
|
||||
* Update the region tracking info for the access. We split up accesses
|
||||
* that span regions even though the plugin infrastructure will deliver
|
||||
* it as a single access.
|
||||
*/
|
||||
static void update_region_info(uint64_t region, uint64_t offset,
|
||||
qemu_plugin_meminfo_t meminfo,
|
||||
qemu_plugin_mem_value value,
|
||||
unsigned size)
|
||||
{
|
||||
bool be = qemu_plugin_mem_is_big_endian(meminfo);
|
||||
bool is_store = qemu_plugin_mem_is_store(meminfo);
|
||||
RegionInfo *ri;
|
||||
bool unseen_data = false;
|
||||
|
||||
g_assert(offset + size <= region_size);
|
||||
|
||||
g_mutex_lock(&lock);
|
||||
ri = (RegionInfo *) g_hash_table_lookup(regions, GUINT_TO_POINTER(region));
|
||||
|
||||
if (!ri) {
|
||||
ri = g_new0(RegionInfo, 1);
|
||||
ri->region_address = region;
|
||||
ri->data = g_malloc0(region_size);
|
||||
ri->seen_all = true;
|
||||
g_hash_table_insert(regions, GUINT_TO_POINTER(region), (gpointer) ri);
|
||||
}
|
||||
|
||||
if (is_store) {
|
||||
ri->writes++;
|
||||
} else {
|
||||
ri->reads++;
|
||||
}
|
||||
|
||||
switch (value.type) {
|
||||
case QEMU_PLUGIN_MEM_VALUE_U8:
|
||||
if (is_store) {
|
||||
ri->data[offset] = value.data.u8;
|
||||
} else if (ri->data[offset] != value.data.u8) {
|
||||
unseen_data = true;
|
||||
}
|
||||
break;
|
||||
case QEMU_PLUGIN_MEM_VALUE_U16:
|
||||
{
|
||||
uint16_t *p = (uint16_t *) &ri->data[offset];
|
||||
if (is_store) {
|
||||
if (be) {
|
||||
stw_be_p(p, value.data.u16);
|
||||
} else {
|
||||
stw_le_p(p, value.data.u16);
|
||||
}
|
||||
} else {
|
||||
uint16_t val = be ? lduw_be_p(p) : lduw_le_p(p);
|
||||
unseen_data = val != value.data.u16;
|
||||
}
|
||||
break;
|
||||
}
|
||||
case QEMU_PLUGIN_MEM_VALUE_U32:
|
||||
{
|
||||
uint32_t *p = (uint32_t *) &ri->data[offset];
|
||||
if (is_store) {
|
||||
if (be) {
|
||||
stl_be_p(p, value.data.u32);
|
||||
} else {
|
||||
stl_le_p(p, value.data.u32);
|
||||
}
|
||||
} else {
|
||||
uint32_t val = be ? ldl_be_p(p) : ldl_le_p(p);
|
||||
unseen_data = val != value.data.u32;
|
||||
}
|
||||
break;
|
||||
}
|
||||
case QEMU_PLUGIN_MEM_VALUE_U64:
|
||||
{
|
||||
uint64_t *p = (uint64_t *) &ri->data[offset];
|
||||
if (is_store) {
|
||||
if (be) {
|
||||
stq_be_p(p, value.data.u64);
|
||||
} else {
|
||||
stq_le_p(p, value.data.u64);
|
||||
}
|
||||
} else {
|
||||
uint64_t val = be ? ldq_be_p(p) : ldq_le_p(p);
|
||||
unseen_data = val != value.data.u64;
|
||||
}
|
||||
break;
|
||||
}
|
||||
case QEMU_PLUGIN_MEM_VALUE_U128:
|
||||
/* non in test so skip */
|
||||
break;
|
||||
default:
|
||||
g_assert_not_reached();
|
||||
}
|
||||
|
||||
/*
|
||||
* This is expected for regions initialised by QEMU (.text etc) but we
|
||||
* expect to see all data read and written to the test_data region
|
||||
* of the memory test.
|
||||
*/
|
||||
if (unseen_data && ri->seen_all) {
|
||||
g_autoptr(GString) error = g_string_new("Warning: ");
|
||||
g_string_append_printf(error, "0x%016"PRIx64":%"PRId64
|
||||
" read an un-instrumented value\n",
|
||||
region, offset);
|
||||
qemu_plugin_outs(error->str);
|
||||
ri->seen_all = false;
|
||||
}
|
||||
|
||||
g_mutex_unlock(&lock);
|
||||
}
|
||||
|
||||
static void vcpu_mem(unsigned int cpu_index, qemu_plugin_meminfo_t meminfo,
|
||||
uint64_t vaddr, void *udata)
|
||||
{
|
||||
@ -63,6 +242,15 @@ static void vcpu_mem(unsigned int cpu_index, qemu_plugin_meminfo_t meminfo,
|
||||
} else {
|
||||
qemu_plugin_u64_add(mem_count, cpu_index, 1);
|
||||
}
|
||||
|
||||
if (do_region_summary) {
|
||||
uint64_t region = vaddr & ~region_mask;
|
||||
uint64_t offset = vaddr & region_mask;
|
||||
qemu_plugin_mem_value value = qemu_plugin_mem_get_value(meminfo);
|
||||
unsigned size = 1 << qemu_plugin_mem_size_shift(meminfo);
|
||||
|
||||
update_region_info(region, offset, meminfo, value, size);
|
||||
}
|
||||
}
|
||||
|
||||
static void print_access(unsigned int cpu_index, qemu_plugin_meminfo_t meminfo,
|
||||
@ -117,7 +305,7 @@ static void vcpu_tb_trans(qemu_plugin_id_t id, struct qemu_plugin_tb *tb)
|
||||
QEMU_PLUGIN_INLINE_ADD_U64,
|
||||
mem_count, 1);
|
||||
}
|
||||
if (do_callback) {
|
||||
if (do_callback || do_region_summary) {
|
||||
qemu_plugin_register_vcpu_mem_cb(insn, vcpu_mem,
|
||||
QEMU_PLUGIN_CB_NO_REGS,
|
||||
rw, NULL);
|
||||
@ -176,6 +364,12 @@ QEMU_PLUGIN_EXPORT int qemu_plugin_install(qemu_plugin_id_t id,
|
||||
fprintf(stderr, "boolean argument parsing failed: %s\n", opt);
|
||||
return -1;
|
||||
}
|
||||
} else if (g_strcmp0(tokens[0], "region-summary") == 0) {
|
||||
if (!qemu_plugin_bool_parse(tokens[0], tokens[1],
|
||||
&do_region_summary)) {
|
||||
fprintf(stderr, "boolean argument parsing failed: %s\n", opt);
|
||||
return -1;
|
||||
}
|
||||
} else {
|
||||
fprintf(stderr, "option parsing failed: %s\n", opt);
|
||||
return -1;
|
||||
@ -196,6 +390,11 @@ QEMU_PLUGIN_EXPORT int qemu_plugin_install(qemu_plugin_id_t id,
|
||||
qemu_plugin_outs(out->str);
|
||||
}
|
||||
|
||||
if (do_region_summary) {
|
||||
region_mask = (region_size - 1);
|
||||
regions = g_hash_table_new(NULL, g_direct_equal);
|
||||
}
|
||||
|
||||
counts = qemu_plugin_scoreboard_new(sizeof(CPUCount));
|
||||
mem_count = qemu_plugin_scoreboard_u64_in_struct(
|
||||
counts, CPUCount, mem_count);
|
||||
|
@ -47,3 +47,8 @@ $(MULTIARCH_TESTS): $(S390X_MULTIARCH_RUNTIME_OBJS)
|
||||
$(MULTIARCH_TESTS): LDFLAGS += $(S390X_MULTIARCH_RUNTIME_OBJS)
|
||||
$(MULTIARCH_TESTS): CFLAGS += $(MINILIB_INC)
|
||||
memory: CFLAGS += -DCHECK_UNALIGNED=0
|
||||
|
||||
# s390x clears the BSS section so we need to account for that
|
||||
run-plugin-memory-with-libmem.so: \
|
||||
CHECK_PLUGIN_OUTPUT_COMMAND=$(MULTIARCH_SYSTEM_SRC)/validate-memory-counts.py \
|
||||
--bss-cleared $@.out
|
||||
|
Loading…
Reference in New Issue
Block a user