linux-perf-users.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v1] perf test: Ignore security failures in all PMU test
@ 2024-09-25 17:30 Ian Rogers
  2024-09-26  4:52 ` Namhyung Kim
  2024-09-27 16:59 ` Namhyung Kim
  0 siblings, 2 replies; 5+ messages in thread
From: Ian Rogers @ 2024-09-25 17:30 UTC (permalink / raw)
  To: Peter Zijlstra, Ingo Molnar, Arnaldo Carvalho de Melo,
	Namhyung Kim, Mark Rutland, Alexander Shishkin, Jiri Olsa,
	Ian Rogers, Adrian Hunter, Kan Liang, Colin Ian King,
	Athira Jajeev, linux-perf-users, linux-kernel

Refactor code to have some more error diagnosis on traps, etc. and to
do less work on each line. Add an ignore situation for security failures.

Signed-off-by: Ian Rogers <irogers@google.com>
---
 tools/perf/tests/shell/stat_all_pmu.sh | 52 ++++++++++++++++++++------
 1 file changed, 40 insertions(+), 12 deletions(-)

diff --git a/tools/perf/tests/shell/stat_all_pmu.sh b/tools/perf/tests/shell/stat_all_pmu.sh
index d2a3506e0d19..42456d89c5da 100755
--- a/tools/perf/tests/shell/stat_all_pmu.sh
+++ b/tools/perf/tests/shell/stat_all_pmu.sh
@@ -1,23 +1,51 @@
-#!/bin/sh
+#!/bin/bash
 # perf all PMU test
 # SPDX-License-Identifier: GPL-2.0
 
 set -e
+err=0
+result=""
+
+trap_cleanup() {
+  echo "Unexpected signal in ${FUNCNAME[1]}"
+  echo "$result"
+  exit 1
+}
+trap trap_cleanup EXIT TERM INT
 
 # Test all PMU events; however exclude parameterized ones (name contains '?')
-for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g'); do
+for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g')
+do
   echo "Testing $p"
   result=$(perf stat -e "$p" true 2>&1)
-  if ! echo "$result" | grep -q "$p" && ! echo "$result" | grep -q "<not supported>" ; then
-    # We failed to see the event and it is supported. Possibly the workload was
-    # too small so retry with something longer.
-    result=$(perf stat -e "$p" perf bench internals synthesize 2>&1)
-    if ! echo "$result" | grep -q "$p" ; then
-      echo "Event '$p' not printed in:"
-      echo "$result"
-      exit 1
-    fi
+  if echo "$result" | grep -q "$p"
+  then
+    # Event seen in output.
+    continue
+  fi
+  if echo "$result" | grep -q "<not supported>"
+  then
+    # Event not supported, so ignore.
+    continue
+  fi
+  if echo "$result" | grep -q "Access to performance monitoring and observability operations is limited."
+  then
+    # Access is limited, so ignore.
+    continue
+  fi
+
+  # We failed to see the event and it is supported. Possibly the workload was
+  # too small so retry with something longer.
+  result=$(perf stat -e "$p" perf bench internals synthesize 2>&1)
+  if echo "$result" | grep -q "$p"
+  then
+    # Event seen in output.
+    continue
   fi
+  echo "Error: event '$p' not printed in:"
+  echo "$result"
+  err=1
 done
 
-exit 0
+trap - EXIT TERM INT
+exit $err
-- 
2.46.0.792.g87dc391469-goog


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH v1] perf test: Ignore security failures in all PMU test
  2024-09-25 17:30 [PATCH v1] perf test: Ignore security failures in all PMU test Ian Rogers
@ 2024-09-26  4:52 ` Namhyung Kim
  2024-09-26 15:24   ` Ian Rogers
  2024-09-27 16:59 ` Namhyung Kim
  1 sibling, 1 reply; 5+ messages in thread
From: Namhyung Kim @ 2024-09-26  4:52 UTC (permalink / raw)
  To: Ian Rogers
  Cc: Peter Zijlstra, Ingo Molnar, Arnaldo Carvalho de Melo,
	Mark Rutland, Alexander Shishkin, Jiri Olsa, Adrian Hunter,
	Kan Liang, Colin Ian King, Athira Jajeev, linux-perf-users,
	linux-kernel

On Wed, Sep 25, 2024 at 10:30:13AM -0700, Ian Rogers wrote:
> Refactor code to have some more error diagnosis on traps, etc. and to
> do less work on each line. Add an ignore situation for security failures.
> 
> Signed-off-by: Ian Rogers <irogers@google.com>
> ---
>  tools/perf/tests/shell/stat_all_pmu.sh | 52 ++++++++++++++++++++------
>  1 file changed, 40 insertions(+), 12 deletions(-)
> 
> diff --git a/tools/perf/tests/shell/stat_all_pmu.sh b/tools/perf/tests/shell/stat_all_pmu.sh
> index d2a3506e0d19..42456d89c5da 100755
> --- a/tools/perf/tests/shell/stat_all_pmu.sh
> +++ b/tools/perf/tests/shell/stat_all_pmu.sh
> @@ -1,23 +1,51 @@
> -#!/bin/sh
> +#!/bin/bash
>  # perf all PMU test
>  # SPDX-License-Identifier: GPL-2.0
>  
>  set -e
> +err=0
> +result=""
> +
> +trap_cleanup() {
> +  echo "Unexpected signal in ${FUNCNAME[1]}"
> +  echo "$result"
> +  exit 1
> +}
> +trap trap_cleanup EXIT TERM INT
>  
>  # Test all PMU events; however exclude parameterized ones (name contains '?')
> -for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g'); do
> +for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g')
> +do
>    echo "Testing $p"
>    result=$(perf stat -e "$p" true 2>&1)
> -  if ! echo "$result" | grep -q "$p" && ! echo "$result" | grep -q "<not supported>" ; then
> -    # We failed to see the event and it is supported. Possibly the workload was
> -    # too small so retry with something longer.
> -    result=$(perf stat -e "$p" perf bench internals synthesize 2>&1)
> -    if ! echo "$result" | grep -q "$p" ; then
> -      echo "Event '$p' not printed in:"
> -      echo "$result"
> -      exit 1
> -    fi
> +  if echo "$result" | grep -q "$p"
> +  then
> +    # Event seen in output.
> +    continue
> +  fi
> +  if echo "$result" | grep -q "<not supported>"
> +  then
> +    # Event not supported, so ignore.
> +    continue

I'm curious about this case.  It'll show up even if it's not supported
right?  Then the first condition would match and it doesn't reach here.

  $ perf stat -e LLC-loads true
  
   Performance counter stats for 'true':
  
     <not supported>      LLC-loads                                                             
  
         0.001213558 seconds time elapsed
  
         0.001373000 seconds user
         0.000000000 seconds sys

> +  fi
> +  if echo "$result" | grep -q "Access to performance monitoring and observability operations is limited."
> +  then
> +    # Access is limited, so ignore.
> +    continue
> +  fi
> +
> +  # We failed to see the event and it is supported. Possibly the workload was
> +  # too small so retry with something longer.

Ok, maybe we want to check "<not counted>" events specifically.

Thanks,
Namhyung


> +  result=$(perf stat -e "$p" perf bench internals synthesize 2>&1)
> +  if echo "$result" | grep -q "$p"
> +  then
> +    # Event seen in output.
> +    continue
>    fi
> +  echo "Error: event '$p' not printed in:"
> +  echo "$result"
> +  err=1
>  done
>  
> -exit 0
> +trap - EXIT TERM INT
> +exit $err
> -- 
> 2.46.0.792.g87dc391469-goog
> 

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH v1] perf test: Ignore security failures in all PMU test
  2024-09-26  4:52 ` Namhyung Kim
@ 2024-09-26 15:24   ` Ian Rogers
  2024-09-26 18:17     ` Namhyung Kim
  0 siblings, 1 reply; 5+ messages in thread
From: Ian Rogers @ 2024-09-26 15:24 UTC (permalink / raw)
  To: Namhyung Kim
  Cc: Peter Zijlstra, Ingo Molnar, Arnaldo Carvalho de Melo,
	Mark Rutland, Alexander Shishkin, Jiri Olsa, Adrian Hunter,
	Kan Liang, Colin Ian King, Athira Jajeev, linux-perf-users,
	linux-kernel

On Wed, Sep 25, 2024 at 9:52 PM Namhyung Kim <namhyung@kernel.org> wrote:
>
> On Wed, Sep 25, 2024 at 10:30:13AM -0700, Ian Rogers wrote:
> > Refactor code to have some more error diagnosis on traps, etc. and to
> > do less work on each line. Add an ignore situation for security failures.
> >
> > Signed-off-by: Ian Rogers <irogers@google.com>
> > ---
> >  tools/perf/tests/shell/stat_all_pmu.sh | 52 ++++++++++++++++++++------
> >  1 file changed, 40 insertions(+), 12 deletions(-)
> >
> > diff --git a/tools/perf/tests/shell/stat_all_pmu.sh b/tools/perf/tests/shell/stat_all_pmu.sh
> > index d2a3506e0d19..42456d89c5da 100755
> > --- a/tools/perf/tests/shell/stat_all_pmu.sh
> > +++ b/tools/perf/tests/shell/stat_all_pmu.sh
> > @@ -1,23 +1,51 @@
> > -#!/bin/sh
> > +#!/bin/bash
> >  # perf all PMU test
> >  # SPDX-License-Identifier: GPL-2.0
> >
> >  set -e
> > +err=0
> > +result=""
> > +
> > +trap_cleanup() {
> > +  echo "Unexpected signal in ${FUNCNAME[1]}"
> > +  echo "$result"
> > +  exit 1
> > +}
> > +trap trap_cleanup EXIT TERM INT
> >
> >  # Test all PMU events; however exclude parameterized ones (name contains '?')
> > -for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g'); do
> > +for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g')
> > +do
> >    echo "Testing $p"
> >    result=$(perf stat -e "$p" true 2>&1)
> > -  if ! echo "$result" | grep -q "$p" && ! echo "$result" | grep -q "<not supported>" ; then
> > -    # We failed to see the event and it is supported. Possibly the workload was
> > -    # too small so retry with something longer.
> > -    result=$(perf stat -e "$p" perf bench internals synthesize 2>&1)
> > -    if ! echo "$result" | grep -q "$p" ; then
> > -      echo "Event '$p' not printed in:"
> > -      echo "$result"
> > -      exit 1
> > -    fi
> > +  if echo "$result" | grep -q "$p"
> > +  then
> > +    # Event seen in output.
> > +    continue
> > +  fi
> > +  if echo "$result" | grep -q "<not supported>"
> > +  then
> > +    # Event not supported, so ignore.
> > +    continue
>
> I'm curious about this case.  It'll show up even if it's not supported
> right?  Then the first condition would match and it doesn't reach here.
>
>   $ perf stat -e LLC-loads true
>
>    Performance counter stats for 'true':
>
>      <not supported>      LLC-loads
>
>          0.001213558 seconds time elapsed
>
>          0.001373000 seconds user
>          0.000000000 seconds sys

We carry this change at Google for an issue on older series kernels. I
was resending the patch as a courtesy in the migration of development
work to:
https://github.com/googleprodkernel/linux-perf
I'm okay with this being a Google only change.

Thanks,
Ian

> > +  fi
> > +  if echo "$result" | grep -q "Access to performance monitoring and observability operations is limited."
> > +  then
> > +    # Access is limited, so ignore.
> > +    continue
> > +  fi
> > +
> > +  # We failed to see the event and it is supported. Possibly the workload was
> > +  # too small so retry with something longer.
>
> Ok, maybe we want to check "<not counted>" events specifically.
>
> Thanks,
> Namhyung
>
>
> > +  result=$(perf stat -e "$p" perf bench internals synthesize 2>&1)
> > +  if echo "$result" | grep -q "$p"
> > +  then
> > +    # Event seen in output.
> > +    continue
> >    fi
> > +  echo "Error: event '$p' not printed in:"
> > +  echo "$result"
> > +  err=1
> >  done
> >
> > -exit 0
> > +trap - EXIT TERM INT
> > +exit $err
> > --
> > 2.46.0.792.g87dc391469-goog
> >

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH v1] perf test: Ignore security failures in all PMU test
  2024-09-26 15:24   ` Ian Rogers
@ 2024-09-26 18:17     ` Namhyung Kim
  0 siblings, 0 replies; 5+ messages in thread
From: Namhyung Kim @ 2024-09-26 18:17 UTC (permalink / raw)
  To: Ian Rogers
  Cc: Peter Zijlstra, Ingo Molnar, Arnaldo Carvalho de Melo,
	Mark Rutland, Alexander Shishkin, Jiri Olsa, Adrian Hunter,
	Kan Liang, Colin Ian King, Athira Jajeev, linux-perf-users,
	linux-kernel

On Thu, Sep 26, 2024 at 08:24:30AM -0700, Ian Rogers wrote:
> On Wed, Sep 25, 2024 at 9:52 PM Namhyung Kim <namhyung@kernel.org> wrote:
> >
> > On Wed, Sep 25, 2024 at 10:30:13AM -0700, Ian Rogers wrote:
> > > Refactor code to have some more error diagnosis on traps, etc. and to
> > > do less work on each line. Add an ignore situation for security failures.
> > >
> > > Signed-off-by: Ian Rogers <irogers@google.com>
> > > ---
> > >  tools/perf/tests/shell/stat_all_pmu.sh | 52 ++++++++++++++++++++------
> > >  1 file changed, 40 insertions(+), 12 deletions(-)
> > >
> > > diff --git a/tools/perf/tests/shell/stat_all_pmu.sh b/tools/perf/tests/shell/stat_all_pmu.sh
> > > index d2a3506e0d19..42456d89c5da 100755
> > > --- a/tools/perf/tests/shell/stat_all_pmu.sh
> > > +++ b/tools/perf/tests/shell/stat_all_pmu.sh
> > > @@ -1,23 +1,51 @@
> > > -#!/bin/sh
> > > +#!/bin/bash
> > >  # perf all PMU test
> > >  # SPDX-License-Identifier: GPL-2.0
> > >
> > >  set -e
> > > +err=0
> > > +result=""
> > > +
> > > +trap_cleanup() {
> > > +  echo "Unexpected signal in ${FUNCNAME[1]}"
> > > +  echo "$result"
> > > +  exit 1
> > > +}
> > > +trap trap_cleanup EXIT TERM INT
> > >
> > >  # Test all PMU events; however exclude parameterized ones (name contains '?')
> > > -for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g'); do
> > > +for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g')
> > > +do
> > >    echo "Testing $p"
> > >    result=$(perf stat -e "$p" true 2>&1)
> > > -  if ! echo "$result" | grep -q "$p" && ! echo "$result" | grep -q "<not supported>" ; then
> > > -    # We failed to see the event and it is supported. Possibly the workload was
> > > -    # too small so retry with something longer.
> > > -    result=$(perf stat -e "$p" perf bench internals synthesize 2>&1)
> > > -    if ! echo "$result" | grep -q "$p" ; then
> > > -      echo "Event '$p' not printed in:"
> > > -      echo "$result"
> > > -      exit 1
> > > -    fi
> > > +  if echo "$result" | grep -q "$p"
> > > +  then
> > > +    # Event seen in output.
> > > +    continue
> > > +  fi
> > > +  if echo "$result" | grep -q "<not supported>"
> > > +  then
> > > +    # Event not supported, so ignore.
> > > +    continue
> >
> > I'm curious about this case.  It'll show up even if it's not supported
> > right?  Then the first condition would match and it doesn't reach here.
> >
> >   $ perf stat -e LLC-loads true
> >
> >    Performance counter stats for 'true':
> >
> >      <not supported>      LLC-loads
> >
> >          0.001213558 seconds time elapsed
> >
> >          0.001373000 seconds user
> >          0.000000000 seconds sys
> 
> We carry this change at Google for an issue on older series kernels. I
> was resending the patch as a courtesy in the migration of development
> work to:
> https://github.com/googleprodkernel/linux-perf
> I'm okay with this being a Google only change.

I'm not sure if it's a kernel issue.  IIUC you want to run perf stat
again if some events are not counted, right?

I understand your patch just converted the existing logic and added the
check for security related failures.  So I'll pick it up for now but we
may want to revisit this later.

Thanks,
Namhyung


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH v1] perf test: Ignore security failures in all PMU test
  2024-09-25 17:30 [PATCH v1] perf test: Ignore security failures in all PMU test Ian Rogers
  2024-09-26  4:52 ` Namhyung Kim
@ 2024-09-27 16:59 ` Namhyung Kim
  1 sibling, 0 replies; 5+ messages in thread
From: Namhyung Kim @ 2024-09-27 16:59 UTC (permalink / raw)
  To: Peter Zijlstra, Ingo Molnar, Arnaldo Carvalho de Melo,
	Mark Rutland, Alexander Shishkin, Jiri Olsa, Adrian Hunter,
	Kan Liang, Colin Ian King, Athira Jajeev, linux-perf-users,
	linux-kernel, Ian Rogers

On Wed, 25 Sep 2024 10:30:13 -0700, Ian Rogers wrote:

> Refactor code to have some more error diagnosis on traps, etc. and to
> do less work on each line. Add an ignore situation for security failures.
> 
> 

Applied to perf-tools-next, thanks!

Best regards,
Namhyung

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2024-09-27 16:59 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-09-25 17:30 [PATCH v1] perf test: Ignore security failures in all PMU test Ian Rogers
2024-09-26  4:52 ` Namhyung Kim
2024-09-26 15:24   ` Ian Rogers
2024-09-26 18:17     ` Namhyung Kim
2024-09-27 16:59 ` Namhyung Kim

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).