From: Namhyung Kim <namhyung@kernel.org>
To: Ian Rogers <irogers@google.com>
Cc: Peter Zijlstra <peterz@infradead.org>,
Ingo Molnar <mingo@redhat.com>,
Arnaldo Carvalho de Melo <acme@kernel.org>,
Mark Rutland <mark.rutland@arm.com>,
Alexander Shishkin <alexander.shishkin@linux.intel.com>,
Jiri Olsa <jolsa@kernel.org>,
Adrian Hunter <adrian.hunter@intel.com>,
Kan Liang <kan.liang@linux.intel.com>,
Colin Ian King <colin.i.king@gmail.com>,
Athira Jajeev <atrajeev@linux.vnet.ibm.com>,
linux-perf-users@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH v1] perf test: Ignore security failures in all PMU test
Date: Thu, 26 Sep 2024 11:17:04 -0700 [thread overview]
Message-ID: <ZvWlICnVELB0WEto@google.com> (raw)
In-Reply-To: <CAP-5=fXJ-Nd-8EUPD+JXy=chZX_7nFYMxRR5L_ovn83+Tt1f_g@mail.gmail.com>
On Thu, Sep 26, 2024 at 08:24:30AM -0700, Ian Rogers wrote:
> On Wed, Sep 25, 2024 at 9:52 PM Namhyung Kim <namhyung@kernel.org> wrote:
> >
> > On Wed, Sep 25, 2024 at 10:30:13AM -0700, Ian Rogers wrote:
> > > Refactor code to have some more error diagnosis on traps, etc. and to
> > > do less work on each line. Add an ignore situation for security failures.
> > >
> > > Signed-off-by: Ian Rogers <irogers@google.com>
> > > ---
> > > tools/perf/tests/shell/stat_all_pmu.sh | 52 ++++++++++++++++++++------
> > > 1 file changed, 40 insertions(+), 12 deletions(-)
> > >
> > > diff --git a/tools/perf/tests/shell/stat_all_pmu.sh b/tools/perf/tests/shell/stat_all_pmu.sh
> > > index d2a3506e0d19..42456d89c5da 100755
> > > --- a/tools/perf/tests/shell/stat_all_pmu.sh
> > > +++ b/tools/perf/tests/shell/stat_all_pmu.sh
> > > @@ -1,23 +1,51 @@
> > > -#!/bin/sh
> > > +#!/bin/bash
> > > # perf all PMU test
> > > # SPDX-License-Identifier: GPL-2.0
> > >
> > > set -e
> > > +err=0
> > > +result=""
> > > +
> > > +trap_cleanup() {
> > > + echo "Unexpected signal in ${FUNCNAME[1]}"
> > > + echo "$result"
> > > + exit 1
> > > +}
> > > +trap trap_cleanup EXIT TERM INT
> > >
> > > # Test all PMU events; however exclude parameterized ones (name contains '?')
> > > -for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g'); do
> > > +for p in $(perf list --raw-dump pmu | sed 's/[[:graph:]]\+?[[:graph:]]\+[[:space:]]//g')
> > > +do
> > > echo "Testing $p"
> > > result=$(perf stat -e "$p" true 2>&1)
> > > - if ! echo "$result" | grep -q "$p" && ! echo "$result" | grep -q "<not supported>" ; then
> > > - # We failed to see the event and it is supported. Possibly the workload was
> > > - # too small so retry with something longer.
> > > - result=$(perf stat -e "$p" perf bench internals synthesize 2>&1)
> > > - if ! echo "$result" | grep -q "$p" ; then
> > > - echo "Event '$p' not printed in:"
> > > - echo "$result"
> > > - exit 1
> > > - fi
> > > + if echo "$result" | grep -q "$p"
> > > + then
> > > + # Event seen in output.
> > > + continue
> > > + fi
> > > + if echo "$result" | grep -q "<not supported>"
> > > + then
> > > + # Event not supported, so ignore.
> > > + continue
> >
> > I'm curious about this case. It'll show up even if it's not supported
> > right? Then the first condition would match and it doesn't reach here.
> >
> > $ perf stat -e LLC-loads true
> >
> > Performance counter stats for 'true':
> >
> > <not supported> LLC-loads
> >
> > 0.001213558 seconds time elapsed
> >
> > 0.001373000 seconds user
> > 0.000000000 seconds sys
>
> We carry this change at Google for an issue on older series kernels. I
> was resending the patch as a courtesy in the migration of development
> work to:
> https://github.com/googleprodkernel/linux-perf
> I'm okay with this being a Google only change.
I'm not sure if it's a kernel issue. IIUC you want to run perf stat
again if some events are not counted, right?
I understand your patch just converted the existing logic and added the
check for security related failures. So I'll pick it up for now but we
may want to revisit this later.
Thanks,
Namhyung
next prev parent reply other threads:[~2024-09-26 18:17 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-09-25 17:30 [PATCH v1] perf test: Ignore security failures in all PMU test Ian Rogers
2024-09-26 4:52 ` Namhyung Kim
2024-09-26 15:24 ` Ian Rogers
2024-09-26 18:17 ` Namhyung Kim [this message]
2024-09-27 16:59 ` Namhyung Kim
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ZvWlICnVELB0WEto@google.com \
--to=namhyung@kernel.org \
--cc=acme@kernel.org \
--cc=adrian.hunter@intel.com \
--cc=alexander.shishkin@linux.intel.com \
--cc=atrajeev@linux.vnet.ibm.com \
--cc=colin.i.king@gmail.com \
--cc=irogers@google.com \
--cc=jolsa@kernel.org \
--cc=kan.liang@linux.intel.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-perf-users@vger.kernel.org \
--cc=mark.rutland@arm.com \
--cc=mingo@redhat.com \
--cc=peterz@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).