mirror of
https://github.com/intel/compute-runtime.git
synced 2026-01-10 15:12:56 +08:00
refactor: fix typos
Signed-off-by: Jaroslaw Warchulski <jaroslaw.warchulski@intel.com>
This commit is contained in:
committed by
Compute-Runtime-Automation
parent
5c6ae48d17
commit
195bf66a49
@@ -233,7 +233,7 @@ ze_result_t DebugSessionImp::slmMemoryAccess(EuThread::ThreadId threadId, const
|
||||
SIP::sip_command sipCommand = {0};
|
||||
|
||||
uint64_t offset = desc->address & maxNBitValue(slmAddressSpaceTag);
|
||||
// SIP accesses SLM in units of slmSendBytesSize at offset allignment of slmSendBytesSize
|
||||
// SIP accesses SLM in units of slmSendBytesSize at offset alignment of slmSendBytesSize
|
||||
uint32_t frontPadding = offset % slmSendBytesSize;
|
||||
uint64_t alignedOffset = offset - frontPadding;
|
||||
uint32_t remainingSlmSendUnits = static_cast<uint32_t>(std::ceil(static_cast<float>(size) / slmSendBytesSize));
|
||||
|
||||
@@ -101,7 +101,7 @@ ze_result_t MetricIpSamplingLinuxImp::readData(uint8_t *pRawData, size_t *pRawDa
|
||||
if (errno == EINTR || errno == EAGAIN || errno == EBUSY) {
|
||||
return ZE_RESULT_SUCCESS;
|
||||
} else if (errno == EIO) {
|
||||
// on i915 EIO is not returned by KMD for any error conditions. Hence we can use this safetly for both xe and i915.
|
||||
// on i915 EIO is not returned by KMD for any error conditions. Hence we can use this safely for both xe and i915.
|
||||
return ZE_RESULT_WARNING_DROPPED_DATA;
|
||||
}
|
||||
|
||||
|
||||
@@ -381,7 +381,7 @@ ze_result_t MetricDeviceContext::getConcurrentMetricGroups(uint32_t metricGroupC
|
||||
}
|
||||
}
|
||||
|
||||
// Update the concurrent Group count and count per concurrent grup
|
||||
// Update the concurrent Group count and count per concurrent group
|
||||
*pConcurrentGroupCount = static_cast<uint32_t>(concurrentGroups.size());
|
||||
for (uint32_t index = 0u; index < *pConcurrentGroupCount; index++) {
|
||||
pCountPerConcurrentGroup[index] = static_cast<uint32_t>(concurrentGroups[index].size());
|
||||
|
||||
@@ -290,7 +290,7 @@ ze_result_t MetricEnumeration::cacheMetricInformation() {
|
||||
return result;
|
||||
}
|
||||
|
||||
// Avoid repeated cacheing for the sub-device
|
||||
// Avoid repeated caching for the sub-device
|
||||
if (getMetricGroupCount() > 0) {
|
||||
return ZE_RESULT_SUCCESS;
|
||||
}
|
||||
@@ -1017,7 +1017,7 @@ ze_result_t OaMetricGroupImp::getMetricTimestampsExp(const ze_bool_t synchronize
|
||||
metricSource->csTimestampPeriodNs = metricSource->getMetricDeviceContext().getDevice().getNEODevice()->getProfilingTimerResolution();
|
||||
result = metricSource->getTimerResolution(metricSource->oaTimestampFrequency);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
METRICS_LOG_ERR("Could not fetch oaTimestampFrequency from getTimerResolution(). Return status recieved %x ", result);
|
||||
METRICS_LOG_ERR("Could not fetch oaTimestampFrequency from getTimerResolution(). Return status received %x ", result);
|
||||
*globalTimestamp = 0;
|
||||
*metricTimestamp = 0;
|
||||
return ZE_RESULT_ERROR_NOT_AVAILABLE;
|
||||
|
||||
@@ -339,7 +339,7 @@ ze_result_t OaMetricSourceImp::createMetricGroupsFromMetrics(std::vector<zet_met
|
||||
};
|
||||
|
||||
bool isMaxMetricGroupCountReached = numMetricGroupsCreated >= *maxMetricGroupCount;
|
||||
// Process the metrics in each sampling type seperately
|
||||
// Process the metrics in each sampling type separately
|
||||
for (auto &entry : samplingTypeToMeticMap) {
|
||||
if (isMaxMetricGroupCountReached) {
|
||||
break;
|
||||
|
||||
@@ -47,7 +47,7 @@ ze_result_t MetricIpSamplingWindowsImp::startMeasurement(uint32_t ¬ifyEveryNR
|
||||
|
||||
uint32_t samplingUnit = 0u;
|
||||
if (getNearestSupportedSamplingUnit(samplingPeriodNs, samplingUnit) != ZE_RESULT_SUCCESS) {
|
||||
METRICS_LOG_ERR("wddm getNearestSupportedSamplingUnit() call falied.");
|
||||
METRICS_LOG_ERR("wddm getNearestSupportedSamplingUnit() call failed.");
|
||||
return ZE_RESULT_ERROR_UNKNOWN;
|
||||
}
|
||||
|
||||
@@ -56,7 +56,7 @@ ze_result_t MetricIpSamplingWindowsImp::startMeasurement(uint32_t ¬ifyEveryNR
|
||||
uint32_t minBufferSize = 512 * MemoryConstants::kiloByte;
|
||||
|
||||
if (!wddm->perfOpenEuStallStream(samplingUnit, minBufferSize)) {
|
||||
METRICS_LOG_ERR("wddm perfOpenEuStallStream() call falied.");
|
||||
METRICS_LOG_ERR("wddm perfOpenEuStallStream() call failed.");
|
||||
return ZE_RESULT_ERROR_UNKNOWN;
|
||||
}
|
||||
|
||||
@@ -94,7 +94,7 @@ bool MetricIpSamplingWindowsImp::isNReportsAvailable() {
|
||||
const auto wddm = device.getOsInterface()->getDriverModel()->as<NEO::Wddm>();
|
||||
bool result = wddm->perfReadEuStallStream(nullptr, &bytesAvailable);
|
||||
if (!result) {
|
||||
METRICS_LOG_ERR("wddm perfReadEuStallStream() call falied.");
|
||||
METRICS_LOG_ERR("wddm perfReadEuStallStream() call failed.");
|
||||
return false;
|
||||
}
|
||||
return (bytesAvailable / unitReportSize) >= notifyEveryNReports ? true : false;
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2021-2022 Intel Corporation
|
||||
* Copyright (C) 2021-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -26,8 +26,8 @@ ze_result_t DiagnosticsImp::diagnosticsRunTests(uint32_t start, uint32_t end, ze
|
||||
return pOsDiagnostics->osRunDiagTests(start, end, pResult);
|
||||
}
|
||||
|
||||
DiagnosticsImp::DiagnosticsImp(OsSysman *pOsSysman, const std::string &initalizedDiagTest) {
|
||||
pOsDiagnostics = OsDiagnostics::create(pOsSysman, initalizedDiagTest);
|
||||
DiagnosticsImp::DiagnosticsImp(OsSysman *pOsSysman, const std::string &initializedDiagTest) {
|
||||
pOsDiagnostics = OsDiagnostics::create(pOsSysman, initializedDiagTest);
|
||||
UNRECOVERABLE_IF(nullptr == pOsDiagnostics);
|
||||
}
|
||||
|
||||
|
||||
@@ -23,7 +23,7 @@ class DiagnosticsImp : public Diagnostics, NEO::NonCopyableAndNonMovableClass {
|
||||
ze_result_t diagnosticsGetTests(uint32_t *pCount, zes_diag_test_t *pTests) override;
|
||||
ze_result_t diagnosticsRunTests(uint32_t start, uint32_t end, zes_diag_result_t *pResult) override;
|
||||
DiagnosticsImp() = default;
|
||||
DiagnosticsImp(OsSysman *pOsSysman, const std::string &initalizedDiagTest);
|
||||
DiagnosticsImp(OsSysman *pOsSysman, const std::string &initializedDiagTest);
|
||||
~DiagnosticsImp() override;
|
||||
std::unique_ptr<OsDiagnostics> pOsDiagnostics = nullptr;
|
||||
};
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2020-2024 Intel Corporation
|
||||
* Copyright (C) 2020-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -25,7 +25,7 @@ EngineHandleContext::~EngineHandleContext() {
|
||||
|
||||
void EngineHandleContext::createHandle(zes_engine_group_t engineType, uint32_t engineInstance, uint32_t subDeviceId, ze_bool_t onSubdevice) {
|
||||
std::unique_ptr<Engine> pEngine = std::make_unique<EngineImp>(pOsSysman, engineType, engineInstance, subDeviceId, onSubdevice);
|
||||
// Only store error for all engines in device incase of dependencies unavailable.
|
||||
// Only store error for all engines in device in case of dependencies unavailable.
|
||||
deviceEngineInitStatus = pEngine->initStatus != ZE_RESULT_ERROR_DEPENDENCY_UNAVAILABLE ? deviceEngineInitStatus : pEngine->initStatus;
|
||||
if (pEngine->initStatus == ZE_RESULT_SUCCESS) {
|
||||
handleList.push_back(std::move(pEngine));
|
||||
|
||||
@@ -20,7 +20,7 @@ struct OsSysman;
|
||||
class FabricDeviceAccess : NEO::NonCopyableAndNonMovableClass {
|
||||
public:
|
||||
virtual ze_result_t getState(const zes_fabric_port_id_t portId, zes_fabric_port_state_t &state) = 0;
|
||||
virtual ze_result_t getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &througput) = 0;
|
||||
virtual ze_result_t getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &throughput) = 0;
|
||||
|
||||
virtual ze_result_t getPortEnabledState(const zes_fabric_port_id_t portId, bool &enabled) = 0;
|
||||
virtual ze_result_t getPortBeaconState(const zes_fabric_port_id_t portId, bool &enabled) = 0;
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2022-2023 Intel Corporation
|
||||
* Copyright (C) 2022-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -99,11 +99,11 @@ ze_result_t FabricDeviceAccessNl::getState(const zes_fabric_port_id_t portId, ze
|
||||
return result;
|
||||
}
|
||||
|
||||
ze_result_t FabricDeviceAccessNl::getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &througput) {
|
||||
ze_result_t FabricDeviceAccessNl::getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &throughput) {
|
||||
const IafPortId iafPortId(portId.fabricId, portId.attachId, portId.portNumber);
|
||||
IafPortThroughPut iafThroughPut = {};
|
||||
ze_result_t result = pIafNlApi->getThroughput(iafPortId, iafThroughPut);
|
||||
readIafPortThroughPut(througput, iafThroughPut);
|
||||
readIafPortThroughPut(throughput, iafThroughPut);
|
||||
return result;
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2022-2023 Intel Corporation
|
||||
* Copyright (C) 2022-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -29,7 +29,7 @@ class FabricDeviceAccessNl : public FabricDeviceAccess {
|
||||
~FabricDeviceAccessNl() override;
|
||||
|
||||
ze_result_t getState(const zes_fabric_port_id_t portId, zes_fabric_port_state_t &state) override;
|
||||
ze_result_t getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &througput) override;
|
||||
ze_result_t getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &throughput) override;
|
||||
|
||||
ze_result_t getPortEnabledState(const zes_fabric_port_id_t portId, bool &enabled) override;
|
||||
ze_result_t getPortBeaconState(const zes_fabric_port_id_t portId, bool &enabled) override;
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2022-2023 Intel Corporation
|
||||
* Copyright (C) 2022-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -15,7 +15,7 @@ ze_result_t FabricDeviceAccessStub::getState(const zes_fabric_port_id_t portId,
|
||||
return ZE_RESULT_SUCCESS;
|
||||
}
|
||||
|
||||
ze_result_t FabricDeviceAccessStub::getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &througput) {
|
||||
ze_result_t FabricDeviceAccessStub::getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &throughput) {
|
||||
return ZE_RESULT_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2022-2023 Intel Corporation
|
||||
* Copyright (C) 2022-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -18,7 +18,7 @@ class FabricDeviceAccessStub : public FabricDeviceAccess {
|
||||
~FabricDeviceAccessStub();
|
||||
|
||||
ze_result_t getState(const zes_fabric_port_id_t portId, zes_fabric_port_state_t &state) override;
|
||||
ze_result_t getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &througput) override;
|
||||
ze_result_t getThroughput(const zes_fabric_port_id_t portId, zes_fabric_port_throughput_t &throughput) override;
|
||||
|
||||
ze_result_t getPortEnabledState(const zes_fabric_port_id_t portId, bool &enabled) override;
|
||||
ze_result_t getPortBeaconState(const zes_fabric_port_id_t portId, bool &enabled) override;
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2020-2023 Intel Corporation
|
||||
* Copyright (C) 2020-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -31,9 +31,9 @@ ze_result_t FirmwareImp::firmwareGetFlashProgress(uint32_t *pCompletionPercent)
|
||||
return ZE_RESULT_ERROR_UNSUPPORTED_FEATURE;
|
||||
}
|
||||
|
||||
FirmwareImp::FirmwareImp(OsSysman *pOsSysman, const std::string &initalizedFwType) {
|
||||
pOsFirmware = OsFirmware::create(pOsSysman, initalizedFwType);
|
||||
fwType = initalizedFwType;
|
||||
FirmwareImp::FirmwareImp(OsSysman *pOsSysman, const std::string &initializedFwType) {
|
||||
pOsFirmware = OsFirmware::create(pOsSysman, initializedFwType);
|
||||
fwType = initializedFwType;
|
||||
UNRECOVERABLE_IF(nullptr == pOsFirmware);
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2022-2024 Intel Corporation
|
||||
* Copyright (C) 2022-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -58,7 +58,7 @@ bool FirmwareUtilImp::loadEntryPoints() {
|
||||
|
||||
static void progressFunc(uint32_t done, uint32_t total, void *ctx) {
|
||||
uint32_t percent = (done * 100) / total;
|
||||
PRINT_DEBUG_STRING(NEO::debugManager.flags.PrintDebugMessages.get(), stdout, "Progess: %d/%d:%d/%\n", done, total, percent);
|
||||
PRINT_DEBUG_STRING(NEO::debugManager.flags.PrintDebugMessages.get(), stdout, "Progress: %d/%d:%d/%\n", done, total, percent);
|
||||
}
|
||||
|
||||
ze_result_t FirmwareUtilImp::getFirstDevice(IgscDeviceInfo *info) {
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2020-2023 Intel Corporation
|
||||
* Copyright (C) 2020-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -204,7 +204,7 @@ ze_result_t FirmwareUtilImp::fwRunDiagTests(std::string &osDiagType, zes_diag_re
|
||||
|
||||
static void progressFunc(uint32_t done, uint32_t total, void *ctx) {
|
||||
uint32_t percent = (done * 100) / total;
|
||||
PRINT_DEBUG_STRING(NEO::debugManager.flags.PrintDebugMessages.get(), stdout, "Progess: %d/%d:%d/%\n", done, total, percent);
|
||||
PRINT_DEBUG_STRING(NEO::debugManager.flags.PrintDebugMessages.get(), stdout, "Progress: %d/%d:%d/%\n", done, total, percent);
|
||||
}
|
||||
|
||||
ze_result_t FirmwareUtilImp::pscGetVersion(std::string &fwVersion) {
|
||||
|
||||
@@ -322,7 +322,7 @@ std::string ProcfsAccess::fullPath(const ::pid_t pid) {
|
||||
}
|
||||
|
||||
std::string ProcfsAccess::fdDirPath(const ::pid_t pid) {
|
||||
// Returns the full path to file descritpor directory
|
||||
// Returns the full path to file descriptor directory
|
||||
// for process pid
|
||||
return std::string(fullPath(pid) + fdDir);
|
||||
}
|
||||
|
||||
@@ -574,7 +574,7 @@ ze_result_t LinuxSysmanImp::osColdReset() {
|
||||
return ZE_RESULT_SUCCESS;
|
||||
}
|
||||
}
|
||||
return ZE_RESULT_ERROR_DEVICE_LOST; // incase the reset fails inform upper layers.
|
||||
return ZE_RESULT_ERROR_DEVICE_LOST; // in case the reset fails inform upper layers.
|
||||
}
|
||||
|
||||
uint32_t LinuxSysmanImp::getMemoryType() {
|
||||
|
||||
@@ -105,7 +105,7 @@ ze_result_t PlatformMonitoringTech::enumerateRootTelemIndex(FsAccess *pFsAccess,
|
||||
}
|
||||
}
|
||||
|
||||
// Exmaple: For below directory
|
||||
// Example: For below directory
|
||||
// # /sys/class/intel_pmt$ ls
|
||||
// telem1 telem2 telem3
|
||||
// Then listOfTelemNodes would contain telem1, telem2, telem3
|
||||
@@ -154,7 +154,7 @@ ze_result_t PlatformMonitoringTech::init(FsAccess *pFsAccess, const std::string
|
||||
}
|
||||
result = PlatformMonitoringTech::getKeyOffsetMap(guid, keyOffsetMap);
|
||||
if (ZE_RESULT_SUCCESS != result) {
|
||||
// We didnt have any entry for this guid in guidToKeyOffsetMap
|
||||
// We did not have any entry for this guid in guidToKeyOffsetMap
|
||||
return result;
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2021-2022 Intel Corporation
|
||||
* Copyright (C) 2021-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -14,7 +14,7 @@ ze_result_t PlatformMonitoringTech::getKeyOffsetMap(std::string guid, std::map<s
|
||||
ze_result_t retVal = ZE_RESULT_ERROR_UNKNOWN;
|
||||
auto keyOffsetMapEntry = guidToKeyOffsetMap.find(guid);
|
||||
if (keyOffsetMapEntry == guidToKeyOffsetMap.end()) {
|
||||
// We didnt have any entry for this guid in guidToKeyOffsetMap
|
||||
// We did not have any entry for this guid in guidToKeyOffsetMap
|
||||
retVal = ZE_RESULT_ERROR_UNSUPPORTED_FEATURE;
|
||||
return retVal;
|
||||
}
|
||||
|
||||
@@ -137,7 +137,7 @@ ze_result_t LinuxMemoryImp::readMcChannelCounters(uint64_t &readCounters, uint64
|
||||
uint32_t numMcChannels = 16u;
|
||||
ze_result_t result = ZE_RESULT_ERROR_UNKNOWN;
|
||||
std::vector<std::string> nameOfCounters{"IDI_READS", "IDI_WRITES", "DISPLAY_VC1_READS"};
|
||||
std::vector<uint64_t> counterValues(3, 0); // Will store the values of counters metioned in nameOfCounters
|
||||
std::vector<uint64_t> counterValues(3, 0); // Will store the values of counters mentioned in nameOfCounters
|
||||
for (uint64_t counterIndex = 0; counterIndex < nameOfCounters.size(); counterIndex++) {
|
||||
for (uint32_t mcChannelIndex = 0; mcChannelIndex < numMcChannels; mcChannelIndex++) {
|
||||
uint64_t val = 0;
|
||||
@@ -150,8 +150,8 @@ ze_result_t LinuxMemoryImp::readMcChannelCounters(uint64_t &readCounters, uint64
|
||||
counterValues[counterIndex] += val;
|
||||
}
|
||||
}
|
||||
// PMT counters returns number of transactions that have occured and each tranaction is of 64 bytes
|
||||
// Multiplying 32(tranaction size) with number of transactions gives the total reads or writes in bytes
|
||||
// PMT counters returns number of transactions that have occurred and each transaction is of 64 bytes
|
||||
// Multiplying 32(transaction size) with number of transactions gives the total reads or writes in bytes
|
||||
constexpr uint64_t transactionSize = 32;
|
||||
readCounters = (counterValues[0] + counterValues[2]) * transactionSize; // Read counters are summation of total IDI_READS and DISPLAY_VC1_READS
|
||||
writeCounters = (counterValues[1]) * transactionSize; // Write counters are summation of IDI_WRITES
|
||||
@@ -209,7 +209,7 @@ ze_result_t LinuxMemoryImp::getHbmBandwidth(uint32_t numHbmModules, zes_mem_band
|
||||
std::string vfId = "";
|
||||
result = getVFIDString(vfId);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s():getVFIDString returning error:0x%x while retriving VFID string \n", __FUNCTION__, result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s():getVFIDString returning error:0x%x while retrieving VFID string \n", __FUNCTION__, result);
|
||||
return result;
|
||||
}
|
||||
auto &hwInfo = pDevice->getNEODevice()->getHardwareInfo();
|
||||
@@ -262,7 +262,7 @@ ze_result_t LinuxMemoryImp::getHbmBandwidthPVC(uint32_t numHbmModules, zes_mem_b
|
||||
std::string vfId = "";
|
||||
result = getVFIDString(vfId);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s():getVFIDString returning error:0x%x while retriving VFID string \n", __FUNCTION__, result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s():getVFIDString returning error:0x%x while retrieving VFID string \n", __FUNCTION__, result);
|
||||
return result;
|
||||
}
|
||||
auto &hwInfo = pDevice->getNEODevice()->getHardwareInfo();
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2020-2024 Intel Corporation
|
||||
* Copyright (C) 2020-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -34,7 +34,7 @@ ze_result_t LinuxPciImp::getPciBdf(zes_pci_properties_t &pciProperties) {
|
||||
std::string bdfDir;
|
||||
ze_result_t result = pSysfsAccess->readSymLink(deviceDir, bdfDir);
|
||||
if (ZE_RESULT_SUCCESS != result) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): readSymLink() failed to retrive BDF from %s and returning error:0x%x \n", __FUNCTION__, deviceDir.c_str(), result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): readSymLink() failed to retrieve BDF from %s and returning error:0x%x \n", __FUNCTION__, deviceDir.c_str(), result);
|
||||
return result;
|
||||
}
|
||||
const auto loc = bdfDir.find_last_of('/');
|
||||
@@ -272,7 +272,7 @@ bool LinuxPciImp::resizableBarEnabled(uint32_t barIndex) {
|
||||
// position of possibleBarSizes is from 0 to n, then this indicates BAR size from 2^0 MB to 2^n MB
|
||||
auto possibleBarSizes = (capabilityRegister & PCI_REBAR_CAP_SIZES) >> 4; // First 4 bits are reserved
|
||||
uint32_t largestPossibleBarSize = 0;
|
||||
while (possibleBarSizes >>= 1) { // most significant set bit position of possibleBarSizes would tell larget possible bar size
|
||||
while (possibleBarSizes >>= 1) { // most significant set bit position of possibleBarSizes would tell largest possible bar size
|
||||
largestPossibleBarSize++;
|
||||
}
|
||||
|
||||
@@ -280,7 +280,7 @@ bool LinuxPciImp::resizableBarEnabled(uint32_t barIndex) {
|
||||
// Example, real value of current size could be 2^currentSize MB
|
||||
auto currentSize = bits(controlRegister, 8, 6);
|
||||
|
||||
// If current size is equal to larget possible BAR size, it indicates resizable BAR is enabled.
|
||||
// If current size is equal to largest possible BAR size, it indicates resizable BAR is enabled.
|
||||
return (currentSize == largestPossibleBarSize);
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2020-2023 Intel Corporation
|
||||
* Copyright (C) 2020-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -111,7 +111,7 @@ ze_result_t LinuxSchedulerImp::setExclusiveMode(ze_bool_t *pNeedReload) {
|
||||
// Unset this mode
|
||||
result = disableComputeUnitDebugMode(pNeedReload);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to diasble COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to disable COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
@@ -168,7 +168,7 @@ ze_result_t LinuxSchedulerImp::setTimeoutMode(zes_sched_timeout_properties_t *pP
|
||||
// Unset this mode
|
||||
result = disableComputeUnitDebugMode(pNeedReload);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to diasble COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to disable COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
@@ -214,7 +214,7 @@ ze_result_t LinuxSchedulerImp::setTimesliceMode(zes_sched_timeslice_properties_t
|
||||
// Unset this mode
|
||||
result = disableComputeUnitDebugMode(pNeedReload);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to diasble COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to disable COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
|
||||
@@ -126,7 +126,7 @@ ze_result_t LinuxSchedulerImp::setExclusiveMode(ze_bool_t *pNeedReload) {
|
||||
// Unset this mode
|
||||
result = disableComputeUnitDebugMode(pNeedReload);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to diasble COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to disable COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
@@ -184,7 +184,7 @@ ze_result_t LinuxSchedulerImp::setTimeoutMode(zes_sched_timeout_properties_t *pP
|
||||
result = disableComputeUnitDebugMode(pNeedReload);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
// failed to disable compute unit debug mode
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to diasble COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to disable COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
@@ -230,7 +230,7 @@ ze_result_t LinuxSchedulerImp::setTimesliceMode(zes_sched_timeslice_properties_t
|
||||
// Unset this mode
|
||||
result = disableComputeUnitDebugMode(pNeedReload);
|
||||
if (result != ZE_RESULT_SUCCESS) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to diasble COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to disable COMPUTE_UNIT_DEBUG mode and returning error:0x%x \n", __FUNCTION__, result);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
@@ -423,7 +423,7 @@ ze_bool_t LinuxSchedulerImp::canControlScheduler() {
|
||||
|
||||
ze_result_t LinuxSchedulerImp::updateComputeUnitDebugNode(uint64_t val) {
|
||||
// I915 will be reloaded if we toggle value of enableEuDebug
|
||||
// Hence for gracefull handling close all i915 clients before toggling enableEuDebug
|
||||
// Hence for graceful handling close all i915 clients before toggling enableEuDebug
|
||||
auto pDevice = pLinuxSysmanImp->getDeviceHandle();
|
||||
auto devicePtr = static_cast<DeviceImp *>(pDevice);
|
||||
NEO::ExecutionEnvironment *executionEnvironment = devicePtr->getNEODevice()->getExecutionEnvironment();
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2020-2023 Intel Corporation
|
||||
* Copyright (C) 2020-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -48,7 +48,7 @@ ze_result_t LinuxStandbyImp::getMode(zes_standby_promo_mode_t &mode) {
|
||||
} else {
|
||||
result = ZE_RESULT_ERROR_UNKNOWN;
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr,
|
||||
"error@<%s> <unknown or internal error occured> <currentMode: %d & result: 0x%x>\n", __func__, currentMode, result);
|
||||
"error@<%s> <unknown or internal error occurred> <currentMode: %d & result: 0x%x>\n", __func__, currentMode, result);
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
@@ -27,7 +27,7 @@ ze_result_t LinuxVfImp::getVfBDFAddress(uint32_t vfIdMinusOne, zes_pci_address_t
|
||||
}
|
||||
std::size_t loc = vfRealPath.find_last_of("/");
|
||||
if (loc == std::string::npos) {
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to get the last occurence of '/' and returning error:0x%x \n", __FUNCTION__, ZE_RESULT_ERROR_DEPENDENCY_UNAVAILABLE);
|
||||
NEO::printDebugString(NEO::debugManager.flags.PrintDebugMessages.get(), stderr, "Error@ %s(): Failed to get the last occurrence of '/' and returning error:0x%x \n", __FUNCTION__, ZE_RESULT_ERROR_DEPENDENCY_UNAVAILABLE);
|
||||
return ZE_RESULT_ERROR_DEPENDENCY_UNAVAILABLE;
|
||||
}
|
||||
std::string vfBdfString = vfRealPath.substr(loc + 1);
|
||||
|
||||
@@ -535,7 +535,7 @@ void TestSettings::parseArguments(int argc, char *argv[]) {
|
||||
"\n -d, --device <deviceId> device ID to run the test"
|
||||
"\n -s, --subdevice <subdeviceId> sub-device ID to run the test"
|
||||
"\n -v, --verboseLevel <verboseLevel> verbosity level(-2:error|-1:warning|(default)0:info|1:debug)"
|
||||
"\n -m, --metricName <name1,name2,..> metric names seperated by a comma"
|
||||
"\n -m, --metricName <name1,name2,..> metric names separated by a comma"
|
||||
"\n -M, --metricGroupName <name> metric group name"
|
||||
"\n -e, --eventNReports <report count> report count threshold for event generation"
|
||||
"\n -y, --showSystemInfo capture and show system info like frequency and power"
|
||||
|
||||
@@ -512,7 +512,7 @@ void testSysmanEcc(ze_device_handle_t &device) {
|
||||
ze_bool_t eccAvailable = false;
|
||||
VALIDATECALL(zesDeviceEccAvailable(device, &eccAvailable));
|
||||
if (eccAvailable == false) {
|
||||
std::cout << "Ecc not availabe" << std::endl;
|
||||
std::cout << "Ecc not available" << std::endl;
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -1589,7 +1589,7 @@ void testSysmanDiagnostics(ze_device_handle_t &device) {
|
||||
std::cout << "diagnostics run, unable to fix" << std::endl;
|
||||
break;
|
||||
case ZES_DIAG_RESULT_ABORT:
|
||||
std::cout << "diagnostics run fialed, unknown error" << std::endl;
|
||||
std::cout << "diagnostics run failed, unknown error" << std::endl;
|
||||
break;
|
||||
case ZES_DIAG_RESULT_FORCE_UINT32:
|
||||
default:
|
||||
|
||||
@@ -53,7 +53,7 @@ void initStateSaveArea(std::vector<char> &stateSaveArea, SIP::version version, L
|
||||
// grfs for 0/0/0/0 - very first eu thread
|
||||
fillRegsetForThread(&pStateSaveAreaHeader->regHeader.grf, 0, 0, 0, 0, 'a');
|
||||
|
||||
// grfs for 0/0/4/0 - requred to test resumeWA
|
||||
// grfs for 0/0/4/0 - required to test resumeWA
|
||||
fillRegsetForThread(&pStateSaveAreaHeader->regHeader.grf, 0, 0, 4, 0, 'a');
|
||||
|
||||
if (version.major < 2) {
|
||||
|
||||
@@ -7,7 +7,7 @@
|
||||
|
||||
#include "shared/source/os_interface/linux/i915_prelim.h"
|
||||
// Force prelim headers over upstream headers
|
||||
// prevent including any other headers to avoid redefintion errors
|
||||
// prevent including any other headers to avoid redefinition errors
|
||||
#define _I915_DRM_H_
|
||||
|
||||
#include "shared/source/gmm_helper/gmm_helper.h"
|
||||
|
||||
@@ -576,7 +576,7 @@ TEST_F(MetricExportDataOaTest, givenGlobalSymbolsWithSupportedValueTypesWhenMetr
|
||||
globalSymbol.SymbolTypedValue.ValueType = mdType;
|
||||
setupTypedValue(globalSymbol.SymbolTypedValue);
|
||||
|
||||
// Resetting the cache so that heap area is calculated everytime
|
||||
// Resetting the cache so that heap area is calculated every time
|
||||
auto metricGroup = L0::MetricGroup::fromHandle(metricGroupHandle);
|
||||
auto oaMetricGroupImp = static_cast<OaMetricGroupImp *>(metricGroup);
|
||||
oaMetricGroupImp->setCachedExportDataHeapSize(0);
|
||||
@@ -710,7 +710,7 @@ TEST_F(MetricExportDataOaTest, givenEquationsWithSupportedElementTypesWhenMetric
|
||||
equation.equationElement.Type = mdType;
|
||||
setupEquationElement(equation.equationElement);
|
||||
|
||||
// Resetting the cache so that heap area is calculated everytime
|
||||
// Resetting the cache so that heap area is calculated every time
|
||||
auto metricGroup = L0::MetricGroup::fromHandle(metricGroupHandle);
|
||||
auto oaMetricGroupImp = static_cast<OaMetricGroupImp *>(metricGroup);
|
||||
oaMetricGroupImp->setCachedExportDataHeapSize(0);
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2022-2024 Intel Corporation
|
||||
* Copyright (C) 2022-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -351,7 +351,7 @@ TEST_F(MultiDeviceMetricQueryPoolTest, givenMetricQueryPoolIsDestroyedWhenMetric
|
||||
EXPECT_EQ(workloadPartition.Type, MetricsLibraryApi::ClientOptionsType::WorkloadPartition);
|
||||
EXPECT_EQ(workloadPartition.WorkloadPartition.Enabled, true);
|
||||
|
||||
// Initiate a Metrics Library Release by releaing Metric Query Pool
|
||||
// Initiate a Metrics Library Release by releasing Metric Query Pool
|
||||
EXPECT_EQ(zetContextActivateMetricGroups(context->toHandle(), devices[0]->toHandle(), 1, &metricGroupHandle), ZE_RESULT_SUCCESS);
|
||||
EXPECT_EQ(zetMetricQueryPoolCreate(context->toHandle(), metricDevice, metricGroupHandle, &poolDesc, &poolHandle), ZE_RESULT_SUCCESS);
|
||||
EXPECT_EQ(zetMetricQueryCreate(poolHandle, 0, &queryHandle), ZE_RESULT_SUCCESS);
|
||||
|
||||
@@ -186,7 +186,7 @@ TEST_F(OaMetricProgrammableTests, whenRetrievingConcurrentGroupFromAdapterGroupT
|
||||
EXPECT_NE(concurrentGroup, nullptr);
|
||||
}
|
||||
|
||||
TEST_F(OaMetricProgrammableTests, givenMetricProgrammableIsSupportedWhenCacheingForMulitpleConcurrentGroupsThenValidHandlesAreReturned) {
|
||||
TEST_F(OaMetricProgrammableTests, givenMetricProgrammableIsSupportedWhenCachingForMulitpleConcurrentGroupsThenValidHandlesAreReturned) {
|
||||
MockIConcurrentGroup1x13 mockConcurrentGroup;
|
||||
MetricsDiscovery::IConcurrentGroup_1_13 &concurrentGroup1x13 = mockConcurrentGroup;
|
||||
EXPECT_EQ(ZE_RESULT_SUCCESS, metricEnumeration->cacheExtendedMetricInformation(concurrentGroup1x13, 1));
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2022-2023 Intel Corporation
|
||||
* Copyright (C) 2022-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -141,7 +141,7 @@ TEST(FwRunDiagTest, GivenValidSupportedDiagnosticsTestsParamWhenFirmwareUtilSupp
|
||||
delete pFwUtilImp;
|
||||
}
|
||||
|
||||
TEST(FwGetProcAddressTest, GivenValidFwUtilMethodNameWhenFirmwareUtilIsInitalizedThenCorrectMethodsAreLoaded) {
|
||||
TEST(FwGetProcAddressTest, GivenValidFwUtilMethodNameWhenFirmwareUtilIsInitializedThenCorrectMethodsAreLoaded) {
|
||||
struct IFRmockOsLibrary : OsLibrary {
|
||||
public:
|
||||
~IFRmockOsLibrary() override = default;
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2020-2023 Intel Corporation
|
||||
* Copyright (C) 2020-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -376,7 +376,7 @@ TEST_F(SysmanDeviceTemperatureFixture, GivenCreatePmtObjectsWhenRootTileIndexEnu
|
||||
PlatformMonitoringTech::create(deviceHandles, pFsAccess.get(), gpuUpstreamPortPathInTemperature, mapOfSubDeviceIdToPmtObject1);
|
||||
for (auto &subDeviceIdToPmtEntry : mapOfSubDeviceIdToPmtObject1) {
|
||||
EXPECT_NE(subDeviceIdToPmtEntry.second, nullptr);
|
||||
EXPECT_EQ(subDeviceIdToPmtEntry.first, 0u); // We know that subdeviceID is zero as core device didnt have any subdevices
|
||||
EXPECT_EQ(subDeviceIdToPmtEntry.first, 0u); // We know that subdeviceID is zero as core device did not have any subdevices
|
||||
delete subDeviceIdToPmtEntry.second; // delete memory to avoid mem leak here, as we finished our test validation just above.
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (C) 2020-2023 Intel Corporation
|
||||
* Copyright (C) 2020-2025 Intel Corporation
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*
|
||||
@@ -211,7 +211,7 @@ TEST_F(SysmanKmdManagerFixture, GivenAllowSetCallsTrueAndCorruptedDataWhenReques
|
||||
EXPECT_NE(ZE_RESULT_SUCCESS, result);
|
||||
}
|
||||
|
||||
TEST_F(SysmanKmdManagerFixture, GivenAllowSetCallsFalseAndTDROccuredWhenRequestSingleIsCalledThenErrorDeviceLostIsReturned) {
|
||||
TEST_F(SysmanKmdManagerFixture, GivenAllowSetCallsFalseAndTDROccurredWhenRequestSingleIsCalledThenErrorDeviceLostIsReturned) {
|
||||
pKmdSysManager->allowSetCalls = false;
|
||||
pKmdSysManager->mockEscapeResult = STATUS_DEVICE_REMOVED;
|
||||
|
||||
@@ -231,7 +231,7 @@ TEST_F(SysmanKmdManagerFixture, GivenAllowSetCallsFalseAndTDROccuredWhenRequestS
|
||||
EXPECT_EQ(ZE_RESULT_ERROR_DEVICE_LOST, result);
|
||||
}
|
||||
|
||||
TEST_F(SysmanKmdManagerFixture, GivenAllowSetCallsFalseAndTDROccuredWhenRequestMultipleIsCalledThenErrorDeviceLostIsReturned) {
|
||||
TEST_F(SysmanKmdManagerFixture, GivenAllowSetCallsFalseAndTDROccurredWhenRequestMultipleIsCalledThenErrorDeviceLostIsReturned) {
|
||||
pKmdSysManager->allowSetCalls = false;
|
||||
pKmdSysManager->mockEscapeResult = STATUS_DEVICE_REMOVED;
|
||||
|
||||
|
||||
Reference in New Issue
Block a user