From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E02D119E975; Thu, 24 Oct 2024 21:08:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804084; cv=none; b=Sr/4vqVs5hb6DBnhmsu6hgflNPaa7NTeSxtvSl3uF5dx5BrlcNAWQFVc5atQdZ4QqhKheCuX710f98SWI4MZXykLI7lkAb5at92zcnDpVIeXn+yfzVWXRV7ozKRIV+NXHkiokRs01KTXD9TkLH7HMkeTbf60OTr0sxORi2rDndQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804084; c=relaxed/simple; bh=Crd/6uBvwkLS624C2I2nGq3B18WmfaTdjyycMbejCYI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=EgoNQXOos42pp3MYiOkyx/8N3rgR4l9DPzWuCqqWb8WmhOm+59X0dBWQ9iTWLlzj98T4dYbFxuFz/hh4EQQkwo4sLVk62EcbMEnD3M3aG4ebWwVApZ7mOg4vvEOnkm/6MN8O+1oVv07+A+MMwXV+ois40UVNw/n/9ke/UQDesbc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=IJRvg89A; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="IJRvg89A" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804082; x=1761340082; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Crd/6uBvwkLS624C2I2nGq3B18WmfaTdjyycMbejCYI=; b=IJRvg89AiU20ryKgr422kVfzd3WSM5hh1EtIskPCPn/o4qiCt1O7mDaA syhHRI1GGyMCy0B7aMmieZXBJhRQf0nxHp/SbaUsyPmR1j2nbK78dTsln raZmAEU+l5TLSuO6Al6e/ToIQe/cB4IvVtKCi3GeMvQ5VS6cemFNRegjc fvGU72Lu6ZWK32hoZLk8fZ9xio9mUA3V9v6iIHNSTGBiA6kUqqQjZIR5F RES+vnIInXCQr4GBHFplar+wN2mCIfUaIpSki/9Q1rsmh7EmiVuTuFzft CoEjsqZu7FdHsV/Rdmc9IJneAEeQkw2OQQTCWbphmhZYepQq8IfcV3pt+ w==; X-CSE-ConnectionGUID: OhqWdO6bTsCYilRwn+yeaA== X-CSE-MsgGUID: C9CALt35TduOU85G4XCPOw== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090868" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090868" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:00 -0700 X-CSE-ConnectionGUID: 65ADica2QgS4w4YjfNWwDg== X-CSE-MsgGUID: DWxS0w3JS/OsP84CRCETiw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488020" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:00 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 01/15] selftests/resctrl: Make functions only used in same file static Date: Thu, 24 Oct 2024 14:18:38 -0700 Message-ID: X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Fix following sparse warnings: tools/testing/selftests/resctrl/resctrl_val.c:47:6: warning: symbol 'membw= _initialize_perf_event_attr' was not declared. Should it be static? tools/testing/selftests/resctrl/resctrl_val.c:64:6: warning: symbol 'membw= _ioctl_perf_event_ioc_reset_enable' was not declared. Should it be static? tools/testing/selftests/resctrl/resctrl_val.c:70:6: warning: symbol 'membw= _ioctl_perf_event_ioc_disable' was not declared. Should it be static? tools/testing/selftests/resctrl/resctrl_val.c:81:6: warning: symbol 'get_e= vent_and_umask' was not declared. Should it be static? Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since v1: - Add Ilpo's Reviewed-by tag. - Let subject describe the change, not the tool that found it. (checkpatch.= pl) --- tools/testing/selftests/resctrl/resctrl_val.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/resctrl/resctrl_val.c b/tools/testing/= selftests/resctrl/resctrl_val.c index 8c275f6b4dd7..70e8e31f5d1a 100644 --- a/tools/testing/selftests/resctrl/resctrl_val.c +++ b/tools/testing/selftests/resctrl/resctrl_val.c @@ -44,7 +44,7 @@ static int imcs; static struct imc_counter_config imc_counters_config[MAX_IMCS][2]; static const struct resctrl_test *current_test; =20 -void membw_initialize_perf_event_attr(int i, int j) +static void membw_initialize_perf_event_attr(int i, int j) { memset(&imc_counters_config[i][j].pe, 0, sizeof(struct perf_event_attr)); @@ -61,13 +61,13 @@ void membw_initialize_perf_event_attr(int i, int j) PERF_FORMAT_TOTAL_TIME_ENABLED | PERF_FORMAT_TOTAL_TIME_RUNNING; } =20 -void membw_ioctl_perf_event_ioc_reset_enable(int i, int j) +static void membw_ioctl_perf_event_ioc_reset_enable(int i, int j) { ioctl(imc_counters_config[i][j].fd, PERF_EVENT_IOC_RESET, 0); ioctl(imc_counters_config[i][j].fd, PERF_EVENT_IOC_ENABLE, 0); } =20 -void membw_ioctl_perf_event_ioc_disable(int i, int j) +static void membw_ioctl_perf_event_ioc_disable(int i, int j) { ioctl(imc_counters_config[i][j].fd, PERF_EVENT_IOC_DISABLE, 0); } @@ -78,7 +78,7 @@ void membw_ioctl_perf_event_ioc_disable(int i, int j) * @count: iMC number * @op: Operation (read/write) */ -void get_event_and_umask(char *cas_count_cfg, int count, bool op) +static void get_event_and_umask(char *cas_count_cfg, int count, bool op) { char *token[MAX_TOKENS]; int i =3D 0; --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D8DCA217320; Thu, 24 Oct 2024 21:08:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804086; cv=none; b=PewbFIER81RetIwKC5EfxB/E8wUq9AKQRYT8aCxJPW9sudXN22DuxBDHDc72tdzNUvXbqwD6r5PDH5YipLovhoWYR9Y5ZPTJixnwF/1FfU4PkU3JaKpISjLorwt2n8ycq4VQiJun5qvs+/k8V+FH3XODQnINkAfZ+UwAEscb+C8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804086; c=relaxed/simple; bh=hdAK9CvNAX8I/mzX3gelODJbXuXlsAXTzOFiQp69MH4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=obS6evuv28/JV7mtiOdx9tu1BN6xSRvWmFcl7XnQF1dILrKmiyHchtKSnulYeL2jAwbLzHoFDjgcLEPEJsCTyqC+7q3bT5S0HR8Np8ib99LHw08qicK8UdQmFGexZv+ya+1JXZzhL+eSCW4gTzwPH3K37ON0CnoXrL7r/N+XHTA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=JQZFOO7v; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="JQZFOO7v" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804084; x=1761340084; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=hdAK9CvNAX8I/mzX3gelODJbXuXlsAXTzOFiQp69MH4=; b=JQZFOO7vabfSrJa3tbPLf7lOKu9pHEFVs8NPh6BQj8L3kcS6VEW7L2UH E4qru+f/oIxL7XW6qGg70yzF/BsrcOgdtry0qnMWXK0RLMbuYmJdzLMMP m6V1yERlB1YBEem5atZx11XxWZHttznA1acS419xJKsCN9KqTbXFLQU9d bMiUwzVN9hyyFLqPUep7Q0xRjCQkY1fy0JJ+QAfau1RMGhM65Eg4025un 4LWQuBsydTDkipdEhWOl2BLG5wBlnbhom00AA4SSlajqJUsAAvxRCNjM5 I+vbfst9C5zFMm6fDTv/tsl96kBeatA4ndqyXI4J5IwNVbrX9w18XpYlA Q==; X-CSE-ConnectionGUID: Jkq6Mz0gRp20CnKRwQK4wA== X-CSE-MsgGUID: nJkgHBipQKyZD35UPmYZGg== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090876" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090876" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:00 -0700 X-CSE-ConnectionGUID: ltt0TNiKTpe4wM8NlDwj3Q== X-CSE-MsgGUID: D7wtuImPSNuPDYI3Y5CWWg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488023" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:00 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 02/15] selftests/resctrl: Print accurate buffer size as part of MBM results Date: Thu, 24 Oct 2024 14:18:39 -0700 Message-ID: X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" By default the MBM test uses the "fill_buf" benchmark to keep reading from a buffer with size DEFAULT_SPAN while measuring memory bandwidth. User space can provide an alternate benchmark or amend the size of the buffer "fill_buf" should use. Analysis of the MBM measurements do not require that a buffer be used and thus do not require knowing the size of the buffer if it was used during testing. Even so, the buffer size is printed as informational as part of the MBM test results. What is printed as buffer size is hardcoded as DEFAULT_SPAN, even if the test relied on another benchmark (that may or may not use a buffer) or if user space amended the buffer size. Ensure that accurate buffer size is printed when using "fill_buf" benchmark and omit the buffer size information if another benchmark is used. Fixes: ecdbb911f22d ("selftests/resctrl: Add MBM test") Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Backporting is not recommended. Backporting this fix will be a challenge with all the refactoring done since then. This issue does not impact default tests and there is no sign that folks run these tests with anything but the defaults. This issue is also minor since it does not impact actual test runs or results, just the information printed during a test run. Changes since V3: - Ensure string parsing handles case when user provides "". (Ilpo) - Fix error returned. (Ilpo) Changes since V2: - Make user input checks more robust. (Ilpo) Changes since V1: - New patch. --- tools/testing/selftests/resctrl/mbm_test.c | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/resctrl/mbm_test.c b/tools/testing/sel= ftests/resctrl/mbm_test.c index 6b5a3b52d861..cf08ba5e314e 100644 --- a/tools/testing/selftests/resctrl/mbm_test.c +++ b/tools/testing/selftests/resctrl/mbm_test.c @@ -40,7 +40,8 @@ show_bw_info(unsigned long *bw_imc, unsigned long *bw_res= c, size_t span) ksft_print_msg("%s Check MBM diff within %d%%\n", ret ? "Fail:" : "Pass:", MAX_DIFF_PERCENT); ksft_print_msg("avg_diff_per: %d%%\n", avg_diff_per); - ksft_print_msg("Span (MB): %zu\n", span / MB); + if (span) + ksft_print_msg("Span (MB): %zu\n", span / MB); ksft_print_msg("avg_bw_imc: %lu\n", avg_bw_imc); ksft_print_msg("avg_bw_resc: %lu\n", avg_bw_resc); =20 @@ -138,15 +139,26 @@ static int mbm_run_test(const struct resctrl_test *te= st, const struct user_param .setup =3D mbm_setup, .measure =3D mbm_measure, }; + char *endptr =3D NULL; + size_t span =3D 0; int ret; =20 remove(RESULT_FILE_NAME); =20 + if (uparams->benchmark_cmd[0] && strcmp(uparams->benchmark_cmd[0], "fill_= buf") =3D=3D 0) { + if (uparams->benchmark_cmd[1] && *uparams->benchmark_cmd[1] !=3D '\0') { + errno =3D 0; + span =3D strtoul(uparams->benchmark_cmd[1], &endptr, 10); + if (errno || *endptr !=3D '\0') + return -EINVAL; + } + } + ret =3D resctrl_val(test, uparams, uparams->benchmark_cmd, ¶m); if (ret) return ret; =20 - ret =3D check_results(DEFAULT_SPAN); + ret =3D check_results(span); if (ret && (get_vendor() =3D=3D ARCH_INTEL)) ksft_print_msg("Intel MBM may be inaccurate when Sub-NUMA Clustering is = enabled. Check BIOS configuration.\n"); =20 --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 78C682178E0; Thu, 24 Oct 2024 21:08:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804086; cv=none; b=N46+lK8uZkfK5x7ukqrZ4N7ySsi29BkIrzE56t8lWOj6yyN+7JO8uZaYXa1xl8k9IcNBfKorddkt46V2Bw6BojFC3mj1O2KhgfmVvl2XPzT4sUgZL1qbgpHd+TjQQ3j+gONa6ZXWdM5fiY2wKBTH38/1e/asX5w6ESsNmsVGfTI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804086; c=relaxed/simple; bh=UzzqknheAAX6hxjlvFlIZNJbYWmAx1Pye1kk6LJzmEE=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=AcfQuyqgYpRHp690/5MPEeLO+SRvqkg9ZODYnMxlv4LVw+ZNdw1IGUu5KlHGZpzR/Vr4EyJ5adnOnpWIf7h242MWgO+W49Xupw4ln7c23xMru31dHMhqWWNRvLClrAbmAiEICpirMWtgZ5v5RAv4UqASKYk1qxnv/GXXY4PKHv0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=mK/u2TUr; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="mK/u2TUr" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804085; x=1761340085; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=UzzqknheAAX6hxjlvFlIZNJbYWmAx1Pye1kk6LJzmEE=; b=mK/u2TUrx0TsmCy4ibt4LmDGOB8Qi0rKBRCiwO/Wfn5eUC+skhr9K5QI 5ifcsyE08D55MKDzaWn76qGdVtw8/vhNKKrV0qShOXAznMYuErjBzbTJ/ XHoRw4kM3/D/vlaY2ep2GiGLIWjJmv10Jt732JJw/KL3cKznj7buVE/NJ 47so5RFDMtP2R5T9R2e/mj0EXckaZZbXDmcQei5M//bPByd2U5pNWXWsm 4AxMJVbwhlvgwrnUleOYeko/o0AfJsISgFEbNx08uO6Dbaeyfk9bA2Oy7 GeP+Da1R1vYJ6kY4TbNSumiElrYeDJUP35saO8Xviz7zMDSzYYFsfRz4j A==; X-CSE-ConnectionGUID: B8ArmqlzR6qWsb+MZrj/9w== X-CSE-MsgGUID: xltyl/nmRTqwV98Io1skoQ== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090884" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090884" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: wLaBP/8zS0e0Bbz38b2NEw== X-CSE-MsgGUID: kitsDoW8QLigmw444S4I8Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488026" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:00 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 03/15] selftests/resctrl: Fix memory overflow due to unhandled wraparound Date: Thu, 24 Oct 2024 14:18:40 -0700 Message-ID: <0927fd4a76961b2452ba3f77f75ed4d19e187b24.1729804024.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable alloc_buffer() allocates and initializes (with random data) a buffer of requested size. The initialization starts from the beginning of the allocated buffer and incrementally assigns sizeof(uint64_t) random data to each cache line. The initialization uses the size of the buffer to control the initialization flow, decrementing the amount of buffer needing to be initialized after each iteration. The size of the buffer is stored in an unsigned (size_t) variable s64 and the test "s64 > 0" is used to decide if initialization is complete. The problem is that decrementing the buffer size may wrap around if the buffer size is not divisible by "CL_SIZE / sizeof(uint64_t)" resulting in the "s64 > 0" test being true and memory beyond the buffer "initialized". Use a signed value for the buffer size to support all buffer sizes. Fixes: a2561b12fe39 ("selftests/resctrl: Add built in benchmark") Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V2: - Add Ilpo's Reviewed-by tag. Changes since V1: - New patch. --- tools/testing/selftests/resctrl/fill_buf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/resctrl/fill_buf.c b/tools/testing/sel= ftests/resctrl/fill_buf.c index ae120f1735c0..34e5df721430 100644 --- a/tools/testing/selftests/resctrl/fill_buf.c +++ b/tools/testing/selftests/resctrl/fill_buf.c @@ -127,7 +127,7 @@ unsigned char *alloc_buffer(size_t buf_size, int memflu= sh) { void *buf =3D NULL; uint64_t *p64; - size_t s64; + ssize_t s64; int ret; =20 ret =3D posix_memalign(&buf, PAGE_SIZE, buf_size); --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4B2A82178F4; Thu, 24 Oct 2024 21:08:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804086; cv=none; b=E6QVtjBlTo7YzzGA8dOLWr2+PfCgtf6eu7vGLXhdERJoaSwrjL1JU/OvQKE2K6BF46Ln2wfZlJFLJWTqHLa9i8dEyTqI8jZmeHh3KHBpyWbL0DM0wHI8BiyUvvL1/7Zx6XUP+4thnYYENu2wxCKsAhiTU5b18CEu04GI2z1xvIg= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804086; c=relaxed/simple; bh=8igkGI9MOLwE1u4y4oKvZ2ckKq/pi4qsR/V3GdFGBdM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=k/0v3cAXHghpSeV+6SblOKCuR0TLAsdw0xiyLwmXNd0TYJxznocGY7drhKx8KUZwYpYgNXmXq8+4NI8HuydJ4yhyaa6yyvJvbgl8CvH8iT2HqIkgUFRN8wCF2e2z3HgHiBcb0xwfmlAMynns0Jk3zXq0IvohYuOai0OLPGPBUaQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=FpFoeMjb; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="FpFoeMjb" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804084; x=1761340084; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=8igkGI9MOLwE1u4y4oKvZ2ckKq/pi4qsR/V3GdFGBdM=; b=FpFoeMjbjI4pj9wZYOIdnZO1c9helsSH75YllEDZYZAmMny26Zp1KE2l yh01vaf0hU+fzjqVtk4vCw2ffzrndyIUwlBExkb8ohKwhBVlK41pgSl6V j3yEcR1LX61WCaMgD90EnSkU7bUJcDT/UUV6UjmrQxiAT+yAavgfwrS5I 0h8/qe3W0jzPatf1B6xWim1veCEEIUAN7u04EuYub+BsQ/0v5OTGLfITD REmqqehERFVFYB4fkhTrHbVZJNorGBJiQ7sjEgxyL5HcpoGxaHHKMSbnC C2baEe0gNLXGFmpthozQkbUzOwt3wZVyLu7ZKsxWhwnSAbLywRzsFZwN5 w==; X-CSE-ConnectionGUID: kUn6JhIfRqW8dHXwPbqMbw== X-CSE-MsgGUID: cxq3mvxKRtiNLm4kocCkow== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090892" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090892" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: eB/4x2gRShSQmgSSkulvyw== X-CSE-MsgGUID: OPEcho7IQ0SrduZcKQWWvw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488029" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:00 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 04/15] selftests/resctrl: Protect against array overrun during iMC config parsing Date: Thu, 24 Oct 2024 14:18:41 -0700 Message-ID: X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The MBM and MBA tests need to discover the event and umask with which to configure the performance event used to measure read memory bandwidth. This is done by parsing the /sys/bus/event_source/devices/uncore_imc_/events/cas_count_re= ad file for each iMC instance that contains the formatted output: "event=3D,umask=3D" Parsing of cas_count_read contents is done by initializing an array of MAX_TOKENS elements with tokens (deliminated by "=3D,") from this file. Remove the unnecessary append of a delimiter to the string needing to be parsed. Per the strtok() man page: "delimiter bytes at the start or end of the string are ignored". This has no impact on the token placement within the array. After initialization, the actual event and umask is determined by parsing the tokens directly following the "event" and "umask" tokens respectively. Iterating through the array up to index "i < MAX_TOKENS" but then accessing index "i + 1" risks array overrun during the final iteration. Avoid array overrun by ensuring that the index used within for loop will always be valid. Fixes: 1d3f08687d76 ("selftests/resctrl: Read memory bandwidth from perf IM= C counter and from resctrl file system") Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V2: - Rephrase changelog. (Ilpo) - Add Ilpo's Reviewed-by tag. Changes since V1: - New patch. --- tools/testing/selftests/resctrl/resctrl_val.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/tools/testing/selftests/resctrl/resctrl_val.c b/tools/testing/= selftests/resctrl/resctrl_val.c index 70e8e31f5d1a..e88d5ca30517 100644 --- a/tools/testing/selftests/resctrl/resctrl_val.c +++ b/tools/testing/selftests/resctrl/resctrl_val.c @@ -83,13 +83,12 @@ static void get_event_and_umask(char *cas_count_cfg, in= t count, bool op) char *token[MAX_TOKENS]; int i =3D 0; =20 - strcat(cas_count_cfg, ","); token[0] =3D strtok(cas_count_cfg, "=3D,"); =20 for (i =3D 1; i < MAX_TOKENS; i++) token[i] =3D strtok(NULL, "=3D,"); =20 - for (i =3D 0; i < MAX_TOKENS; i++) { + for (i =3D 0; i < MAX_TOKENS - 1; i++) { if (!token[i]) break; if (strcmp(token[i], "event") =3D=3D 0) { --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4A2DA189F3E; Thu, 24 Oct 2024 21:08:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804088; cv=none; b=hxAdQ9KJ17AKd9e0uYhN6ee81chZG3bJLjw/CyvqbSo3ATUUzAMSk8SNW/lPrJUd3kil8byTKxOqBUTd52Nv4NC1eYS3KcGe0o5lqVS8tlT6FwTyjMnziLQ6UHZlZFU9bz0WlLtmBZWfrVy5kYEfcuyzZCkvL3cEIvjDGKI4vYc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804088; c=relaxed/simple; bh=7BFETFF+Lrhf1bsYmQmPo4keg+4a9mpHorYCi83s0Ww=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=sMuw4A71OqyoK1PjvqGNIZhwLwHNaNqRfMHeAyKhq6w32t1sr7dOzbFZOdRcH5Uq54QoVcjE3hQDB7KMSNAXtDIxQ9gX0sb/v+EHhGdAJt2fTzewUc7gV3RjubCPuzPecSePMrbQH3nNgo09aQpRZ3/aNty4W4kvrI3fMgjBiGw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=IOo4+yMn; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="IOo4+yMn" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804086; x=1761340086; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=7BFETFF+Lrhf1bsYmQmPo4keg+4a9mpHorYCi83s0Ww=; b=IOo4+yMnhjQfHchi6ElN+dDW3Q6v6hEWz9gYSHqjOl2nNa2gy3NojCgm G/CAZUrFyYo7wFCcZNnVkVfMuMuTac4WEBsoGEJ+GAlwWEMNhOtJXkBqI 38KWby8GbGZfKtJQk82eHLTT6Viqvfm6RVU4JemCFH5mW6RYpcsh0ubdi kd4cc6fhm3LC9eyVnzqkN/T6lUzvFGC8VpAWPJN2fq+qv0XNuSJQgQKQw RWTnI9ig7nvXsUxN0vg5qgYEVhhVLIm0zxPYvMfowq6SOhJMYS2LmCxSo yRipl38RhN1uRwo6Y2eXTbcdlo3Ds0FACTNIr7B6AYrfFhjkjBURjMbyS w==; X-CSE-ConnectionGUID: 03BM610MRke62VyUUNTO3w== X-CSE-MsgGUID: zRRxaJ0+S6afT5xuaxabEg== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090899" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090899" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: 8yXDKXrCQw+3P0eLxSdP4A== X-CSE-MsgGUID: 3ujS6rGhRGqK3Sn3YBsZbQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488033" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 05/15] selftests/resctrl: Protect against array overflow when reading strings Date: Thu, 24 Oct 2024 14:18:42 -0700 Message-ID: <96c86bb56a520945eee493a938161f50549ce6a5.1729804024.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable resctrl selftests discover system properties via a variety of sysfs files. The MBM and MBA tests need to discover the event and umask with which to configure the performance event used to measure read memory bandwidth. This is done by parsing the contents of /sys/bus/event_source/devices/uncore_imc_/events/cas_count_re= ad Similarly, the resctrl selftests discover the cache size via /sys/bus/cpu/devices/cpu/cache/index/size. Take care to do bounds checking when using fscanf() to read the contents of files into a string buffer because by default fscanf() assumes arbitrarily long strings. If the file contains more bytes than the array can accommodate then an overflow will occur. Provide a maximum field width to the conversion specifier to protect against array overflow. The maximum is one less than the array size because string input stores a terminating null byte that is not covered by the maximum field width. Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- This makes the code robust against any changes in information read from sysfs. The existing sysfs content fit well into the arrays, thus this is not considered a bugfix. Changes since V3: - Add Ilpo's Reviewed-by tag. Changes since V2: - New patch --- tools/testing/selftests/resctrl/resctrl_val.c | 4 ++-- tools/testing/selftests/resctrl/resctrlfs.c | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/tools/testing/selftests/resctrl/resctrl_val.c b/tools/testing/= selftests/resctrl/resctrl_val.c index e88d5ca30517..c9dd70ce3ea8 100644 --- a/tools/testing/selftests/resctrl/resctrl_val.c +++ b/tools/testing/selftests/resctrl/resctrl_val.c @@ -159,7 +159,7 @@ static int read_from_imc_dir(char *imc_dir, int count) =20 return -1; } - if (fscanf(fp, "%s", cas_count_cfg) <=3D 0) { + if (fscanf(fp, "%1023s", cas_count_cfg) <=3D 0) { ksft_perror("Could not get iMC cas count read"); fclose(fp); =20 @@ -177,7 +177,7 @@ static int read_from_imc_dir(char *imc_dir, int count) =20 return -1; } - if (fscanf(fp, "%s", cas_count_cfg) <=3D 0) { + if (fscanf(fp, "%1023s", cas_count_cfg) <=3D 0) { ksft_perror("Could not get iMC cas count write"); fclose(fp); =20 diff --git a/tools/testing/selftests/resctrl/resctrlfs.c b/tools/testing/se= lftests/resctrl/resctrlfs.c index 250c320349a7..a53cd1cb6e0c 100644 --- a/tools/testing/selftests/resctrl/resctrlfs.c +++ b/tools/testing/selftests/resctrl/resctrlfs.c @@ -182,7 +182,7 @@ int get_cache_size(int cpu_no, const char *cache_type, = unsigned long *cache_size =20 return -1; } - if (fscanf(fp, "%s", cache_str) <=3D 0) { + if (fscanf(fp, "%63s", cache_str) <=3D 0) { ksft_perror("Could not get cache_size"); fclose(fp); =20 --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CE3EF21832E; Thu, 24 Oct 2024 21:08:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804089; cv=none; b=qv5AX9fQ9sjTfu/MtZnyrqkGgDtOhigfIY2Pwy3R6Z43gS0OLP91YkpH6kqPobxJ+29+KHG9vSqdgEr6KsP9WFJ8w+Hc+VznM1z6Dq8IYLo6Vl/08RlnhyE58KJ9J5nqBQlXkIqwbrCuQDkj3pDEee6Q8WW4uDLQTMgorZ1Ruxs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804089; c=relaxed/simple; bh=K3dDL/ARG9AHDi3oOFzH+WG7DuBUfvcX+mwZNnT6MGw=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=SeUtLL8MYf82Iyom2ifP6O3JjcJYAyXynxaIaL5LWwWhDxzMmNqR2YkPNePFhf01UolF47M3nyIlcDYaOUWfxlgjElqtcnCmUlf267zTZ1OnHi+H6wuP6V5XzLKRRQO+4be2Ap/GP7GQwlnH2Nh+nIjKE9mmn/SgktvW2YwWT9o= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=atis4df6; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="atis4df6" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804087; x=1761340087; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=K3dDL/ARG9AHDi3oOFzH+WG7DuBUfvcX+mwZNnT6MGw=; b=atis4df6Kg3mK63XiapyT0N2N/xCG+YVZkfhwvzzOxgsKa66PQkUQ5IO DEaU76AtVG1mOWZxnlPsahpYnFVZk/NDwYgMI75lrU0CmT9fkhDoclqG2 mHb86j+j6eSwvJijJ1ETs03cjNx2rDIBm7DWXuopWPGn6BcmBAJoH9+ej 04kU0PlMSwUi+daDTyqdQUSv9qF5ZzaOev5UHLi5+3H19rUAn8jzuQiPu VLNDVAjhYodNkGKHpNZRqjCxON4EYG4X63VNlTVh6p/W6FY5lyGBwlrjs Irh6G/Xk91JTXZc/S6DpriYmZ3yflChFPggphkaM55HyK9WbmIicpvZ13 A==; X-CSE-ConnectionGUID: j/dPH2bnSTWh3m5F6lOX2A== X-CSE-MsgGUID: O5hFrmLEQLKr7/qQOV+Edg== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090905" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090905" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: TK8Vk/jXR1qcmmLPcEbsvw== X-CSE-MsgGUID: e9NfCFGfR6eApHvDs72UQA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488036" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 06/15] selftests/resctrl: Make wraparound handling obvious Date: Thu, 24 Oct 2024 14:18:43 -0700 Message-ID: <890c35b8c7b1aef384db0a1f9042322cf2dd23c8.1729804024.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Within mba_setup() the programmed bandwidth delay value starts at the maximum (100, or rather ALLOCATION_MAX) and progresses towards ALLOCATION_MIN by decrementing with ALLOCATION_STEP. The programmed bandwidth delay should never be negative, so representing it with an unsigned int is most appropriate. This may introduce confusion because of the "allocation > ALLOCATION_MAX" check used to check wraparound of the subtraction. Modify the mba_setup() flow to start at the minimum, ALLOCATION_MIN, and incrementally, with ALLOCATION_STEP steps, adjust the bandwidth delay value. This avoids wraparound while making the purpose of "allocation > ALLOCATION_MAX" clear and eliminates the need for the "allocation < ALLOCATION_MIN" check. Reported-by: Ilpo J=C3=A4rvinen Closes: https://lore.kernel.org/lkml/1903ac13-5c9c-ef8d-78e0-417ac34a971b@l= inux.intel.com/ Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V1: - New patch - Add Ilpo's Reviewed-by tag. --- tools/testing/selftests/resctrl/mba_test.c | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/tools/testing/selftests/resctrl/mba_test.c b/tools/testing/sel= ftests/resctrl/mba_test.c index ab8496a4925b..da40a8ed4413 100644 --- a/tools/testing/selftests/resctrl/mba_test.c +++ b/tools/testing/selftests/resctrl/mba_test.c @@ -39,7 +39,8 @@ static int mba_setup(const struct resctrl_test *test, const struct user_params *uparams, struct resctrl_val_param *p) { - static int runs_per_allocation, allocation =3D 100; + static unsigned int allocation =3D ALLOCATION_MIN; + static int runs_per_allocation; char allocation_str[64]; int ret; =20 @@ -50,7 +51,7 @@ static int mba_setup(const struct resctrl_test *test, if (runs_per_allocation++ !=3D 0) return 0; =20 - if (allocation < ALLOCATION_MIN || allocation > ALLOCATION_MAX) + if (allocation > ALLOCATION_MAX) return END_OF_TESTS; =20 sprintf(allocation_str, "%d", allocation); @@ -59,7 +60,7 @@ static int mba_setup(const struct resctrl_test *test, if (ret < 0) return ret; =20 - allocation -=3D ALLOCATION_STEP; + allocation +=3D ALLOCATION_STEP; =20 return 0; } @@ -72,8 +73,9 @@ static int mba_measure(const struct user_params *uparams, =20 static bool show_mba_info(unsigned long *bw_imc, unsigned long *bw_resc) { - int allocation, runs; + unsigned int allocation; bool ret =3D false; + int runs; =20 ksft_print_msg("Results are displayed in (MB)\n"); /* Memory bandwidth from 100% down to 10% */ @@ -103,7 +105,7 @@ static bool show_mba_info(unsigned long *bw_imc, unsign= ed long *bw_resc) avg_diff_per > MAX_DIFF_PERCENT ? "Fail:" : "Pass:", MAX_DIFF_PERCENT, - ALLOCATION_MAX - ALLOCATION_STEP * allocation); + ALLOCATION_MIN + ALLOCATION_STEP * allocation); =20 ksft_print_msg("avg_diff_per: %d%%\n", avg_diff_per); ksft_print_msg("avg_bw_imc: %lu\n", avg_bw_imc); --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 91433218320; Thu, 24 Oct 2024 21:08:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804090; cv=none; b=Za0DnUEADlbTCQJxEAxHahsqnTZrmx3M3Ry1QdRNCnedCQ2dArrYP472Lus7YUeoDezJHZaGFYmyccsSSmrbwDBvqAiTsfS+g5iV3XTAtWljoPcHIletsvW5LP1Ing/i0CM6Ov60z+UJS803IQOwTpyxA3/3oWoaPDd6fXLcFNo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804090; c=relaxed/simple; bh=jYJhpr/7IMJQAZ3azMO430LcvmKCQNmOW0TWywlpP9s=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=saRsageE8Gas+FdUSeOKzsUHBA9yqWIcjWKXfG8uxgrd5NWzjrYsGniXcLwyZvjNNtjjMwkDgRsIbLWYWpJRRMqJIrbrBzuu7wXmwv5GOWXDB2BNBqtnX1lvhNokZt4pd6U28tWh8Q55nIdmAzZ2I8FEeuI0nB7NNi++a0I1xG4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=gbyYkxqk; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="gbyYkxqk" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804087; x=1761340087; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=jYJhpr/7IMJQAZ3azMO430LcvmKCQNmOW0TWywlpP9s=; b=gbyYkxqkB1BmtNoetXt+ZpshD/AfhWBFHkfPgyhhHo245rOBWkGbeVqF v773pi1cYxQ34f5TN9zMVRmCsakut6+c6MCyqwb7IqkRZ7wqJ/TfFr4r+ HCADwCmKYHYVUKaMdLPZTwJQ4MRE8GUo/LJ2lrp5T00JIbwqHBpFZT8f2 ESZdtZgh253QuY1I3lIiZWlf4+UjLlF+8bMdO5PoBTeHbXspjD4ZPi86P RLW4qP/zc/a7zah8N5xfgivww9i+MFKATzZKicmyV6t7f57ImmtJWNnvu 3rnAe1bBCzRBFXEK8Y5oK7QHulTm1jG/BbMY7M/KUs9faAMr5P/hV4gsq Q==; X-CSE-ConnectionGUID: Zvj6B6XzT/y2/o7A9C6IAQ== X-CSE-MsgGUID: HUG8BQ8nSFq2QKr7cFbGFQ== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090907" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090907" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: jQTSxGgpTUGcYD4oGu9UWQ== X-CSE-MsgGUID: f+3Irla0R5G7TkeY6WcRfg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488040" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 07/15] selftests/resctrl: Remove "once" parameter required to be false Date: Thu, 24 Oct 2024 14:18:44 -0700 Message-ID: <131b87e57d6cfc63420dd423baf25ee21c273ea7.1729804024.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The CMT, MBM, and MBA tests rely on a benchmark that runs while the test makes changes to needed configuration (for example memory bandwidth allocation) and takes needed measurements. By default the "fill_buf" benchmark is used and by default (via its "once =3D false" setting) "fill_buf" is configured to run until terminated after the test completes. An unintended consequence of enabling the user to override the benchmark also enables the user to change parameters to the "fill_buf" benchmark. This enables the user to set "fill_buf" to only cycle through the buffer once (by setting "once =3D true") and thus breaking the CMT, MBA, and MBM tests that expect workload/interference to be reflected by their measurements. Prevent user space from changing the "once" parameter and ensure that it is always false for the CMT, MBA, and MBM tests. Suggested-by: Ilpo J=C3=A4rvinen Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V3: - Add Ilpo's Reviewed-by tag. Changes since V2: - Remove unnecessary assignment to benchmark_cmd[5]. (Ilpo) Changes since V1: - New patch --- tools/testing/selftests/resctrl/fill_buf.c | 7 ++++--- tools/testing/selftests/resctrl/resctrl.h | 2 +- tools/testing/selftests/resctrl/resctrl_tests.c | 9 +++++++-- tools/testing/selftests/resctrl/resctrl_val.c | 11 +---------- 4 files changed, 13 insertions(+), 16 deletions(-) diff --git a/tools/testing/selftests/resctrl/fill_buf.c b/tools/testing/sel= ftests/resctrl/fill_buf.c index 34e5df721430..854f0108d8e6 100644 --- a/tools/testing/selftests/resctrl/fill_buf.c +++ b/tools/testing/selftests/resctrl/fill_buf.c @@ -151,7 +151,7 @@ unsigned char *alloc_buffer(size_t buf_size, int memflu= sh) return buf; } =20 -int run_fill_buf(size_t buf_size, int memflush, int op, bool once) +int run_fill_buf(size_t buf_size, int memflush, int op) { unsigned char *buf; =20 @@ -160,9 +160,10 @@ int run_fill_buf(size_t buf_size, int memflush, int op= , bool once) return -1; =20 if (op =3D=3D 0) - fill_cache_read(buf, buf_size, once); + fill_cache_read(buf, buf_size, false); else - fill_cache_write(buf, buf_size, once); + fill_cache_write(buf, buf_size, false); + free(buf); =20 return 0; diff --git a/tools/testing/selftests/resctrl/resctrl.h b/tools/testing/self= tests/resctrl/resctrl.h index 2dda56084588..51f5f4b25e06 100644 --- a/tools/testing/selftests/resctrl/resctrl.h +++ b/tools/testing/selftests/resctrl/resctrl.h @@ -142,7 +142,7 @@ int perf_event_open(struct perf_event_attr *hw_event, p= id_t pid, int cpu, unsigned char *alloc_buffer(size_t buf_size, int memflush); void mem_flush(unsigned char *buf, size_t buf_size); void fill_cache_read(unsigned char *buf, size_t buf_size, bool once); -int run_fill_buf(size_t buf_size, int memflush, int op, bool once); +int run_fill_buf(size_t buf_size, int memflush, int op); int initialize_mem_bw_imc(void); int measure_mem_bw(const struct user_params *uparams, struct resctrl_val_param *param, pid_t bm_pid, diff --git a/tools/testing/selftests/resctrl/resctrl_tests.c b/tools/testin= g/selftests/resctrl/resctrl_tests.c index ecbb7605a981..e7878077883f 100644 --- a/tools/testing/selftests/resctrl/resctrl_tests.c +++ b/tools/testing/selftests/resctrl/resctrl_tests.c @@ -266,8 +266,13 @@ int main(int argc, char **argv) uparams.benchmark_cmd[1] =3D span_str; uparams.benchmark_cmd[2] =3D "1"; uparams.benchmark_cmd[3] =3D "0"; - uparams.benchmark_cmd[4] =3D "false"; - uparams.benchmark_cmd[5] =3D NULL; + /* + * Fourth parameter was previously used to indicate + * how long "fill_buf" should run for, with "false" + * ("fill_buf" will keep running until terminated) + * the only option that works. + */ + uparams.benchmark_cmd[4] =3D NULL; } =20 ksft_set_plan(tests); diff --git a/tools/testing/selftests/resctrl/resctrl_val.c b/tools/testing/= selftests/resctrl/resctrl_val.c index c9dd70ce3ea8..b0f3c594c4da 100644 --- a/tools/testing/selftests/resctrl/resctrl_val.c +++ b/tools/testing/selftests/resctrl/resctrl_val.c @@ -625,7 +625,6 @@ static void run_benchmark(int signum, siginfo_t *info, = void *ucontext) int operation, ret, memflush; char **benchmark_cmd; size_t span; - bool once; FILE *fp; =20 benchmark_cmd =3D info->si_ptr; @@ -645,16 +644,8 @@ static void run_benchmark(int signum, siginfo_t *info,= void *ucontext) span =3D strtoul(benchmark_cmd[1], NULL, 10); memflush =3D atoi(benchmark_cmd[2]); operation =3D atoi(benchmark_cmd[3]); - if (!strcmp(benchmark_cmd[4], "true")) { - once =3D true; - } else if (!strcmp(benchmark_cmd[4], "false")) { - once =3D false; - } else { - ksft_print_msg("Invalid once parameter\n"); - parent_exit(ppid); - } =20 - if (run_fill_buf(span, memflush, operation, once)) + if (run_fill_buf(span, memflush, operation)) fprintf(stderr, "Error in running fill buffer\n"); } else { /* Execute specified benchmark */ --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DD76C218D7D; Thu, 24 Oct 2024 21:08:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804091; cv=none; b=m4i/zOll8Pr4yfVHElpsvQyac/rtrti0TdfL34PKqSk6swoxPVfykcNFxyRA+eQhQRzbWBol1+qwSUxzXrswg8nPpA6Ja4SJIh/PWLkVjkeCMhlKAPHtdWJbn5+fjhfxfGkBB2oO6icBLh4tEMIpsOpQE2MyArP1cCN4jwIGVGY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804091; c=relaxed/simple; bh=aQX0cjK9HHCJqQRg1lw6DusEwJtaCqS8ZGRtHEIO3g0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=T0EOaYOzoLMmR7jU3335uES4Os353YE2pWluEKGHUrsRhl4pFBgz/VzuTRePxYXmhDybHAoYyZVZuTsAc7/dkbijJPb9OAPJfQEbC1lA07Mwx8V0gTXcgHC6lx7WrW69E7+JyySjb4ekquv42qVkrtut6GdSEiIkbJTibUZJ6so= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=j+LBriGK; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="j+LBriGK" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804089; x=1761340089; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=aQX0cjK9HHCJqQRg1lw6DusEwJtaCqS8ZGRtHEIO3g0=; b=j+LBriGKJTA18CTopVSvqPuX3yGlQzdXsHFlO20Bx+IUz5qi8Ja3wfEn hPfdsBGRiMfnwDJRP1HTSqwHq25cpm4EP/cua02cuF0F8k5DnolQvYL8l 4RDkr3b9/Xf8XwBlFczX7FQGHHNrdUvY+CUPE+Rehjy5lBJuD3iXET5mt /imJz8m4CCAM1Lm+k9uL8JSDh49kMzGk2KP3tMK+k8C5lDK/bClQwAJ8c pDatM7GdJB0fVrtaOwej0FFmJCU3Nf7/KSJGZ3cHiAWy8+kfaxgk7KCbB kNOZr/YO8tTnE0odiYLFEYUErssKrPA/E4vEfwfVmf2CXwXbmBk4WYJz6 g==; X-CSE-ConnectionGUID: xCj2dOt7SQeTDSbJM/R1PQ== X-CSE-MsgGUID: UfqdJqxyRu+Qdh6OiQwzWw== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090914" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090914" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: Ou62wbVTTgOA4w77/hv6Ug== X-CSE-MsgGUID: /cwRFDxvTkumHed3dIV2tw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488044" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 08/15] selftests/resctrl: Only support measured read operation Date: Thu, 24 Oct 2024 14:18:45 -0700 Message-ID: X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The CMT, MBM, and MBA tests rely on a benchmark to generate memory traffic. By default this is the "fill_buf" benchmark that can be replaced via the "-b" command line argument. The original intent of the "-b" command line parameter was to replace the default "fill_buf" benchmark, but the implementation also exposes an alternative use case where the "fill_buf" parameters itself can be modified. One of the parameters to "fill_buf" is the "operation" that can be either "read" or "write" and indicates whether the "fill_buf" should use "read" or "write" operations on the allocated buffer. While replacing "fill_buf" default parameters is technically possible, replacing the default "read" parameter with "write" is not supported because the MBA and MBM tests only measure "read" operations. The "read" operation is also most appropriate for the CMT test that aims to use the benchmark to allocate into the cache. Avoid any potential inconsistencies between test and measurement by removing code for unsupported "write" operations to the buffer. Ignore any attempt from user space to enable this unsupported test configuration, instead always use read operations. Keep the initialization of the, now unused, "fill_buf" parameters to reserve these parameter positions since it has been exposed as an API. Future parameter additions cannot use these parameter positions. Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V3: - Add Ilpo's Reviewed-by tag. Changes since V2: - Update changelog to justify keeping the assignment to benchmark_cmd[4]. (Ilpo) Changes since V1: - New patch. --- tools/testing/selftests/resctrl/fill_buf.c | 28 ++----------------- tools/testing/selftests/resctrl/resctrl.h | 2 +- .../testing/selftests/resctrl/resctrl_tests.c | 5 +++- tools/testing/selftests/resctrl/resctrl_val.c | 5 ++-- 4 files changed, 9 insertions(+), 31 deletions(-) diff --git a/tools/testing/selftests/resctrl/fill_buf.c b/tools/testing/sel= ftests/resctrl/fill_buf.c index 854f0108d8e6..e4f1cea317f1 100644 --- a/tools/testing/selftests/resctrl/fill_buf.c +++ b/tools/testing/selftests/resctrl/fill_buf.c @@ -88,18 +88,6 @@ static int fill_one_span_read(unsigned char *buf, size_t= buf_size) return sum; } =20 -static void fill_one_span_write(unsigned char *buf, size_t buf_size) -{ - unsigned char *end_ptr =3D buf + buf_size; - unsigned char *p; - - p =3D buf; - while (p < end_ptr) { - *p =3D '1'; - p +=3D (CL_SIZE / 2); - } -} - void fill_cache_read(unsigned char *buf, size_t buf_size, bool once) { int ret =3D 0; @@ -114,15 +102,6 @@ void fill_cache_read(unsigned char *buf, size_t buf_si= ze, bool once) *value_sink =3D ret; } =20 -static void fill_cache_write(unsigned char *buf, size_t buf_size, bool onc= e) -{ - while (1) { - fill_one_span_write(buf, buf_size); - if (once) - break; - } -} - unsigned char *alloc_buffer(size_t buf_size, int memflush) { void *buf =3D NULL; @@ -151,7 +130,7 @@ unsigned char *alloc_buffer(size_t buf_size, int memflu= sh) return buf; } =20 -int run_fill_buf(size_t buf_size, int memflush, int op) +int run_fill_buf(size_t buf_size, int memflush) { unsigned char *buf; =20 @@ -159,10 +138,7 @@ int run_fill_buf(size_t buf_size, int memflush, int op) if (!buf) return -1; =20 - if (op =3D=3D 0) - fill_cache_read(buf, buf_size, false); - else - fill_cache_write(buf, buf_size, false); + fill_cache_read(buf, buf_size, false); =20 free(buf); =20 diff --git a/tools/testing/selftests/resctrl/resctrl.h b/tools/testing/self= tests/resctrl/resctrl.h index 51f5f4b25e06..ba1ce1b35699 100644 --- a/tools/testing/selftests/resctrl/resctrl.h +++ b/tools/testing/selftests/resctrl/resctrl.h @@ -142,7 +142,7 @@ int perf_event_open(struct perf_event_attr *hw_event, p= id_t pid, int cpu, unsigned char *alloc_buffer(size_t buf_size, int memflush); void mem_flush(unsigned char *buf, size_t buf_size); void fill_cache_read(unsigned char *buf, size_t buf_size, bool once); -int run_fill_buf(size_t buf_size, int memflush, int op); +int run_fill_buf(size_t buf_size, int memflush); int initialize_mem_bw_imc(void); int measure_mem_bw(const struct user_params *uparams, struct resctrl_val_param *param, pid_t bm_pid, diff --git a/tools/testing/selftests/resctrl/resctrl_tests.c b/tools/testin= g/selftests/resctrl/resctrl_tests.c index e7878077883f..0f91c475b255 100644 --- a/tools/testing/selftests/resctrl/resctrl_tests.c +++ b/tools/testing/selftests/resctrl/resctrl_tests.c @@ -265,13 +265,16 @@ int main(int argc, char **argv) ksft_exit_fail_msg("Out of memory!\n"); uparams.benchmark_cmd[1] =3D span_str; uparams.benchmark_cmd[2] =3D "1"; - uparams.benchmark_cmd[3] =3D "0"; /* + * Third parameter was previously used for "operation" + * (read/write) of which only (now default) "read"/"0" + * works. * Fourth parameter was previously used to indicate * how long "fill_buf" should run for, with "false" * ("fill_buf" will keep running until terminated) * the only option that works. */ + uparams.benchmark_cmd[3] =3D NULL; uparams.benchmark_cmd[4] =3D NULL; } =20 diff --git a/tools/testing/selftests/resctrl/resctrl_val.c b/tools/testing/= selftests/resctrl/resctrl_val.c index b0f3c594c4da..113ca18d67c1 100644 --- a/tools/testing/selftests/resctrl/resctrl_val.c +++ b/tools/testing/selftests/resctrl/resctrl_val.c @@ -622,8 +622,8 @@ int measure_mem_bw(const struct user_params *uparams, */ static void run_benchmark(int signum, siginfo_t *info, void *ucontext) { - int operation, ret, memflush; char **benchmark_cmd; + int ret, memflush; size_t span; FILE *fp; =20 @@ -643,9 +643,8 @@ static void run_benchmark(int signum, siginfo_t *info, = void *ucontext) /* Execute default fill_buf benchmark */ span =3D strtoul(benchmark_cmd[1], NULL, 10); memflush =3D atoi(benchmark_cmd[2]); - operation =3D atoi(benchmark_cmd[3]); =20 - if (run_fill_buf(span, memflush, operation)) + if (run_fill_buf(span, memflush)) fprintf(stderr, "Error in running fill buffer\n"); } else { /* Execute specified benchmark */ --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 463CA219484; Thu, 24 Oct 2024 21:08:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804093; cv=none; b=kZ2Lnm7/v8x0nH6mgwO7RHQrPIpUUMpi0UDHNHz+iCszM9kzrXuKkI2SGgd2x6l4F8jrVdo9DeGvFHJmYF9RhP+sJXXwrYRHBy+LuF+HblebMqDFoS6paj4u4sYbrhV94pfOwU7v18MPZFjluy4m5nkNxLcf4LGdG4NEVllSqRo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804093; c=relaxed/simple; bh=JE/B3/kve8BNJ5315YERJUiTrYkzwZHKHzLT5lPRnBs=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=i2GpTnGo9qvR8cZyWHqHw/k7bzV7SiVczFI9uiHSgMGnQMIkLTpJ2g/GPXrKr9lGffaUf/TOUT/SuaXVvBtwHclDC6oZPNnRL/dbLdP084Ba6jMBTAyjxYuQ3mcN7ODDoXt0StFiUZ+4jpWDUdZQVLWigDGgFA5B0BYY5HNy+wQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=CWBbkZi/; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="CWBbkZi/" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804089; x=1761340089; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=JE/B3/kve8BNJ5315YERJUiTrYkzwZHKHzLT5lPRnBs=; b=CWBbkZi/apAuzULHcihV4UND5zzV8V6sXbfT4Y1LHM5kClgJtmFzHRcg 0QuvtqR36ZcgNQy/5NkQOm5Mdd9WmDwoPtYlIHZ12mt4OPZVUEsqCHx+0 HPiFdPgd4R1cs9QphGbAkXHV0uxNtCKozmIi0ggrYmNBD/Ak5Jqw4ZgGx eMEvURttYB5+MR4ZTALVhhnIBzF6Dg/p499qNWtX0FUHN2+oQByK3yTeQ YrMmE3Mdt/b5Dj5KMj8K76ehVeJpc3aaQ+GuqxsOqO+dDWcP3MaAmJR9y cect/0zoInTZAPoo/df7iWwSMooNd5VmOShbrwlIl6uQcM7sGLVY8/lLp A==; X-CSE-ConnectionGUID: 5YqYOe9vRZGssEVI+jKckg== X-CSE-MsgGUID: 7muJQh3xRDyXB7u+WpmuFw== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090918" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090918" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: 29u2VMr4TTKlVl1qiHV9BQ== X-CSE-MsgGUID: zNv0sv/gRWuKfQTymQqQ2g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488047" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 09/15] selftests/resctrl: Remove unused measurement code Date: Thu, 24 Oct 2024 14:18:46 -0700 Message-ID: <5e30d173b98588b5c8580f710b71d5dc1a2886b3.1729804024.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The MBM and MBA resctrl selftests run a benchmark during which it takes measurements of read memory bandwidth via perf. Code exists to support measurements of write memory bandwidth but there exists no path with which this code can execute. While code exists for write memory bandwidth measurement there has not yet been a use case for it. Remove this unused code. Rename relevant functions to include "read" so that it is clear that it relates only to memory bandwidth reads, while renaming the functions also add consistency by changing the "membw" instances to more prevalent "mem_bw". Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V2: - Add Ilpo's Reviewed-by tag. Changes since V1: - New patch. --- tools/testing/selftests/resctrl/mba_test.c | 4 +- tools/testing/selftests/resctrl/mbm_test.c | 4 +- tools/testing/selftests/resctrl/resctrl.h | 8 +- tools/testing/selftests/resctrl/resctrl_val.c | 234 ++++++------------ tools/testing/selftests/resctrl/resctrlfs.c | 17 -- 5 files changed, 85 insertions(+), 182 deletions(-) diff --git a/tools/testing/selftests/resctrl/mba_test.c b/tools/testing/sel= ftests/resctrl/mba_test.c index da40a8ed4413..be0ead73e55d 100644 --- a/tools/testing/selftests/resctrl/mba_test.c +++ b/tools/testing/selftests/resctrl/mba_test.c @@ -21,7 +21,7 @@ static int mba_init(const struct resctrl_val_param *param= , int domain_id) { int ret; =20 - ret =3D initialize_mem_bw_imc(); + ret =3D initialize_read_mem_bw_imc(); if (ret) return ret; =20 @@ -68,7 +68,7 @@ static int mba_setup(const struct resctrl_test *test, static int mba_measure(const struct user_params *uparams, struct resctrl_val_param *param, pid_t bm_pid) { - return measure_mem_bw(uparams, param, bm_pid, "reads"); + return measure_read_mem_bw(uparams, param, bm_pid); } =20 static bool show_mba_info(unsigned long *bw_imc, unsigned long *bw_resc) diff --git a/tools/testing/selftests/resctrl/mbm_test.c b/tools/testing/sel= ftests/resctrl/mbm_test.c index cf08ba5e314e..defa94293915 100644 --- a/tools/testing/selftests/resctrl/mbm_test.c +++ b/tools/testing/selftests/resctrl/mbm_test.c @@ -91,7 +91,7 @@ static int mbm_init(const struct resctrl_val_param *param= , int domain_id) { int ret; =20 - ret =3D initialize_mem_bw_imc(); + ret =3D initialize_read_mem_bw_imc(); if (ret) return ret; =20 @@ -122,7 +122,7 @@ static int mbm_setup(const struct resctrl_test *test, static int mbm_measure(const struct user_params *uparams, struct resctrl_val_param *param, pid_t bm_pid) { - return measure_mem_bw(uparams, param, bm_pid, "reads"); + return measure_read_mem_bw(uparams, param, bm_pid); } =20 static void mbm_test_cleanup(void) diff --git a/tools/testing/selftests/resctrl/resctrl.h b/tools/testing/self= tests/resctrl/resctrl.h index ba1ce1b35699..82801245e4c1 100644 --- a/tools/testing/selftests/resctrl/resctrl.h +++ b/tools/testing/selftests/resctrl/resctrl.h @@ -126,7 +126,6 @@ int filter_dmesg(void); int get_domain_id(const char *resource, int cpu_no, int *domain_id); int mount_resctrlfs(void); int umount_resctrlfs(void); -const char *get_bw_report_type(const char *bw_report); bool resctrl_resource_exists(const char *resource); bool resctrl_mon_feature_exists(const char *resource, const char *feature); bool resource_info_file_exists(const char *resource, const char *file); @@ -143,10 +142,9 @@ unsigned char *alloc_buffer(size_t buf_size, int memfl= ush); void mem_flush(unsigned char *buf, size_t buf_size); void fill_cache_read(unsigned char *buf, size_t buf_size, bool once); int run_fill_buf(size_t buf_size, int memflush); -int initialize_mem_bw_imc(void); -int measure_mem_bw(const struct user_params *uparams, - struct resctrl_val_param *param, pid_t bm_pid, - const char *bw_report); +int initialize_read_mem_bw_imc(void); +int measure_read_mem_bw(const struct user_params *uparams, + struct resctrl_val_param *param, pid_t bm_pid); void initialize_mem_bw_resctrl(const struct resctrl_val_param *param, int domain_id); int resctrl_val(const struct resctrl_test *test, diff --git a/tools/testing/selftests/resctrl/resctrl_val.c b/tools/testing/= selftests/resctrl/resctrl_val.c index 113ca18d67c1..c4ebf70a46ef 100644 --- a/tools/testing/selftests/resctrl/resctrl_val.c +++ b/tools/testing/selftests/resctrl/resctrl_val.c @@ -12,13 +12,10 @@ =20 #define UNCORE_IMC "uncore_imc" #define READ_FILE_NAME "events/cas_count_read" -#define WRITE_FILE_NAME "events/cas_count_write" #define DYN_PMU_PATH "/sys/bus/event_source/devices" #define SCALE 0.00006103515625 #define MAX_IMCS 20 #define MAX_TOKENS 5 -#define READ 0 -#define WRITE 1 =20 #define CON_MBM_LOCAL_BYTES_PATH \ "%s/%s/mon_data/mon_L3_%02d/mbm_local_bytes" @@ -41,44 +38,43 @@ struct imc_counter_config { =20 static char mbm_total_path[1024]; static int imcs; -static struct imc_counter_config imc_counters_config[MAX_IMCS][2]; +static struct imc_counter_config imc_counters_config[MAX_IMCS]; static const struct resctrl_test *current_test; =20 -static void membw_initialize_perf_event_attr(int i, int j) +static void read_mem_bw_initialize_perf_event_attr(int i) { - memset(&imc_counters_config[i][j].pe, 0, + memset(&imc_counters_config[i].pe, 0, sizeof(struct perf_event_attr)); - imc_counters_config[i][j].pe.type =3D imc_counters_config[i][j].type; - imc_counters_config[i][j].pe.size =3D sizeof(struct perf_event_attr); - imc_counters_config[i][j].pe.disabled =3D 1; - imc_counters_config[i][j].pe.inherit =3D 1; - imc_counters_config[i][j].pe.exclude_guest =3D 0; - imc_counters_config[i][j].pe.config =3D - imc_counters_config[i][j].umask << 8 | - imc_counters_config[i][j].event; - imc_counters_config[i][j].pe.sample_type =3D PERF_SAMPLE_IDENTIFIER; - imc_counters_config[i][j].pe.read_format =3D + imc_counters_config[i].pe.type =3D imc_counters_config[i].type; + imc_counters_config[i].pe.size =3D sizeof(struct perf_event_attr); + imc_counters_config[i].pe.disabled =3D 1; + imc_counters_config[i].pe.inherit =3D 1; + imc_counters_config[i].pe.exclude_guest =3D 0; + imc_counters_config[i].pe.config =3D + imc_counters_config[i].umask << 8 | + imc_counters_config[i].event; + imc_counters_config[i].pe.sample_type =3D PERF_SAMPLE_IDENTIFIER; + imc_counters_config[i].pe.read_format =3D PERF_FORMAT_TOTAL_TIME_ENABLED | PERF_FORMAT_TOTAL_TIME_RUNNING; } =20 -static void membw_ioctl_perf_event_ioc_reset_enable(int i, int j) +static void read_mem_bw_ioctl_perf_event_ioc_reset_enable(int i) { - ioctl(imc_counters_config[i][j].fd, PERF_EVENT_IOC_RESET, 0); - ioctl(imc_counters_config[i][j].fd, PERF_EVENT_IOC_ENABLE, 0); + ioctl(imc_counters_config[i].fd, PERF_EVENT_IOC_RESET, 0); + ioctl(imc_counters_config[i].fd, PERF_EVENT_IOC_ENABLE, 0); } =20 -static void membw_ioctl_perf_event_ioc_disable(int i, int j) +static void read_mem_bw_ioctl_perf_event_ioc_disable(int i) { - ioctl(imc_counters_config[i][j].fd, PERF_EVENT_IOC_DISABLE, 0); + ioctl(imc_counters_config[i].fd, PERF_EVENT_IOC_DISABLE, 0); } =20 /* - * get_event_and_umask: Parse config into event and umask + * get_read_event_and_umask: Parse config into event and umask * @cas_count_cfg: Config * @count: iMC number - * @op: Operation (read/write) */ -static void get_event_and_umask(char *cas_count_cfg, int count, bool op) +static void get_read_event_and_umask(char *cas_count_cfg, int count) { char *token[MAX_TOKENS]; int i =3D 0; @@ -91,34 +87,22 @@ static void get_event_and_umask(char *cas_count_cfg, in= t count, bool op) for (i =3D 0; i < MAX_TOKENS - 1; i++) { if (!token[i]) break; - if (strcmp(token[i], "event") =3D=3D 0) { - if (op =3D=3D READ) - imc_counters_config[count][READ].event =3D - strtol(token[i + 1], NULL, 16); - else - imc_counters_config[count][WRITE].event =3D - strtol(token[i + 1], NULL, 16); - } - if (strcmp(token[i], "umask") =3D=3D 0) { - if (op =3D=3D READ) - imc_counters_config[count][READ].umask =3D - strtol(token[i + 1], NULL, 16); - else - imc_counters_config[count][WRITE].umask =3D - strtol(token[i + 1], NULL, 16); - } + if (strcmp(token[i], "event") =3D=3D 0) + imc_counters_config[count].event =3D strtol(token[i + 1], NULL, 16); + if (strcmp(token[i], "umask") =3D=3D 0) + imc_counters_config[count].umask =3D strtol(token[i + 1], NULL, 16); } } =20 -static int open_perf_event(int i, int cpu_no, int j) +static int open_perf_read_event(int i, int cpu_no) { - imc_counters_config[i][j].fd =3D - perf_event_open(&imc_counters_config[i][j].pe, -1, cpu_no, -1, + imc_counters_config[i].fd =3D + perf_event_open(&imc_counters_config[i].pe, -1, cpu_no, -1, PERF_FLAG_FD_CLOEXEC); =20 - if (imc_counters_config[i][j].fd =3D=3D -1) { + if (imc_counters_config[i].fd =3D=3D -1) { fprintf(stderr, "Error opening leader %llx\n", - imc_counters_config[i][j].pe.config); + imc_counters_config[i].pe.config); =20 return -1; } @@ -126,7 +110,7 @@ static int open_perf_event(int i, int cpu_no, int j) return 0; } =20 -/* Get type and config (read and write) of an iMC counter */ +/* Get type and config of an iMC counter's read event. */ static int read_from_imc_dir(char *imc_dir, int count) { char cas_count_cfg[1024], imc_counter_cfg[1024], imc_counter_type[1024]; @@ -140,7 +124,7 @@ static int read_from_imc_dir(char *imc_dir, int count) =20 return -1; } - if (fscanf(fp, "%u", &imc_counters_config[count][READ].type) <=3D 0) { + if (fscanf(fp, "%u", &imc_counters_config[count].type) <=3D 0) { ksft_perror("Could not get iMC type"); fclose(fp); =20 @@ -148,9 +132,6 @@ static int read_from_imc_dir(char *imc_dir, int count) } fclose(fp); =20 - imc_counters_config[count][WRITE].type =3D - imc_counters_config[count][READ].type; - /* Get read config */ sprintf(imc_counter_cfg, "%s%s", imc_dir, READ_FILE_NAME); fp =3D fopen(imc_counter_cfg, "r"); @@ -167,34 +148,19 @@ static int read_from_imc_dir(char *imc_dir, int count) } fclose(fp); =20 - get_event_and_umask(cas_count_cfg, count, READ); - - /* Get write config */ - sprintf(imc_counter_cfg, "%s%s", imc_dir, WRITE_FILE_NAME); - fp =3D fopen(imc_counter_cfg, "r"); - if (!fp) { - ksft_perror("Failed to open iMC config file"); - - return -1; - } - if (fscanf(fp, "%1023s", cas_count_cfg) <=3D 0) { - ksft_perror("Could not get iMC cas count write"); - fclose(fp); - - return -1; - } - fclose(fp); - - get_event_and_umask(cas_count_cfg, count, WRITE); + get_read_event_and_umask(cas_count_cfg, count); =20 return 0; } =20 /* * A system can have 'n' number of iMC (Integrated Memory Controller) - * counters, get that 'n'. For each iMC counter get it's type and config. - * Also, each counter has two configs, one for read and the other for writ= e. - * A config again has two parts, event and umask. + * counters, get that 'n'. Discover the properties of the available + * counters in support of needed performance measurement via perf. + * For each iMC counter get it's type and config. Also obtain each + * counter's event and umask for the memory read events that will be + * measured. + * * Enumerate all these details into an array of structures. * * Return: >=3D 0 on success. < 0 on failure. @@ -255,55 +221,46 @@ static int num_of_imcs(void) return count; } =20 -int initialize_mem_bw_imc(void) +int initialize_read_mem_bw_imc(void) { - int imc, j; + int imc; =20 imcs =3D num_of_imcs(); if (imcs <=3D 0) return imcs; =20 /* Initialize perf_event_attr structures for all iMC's */ - for (imc =3D 0; imc < imcs; imc++) { - for (j =3D 0; j < 2; j++) - membw_initialize_perf_event_attr(imc, j); - } + for (imc =3D 0; imc < imcs; imc++) + read_mem_bw_initialize_perf_event_attr(imc); =20 return 0; } =20 -static void perf_close_imc_mem_bw(void) +static void perf_close_imc_read_mem_bw(void) { int mc; =20 for (mc =3D 0; mc < imcs; mc++) { - if (imc_counters_config[mc][READ].fd !=3D -1) - close(imc_counters_config[mc][READ].fd); - if (imc_counters_config[mc][WRITE].fd !=3D -1) - close(imc_counters_config[mc][WRITE].fd); + if (imc_counters_config[mc].fd !=3D -1) + close(imc_counters_config[mc].fd); } } =20 /* - * perf_open_imc_mem_bw - Open perf fds for IMCs + * perf_open_imc_read_mem_bw - Open perf fds for IMCs * @cpu_no: CPU number that the benchmark PID is bound to * * Return: =3D 0 on success. < 0 on failure. */ -static int perf_open_imc_mem_bw(int cpu_no) +static int perf_open_imc_read_mem_bw(int cpu_no) { int imc, ret; =20 - for (imc =3D 0; imc < imcs; imc++) { - imc_counters_config[imc][READ].fd =3D -1; - imc_counters_config[imc][WRITE].fd =3D -1; - } + for (imc =3D 0; imc < imcs; imc++) + imc_counters_config[imc].fd =3D -1; =20 for (imc =3D 0; imc < imcs; imc++) { - ret =3D open_perf_event(imc, cpu_no, READ); - if (ret) - goto close_fds; - ret =3D open_perf_event(imc, cpu_no, WRITE); + ret =3D open_perf_read_event(imc, cpu_no); if (ret) goto close_fds; } @@ -311,60 +268,52 @@ static int perf_open_imc_mem_bw(int cpu_no) return 0; =20 close_fds: - perf_close_imc_mem_bw(); + perf_close_imc_read_mem_bw(); return -1; } =20 /* - * do_mem_bw_test - Perform memory bandwidth test + * do_imc_read_mem_bw_test - Perform memory bandwidth test * * Runs memory bandwidth test over one second period. Also, handles starti= ng * and stopping of the IMC perf counters around the test. */ -static void do_imc_mem_bw_test(void) +static void do_imc_read_mem_bw_test(void) { int imc; =20 - for (imc =3D 0; imc < imcs; imc++) { - membw_ioctl_perf_event_ioc_reset_enable(imc, READ); - membw_ioctl_perf_event_ioc_reset_enable(imc, WRITE); - } + for (imc =3D 0; imc < imcs; imc++) + read_mem_bw_ioctl_perf_event_ioc_reset_enable(imc); =20 sleep(1); =20 - /* Stop counters after a second to get results (both read and write) */ - for (imc =3D 0; imc < imcs; imc++) { - membw_ioctl_perf_event_ioc_disable(imc, READ); - membw_ioctl_perf_event_ioc_disable(imc, WRITE); - } + /* Stop counters after a second to get results. */ + for (imc =3D 0; imc < imcs; imc++) + read_mem_bw_ioctl_perf_event_ioc_disable(imc); } =20 /* - * get_mem_bw_imc - Memory bandwidth as reported by iMC counters - * @bw_report: Bandwidth report type (reads, writes) + * get_read_mem_bw_imc - Memory read bandwidth as reported by iMC counters * - * Memory bandwidth utilized by a process on a socket can be calculated - * using iMC counters. Perf events are used to read these counters. + * Memory read bandwidth utilized by a process on a socket can be calculat= ed + * using iMC counters' read events. Perf events are used to read these + * counters. * * Return: =3D 0 on success. < 0 on failure. */ -static int get_mem_bw_imc(const char *bw_report, float *bw_imc) +static int get_read_mem_bw_imc(float *bw_imc) { - float reads, writes, of_mul_read, of_mul_write; + float reads =3D 0, of_mul_read =3D 1; int imc; =20 - /* Start all iMC counters to log values (both read and write) */ - reads =3D 0, writes =3D 0, of_mul_read =3D 1, of_mul_write =3D 1; - /* - * Get results which are stored in struct type imc_counter_config + * Log read event values from all iMC counters into + * struct imc_counter_config. * Take overflow into consideration before calculating total bandwidth. */ for (imc =3D 0; imc < imcs; imc++) { struct imc_counter_config *r =3D - &imc_counters_config[imc][READ]; - struct imc_counter_config *w =3D - &imc_counters_config[imc][WRITE]; + &imc_counters_config[imc]; =20 if (read(r->fd, &r->return_value, sizeof(struct membw_read_format)) =3D=3D -1) { @@ -372,12 +321,6 @@ static int get_mem_bw_imc(const char *bw_report, float= *bw_imc) return -1; } =20 - if (read(w->fd, &w->return_value, - sizeof(struct membw_read_format)) =3D=3D -1) { - ksft_perror("Couldn't get write bandwidth through iMC"); - return -1; - } - __u64 r_time_enabled =3D r->return_value.time_enabled; __u64 r_time_running =3D r->return_value.time_running; =20 @@ -385,27 +328,10 @@ static int get_mem_bw_imc(const char *bw_report, floa= t *bw_imc) of_mul_read =3D (float)r_time_enabled / (float)r_time_running; =20 - __u64 w_time_enabled =3D w->return_value.time_enabled; - __u64 w_time_running =3D w->return_value.time_running; - - if (w_time_enabled !=3D w_time_running) - of_mul_write =3D (float)w_time_enabled / - (float)w_time_running; reads +=3D r->return_value.value * of_mul_read * SCALE; - writes +=3D w->return_value.value * of_mul_write * SCALE; - } - - if (strcmp(bw_report, "reads") =3D=3D 0) { - *bw_imc =3D reads; - return 0; - } - - if (strcmp(bw_report, "writes") =3D=3D 0) { - *bw_imc =3D writes; - return 0; } =20 - *bw_imc =3D reads + writes; + *bw_imc =3D reads; return 0; } =20 @@ -551,35 +477,31 @@ static int print_results_bw(char *filename, pid_t bm_= pid, float bw_imc, } =20 /* - * measure_mem_bw - Measures memory bandwidth numbers while benchmark runs + * measure_read_mem_bw - Measures read memory bandwidth numbers while benc= hmark runs * @uparams: User supplied parameters * @param: Parameters passed to resctrl_val() * @bm_pid: PID that runs the benchmark - * @bw_report: Bandwidth report type (reads, writes) * * Measure memory bandwidth from resctrl and from another source which is * perf imc value or could be something else if perf imc event is not * available. Compare the two values to validate resctrl value. It takes * 1 sec to measure the data. + * resctrl does not distinguish between read and write operations so + * its data includes all memory operations. */ -int measure_mem_bw(const struct user_params *uparams, - struct resctrl_val_param *param, pid_t bm_pid, - const char *bw_report) +int measure_read_mem_bw(const struct user_params *uparams, + struct resctrl_val_param *param, pid_t bm_pid) { unsigned long bw_resc, bw_resc_start, bw_resc_end; FILE *mem_bw_fp; float bw_imc; int ret; =20 - bw_report =3D get_bw_report_type(bw_report); - if (!bw_report) - return -1; - mem_bw_fp =3D open_mem_bw_resctrl(mbm_total_path); if (!mem_bw_fp) return -1; =20 - ret =3D perf_open_imc_mem_bw(uparams->cpu); + ret =3D perf_open_imc_read_mem_bw(uparams->cpu); if (ret < 0) goto close_fp; =20 @@ -589,17 +511,17 @@ int measure_mem_bw(const struct user_params *uparams, =20 rewind(mem_bw_fp); =20 - do_imc_mem_bw_test(); + do_imc_read_mem_bw_test(); =20 ret =3D get_mem_bw_resctrl(mem_bw_fp, &bw_resc_end); if (ret < 0) goto close_imc; =20 - ret =3D get_mem_bw_imc(bw_report, &bw_imc); + ret =3D get_read_mem_bw_imc(&bw_imc); if (ret < 0) goto close_imc; =20 - perf_close_imc_mem_bw(); + perf_close_imc_read_mem_bw(); fclose(mem_bw_fp); =20 bw_resc =3D (bw_resc_end - bw_resc_start) / MB; @@ -607,7 +529,7 @@ int measure_mem_bw(const struct user_params *uparams, return print_results_bw(param->filename, bm_pid, bw_imc, bw_resc); =20 close_imc: - perf_close_imc_mem_bw(); + perf_close_imc_read_mem_bw(); close_fp: fclose(mem_bw_fp); return ret; diff --git a/tools/testing/selftests/resctrl/resctrlfs.c b/tools/testing/se= lftests/resctrl/resctrlfs.c index a53cd1cb6e0c..d38d6dd90be4 100644 --- a/tools/testing/selftests/resctrl/resctrlfs.c +++ b/tools/testing/selftests/resctrl/resctrlfs.c @@ -831,23 +831,6 @@ int filter_dmesg(void) return 0; } =20 -const char *get_bw_report_type(const char *bw_report) -{ - if (strcmp(bw_report, "reads") =3D=3D 0) - return bw_report; - if (strcmp(bw_report, "writes") =3D=3D 0) - return bw_report; - if (strcmp(bw_report, "nt-writes") =3D=3D 0) { - return "writes"; - } - if (strcmp(bw_report, "total") =3D=3D 0) - return bw_report; - - fprintf(stderr, "Requested iMC bandwidth report type unavailable\n"); - - return NULL; -} - int perf_event_open(struct perf_event_attr *hw_event, pid_t pid, int cpu, int group_fd, unsigned long flags) { --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CA1EB219C9E; Thu, 24 Oct 2024 21:08:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804094; cv=none; b=Ip7xYxns+RoEWp4NxIkEJbgLJyJAtThiCszdDQJckBHlYQDv83B23IiOikJieHqxDHCVMHRzGh/Yk2ou4UjzcEGZr8I7igP8xjFgENi95ft6/+nXmfuB7e9HnS29mrxTGHXJoUIeviZy40uawMt24rKZatNDEU7PMBsTTl9MIUU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804094; c=relaxed/simple; bh=RpMEH61G6k2AubJ2QMWacbTKZHwjrIla4MBshmUpn/8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Gk1YgyrFzkYjr+0aTz/MPufylNHqzku5Ei3jP3NdL4S4gPN4+FA88kMB0yvhNqq5dbX/Xyq32SzQOX2aTbe9ahIX7T6nOS3m1y/mMMplKi5q7WU22EtKz9RzRXiTCUZFnTraB8ZO+8c4ubRDeH87IuhfncROJ06wNQzWEIi4Suk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=b/kvhwRs; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="b/kvhwRs" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804091; x=1761340091; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=RpMEH61G6k2AubJ2QMWacbTKZHwjrIla4MBshmUpn/8=; b=b/kvhwRs3nNeJ7rFqRkYQ4UgFOyD9ba8VbsjLufO9ToDpztyA5Epcm3a SRVikAai0rp6Fe9ev6rDoxjk9JAF+qposZaMYT4JUCiwF79QPdGkWy3AS tY/rMDe/Uz4eA1Mj/2V9veLI8WjcUs6B1+LuSWX1bFkTwNwdTJ/uO+YYR XlnELdIuKA30DIIN4vAOgMXR+v3gnez1phgAQG4HDaiLND/JLQYP+D0fH 5OC0vy4CEhUT0B+HpRPjNutB24U6eQa/5K5QOxzXWxKfX66bnbbsOq3BA YBltuBz7Lc+h6sECz0jwcWZvtD5k8EK7wjM3O8K+29ZYlRd7emhwh5EBm A==; X-CSE-ConnectionGUID: xCUwvpcaRsaDpHgqt00A6w== X-CSE-MsgGUID: YQ2ePB2wRqmHTnExnCERKg== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090919" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090919" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: wx2udhbGRWOI7WiKOOJpCg== X-CSE-MsgGUID: VPtlO6eqTI2QznZWgQDBIw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488050" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 10/15] selftests/resctrl: Make benchmark parameter passing robust Date: Thu, 24 Oct 2024 14:18:47 -0700 Message-ID: <5dd880128db5d49ebbf606763c46dc3d707c3c87.1729804024.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The benchmark used during the CMT, MBM, and MBA tests can be provided by the user via (-b) parameter, if not provided the default "fill_buf" benchmark is used. The user is additionally able to override any of the "fill_buf" default parameters when running the tests with "-b fill_buf ". The "fill_buf" parameters are managed as an array of strings. Using an array of strings is complex because it requires transformations to/from strings at every producer and consumer. This is made worse for the individual tests where the default benchmark parameters values may not be appropriate and additional data wrangling is required. For example, the CMT test duplicates the entire array of strings in order to replace one of the parameters. More issues appear when combining the usage of an array of strings with the use case of user overriding default parameters by specifying "-b fill_buf ". This use case is fragile with opportunities to trigger a SIGSEGV because of opportunities for NULL pointers to exist in the array of strings. For example, by running below (thus by specifying "fill_buf" should be used but all parameters are NULL): $ sudo resctrl_tests -t mbm -b fill_buf Replace the "array of strings" parameters used for "fill_buf" with new struct fill_buf_param that contains the "fill_buf" parameters that can be used directly without transformations to/from strings. Two instances of struct fill_buf_param may exist at any point in time: * If the user provides new parameters to "fill_buf", the user parameter structure (struct user_params) will point to a fully initialized and immutable struct fill_buf_param containing the user provided parameters. * If "fill_buf" is the benchmark that should be used by a test, then the test parameter structure (struct resctrl_val_param) will point to a fully initialized struct fill_buf_param. The latter may contain (a) the user provided parameters verbatim, (b) user provided parameters adjusted to be appropriate for the test, or (c) the default parameters for "fill_buf" that is appropriate for the test if the user did not provide "fill_buf" parameters nor an alternate benchmark. The existing behavior of CMT test is to use test defined value for the buffer size even if the user provides another value via command line. This behavior is maintained since the test requires that the buffer size matches the size of the cache allocated, and the amount of cache allocated can instead be changed by the user with the "-n" command line parameter. Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V3: - Handle empty string input. (Ilpo) Changes since V2: - Use empty initializers. (Ilpo) - Let memflush be bool instead of int. (Ilpo) - Make user input checks more robust. (Ilpo) - Assign values as part of local variable definition. (Ilpo) Changes since V1: - Maintain original behavior where user can override "fill_buf" parameters via command line ... but only those that can actually be changed. (Ilpo) - Fix parsing issues associated with original behavior to ensure any parameter is valid before any attempt to use it. - Move patch earlier in series to highlight that this fixes existing issues. - Make struct fill_buf_param dynamic to support user provided parameters as well as test specific parameters. - Rewrite changelog. --- tools/testing/selftests/resctrl/cmt_test.c | 32 ++---- tools/testing/selftests/resctrl/fill_buf.c | 4 +- tools/testing/selftests/resctrl/mba_test.c | 13 ++- tools/testing/selftests/resctrl/mbm_test.c | 22 ++-- tools/testing/selftests/resctrl/resctrl.h | 59 +++++++--- .../testing/selftests/resctrl/resctrl_tests.c | 103 ++++++++++++++---- tools/testing/selftests/resctrl/resctrl_val.c | 41 ++++--- 7 files changed, 178 insertions(+), 96 deletions(-) diff --git a/tools/testing/selftests/resctrl/cmt_test.c b/tools/testing/sel= ftests/resctrl/cmt_test.c index 0c045080d808..4c3cf2c25a38 100644 --- a/tools/testing/selftests/resctrl/cmt_test.c +++ b/tools/testing/selftests/resctrl/cmt_test.c @@ -116,15 +116,13 @@ static void cmt_test_cleanup(void) =20 static int cmt_run_test(const struct resctrl_test *test, const struct user= _params *uparams) { - const char * const *cmd =3D uparams->benchmark_cmd; - const char *new_cmd[BENCHMARK_ARGS]; + struct fill_buf_param fill_buf =3D {}; unsigned long cache_total_size =3D 0; int n =3D uparams->bits ? : 5; unsigned long long_mask; - char *span_str =3D NULL; int count_of_bits; size_t span; - int ret, i; + int ret; =20 ret =3D get_full_cbm("L3", &long_mask); if (ret) @@ -155,32 +153,26 @@ static int cmt_run_test(const struct resctrl_test *te= st, const struct user_param =20 span =3D cache_portion_size(cache_total_size, param.mask, long_mask); =20 - if (strcmp(cmd[0], "fill_buf") =3D=3D 0) { - /* Duplicate the command to be able to replace span in it */ - for (i =3D 0; uparams->benchmark_cmd[i]; i++) - new_cmd[i] =3D uparams->benchmark_cmd[i]; - new_cmd[i] =3D NULL; - - ret =3D asprintf(&span_str, "%zu", span); - if (ret < 0) - return -1; - new_cmd[1] =3D span_str; - cmd =3D new_cmd; + if (uparams->fill_buf) { + fill_buf.buf_size =3D span; + fill_buf.memflush =3D uparams->fill_buf->memflush; + param.fill_buf =3D &fill_buf; + } else if (!uparams->benchmark_cmd[0]) { + fill_buf.buf_size =3D span; + fill_buf.memflush =3D true; + param.fill_buf =3D &fill_buf; } =20 remove(RESULT_FILE_NAME); =20 - ret =3D resctrl_val(test, uparams, cmd, ¶m); + ret =3D resctrl_val(test, uparams, ¶m); if (ret) - goto out; + return ret; =20 ret =3D check_results(¶m, span, n); if (ret && (get_vendor() =3D=3D ARCH_INTEL)) ksft_print_msg("Intel CMT may be inaccurate when Sub-NUMA Clustering is = enabled. Check BIOS configuration.\n"); =20 -out: - free(span_str); - return ret; } =20 diff --git a/tools/testing/selftests/resctrl/fill_buf.c b/tools/testing/sel= ftests/resctrl/fill_buf.c index e4f1cea317f1..39545f9369e8 100644 --- a/tools/testing/selftests/resctrl/fill_buf.c +++ b/tools/testing/selftests/resctrl/fill_buf.c @@ -102,7 +102,7 @@ void fill_cache_read(unsigned char *buf, size_t buf_siz= e, bool once) *value_sink =3D ret; } =20 -unsigned char *alloc_buffer(size_t buf_size, int memflush) +unsigned char *alloc_buffer(size_t buf_size, bool memflush) { void *buf =3D NULL; uint64_t *p64; @@ -130,7 +130,7 @@ unsigned char *alloc_buffer(size_t buf_size, int memflu= sh) return buf; } =20 -int run_fill_buf(size_t buf_size, int memflush) +int run_fill_buf(size_t buf_size, bool memflush) { unsigned char *buf; =20 diff --git a/tools/testing/selftests/resctrl/mba_test.c b/tools/testing/sel= ftests/resctrl/mba_test.c index be0ead73e55d..74d95c460bd0 100644 --- a/tools/testing/selftests/resctrl/mba_test.c +++ b/tools/testing/selftests/resctrl/mba_test.c @@ -172,11 +172,22 @@ static int mba_run_test(const struct resctrl_test *te= st, const struct user_param .setup =3D mba_setup, .measure =3D mba_measure, }; + struct fill_buf_param fill_buf =3D {}; int ret; =20 remove(RESULT_FILE_NAME); =20 - ret =3D resctrl_val(test, uparams, uparams->benchmark_cmd, ¶m); + if (uparams->fill_buf) { + fill_buf.buf_size =3D uparams->fill_buf->buf_size; + fill_buf.memflush =3D uparams->fill_buf->memflush; + param.fill_buf =3D &fill_buf; + } else if (!uparams->benchmark_cmd[0]) { + fill_buf.buf_size =3D DEFAULT_SPAN; + fill_buf.memflush =3D true; + param.fill_buf =3D &fill_buf; + } + + ret =3D resctrl_val(test, uparams, ¶m); if (ret) return ret; =20 diff --git a/tools/testing/selftests/resctrl/mbm_test.c b/tools/testing/sel= ftests/resctrl/mbm_test.c index defa94293915..72261413c868 100644 --- a/tools/testing/selftests/resctrl/mbm_test.c +++ b/tools/testing/selftests/resctrl/mbm_test.c @@ -139,26 +139,26 @@ static int mbm_run_test(const struct resctrl_test *te= st, const struct user_param .setup =3D mbm_setup, .measure =3D mbm_measure, }; - char *endptr =3D NULL; - size_t span =3D 0; + struct fill_buf_param fill_buf =3D {}; int ret; =20 remove(RESULT_FILE_NAME); =20 - if (uparams->benchmark_cmd[0] && strcmp(uparams->benchmark_cmd[0], "fill_= buf") =3D=3D 0) { - if (uparams->benchmark_cmd[1] && *uparams->benchmark_cmd[1] !=3D '\0') { - errno =3D 0; - span =3D strtoul(uparams->benchmark_cmd[1], &endptr, 10); - if (errno || *endptr !=3D '\0') - return -EINVAL; - } + if (uparams->fill_buf) { + fill_buf.buf_size =3D uparams->fill_buf->buf_size; + fill_buf.memflush =3D uparams->fill_buf->memflush; + param.fill_buf =3D &fill_buf; + } else if (!uparams->benchmark_cmd[0]) { + fill_buf.buf_size =3D DEFAULT_SPAN; + fill_buf.memflush =3D true; + param.fill_buf =3D &fill_buf; } =20 - ret =3D resctrl_val(test, uparams, uparams->benchmark_cmd, ¶m); + ret =3D resctrl_val(test, uparams, ¶m); if (ret) return ret; =20 - ret =3D check_results(span); + ret =3D check_results(param.fill_buf ? param.fill_buf->buf_size : 0); if (ret && (get_vendor() =3D=3D ARCH_INTEL)) ksft_print_msg("Intel MBM may be inaccurate when Sub-NUMA Clustering is = enabled. Check BIOS configuration.\n"); =20 diff --git a/tools/testing/selftests/resctrl/resctrl.h b/tools/testing/self= tests/resctrl/resctrl.h index 82801245e4c1..c9336f9c2cae 100644 --- a/tools/testing/selftests/resctrl/resctrl.h +++ b/tools/testing/selftests/resctrl/resctrl.h @@ -43,16 +43,36 @@ =20 #define DEFAULT_SPAN (250 * MB) =20 +/* + * fill_buf_param: "fill_buf" benchmark parameters + * @buf_size: Size (in bytes) of buffer used in benchmark. + * "fill_buf" allocates and initializes buffer of + * @buf_size. User can change value via command line. + * @memflush: If false the buffer will not be flushed after + * allocation and initialization, otherwise the + * buffer will be flushed. User can change value via + * command line (via integers with 0 interpreted as + * false and anything else as true). + */ +struct fill_buf_param { + size_t buf_size; + bool memflush; +}; + /* * user_params: User supplied parameters * @cpu: CPU number to which the benchmark will be bound to * @bits: Number of bits used for cache allocation size * @benchmark_cmd: Benchmark command to run during (some of the) tests + * @fill_buf: Pointer to user provided parameters for "fill_buf", + * NULL if user did not provide parameters and test + * specific defaults should be used. */ struct user_params { int cpu; int bits; const char *benchmark_cmd[BENCHMARK_ARGS]; + const struct fill_buf_param *fill_buf; }; =20 /* @@ -87,21 +107,29 @@ struct resctrl_test { * @init: Callback function to initialize test environment * @setup: Callback function to setup per test run environment * @measure: Callback that performs the measurement (a single test) + * @fill_buf: Parameters for default "fill_buf" benchmark. + * Initialized with user provided parameters, possibly + * adapted to be relevant to the test. If user does + * not provide parameters for "fill_buf" nor a + * replacement benchmark then initialized with defaults + * appropriate for test. NULL if user provided + * benchmark. */ struct resctrl_val_param { - const char *ctrlgrp; - const char *mongrp; - char filename[64]; - unsigned long mask; - int num_of_runs; - int (*init)(const struct resctrl_val_param *param, - int domain_id); - int (*setup)(const struct resctrl_test *test, - const struct user_params *uparams, - struct resctrl_val_param *param); - int (*measure)(const struct user_params *uparams, - struct resctrl_val_param *param, - pid_t bm_pid); + const char *ctrlgrp; + const char *mongrp; + char filename[64]; + unsigned long mask; + int num_of_runs; + int (*init)(const struct resctrl_val_param *param, + int domain_id); + int (*setup)(const struct resctrl_test *test, + const struct user_params *uparams, + struct resctrl_val_param *param); + int (*measure)(const struct user_params *uparams, + struct resctrl_val_param *param, + pid_t bm_pid); + struct fill_buf_param *fill_buf; }; =20 struct perf_event_read { @@ -138,10 +166,10 @@ int write_schemata(const char *ctrlgrp, char *schemat= a, int cpu_no, int write_bm_pid_to_resctrl(pid_t bm_pid, const char *ctrlgrp, const char = *mongrp); int perf_event_open(struct perf_event_attr *hw_event, pid_t pid, int cpu, int group_fd, unsigned long flags); -unsigned char *alloc_buffer(size_t buf_size, int memflush); +unsigned char *alloc_buffer(size_t buf_size, bool memflush); void mem_flush(unsigned char *buf, size_t buf_size); void fill_cache_read(unsigned char *buf, size_t buf_size, bool once); -int run_fill_buf(size_t buf_size, int memflush); +int run_fill_buf(size_t buf_size, bool memflush); int initialize_read_mem_bw_imc(void); int measure_read_mem_bw(const struct user_params *uparams, struct resctrl_val_param *param, pid_t bm_pid); @@ -149,7 +177,6 @@ void initialize_mem_bw_resctrl(const struct resctrl_val= _param *param, int domain_id); int resctrl_val(const struct resctrl_test *test, const struct user_params *uparams, - const char * const *benchmark_cmd, struct resctrl_val_param *param); unsigned long create_bit_mask(unsigned int start, unsigned int len); unsigned int count_contiguous_bits(unsigned long val, unsigned int *start); diff --git a/tools/testing/selftests/resctrl/resctrl_tests.c b/tools/testin= g/selftests/resctrl/resctrl_tests.c index 0f91c475b255..24daf76b4039 100644 --- a/tools/testing/selftests/resctrl/resctrl_tests.c +++ b/tools/testing/selftests/resctrl/resctrl_tests.c @@ -148,6 +148,78 @@ static void run_single_test(const struct resctrl_test = *test, const struct user_p test_cleanup(test); } =20 +/* + * Allocate and initialize a struct fill_buf_param with user provided + * (via "-b fill_buf ") parameters. + * + * Use defaults (that may not be appropriate for all tests) for any + * fill_buf parameters omitted by the user. + * + * Historically it may have been possible for user space to provide + * additional parameters, "operation" ("read" vs "write") in + * benchmark_cmd[3] and "once" (run "once" or until terminated) in + * benchmark_cmd[4]. Changing these parameters have never been + * supported with the default of "read" operation and running until + * terminated built into the tests. Any unsupported values for + * (original) "fill_buf" parameters are treated as failure. + * + * Return: On failure, forcibly exits the test on any parsing failure, + * returns NULL if no parsing needed (user did not actually provide + * "-b fill_buf"). + * On success, returns pointer to newly allocated and fully + * initialized struct fill_buf_param that caller must free. + */ +static struct fill_buf_param *alloc_fill_buf_param(struct user_params *upa= rams) +{ + struct fill_buf_param *fill_param =3D NULL; + char *endptr =3D NULL; + + if (!uparams->benchmark_cmd[0] || strcmp(uparams->benchmark_cmd[0], "fill= _buf")) + return NULL; + + fill_param =3D malloc(sizeof(*fill_param)); + if (!fill_param) + ksft_exit_skip("Unable to allocate memory for fill_buf parameters.\n"); + + if (uparams->benchmark_cmd[1] && *uparams->benchmark_cmd[1] !=3D '\0') { + errno =3D 0; + fill_param->buf_size =3D strtoul(uparams->benchmark_cmd[1], &endptr, 10); + if (errno || *endptr !=3D '\0') { + free(fill_param); + ksft_exit_skip("Unable to parse benchmark buffer size.\n"); + } + } else { + fill_param->buf_size =3D DEFAULT_SPAN; + } + + if (uparams->benchmark_cmd[2] && *uparams->benchmark_cmd[2] !=3D '\0') { + errno =3D 0; + fill_param->memflush =3D strtol(uparams->benchmark_cmd[2], &endptr, 10) = !=3D 0; + if (errno || *endptr !=3D '\0') { + free(fill_param); + ksft_exit_skip("Unable to parse benchmark memflush parameter.\n"); + } + } else { + fill_param->memflush =3D true; + } + + if (uparams->benchmark_cmd[3] && *uparams->benchmark_cmd[3] !=3D '\0') { + if (strcmp(uparams->benchmark_cmd[3], "0")) { + free(fill_param); + ksft_exit_skip("Only read operations supported.\n"); + } + } + + if (uparams->benchmark_cmd[4] && *uparams->benchmark_cmd[4] !=3D '\0') { + if (strcmp(uparams->benchmark_cmd[4], "false")) { + free(fill_param); + ksft_exit_skip("fill_buf is required to run until termination.\n"); + } + } + + return fill_param; +} + static void init_user_params(struct user_params *uparams) { memset(uparams, 0, sizeof(*uparams)); @@ -158,11 +230,11 @@ static void init_user_params(struct user_params *upar= ams) =20 int main(int argc, char **argv) { + struct fill_buf_param *fill_param =3D NULL; int tests =3D ARRAY_SIZE(resctrl_tests); bool test_param_seen =3D false; struct user_params uparams; - char *span_str =3D NULL; - int ret, c, i; + int c, i; =20 init_user_params(&uparams); =20 @@ -239,6 +311,10 @@ int main(int argc, char **argv) } last_arg: =20 + fill_param =3D alloc_fill_buf_param(&uparams); + if (fill_param) + uparams.fill_buf =3D fill_param; + ksft_print_header(); =20 /* @@ -257,32 +333,11 @@ int main(int argc, char **argv) =20 filter_dmesg(); =20 - if (!uparams.benchmark_cmd[0]) { - /* If no benchmark is given by "-b" argument, use fill_buf. */ - uparams.benchmark_cmd[0] =3D "fill_buf"; - ret =3D asprintf(&span_str, "%u", DEFAULT_SPAN); - if (ret < 0) - ksft_exit_fail_msg("Out of memory!\n"); - uparams.benchmark_cmd[1] =3D span_str; - uparams.benchmark_cmd[2] =3D "1"; - /* - * Third parameter was previously used for "operation" - * (read/write) of which only (now default) "read"/"0" - * works. - * Fourth parameter was previously used to indicate - * how long "fill_buf" should run for, with "false" - * ("fill_buf" will keep running until terminated) - * the only option that works. - */ - uparams.benchmark_cmd[3] =3D NULL; - uparams.benchmark_cmd[4] =3D NULL; - } - ksft_set_plan(tests); =20 for (i =3D 0; i < ARRAY_SIZE(resctrl_tests); i++) run_single_test(resctrl_tests[i], &uparams); =20 - free(span_str); + free(fill_param); ksft_finished(); } diff --git a/tools/testing/selftests/resctrl/resctrl_val.c b/tools/testing/= selftests/resctrl/resctrl_val.c index c4ebf70a46ef..00b3808d3bca 100644 --- a/tools/testing/selftests/resctrl/resctrl_val.c +++ b/tools/testing/selftests/resctrl/resctrl_val.c @@ -535,6 +535,11 @@ int measure_read_mem_bw(const struct user_params *upar= ams, return ret; } =20 +struct benchmark_info { + const struct user_params *uparams; + struct resctrl_val_param *param; +}; + /* * run_benchmark - Run a specified benchmark or fill_buf (default benchmar= k) * in specified signal. Direct benchmark stdio to /dev/null. @@ -544,12 +549,11 @@ int measure_read_mem_bw(const struct user_params *upa= rams, */ static void run_benchmark(int signum, siginfo_t *info, void *ucontext) { - char **benchmark_cmd; - int ret, memflush; - size_t span; + struct benchmark_info *benchmark_info =3D info->si_ptr; + const struct user_params *uparams =3D benchmark_info->uparams; + struct resctrl_val_param *param =3D benchmark_info->param; FILE *fp; - - benchmark_cmd =3D info->si_ptr; + int ret; =20 /* * Direct stdio of child to /dev/null, so that only parent writes to @@ -561,16 +565,13 @@ static void run_benchmark(int signum, siginfo_t *info= , void *ucontext) parent_exit(ppid); } =20 - if (strcmp(benchmark_cmd[0], "fill_buf") =3D=3D 0) { - /* Execute default fill_buf benchmark */ - span =3D strtoul(benchmark_cmd[1], NULL, 10); - memflush =3D atoi(benchmark_cmd[2]); - - if (run_fill_buf(span, memflush)) + if (param->fill_buf) { + if (run_fill_buf(param->fill_buf->buf_size, + param->fill_buf->memflush)) fprintf(stderr, "Error in running fill buffer\n"); - } else { + } else if (uparams->benchmark_cmd[0]) { /* Execute specified benchmark */ - ret =3D execvp(benchmark_cmd[0], benchmark_cmd); + ret =3D execvp(uparams->benchmark_cmd[0], (char **)uparams->benchmark_cm= d); if (ret) ksft_perror("execvp"); } @@ -585,16 +586,15 @@ static void run_benchmark(int signum, siginfo_t *info= , void *ucontext) * the benchmark * @test: test information structure * @uparams: user supplied parameters - * @benchmark_cmd: benchmark command and its arguments * @param: parameters passed to resctrl_val() * * Return: 0 when the test was run, < 0 on error. */ int resctrl_val(const struct resctrl_test *test, const struct user_params *uparams, - const char * const *benchmark_cmd, struct resctrl_val_param *param) { + struct benchmark_info benchmark_info; struct sigaction sigact; int ret =3D 0, pipefd[2]; char pipe_message =3D 0; @@ -610,6 +610,9 @@ int resctrl_val(const struct resctrl_test *test, return ret; } =20 + benchmark_info.uparams =3D uparams; + benchmark_info.param =3D param; + /* * If benchmark wasn't successfully started by child, then child should * kill parent, so save parent's pid @@ -671,13 +674,7 @@ int resctrl_val(const struct resctrl_test *test, =20 ksft_print_msg("Benchmark PID: %d\n", (int)bm_pid); =20 - /* - * The cast removes constness but nothing mutates benchmark_cmd within - * the context of this process. At the receiving process, it becomes - * argv, which is mutable, on exec() but that's after fork() so it - * doesn't matter for the process running the tests. - */ - value.sival_ptr =3D (void *)benchmark_cmd; + value.sival_ptr =3D (void *)&benchmark_info; =20 /* Taskset benchmark to specified cpu */ ret =3D taskset_benchmark(bm_pid, uparams->cpu, NULL); --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6400821A6E2; Thu, 24 Oct 2024 21:08:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804097; cv=none; b=JbCetTCgZRYOocp8zfi/iLfAQMpM2qIU/yLFpyuoKT8udJd/BK3px3sY0cTR5GqFJ07Ws43C3RCGPGibXM7HrKreMa8jV/IVb267fXujmGACnt0F4SctXtvRSpuO+jJOB0nc3Fw5u7UJXeDaSo/R8A6btj0uqCB/RBAZmXHIHio= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804097; c=relaxed/simple; bh=P2HOYzUXw07lhwl1z3PmjsSo47s3FUXbboxIje+LtVo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=mQvFX7/phYz84bYPVEqJLHwg2VSt1joWHALyn8xyFl3gP1WTm3Aq+wTRucFQqg1JTsHti/rEHGbWNNBwtiZ7q5T/I5r3t9CgO8uQ0PVHJDSoANzOzml3JZ88VrTk+OSjlW8c0XOQss2VUGrqvmkiyIP9Kxr/Gv5cLOWjAMV0K14= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=dHS0cDiN; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="dHS0cDiN" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804093; x=1761340093; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=P2HOYzUXw07lhwl1z3PmjsSo47s3FUXbboxIje+LtVo=; b=dHS0cDiN2GcsFj7PpGGXQYzXNhZ+gpIgJsRE0EjfCuIi+hqrBG36WUmO 3XwqkxYlxl+LnjWVm976VUouM86r3vaFFFBAzGUM+5iARYJ2M+dT81XVT oEVzNjCGXGDY/GB6ft1zbVjYjMDEVJC7QcFpcxJgSXRc0iaUs/5aAUAaG 6fDyktn/UXWbMwk2RsGaChaLK8cQFzSEuYXjJgvtymQlpQH6YPvHr5AZh ENFOEefLGf9vyBS3CF9sKneZ2QS23jYBJZwBn200fnBNXO6rc3I9hjlYa MkQe6XQN7ZK5HfhFVJpgbSh7zZpNeE5vzehLIrGW3KO3l7p13uo7lQG4g w==; X-CSE-ConnectionGUID: S7TIZmf9TaWn9Oev7YhXEw== X-CSE-MsgGUID: 2Vzm/G3cSgmiaR997KeJWQ== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090921" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090921" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: dS78AZz0T+2zXnAmXsGimA== X-CSE-MsgGUID: StL4bv2GTu+vE0UsrKDcDQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488054" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 11/15] selftests/resctrl: Ensure measurements skip initialization of default benchmark Date: Thu, 24 Oct 2024 14:18:48 -0700 Message-ID: X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The CMT, MBA, and MBM tests rely on the resctrl_val() wrapper to start and run a benchmark while providing test specific flows via callbacks to do test specific configuration and measurements. At a high level, the resctrl_val() flow is: a) Start by fork()ing a child process that installs a signal handler for SIGUSR1 that, on receipt of SIGUSR1, will start running a benchmark. b) Assign the child process created in (a) to the resctrl control and monitoring group that dictates the memory and cache allocations with which the process can run and will contain all resctrl monitoring data of that process. c) Once parent and child are considered "ready" (determined via a message over a pipe) the parent signals the child (via SIGUSR1) to start the benchmark, waits one second for the benchmark to run, and then starts collecting monitoring data for the tests, potentially also changing allocation configuration depending on the various test callbacks. A problem with the above flow is the "black box" view of the benchmark that is combined with an arbitrarily chosen "wait one second" before measurements start. No matter what the benchmark does, it is given one second to initialize before measurements start. The default benchmark "fill_buf" consists of two parts, first it prepares a buffer (allocate, initialize, then flush), then it reads from the buffer (in unpredictable ways) until terminated. Depending on the system and the size of the buffer, the first "prepare" part may not be complete by the time the one second delay expires. Test measurements may thus start before the work needing to be measured runs. Split the default benchmark into its "prepare" and "runtime" parts and simplify the resctrl_val() wrapper while doing so. This same split cannot be done for the user provided benchmark (without a user interface change), so the current behavior is maintained for user provided benchmark. Assign the test itself to the control and monitoring group and run the "prepare" part of the benchmark in this context, ensuring it runs with required cache and memory bandwidth allocations. With the benchmark preparation complete it is only needed to fork() the "runtime" part of the benchmark (or entire user provided benchmark). Keep the "wait one second" delay before measurements start. For the default "fill_buf" benchmark this time now covers only the "runtime" portion that needs to be measured. For the user provided benchmark this delay maintains current behavior. Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V2: - Add Ilpo's Reviewed-by tag. Changes since V1: - Keep the fflush(stdout) before fork() to avoid duplicate messages. (Ilpo) - Re-order in series to that the new behavior is introduced after issues with existing behavior is addressed. --- tools/testing/selftests/resctrl/fill_buf.c | 15 -- tools/testing/selftests/resctrl/resctrl.h | 1 - tools/testing/selftests/resctrl/resctrl_val.c | 195 +++++------------- 3 files changed, 50 insertions(+), 161 deletions(-) diff --git a/tools/testing/selftests/resctrl/fill_buf.c b/tools/testing/sel= ftests/resctrl/fill_buf.c index 39545f9369e8..380cc35f10c6 100644 --- a/tools/testing/selftests/resctrl/fill_buf.c +++ b/tools/testing/selftests/resctrl/fill_buf.c @@ -129,18 +129,3 @@ unsigned char *alloc_buffer(size_t buf_size, bool memf= lush) =20 return buf; } - -int run_fill_buf(size_t buf_size, bool memflush) -{ - unsigned char *buf; - - buf =3D alloc_buffer(buf_size, memflush); - if (!buf) - return -1; - - fill_cache_read(buf, buf_size, false); - - free(buf); - - return 0; -} diff --git a/tools/testing/selftests/resctrl/resctrl.h b/tools/testing/self= tests/resctrl/resctrl.h index c9336f9c2cae..032cd9ebd761 100644 --- a/tools/testing/selftests/resctrl/resctrl.h +++ b/tools/testing/selftests/resctrl/resctrl.h @@ -169,7 +169,6 @@ int perf_event_open(struct perf_event_attr *hw_event, p= id_t pid, int cpu, unsigned char *alloc_buffer(size_t buf_size, bool memflush); void mem_flush(unsigned char *buf, size_t buf_size); void fill_cache_read(unsigned char *buf, size_t buf_size, bool once); -int run_fill_buf(size_t buf_size, bool memflush); int initialize_read_mem_bw_imc(void); int measure_read_mem_bw(const struct user_params *uparams, struct resctrl_val_param *param, pid_t bm_pid); diff --git a/tools/testing/selftests/resctrl/resctrl_val.c b/tools/testing/= selftests/resctrl/resctrl_val.c index 00b3808d3bca..7c08e936572d 100644 --- a/tools/testing/selftests/resctrl/resctrl_val.c +++ b/tools/testing/selftests/resctrl/resctrl_val.c @@ -373,7 +373,7 @@ static int get_mem_bw_resctrl(FILE *fp, unsigned long *= mbm_total) return 0; } =20 -static pid_t bm_pid, ppid; +static pid_t bm_pid; =20 void ctrlc_handler(int signum, siginfo_t *info, void *ptr) { @@ -431,13 +431,6 @@ void signal_handler_unregister(void) } } =20 -static void parent_exit(pid_t ppid) -{ - kill(ppid, SIGKILL); - umount_resctrlfs(); - exit(EXIT_FAILURE); -} - /* * print_results_bw: the memory bandwidth results are stored in a file * @filename: file that stores the results @@ -535,52 +528,6 @@ int measure_read_mem_bw(const struct user_params *upar= ams, return ret; } =20 -struct benchmark_info { - const struct user_params *uparams; - struct resctrl_val_param *param; -}; - -/* - * run_benchmark - Run a specified benchmark or fill_buf (default benchmar= k) - * in specified signal. Direct benchmark stdio to /dev/null. - * @signum: signal number - * @info: signal info - * @ucontext: user context in signal handling - */ -static void run_benchmark(int signum, siginfo_t *info, void *ucontext) -{ - struct benchmark_info *benchmark_info =3D info->si_ptr; - const struct user_params *uparams =3D benchmark_info->uparams; - struct resctrl_val_param *param =3D benchmark_info->param; - FILE *fp; - int ret; - - /* - * Direct stdio of child to /dev/null, so that only parent writes to - * stdio (console) - */ - fp =3D freopen("/dev/null", "w", stdout); - if (!fp) { - ksft_perror("Unable to direct benchmark status to /dev/null"); - parent_exit(ppid); - } - - if (param->fill_buf) { - if (run_fill_buf(param->fill_buf->buf_size, - param->fill_buf->memflush)) - fprintf(stderr, "Error in running fill buffer\n"); - } else if (uparams->benchmark_cmd[0]) { - /* Execute specified benchmark */ - ret =3D execvp(uparams->benchmark_cmd[0], (char **)uparams->benchmark_cm= d); - if (ret) - ksft_perror("execvp"); - } - - fclose(stdout); - ksft_print_msg("Unable to run specified benchmark\n"); - parent_exit(ppid); -} - /* * resctrl_val: execute benchmark and measure memory bandwidth on * the benchmark @@ -594,12 +541,11 @@ int resctrl_val(const struct resctrl_test *test, const struct user_params *uparams, struct resctrl_val_param *param) { - struct benchmark_info benchmark_info; - struct sigaction sigact; - int ret =3D 0, pipefd[2]; - char pipe_message =3D 0; - union sigval value; + unsigned char *buf =3D NULL; + cpu_set_t old_affinity; int domain_id; + int ret =3D 0; + pid_t ppid; =20 if (strcmp(param->filename, "") =3D=3D 0) sprintf(param->filename, "stdio"); @@ -610,108 +556,65 @@ int resctrl_val(const struct resctrl_test *test, return ret; } =20 - benchmark_info.uparams =3D uparams; - benchmark_info.param =3D param; - - /* - * If benchmark wasn't successfully started by child, then child should - * kill parent, so save parent's pid - */ ppid =3D getpid(); =20 - if (pipe(pipefd)) { - ksft_perror("Unable to create pipe"); + /* Taskset test to specified CPU. */ + ret =3D taskset_benchmark(ppid, uparams->cpu, &old_affinity); + if (ret) + return ret; + + /* Write test to specified control & monitoring group in resctrl FS. */ + ret =3D write_bm_pid_to_resctrl(ppid, param->ctrlgrp, param->mongrp); + if (ret) + goto reset_affinity; =20 - return -1; + if (param->init) { + ret =3D param->init(param, domain_id); + if (ret) + goto reset_affinity; } =20 /* - * Fork to start benchmark, save child's pid so that it can be killed - * when needed + * If not running user provided benchmark, run the default + * "fill_buf". First phase of "fill_buf" is to prepare the + * buffer that the benchmark will operate on. No measurements + * are needed during this phase and prepared memory will be + * passed to next part of benchmark via copy-on-write thus + * no impact on the benchmark that relies on reading from + * memory only. */ + if (param->fill_buf) { + buf =3D alloc_buffer(param->fill_buf->buf_size, + param->fill_buf->memflush); + if (!buf) { + ret =3D -ENOMEM; + goto reset_affinity; + } + } + fflush(stdout); bm_pid =3D fork(); if (bm_pid =3D=3D -1) { + ret =3D -errno; ksft_perror("Unable to fork"); - - return -1; + goto free_buf; } =20 + /* + * What needs to be measured runs in separate process until + * terminated. + */ if (bm_pid =3D=3D 0) { - /* - * Mask all signals except SIGUSR1, parent uses SIGUSR1 to - * start benchmark - */ - sigfillset(&sigact.sa_mask); - sigdelset(&sigact.sa_mask, SIGUSR1); - - sigact.sa_sigaction =3D run_benchmark; - sigact.sa_flags =3D SA_SIGINFO; - - /* Register for "SIGUSR1" signal from parent */ - if (sigaction(SIGUSR1, &sigact, NULL)) { - ksft_perror("Can't register child for signal"); - parent_exit(ppid); - } - - /* Tell parent that child is ready */ - close(pipefd[0]); - pipe_message =3D 1; - if (write(pipefd[1], &pipe_message, sizeof(pipe_message)) < - sizeof(pipe_message)) { - ksft_perror("Failed signaling parent process"); - close(pipefd[1]); - return -1; - } - close(pipefd[1]); - - /* Suspend child until delivery of "SIGUSR1" from parent */ - sigsuspend(&sigact.sa_mask); - - ksft_perror("Child is done"); - parent_exit(ppid); + if (param->fill_buf) + fill_cache_read(buf, param->fill_buf->buf_size, false); + else if (uparams->benchmark_cmd[0]) + execvp(uparams->benchmark_cmd[0], (char **)uparams->benchmark_cmd); + exit(EXIT_SUCCESS); } =20 ksft_print_msg("Benchmark PID: %d\n", (int)bm_pid); =20 - value.sival_ptr =3D (void *)&benchmark_info; - - /* Taskset benchmark to specified cpu */ - ret =3D taskset_benchmark(bm_pid, uparams->cpu, NULL); - if (ret) - goto out; - - /* Write benchmark to specified control&monitoring grp in resctrl FS */ - ret =3D write_bm_pid_to_resctrl(bm_pid, param->ctrlgrp, param->mongrp); - if (ret) - goto out; - - if (param->init) { - ret =3D param->init(param, domain_id); - if (ret) - goto out; - } - - /* Parent waits for child to be ready. */ - close(pipefd[1]); - while (pipe_message !=3D 1) { - if (read(pipefd[0], &pipe_message, sizeof(pipe_message)) < - sizeof(pipe_message)) { - ksft_perror("Failed reading message from child process"); - close(pipefd[0]); - goto out; - } - } - close(pipefd[0]); - - /* Signal child to start benchmark */ - if (sigqueue(bm_pid, SIGUSR1, value) =3D=3D -1) { - ksft_perror("sigqueue SIGUSR1 to child"); - ret =3D -1; - goto out; - } - - /* Give benchmark enough time to fully run */ + /* Give benchmark enough time to fully run. */ sleep(1); =20 /* Test runs until the callback setup() tells the test to stop. */ @@ -729,8 +632,10 @@ int resctrl_val(const struct resctrl_test *test, break; } =20 -out: kill(bm_pid, SIGKILL); - +free_buf: + free(buf); +reset_affinity: + taskset_restore(ppid, &old_affinity); return ret; } --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8F2A4219CB3; Thu, 24 Oct 2024 21:08:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804094; cv=none; b=DfPAv9IM1iwwv85RYLj4nhAsbw9GKIlEvYZGjPUlStb5m3mcZsNKkqWlg70Ux+QYRxeTtClFnm7see9AJu9fckhlAhMsOyy/e/o7HgTZU6F5kXsPZ+maFoLrWj7LcpJmvArQAi2G2qWiEMk5C3cG0sqG6N9wpjoQieOFyIDao1U= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804094; c=relaxed/simple; bh=zYnxcthe37nzkFi+pQL7JPm7hpbOY3j7iCqr9ypKhq4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=TOn84Y0FeYDk2AMoaqaQ0fJkXu+IgtmFGQvqH+93q88YJjh9tD5u5ZQx6q4XRtjun5e40ZSSe9VxY+06hUx6FPCwSxgkmjwJnEJEci5fAYnxKHhxvxCzsCDQypFy6CUJrSfX1XD6E3/oVpH0tKKt6pSwbCafCiSVug+COjUn+Rc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=nXIsj4aR; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="nXIsj4aR" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804092; x=1761340092; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=zYnxcthe37nzkFi+pQL7JPm7hpbOY3j7iCqr9ypKhq4=; b=nXIsj4aRfdHd78Oia41jU8O0OMXeYKJChH3vecxtkTw+g0pInAGLoZoI HWkOZ0UyATr0RmDJrTUvmGMe3B7NzXJ86KTPSTVPPxQuR31xl8CAcW3YK tbLddY5yVyuIa4QPKU6TwxKdBQOUevLDoc7R14T6gSuoO2msmX4anIy/+ 1WDQ8Nwl5zz2KqYM4m9aCp1c/tT1bvsiBwI3rGTfZUVPEmt/NGoN0CscT lMcDS8QjkYrLInWOTSjcRj50mRlkOsBK6A62j2B3K/Wj9rk8sCtcNHt0J xVzFC5JDU3qX7yCjwARAnD4rgd8atM6Kj3Bf8DwqRaqjOeeDLH6EOoNnt w==; X-CSE-ConnectionGUID: kfBsqmkPSxSzQsXWL/oI5Q== X-CSE-MsgGUID: /MVW1pDoRr+PLA+YCCvmMQ== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090922" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090922" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 X-CSE-ConnectionGUID: QkZ/ri0cRsWHoliKeEr2LQ== X-CSE-MsgGUID: 4fvVJcbWRuaUl9Mp79RGCQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488057" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 12/15] selftests/resctrl: Use cache size to determine "fill_buf" buffer size Date: Thu, 24 Oct 2024 14:18:49 -0700 Message-ID: <8664a46c42a66f0a767fb8d461a2eff86a4c0bee.1729804024.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable By default the MBM and MBA tests use the "fill_buf" benchmark to read from a buffer with the goal to measure the memory bandwidth generated by this buffer access. Care should be taken when sizing the buffer used by the "fill_buf" benchmark. If the buffer is small enough to fit in the cache then it cannot be expected that the benchmark will generate much memory bandwidth. For example, on a system with 320MB L3 cache the existing hardcoded default of 250MB is insufficient. Use the measured cache size to determine a buffer size that can be expected to trigger memory access while keeping the existing default as minimum, now renamed to MINIMUM_SPAN, that has been appropriate for testing so far. Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V3: - Add Ilpo's Reviewed-by tag. Changes since V2: - Move duplicate code into helper. (Ilpo) - Rename DEFAULT_SPAN to MINIMUM_SPAN to reflect its new purpose. (Ilpo) - Do _not_ add Ilpo's Reviewed-by tag ... the patch changed too much. Changes since V1: - Ensure buffer is at least double L3 cache size. (Ilpo) - Support user override of default buffer size. (Ilpo) --- tools/testing/selftests/resctrl/fill_buf.c | 13 +++++++++++++ tools/testing/selftests/resctrl/mba_test.c | 7 ++++++- tools/testing/selftests/resctrl/mbm_test.c | 7 ++++++- tools/testing/selftests/resctrl/resctrl.h | 3 ++- tools/testing/selftests/resctrl/resctrl_tests.c | 2 +- 5 files changed, 28 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/resctrl/fill_buf.c b/tools/testing/sel= ftests/resctrl/fill_buf.c index 380cc35f10c6..19a01a52dc1a 100644 --- a/tools/testing/selftests/resctrl/fill_buf.c +++ b/tools/testing/selftests/resctrl/fill_buf.c @@ -129,3 +129,16 @@ unsigned char *alloc_buffer(size_t buf_size, bool memf= lush) =20 return buf; } + +ssize_t get_fill_buf_size(int cpu_no, const char *cache_type) +{ + unsigned long cache_total_size =3D 0; + int ret; + + ret =3D get_cache_size(cpu_no, cache_type, &cache_total_size); + if (ret) + return ret; + + return cache_total_size * 2 > MINIMUM_SPAN ? + cache_total_size * 2 : MINIMUM_SPAN; +} diff --git a/tools/testing/selftests/resctrl/mba_test.c b/tools/testing/sel= ftests/resctrl/mba_test.c index 74d95c460bd0..bf37f3555660 100644 --- a/tools/testing/selftests/resctrl/mba_test.c +++ b/tools/testing/selftests/resctrl/mba_test.c @@ -182,7 +182,12 @@ static int mba_run_test(const struct resctrl_test *tes= t, const struct user_param fill_buf.memflush =3D uparams->fill_buf->memflush; param.fill_buf =3D &fill_buf; } else if (!uparams->benchmark_cmd[0]) { - fill_buf.buf_size =3D DEFAULT_SPAN; + ssize_t buf_size; + + buf_size =3D get_fill_buf_size(uparams->cpu, "L3"); + if (buf_size < 0) + return buf_size; + fill_buf.buf_size =3D buf_size; fill_buf.memflush =3D true; param.fill_buf =3D &fill_buf; } diff --git a/tools/testing/selftests/resctrl/mbm_test.c b/tools/testing/sel= ftests/resctrl/mbm_test.c index 72261413c868..4224f8ce3538 100644 --- a/tools/testing/selftests/resctrl/mbm_test.c +++ b/tools/testing/selftests/resctrl/mbm_test.c @@ -149,7 +149,12 @@ static int mbm_run_test(const struct resctrl_test *tes= t, const struct user_param fill_buf.memflush =3D uparams->fill_buf->memflush; param.fill_buf =3D &fill_buf; } else if (!uparams->benchmark_cmd[0]) { - fill_buf.buf_size =3D DEFAULT_SPAN; + ssize_t buf_size; + + buf_size =3D get_fill_buf_size(uparams->cpu, "L3"); + if (buf_size < 0) + return buf_size; + fill_buf.buf_size =3D buf_size; fill_buf.memflush =3D true; param.fill_buf =3D &fill_buf; } diff --git a/tools/testing/selftests/resctrl/resctrl.h b/tools/testing/self= tests/resctrl/resctrl.h index 032cd9ebd761..a553fe975938 100644 --- a/tools/testing/selftests/resctrl/resctrl.h +++ b/tools/testing/selftests/resctrl/resctrl.h @@ -41,7 +41,7 @@ =20 #define BENCHMARK_ARGS 64 =20 -#define DEFAULT_SPAN (250 * MB) +#define MINIMUM_SPAN (250 * MB) =20 /* * fill_buf_param: "fill_buf" benchmark parameters @@ -169,6 +169,7 @@ int perf_event_open(struct perf_event_attr *hw_event, p= id_t pid, int cpu, unsigned char *alloc_buffer(size_t buf_size, bool memflush); void mem_flush(unsigned char *buf, size_t buf_size); void fill_cache_read(unsigned char *buf, size_t buf_size, bool once); +ssize_t get_fill_buf_size(int cpu_no, const char *cache_type); int initialize_read_mem_bw_imc(void); int measure_read_mem_bw(const struct user_params *uparams, struct resctrl_val_param *param, pid_t bm_pid); diff --git a/tools/testing/selftests/resctrl/resctrl_tests.c b/tools/testin= g/selftests/resctrl/resctrl_tests.c index 24daf76b4039..3335af815b21 100644 --- a/tools/testing/selftests/resctrl/resctrl_tests.c +++ b/tools/testing/selftests/resctrl/resctrl_tests.c @@ -189,7 +189,7 @@ static struct fill_buf_param *alloc_fill_buf_param(stru= ct user_params *uparams) ksft_exit_skip("Unable to parse benchmark buffer size.\n"); } } else { - fill_param->buf_size =3D DEFAULT_SPAN; + fill_param->buf_size =3D MINIMUM_SPAN; } =20 if (uparams->benchmark_cmd[2] && *uparams->benchmark_cmd[2] !=3D '\0') { --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 330EB21B428; Thu, 24 Oct 2024 21:08:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804096; cv=none; b=A0Smm7cUox0dlzGwwwM8sDCBUovRDMDhB0JUBydWDHWaglMKnvTn+E7wadFt6HM6xr3fmHxkOtcx4LMFbyMdzKC80wlMD4VjynVRki3jnhDL1EE7MGpQSR+0jq7drcUZ2MpskX9w10hJm2N1Gn1vDq/Y7sCHzk1aZdkLzjU1ugM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804096; c=relaxed/simple; bh=Gt5pFky4i1RJBVmV9QoqIcVcdYRvFayj0IsWsZXVFt4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=JYgAMj/141NxzGjpi5VsTjWU0lKoB6h9KgONU0eHgP2hGG7rdhMkh9ZjnrToJvwAcqBHD+5I54OYVaZ4nwP1JeDks2TSHbje7goAwtjO1gYhZVhk8MIm8HML0ssddB6Ikqs6ksxy5QN7zpxdVJHD457J4Vvk8SHRarti4AcWRLc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=iE2PRkoX; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="iE2PRkoX" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804094; x=1761340094; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Gt5pFky4i1RJBVmV9QoqIcVcdYRvFayj0IsWsZXVFt4=; b=iE2PRkoX+1GbpZNVcgKM7KsN/ARp7AedX+35E90duu5I3iu18r7tyTkk 3yCu+6ZnTTEf0BiPRRDKu8hQRjg8Xzu8Nu/HafU8RnTLScz5WoldjsB1b MS8vTKnGPvYufq2KMFnmQVlfQNqvFFymXUQO4v3AcCwUWuq5D8f8H2mkZ DftxTzKb9BEBAgxt5+oj0oRDC1j6px402BY9zwf+luVotM/ajUe281sHY dJvBuuymAuAw7Eeij9nJ4ALv+ORUFcwUm1iGHR9PqNQ1NYtFqmJdVTOT1 kLCdh1xMr8BNjE9r2rW2OOjrd8zpGLjHOkqssNwwxb8jNP+3WuB0vDjxQ w==; X-CSE-ConnectionGUID: eJy8IhqWQOSAUkAB8l92yg== X-CSE-MsgGUID: QL/RtGSYRkuwvYHoAXHQNQ== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090923" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090923" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:02 -0700 X-CSE-ConnectionGUID: jsLILWxWSpysVhwELckp3A== X-CSE-MsgGUID: KMVj3XXGRtKkstyMe0A/8g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488060" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 13/15] selftests/resctrl: Do not compare performance counters and resctrl at low bandwidth Date: Thu, 24 Oct 2024 14:18:50 -0700 Message-ID: <4f7824c67703a1b4a4348fb1d031d2adaef77769.1729804024.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The MBA test incrementally throttles memory bandwidth, each time followed by a comparison between the memory bandwidth observed by the performance counters and resctrl respectively. While a comparison between performance counters and resctrl is generally appropriate, they do not have an identical view of memory bandwidth. For example RAS features or memory performance features that generate memory traffic may drive accesses that are counted differently by performance counters and MBM respectively, for instance generating "overhead" traffic which is not counted against any specific RMID. As a ratio, this different view of memory bandwidth becomes more apparent at low memory bandwidths. It is not practical to enable/disable the various features that may generate memory bandwidth to give performance counters and resctrl an identical view. Instead, do not compare performance counters and resctrl view of memory bandwidth when the memory bandwidth is low. Bandwidth throttling behaves differently across platforms so it is not appropriate to drop measurement data simply based on the throttling level. Instead, use a threshold of 750MiB that has been observed to support adequate comparison between performance counters and resctrl. Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V2: - Add Ilpo's Reviewed-by tag. Changes since V1: - Fix code alignment and spacing. - Modify flow to use "continue" instead of "break" now that earlier changes decreases throttling. - Expand comment of define to elaborate causes of discrepancy between performance counters and MBM. --- tools/testing/selftests/resctrl/mba_test.c | 7 +++++++ tools/testing/selftests/resctrl/resctrl.h | 10 ++++++++++ 2 files changed, 17 insertions(+) diff --git a/tools/testing/selftests/resctrl/mba_test.c b/tools/testing/sel= ftests/resctrl/mba_test.c index bf37f3555660..5b4f0aa7a3a4 100644 --- a/tools/testing/selftests/resctrl/mba_test.c +++ b/tools/testing/selftests/resctrl/mba_test.c @@ -98,6 +98,13 @@ static bool show_mba_info(unsigned long *bw_imc, unsigne= d long *bw_resc) =20 avg_bw_imc =3D sum_bw_imc / (NUM_OF_RUNS - 1); avg_bw_resc =3D sum_bw_resc / (NUM_OF_RUNS - 1); + if (avg_bw_imc < THROTTLE_THRESHOLD || avg_bw_resc < THROTTLE_THRESHOLD)= { + ksft_print_msg("Bandwidth below threshold (%d MiB). Dropping results fr= om MBA schemata %u.\n", + THROTTLE_THRESHOLD, + ALLOCATION_MIN + ALLOCATION_STEP * allocation); + continue; + } + avg_diff =3D (float)labs(avg_bw_resc - avg_bw_imc) / avg_bw_imc; avg_diff_per =3D (int)(avg_diff * 100); =20 diff --git a/tools/testing/selftests/resctrl/resctrl.h b/tools/testing/self= tests/resctrl/resctrl.h index a553fe975938..dab1953fc7a0 100644 --- a/tools/testing/selftests/resctrl/resctrl.h +++ b/tools/testing/selftests/resctrl/resctrl.h @@ -43,6 +43,16 @@ =20 #define MINIMUM_SPAN (250 * MB) =20 +/* + * Memory bandwidth (in MiB) below which the bandwidth comparisons + * between iMC and resctrl are considered unreliable. For example RAS + * features or memory performance features that generate memory traffic + * may drive accesses that are counted differently by performance counters + * and MBM respectively, for instance generating "overhead" traffic which + * is not counted against any specific RMID. + */ +#define THROTTLE_THRESHOLD 750 + /* * fill_buf_param: "fill_buf" benchmark parameters * @buf_size: Size (in bytes) of buffer used in benchmark. --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D75C421B442; Thu, 24 Oct 2024 21:08:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804097; cv=none; b=TAfiRMZGK3PbdPkf2dyrrdpbVVnGjzjPON6U2FVmKGEG40qBa1iIBFuMu49a9ssrSH96YfipGYoS58lLpgwqXlWh+jpwfcdexS1nYrV729OONI7PowTk+ZBC3SLMgdVt/5qcMUf1Ut531ryv0/Cj2y8aAg/vD8EAtkhQ/XYHb/w= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804097; c=relaxed/simple; bh=4ZunPOnMHW173QBc9rpbdE5QhwsHAnEOxM8gzcv7OFo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=C1hRAfFm6CVMq9DhL2TEmsh3PGfVQCnzC77zppVBxyOlK7LvnAZTmxUAhj1tEpMlj/H6TI9V24adpCnWm6AM2+NkdtaUBcLPavQ3jFimMq6bKB2Ir11iCFs2ZOZ/av8JBNE0yeZUNqiUaVtYJ6O0RWrTqRTofDAIYiqx/T8EId4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=O+cFU5qt; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="O+cFU5qt" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804095; x=1761340095; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=4ZunPOnMHW173QBc9rpbdE5QhwsHAnEOxM8gzcv7OFo=; b=O+cFU5qtXUy2iBFEq6xas2nH+nHnYvxHrOMpzaYmJZKU4jsWC9mDUnXa MIYkrm/ubPlUJJLwdOk6cotYADPANHx+WT3MJ8h85R4a7s9dlcfo0siK2 Oeb/SkCr6EauuA6/1277iXH22yNU9fMXQglAAE3sfSm9gwHy4C4VmjKWY jdCHUQTy/yv1cIO79kyN4sZUdG7Jmac48gynMNrqFIBgt6cE/AgR63Q1m ++xy++CQD6Psxg2lDjqQiqBZLRwMZkX2qFiH8lwDYUJCxkPnOHLWZ1MvH +CaKzp6p8KmKm3ry0ZvSKnJgA4ml7KxxqpvJYHg6U94cm1fI8lSePuNP2 w==; X-CSE-ConnectionGUID: 0TSN5H01QVumBxrUDjOqnQ== X-CSE-MsgGUID: Vf2ZhO4pS9SbNthR2c5xTw== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090924" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090924" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:02 -0700 X-CSE-ConnectionGUID: RHG2KVSIRlCNfz5RHAM4nA== X-CSE-MsgGUID: sGz7Cd+RQhO0h9BpQ5F5RA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488063" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 14/15] selftests/resctrl: Keep results from first test run Date: Thu, 24 Oct 2024 14:18:51 -0700 Message-ID: X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The resctrl selftests drop the results from every first test run to avoid (per comment) "inaccurate due to monitoring setup transition phase" data. Previously inaccurate data resulted from workloads needing some time to "settle" and also the measurements themselves to account for earlier measurements to measure across needed timeframe. commit da50de0a92f3 ("selftests/resctrl: Calculate resctrl FS derived mem bw over sleep(1) only") ensured that measurements accurately measure just the time frame of interest. The default "fill_buf" benchmark since separated the buffer prepare phase from the benchmark run phase reducing the need for the tests themselves to accommodate the benchmark's "settle" time. With these enhancements there are no remaining portions needing to "settle" and the first test run can contribute to measurements. Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V2: - Separate patch addresses Ilpo's observation about magic number in adjacent code. - Add Ilpo's Reviewed-by tag. Changes since V1: - Remove comment about needing results from first run removed. - Fix existing incorrect spacing while changing line. --- tools/testing/selftests/resctrl/cmt_test.c | 5 ++--- tools/testing/selftests/resctrl/mba_test.c | 10 +++------- tools/testing/selftests/resctrl/mbm_test.c | 10 +++------- 3 files changed, 8 insertions(+), 17 deletions(-) diff --git a/tools/testing/selftests/resctrl/cmt_test.c b/tools/testing/sel= ftests/resctrl/cmt_test.c index 4c3cf2c25a38..3bbf3042fb06 100644 --- a/tools/testing/selftests/resctrl/cmt_test.c +++ b/tools/testing/selftests/resctrl/cmt_test.c @@ -99,14 +99,13 @@ static int check_results(struct resctrl_val_param *para= m, size_t span, int no_of } =20 /* Field 3 is llc occ resc value */ - if (runs > 0) - sum_llc_occu_resc +=3D strtoul(token_array[3], NULL, 0); + sum_llc_occu_resc +=3D strtoul(token_array[3], NULL, 0); runs++; } fclose(fp); =20 return show_results_info(sum_llc_occu_resc, no_of_bits, span, - MAX_DIFF, MAX_DIFF_PERCENT, runs - 1, true); + MAX_DIFF, MAX_DIFF_PERCENT, runs, true); } =20 static void cmt_test_cleanup(void) diff --git a/tools/testing/selftests/resctrl/mba_test.c b/tools/testing/sel= ftests/resctrl/mba_test.c index 5b4f0aa7a3a4..4e6645b172e3 100644 --- a/tools/testing/selftests/resctrl/mba_test.c +++ b/tools/testing/selftests/resctrl/mba_test.c @@ -86,18 +86,14 @@ static bool show_mba_info(unsigned long *bw_imc, unsign= ed long *bw_resc) int avg_diff_per; float avg_diff; =20 - /* - * The first run is discarded due to inaccurate value from - * phase transition. - */ - for (runs =3D NUM_OF_RUNS * allocation + 1; + for (runs =3D NUM_OF_RUNS * allocation; runs < NUM_OF_RUNS * allocation + NUM_OF_RUNS ; runs++) { sum_bw_imc +=3D bw_imc[runs]; sum_bw_resc +=3D bw_resc[runs]; } =20 - avg_bw_imc =3D sum_bw_imc / (NUM_OF_RUNS - 1); - avg_bw_resc =3D sum_bw_resc / (NUM_OF_RUNS - 1); + avg_bw_imc =3D sum_bw_imc / NUM_OF_RUNS; + avg_bw_resc =3D sum_bw_resc / NUM_OF_RUNS; if (avg_bw_imc < THROTTLE_THRESHOLD || avg_bw_resc < THROTTLE_THRESHOLD)= { ksft_print_msg("Bandwidth below threshold (%d MiB). Dropping results fr= om MBA schemata %u.\n", THROTTLE_THRESHOLD, diff --git a/tools/testing/selftests/resctrl/mbm_test.c b/tools/testing/sel= ftests/resctrl/mbm_test.c index 4224f8ce3538..315b2ef3b3bc 100644 --- a/tools/testing/selftests/resctrl/mbm_test.c +++ b/tools/testing/selftests/resctrl/mbm_test.c @@ -22,17 +22,13 @@ show_bw_info(unsigned long *bw_imc, unsigned long *bw_r= esc, size_t span) int runs, ret, avg_diff_per; float avg_diff =3D 0; =20 - /* - * Discard the first value which is inaccurate due to monitoring setup - * transition phase. - */ - for (runs =3D 1; runs < NUM_OF_RUNS ; runs++) { + for (runs =3D 0; runs < NUM_OF_RUNS; runs++) { sum_bw_imc +=3D bw_imc[runs]; sum_bw_resc +=3D bw_resc[runs]; } =20 - avg_bw_imc =3D sum_bw_imc / 4; - avg_bw_resc =3D sum_bw_resc / 4; + avg_bw_imc =3D sum_bw_imc / NUM_OF_RUNS; + avg_bw_resc =3D sum_bw_resc / NUM_OF_RUNS; avg_diff =3D (float)labs(avg_bw_resc - avg_bw_imc) / avg_bw_imc; avg_diff_per =3D (int)(avg_diff * 100); =20 --=20 2.47.0 From nobody Mon Nov 25 19:45:50 2024 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D106B21B42C; Thu, 24 Oct 2024 21:08:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.16 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804099; cv=none; b=aheLkq5iiP7DahzlCEpgB7P43HWvx8Izz+m5iZr0ni0fdW2wYoM7WRS1PDuhVjshhiLLj6jxcKFOxdVyTDrPP5PqO1cq8TIYS3y6jGAL+q5UEjmHMcxNSQ0fyHZElOW4HxKekoMuLVzlu5lurIz6wryYqgT7i+wxSf69RkMkSSU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729804099; c=relaxed/simple; bh=hxxhPlp3/W6zJ7QsCgtx7RPiium1wTI6Fd1gqm40yoM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=TXhbXszenYCXlV8eJOmuqSipIoPqbunrvalc8XuhVHG7/lgavA6f1sKs5YoQde8nsU170V/R6GgjMInwxPGaNoVreHGokQAqtFMSVtiHkK624XmlJE7mePHayS4MlMj277aJMtmGjLQbWL9bNFragtT5qoNRG3a3qoyJ4VaLK0w= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=WCASzi6a; arc=none smtp.client-ip=192.198.163.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="WCASzi6a" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1729804097; x=1761340097; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=hxxhPlp3/W6zJ7QsCgtx7RPiium1wTI6Fd1gqm40yoM=; b=WCASzi6aWqgVOJByT+ZvJ3JaGqL8ARFdMlzHgfPHBtK6xVlQSPHDUxQW P3+sa2pLoP/ZB5DMHU6C9FR1VpzWYJgINTeru7o2AycN2JX9/fTDTLOWK 5xUog4iUyG09HfIClmQFLpgBS6JJfwruZSrrdK4MDDEFZytF3o1asNzMT MSNzZ71PdF/D3biLhejF3f6qIBqGu9hrFaHIVc1o+4C+7ER2DeklWk0Ao U9tXCJZOWm9hbIWnD3pk2QlIBI2/bmkxm4O9VXzGnw9xNV9jHjeqZcPyw BUFvXRMcQa8rOFIoGJth9HnCn002cBWOli+kPZfBmL21Ica6UZV97QvhF g==; X-CSE-ConnectionGUID: tvUcaWIZTTSdQ+YaaX9kgA== X-CSE-MsgGUID: B8cDwODFR5SfmfNUdyR85g== X-IronPort-AV: E=McAfee;i="6700,10204,11235"; a="17090925" X-IronPort-AV: E=Sophos;i="6.11,230,1725346800"; d="scan'208";a="17090925" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:02 -0700 X-CSE-ConnectionGUID: 5QLbLdw6Q8ayvGyLN2bxgA== X-CSE-MsgGUID: IpZb9Ps/S3i8yateJGlgTQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,199,1725346800"; d="scan'208";a="85488066" Received: from rchatre-desk1.jf.intel.com ([10.165.154.99]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Oct 2024 14:08:01 -0700 From: Reinette Chatre To: fenghua.yu@intel.com, shuah@kernel.org, tony.luck@intel.com, peternewman@google.com, babu.moger@amd.com, ilpo.jarvinen@linux.intel.com Cc: maciej.wieczor-retman@intel.com, reinette.chatre@intel.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 15/15] selftests/resctrl: Replace magic constants used as array size Date: Thu, 24 Oct 2024 14:18:52 -0700 Message-ID: X-Mailer: git-send-email 2.47.0 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The Memory Bandwidth Allocation (MBA) test iterates through all possible MBA allocations, from 10% (ALLOCATION_MIN) to 100% (ALLOCATION_MAX) with increments of 10% (ALLOCATION_STEP) at each iteration. During each iteration the test measures the actual memory bandwidth NUM_OF_RUNS times to determine the impact of MBA on actual memory bandwidth. After the MBA test completes all the memory bandwidth measurements are parsed into an array. One array for resctrl Memory Bandwidth Monitoring (MBM) measurements and one array for the Integrated Memory Controller (iMC) measurements. Each array has a hardcoded size of 1024 that is large enough to hold the current test data, but this hardcoded value makes the implementation difficult to understand. It will not be clear that this array needs to be reconsidered if any of the test parameters are changed. Replace the magic constant as array size with the test parameters the array size depends on. Reported-by: Ilpo J=C3=A4rvinen Closes: https://lore.kernel.org/all/45af2a8c-517d-8f0d-137d-ad0f3f6a3c68@li= nux.intel.com/ Signed-off-by: Reinette Chatre Reviewed-by: Ilpo J=C3=A4rvinen --- Changes since V3: - Add Ilpo's Reviewed-by tag. Changes since V2: - New patch. --- tools/testing/selftests/resctrl/mba_test.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/tools/testing/selftests/resctrl/mba_test.c b/tools/testing/sel= ftests/resctrl/mba_test.c index 4e6645b172e3..536d9089d2f6 100644 --- a/tools/testing/selftests/resctrl/mba_test.c +++ b/tools/testing/selftests/resctrl/mba_test.c @@ -127,8 +127,9 @@ static bool show_mba_info(unsigned long *bw_imc, unsign= ed long *bw_resc) =20 static int check_results(void) { + unsigned long bw_resc[NUM_OF_RUNS * ALLOCATION_MAX / ALLOCATION_STEP]; + unsigned long bw_imc[NUM_OF_RUNS * ALLOCATION_MAX / ALLOCATION_STEP]; char *token_array[8], output[] =3D RESULT_FILE_NAME, temp[512]; - unsigned long bw_imc[1024], bw_resc[1024]; int runs; FILE *fp; =20 --=20 2.47.0