From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from akranes.kaiser.cx (akranes.kaiser.cx [152.53.16.207]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3AB573A1D01; Mon, 27 Apr 2026 09:38:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=152.53.16.207 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777282697; cv=none; b=X03ErPj8XFZkC2/t1JNGikPlwiiEVYx8YVYsk+GdMcUDaSBxJ2cIOPK423BoE809YX/z+10S/ln+AwwNAscmaGyIQNAsxXF50bFje288Apzx2B7ZHHCZwSIXCCVGWQHMhTZLmSxp5LaeKxk/DZRz9xgvNneaE27fCMZURNbzs9w= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777282697; c=relaxed/simple; bh=tdlII85rl4FSfMOozmCfV2xnCZaKltxoi01AqY0fmsE=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=XyWNIfADUjOVSe0mCWiBx4zkSZXabyayK7zz5jwK1EVtsDjvxuUBZ2dRE6SeRDEEx1TQhU3PDAUx3JWJ5b4N822vxwVCguNjxkfZXL3BnL6idLPwfHo6y+RrozYFA7mTXzqf+xNcrSa2t9Km0HhgeDJHAAMU1kkmYocKX1Th1tE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=kaiser.cx; spf=pass smtp.mailfrom=kaiser.cx; arc=none smtp.client-ip=152.53.16.207 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=kaiser.cx Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=kaiser.cx Received: from ipservice-092-208-105-007.092.208.pools.vodafone-ip.de ([92.208.105.7] helo=nb282.user.codasip.com) by akranes.kaiser.cx with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.98.2) (envelope-from ) id 1wHHrW-00000000jJc-2NT1; Mon, 27 Apr 2026 11:02:42 +0200 From: Martin Kaiser To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Namhyung Kim Cc: Ian Rogers , James Clark , linux-perf-users@vger.kernel.org, linux-kernel@vger.kernel.org, Martin Kaiser Subject: [PATCH 2/3] perf test: fix sys_enter_openat event test for musl Date: Mon, 27 Apr 2026 11:01:42 +0200 Message-ID: <20260427090225.794482-3-martin@kaiser.cx> X-Mailer: git-send-email 2.43.7 In-Reply-To: <20260427090225.794482-1-martin@kaiser.cx> References: <20260427090225.794482-1-martin@kaiser.cx> Precedence: bulk X-Mailing-List: linux-perf-users@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit The "syscalls:sys_enter_openat event fields" test calls openat(AT_FDCWD, "/etc/passwd", O_RDONLY | O_DIRECTORY) and verifies that the flags of the captured event are matching. This fails for musl, where the openat syscall wrapper always adds O_LARGEFILE. Update the check to allow for additional flags. Fail the test only if one of our flags is missing. Signed-off-by: Martin Kaiser --- tools/perf/tests/openat-syscall-tp-fields.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/tools/perf/tests/openat-syscall-tp-fields.c b/tools/perf/tests/openat-syscall-tp-fields.c index 2a139d2781a8..366b3bf39def 100644 --- a/tools/perf/tests/openat-syscall-tp-fields.c +++ b/tools/perf/tests/openat-syscall-tp-fields.c @@ -120,7 +120,8 @@ static int test__syscall_openat_tp_fields(struct test_suite *test __maybe_unused tp_flags = evsel__intval(evsel, &sample, "flags"); perf_sample__exit(&sample); - if (flags != tp_flags) { + /* C library wrapper may set additional flags */ + if ((tp_flags & flags) != flags) { pr_debug("%s: Expected flags=%#x, got %#x\n", __func__, flags, tp_flags); goto out_delete_evlist; -- 2.43.7