Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp4677458rdh; Wed, 29 Nov 2023 07:48:16 -0800 (PST) X-Google-Smtp-Source: AGHT+IHpwXFTmdthWgHs/g46SGu5x58JM9X0ueWTvzj2YWXKtULJioRLliL4tsbMhCnH4cXpXwin X-Received: by 2002:a05:6a20:3d8b:b0:18c:41cd:c774 with SMTP id s11-20020a056a203d8b00b0018c41cdc774mr15130829pzi.1.1701272896523; Wed, 29 Nov 2023 07:48:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701272896; cv=none; d=google.com; s=arc-20160816; b=nhIV2aaTlwa/iUGnDYRMS46hXByMeG1XAr3M40KnCSHHDmLasE1wz6F3RF2OcDls/e 7pomKuEC9EN39kwQHQVMJ+R+Q0U4cqhL1hVTq0cOsXdsz+C5pT6Ev5/C60P5dDyZrx+I 7gECzW6lV3dR1eHey1eT9dKuq2kbEFHdFp/SairU6FFxiZrt3Hm/KJJnLZ5rdO/suvHr J2p0Du2o5PhW3yWtIVf2eETeAeRV60wR9ekETNNibe7knpx2+lXpLiMZflI9f0LC9vpP bZTNk5aQbVVnoNb3msedBoF5scaB2FVkyAFNgFgIuKWsptYdIYOc1SnaNvwEA3ezGr5/ GUhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=NEZw4GlvuZDgEBy2iXwv0HKH0SUrkAeOVlouSVdCYQ4=; fh=jy3LohGc5hVyn54A5LgJUZY1dOWXq435vgH8fY8iy+s=; b=nNJRl9R7Zyo+U2GaXDRXcUBvk63Rbs03y7N+W4UPLxo8pbRg4kfRthrHd6ct+cmuHG DxIYknG1BF1cufX1WC+fZ4oHc9S+CRwWIxXnQqfVO7sPJqlMq7RNI//LXJXJhWPp8+Zf IkIvdr4r+bTRuzOI7o6UJVd9qNkTWqKFG8/5hkEDeimIOKNt/r+0a38EccAI4X6js9jP 8PXK3ytSsbe5pSBY/ZQiz4RoCs1Hl1Yv1MkkPTQe0T7nPH5pbos/zKrpBU01YNvzy0yn uRteJbQ3o+tfC9edQos7IRGLrV1FlMgaxPyP1lIHXDjwVCiIRSVb79yM+8jMwbevTL65 GB1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=srT7EPF8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id y21-20020a63e255000000b0058974d3c296si15041009pgj.815.2023.11.29.07.48.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Nov 2023 07:48:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=srT7EPF8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id CE7F5803512E; Wed, 29 Nov 2023 07:48:13 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344143AbjK2Prr (ORCPT + 99 others); Wed, 29 Nov 2023 10:47:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42130 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344032AbjK2Pre (ORCPT ); Wed, 29 Nov 2023 10:47:34 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B9E5110DB for ; Wed, 29 Nov 2023 07:47:40 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1DE61C433C9; Wed, 29 Nov 2023 15:47:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701272860; bh=45craR8fXhu4UKylqaeeXIMxfA/OQi5bmwotxf0KdVY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=srT7EPF8WxYZeCnQTbCvQdasmXfcwhwnDkVorUW54rnoYLdO+f6xSPNSzDJuDPaXh h99pThfxiCqrMpZSzYW5EtBiqUx8yKl163sPOhGrRKzW0pwAR6xfVyInfl5sSK7NjV NLGWDGLap3tYDCkmDQ0iSdE94oL++/7KgH+o5wMWCjIBtk4RbEme/mox+cegknfdrH lx2N6ak7aE9L4Z+sfxFoIo5GOCMflYabhLeqgG9sla8Kb4DAerzyLajqOyaD1lDbLQ NsxYsohRhWeyTHRrJ1VbiDX/XNV2zUN3hiGSloFC4Xi2GGW2yYKWdGn85ZzfwMafg5 C0+Xo6ThVqtew== From: Arnaldo Carvalho de Melo To: Namhyung Kim Cc: Ingo Molnar , Thomas Gleixner , Jiri Olsa , Ian Rogers , Adrian Hunter , Clark Williams , Kate Carcia , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Arnaldo Carvalho de Melo , Juri Lelli , Marco Elver , Mike Galbraith , Peter Zijlstra Subject: [PATCH 2/2] perf tests sigtrap: Skip if running on a kernel with sleepable spinlocks Date: Wed, 29 Nov 2023 12:47:18 -0300 Message-ID: <20231129154718.326330-3-acme@kernel.org> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20231129154718.326330-1-acme@kernel.org> References: <20231129154718.326330-1-acme@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Wed, 29 Nov 2023 07:48:14 -0800 (PST) From: Arnaldo Carvalho de Melo There are issues as reported that need some more investigation on the RT kernel front, till that is addressed, skip this test. This test is already skipped for multiple hardware architectures where the tested kernel feature is not supported. Cc: Adrian Hunter Cc: Clark Williams Cc: Ian Rogers Cc: Jiri Olsa Cc: Juri Lelli Cc: Marco Elver Cc: Mike Galbraith Cc: Namhyung Kim Cc: Peter Zijlstra Cc: Thomas Gleixner Link: https://lore.kernel.org/all/e368f2c848d77fbc8d259f44e2055fe469c219cf.camel@gmx.de/ Signed-off-by: Arnaldo Carvalho de Melo --- tools/perf/tests/sigtrap.c | 46 ++++++++++++++++++++++++++++++++++++-- 1 file changed, 44 insertions(+), 2 deletions(-) diff --git a/tools/perf/tests/sigtrap.c b/tools/perf/tests/sigtrap.c index a1bc7c776254ed2f..e6fd934b027a3d0c 100644 --- a/tools/perf/tests/sigtrap.c +++ b/tools/perf/tests/sigtrap.c @@ -103,6 +103,34 @@ static bool attr_has_sigtrap(void) return __btf_type__find_member_by_name(id, "sigtrap") != NULL; } + +static bool kernel_with_sleepable_spinlocks(void) +{ + const struct btf_member *member; + const struct btf_type *type; + const char *type_name; + int id; + + if (!btf__available()) + return false; + + id = btf__find_by_name_kind(btf, "spinlock", BTF_KIND_STRUCT); + if (id < 0) + return false; + + // Only RT has a "lock" member for "struct spinlock" + member = __btf_type__find_member_by_name(id, "lock"); + if (member == NULL) + return false; + + // But check its type as well + type = btf__type_by_id(btf, member->type); + if (!type || !btf_is_struct(type)) + return false; + + type_name = btf__name_by_offset(btf, type->name_off); + return type_name && !strcmp(type_name, "rt_mutex_base"); +} #else /* !HAVE_BPF_SKEL */ static bool attr_has_sigtrap(void) { @@ -125,6 +153,11 @@ static bool attr_has_sigtrap(void) return ret; } +static bool kernel_with_sleepable_spinlocks(void) +{ + return false; +} + static void btf__exit(void) { } @@ -166,7 +199,7 @@ static int run_test_threads(pthread_t *threads, pthread_barrier_t *barrier) static int run_stress_test(int fd, pthread_t *threads, pthread_barrier_t *barrier) { - int ret; + int ret, expected_sigtraps; ctx.iterate_on = 3000; @@ -175,7 +208,16 @@ static int run_stress_test(int fd, pthread_t *threads, pthread_barrier_t *barrie ret = run_test_threads(threads, barrier); TEST_ASSERT_EQUAL("disable failed", ioctl(fd, PERF_EVENT_IOC_DISABLE, 0), 0); - TEST_ASSERT_EQUAL("unexpected sigtraps", ctx.signal_count, NUM_THREADS * ctx.iterate_on); + expected_sigtraps = NUM_THREADS * ctx.iterate_on; + + if (ctx.signal_count < expected_sigtraps && kernel_with_sleepable_spinlocks()) { + pr_debug("Expected %d sigtraps, got %d, running on a kernel with sleepable spinlocks.\n", + expected_sigtraps, ctx.signal_count); + pr_debug("See https://lore.kernel.org/all/e368f2c848d77fbc8d259f44e2055fe469c219cf.camel@gmx.de/\n"); + return TEST_SKIP; + } else + TEST_ASSERT_EQUAL("unexpected sigtraps", ctx.signal_count, expected_sigtraps); + TEST_ASSERT_EQUAL("missing signals or incorrectly delivered", ctx.tids_want_signal, 0); TEST_ASSERT_VAL("unexpected si_addr", ctx.first_siginfo.si_addr == &ctx.iterate_on); #if 0 /* FIXME: enable when libc's signal.h has si_perf_{type,data} */ -- 2.41.0