Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp4856931rdh; Wed, 29 Nov 2023 12:42:41 -0800 (PST) X-Google-Smtp-Source: AGHT+IEloxzzc/EohL/xxjXryn6YHcPBxiCXY6mORM2Djs46lWG/KeJnBKEaavAg8izMLDHy6w+1 X-Received: by 2002:a05:6830:1e86:b0:6d3:127b:6fba with SMTP id n6-20020a0568301e8600b006d3127b6fbamr21340271otr.9.1701290561393; Wed, 29 Nov 2023 12:42:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701290561; cv=none; d=google.com; s=arc-20160816; b=o2DrpeGAlrUNFbw63W5riurvkK9zZCOmeT0Z5ONCN371QTlfwGa8lL4jZrf4pezCei uAqxC6aMx8mkIkJobvfmqRlLR6B0NhSd9um1DFHiEYLvEyM/wTEmtuBGM3BZ0MNCO+M4 zYi2VbxIwg7bVZu3VvgMhMoi0TT0TyxEmvI1qfJoOnYFVMexM80w4CfqTEkcdHuY0vW9 00eRGd5IW7sWE0g6KM728H899yzPUY6+kO8tGkoIV/ILR4J6zebkPZ0j2+HRaO44rmLO FcDIJ8wwxSWUEOTTiZq9gFNbtzUIwZ5uqzk52ysMIIXF39QENATAIDeYZycEdEuutg+h i6fA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=w4pKlYJLtv9AEklKfYlnuHjHdi+4lzHQSba8QoxuueU=; fh=glUpL/Jbk8FBYIg3SPem4SGEK1plZFedyKMLtC1u9Xg=; b=pHvQEoJGcPVKzq2zX4yt21lNgDno0tkFJ6Md1AIt1WLMce+FVwL9fXGf56JE/7jEey 7DEgQfN41UrvMkWhxMQLAb002yX+JxxIobIoLkY6kyOK/91OX8qe2QdnUWzJYx2qoub4 G/lloaVkFFi5RTGLg67QHip0y2I3NO1pzIpreX/SX3MXTS+3LaE+8ZC7Ojw6zteozAql TuImkJ5bhgAbfY9P6joiB1T1CR/xHj3GRP7vwcDYT+m41BY3hx/tpEzXXweRtD+miQHX 2p8dcXRY7mODPxac+2wNuADFzob7bqCKZM+BCBlBrh/UuhvyEpUI1BKWLoNH4S0pOeR9 U2YA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pPSumhXD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id b3-20020a631b03000000b005c2030dd612si14564739pgb.870.2023.11.29.12.42.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Nov 2023 12:42:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pPSumhXD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 1C3CF802DD10; Wed, 29 Nov 2023 12:42:40 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231549AbjK2Uma (ORCPT + 99 others); Wed, 29 Nov 2023 15:42:30 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49614 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234061AbjK2Um2 (ORCPT ); Wed, 29 Nov 2023 15:42:28 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F114810D3 for ; Wed, 29 Nov 2023 12:42:34 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 368CDC433C7; Wed, 29 Nov 2023 20:42:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701290554; bh=SVwxP2iECxaAaRjYUKPB82HlCDKzRNHkS7oX5cfLIpY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=pPSumhXDPf7c9ZaH+q/FapiH1qxgvEOa0nbUmSonZSmjynUdRasBZwEqPlUu7kFMF iLyu2IR0PQsJ6o783VcalcOg+SRkyDziKkYHtTjyXoxlV/znSUzeoKfsf+L1JEokI5 ivZq+YFCXv3Cx2tlcHkm6510QGQWz6gftbrz3BhKvDFuZhFnFFXRJBA8K/srsTkHbA bUjD0+eyjZECITggCAWXwnGfjziVMy8WELteQz01tsJOM0N73sD0njCv3o8r9U67sC awYW8Mkgt4/1h2M/DUB7U443SN5jhAy7pn3gT/wyiSUt+skAAHxBPBlkqx6llDG7fx h02R34ql7pGEQ== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id 02DD240094; Wed, 29 Nov 2023 17:42:30 -0300 (-03) Date: Wed, 29 Nov 2023 17:42:30 -0300 From: Arnaldo Carvalho de Melo To: Marco Elver Cc: Namhyung Kim , Ingo Molnar , Thomas Gleixner , Jiri Olsa , Ian Rogers , Adrian Hunter , Clark Williams , Kate Carcia , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Arnaldo Carvalho de Melo , Juri Lelli , Mike Galbraith , Peter Zijlstra Subject: Re: [PATCH 2/2] perf tests sigtrap: Skip if running on a kernel with sleepable spinlocks Message-ID: References: <20231129154718.326330-1-acme@kernel.org> <20231129154718.326330-3-acme@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Url: http://acmel.wordpress.com X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Wed, 29 Nov 2023 12:42:40 -0800 (PST) Em Wed, Nov 29, 2023 at 04:57:47PM +0100, Marco Elver escreveu: > On Wed, 29 Nov 2023 at 16:47, Arnaldo Carvalho de Melo wrote: > > > > From: Arnaldo Carvalho de Melo > > > > There are issues as reported that need some more investigation on the > > RT kernel front, till that is addressed, skip this test. > > > > This test is already skipped for multiple hardware architectures where > > the tested kernel feature is not supported. > > > > Cc: Adrian Hunter > > Cc: Clark Williams > > Cc: Ian Rogers > > Cc: Jiri Olsa > > Cc: Juri Lelli > > Cc: Marco Elver > > Cc: Mike Galbraith > > Cc: Namhyung Kim > > Cc: Peter Zijlstra > > Cc: Thomas Gleixner > > Link: https://lore.kernel.org/all/e368f2c848d77fbc8d259f44e2055fe469c219cf.camel@gmx.de/ > > Signed-off-by: Arnaldo Carvalho de Melo > > Acked-by: Marco Elver > > > --- > > tools/perf/tests/sigtrap.c | 46 ++++++++++++++++++++++++++++++++++++-- > > 1 file changed, 44 insertions(+), 2 deletions(-) > > > > diff --git a/tools/perf/tests/sigtrap.c b/tools/perf/tests/sigtrap.c > > index a1bc7c776254ed2f..e6fd934b027a3d0c 100644 > > --- a/tools/perf/tests/sigtrap.c > > +++ b/tools/perf/tests/sigtrap.c > > @@ -103,6 +103,34 @@ static bool attr_has_sigtrap(void) > > > > return __btf_type__find_member_by_name(id, "sigtrap") != NULL; > > } > > + > > +static bool kernel_with_sleepable_spinlocks(void) > > +{ > > + const struct btf_member *member; > > + const struct btf_type *type; > > + const char *type_name; > > + int id; > > + > > + if (!btf__available()) > > + return false; > > + > > + id = btf__find_by_name_kind(btf, "spinlock", BTF_KIND_STRUCT); > > + if (id < 0) > > + return false; > > + > > + // Only RT has a "lock" member for "struct spinlock" > > + member = __btf_type__find_member_by_name(id, "lock"); > > + if (member == NULL) > > + return false; > > + > > + // But check its type as well > > + type = btf__type_by_id(btf, member->type); > > + if (!type || !btf_is_struct(type)) > > + return false; > > + > > + type_name = btf__name_by_offset(btf, type->name_off); > > + return type_name && !strcmp(type_name, "rt_mutex_base"); > > +} > > #else /* !HAVE_BPF_SKEL */ > > static bool attr_has_sigtrap(void) > > { > > @@ -125,6 +153,11 @@ static bool attr_has_sigtrap(void) > > return ret; > > } > > > > +static bool kernel_with_sleepable_spinlocks(void) > > +{ > > + return false; > > +} > > + > > static void btf__exit(void) > > { > > } > > @@ -166,7 +199,7 @@ static int run_test_threads(pthread_t *threads, pthread_barrier_t *barrier) > > > > static int run_stress_test(int fd, pthread_t *threads, pthread_barrier_t *barrier) > > { > > - int ret; > > + int ret, expected_sigtraps; > > > > ctx.iterate_on = 3000; > > > > @@ -175,7 +208,16 @@ static int run_stress_test(int fd, pthread_t *threads, pthread_barrier_t *barrie > > ret = run_test_threads(threads, barrier); > > TEST_ASSERT_EQUAL("disable failed", ioctl(fd, PERF_EVENT_IOC_DISABLE, 0), 0); > > > > - TEST_ASSERT_EQUAL("unexpected sigtraps", ctx.signal_count, NUM_THREADS * ctx.iterate_on); > > + expected_sigtraps = NUM_THREADS * ctx.iterate_on; > > + > > + if (ctx.signal_count < expected_sigtraps && kernel_with_sleepable_spinlocks()) { > > + pr_debug("Expected %d sigtraps, got %d, running on a kernel with sleepable spinlocks.\n", > > + expected_sigtraps, ctx.signal_count); > > + pr_debug("See https://lore.kernel.org/all/e368f2c848d77fbc8d259f44e2055fe469c219cf.camel@gmx.de/\n"); > > No changes from the RT side since? A fix exists, but apparently not > good enough... Sigh. Yeah, my impression, and first attempt at writing that patch wast that no sigtraps were being sent, but then when I tried with a random, more recent machine in the Red Hat labs, I got some signals, way less than the expected ones, but some, maybe this is an interesting data point? I'll try again to reproduce in the local machine, old i7 lenovo notebook and at the newer machine, a Xeon(R) Silver 4216, 32 cpu and report here. - Arnaldo