feature(sysman): Added implementation for zesVFManagementGetVFCapabilitiesExp2

As zesVFManagementGetVFCapabilitiesExp has been deprecated, added the
implementation for zesVFManagementGetVFCapabilitiesExp2

Related-To: NEO-13525

Signed-off-by: Pratik Bari <pratik.bari@intel.com>
This commit is contained in:
Pratik Bari
2025-01-23 14:59:12 +00:00
committed by Compute-Runtime-Automation
parent 272edeabe6
commit 245aa0cb59
23 changed files with 103 additions and 82 deletions

View File

@@ -1611,13 +1611,13 @@ void testSysmanVfTelemetry(ze_device_handle_t &device) {
VALIDATECALL(zesDeviceEnumEnabledVFExp(device, &count, handles.data()));
for (const auto &handle : handles) {
zes_vf_exp_capabilities_t props = {};
VALIDATECALL(zesVFManagementGetVFCapabilitiesExp(handle, &props));
zes_vf_exp2_capabilities_t props = {};
VALIDATECALL(zesVFManagementGetVFCapabilitiesExp2(handle, &props));
if (verbose) {
std::cout << std::endl
<< "----- PCI BDF ------ " << std::endl;
std::cout << "Domain: Bus: Device: Function = " << props.address.domain << " : " << props.address.bus << " : " << props.address.device << " : " << props.address.function << std::endl;
std::cout << "Memory Size in KiloBytes = " << props.vfDeviceMemSize << std::endl;
std::cout << "Memory Size in Bytes = " << props.vfDeviceMemSize << std::endl;
std::cout << "VF Id = " << props.vfID << std::endl;
}
@@ -1631,7 +1631,7 @@ void testSysmanVfTelemetry(ze_device_handle_t &device) {
for (uint32_t it = 0; it < count; it++) {
if (verbose) {
std::cout << "Location of the Memory = " << getMemoryModuleLocation(memUtils[it].vfMemLocation) << std::endl;
std::cout << "Memory Utilized in KiloBytes = " << memUtils[it].vfMemUtilized << std::endl;
std::cout << "Memory Utilized in Bytes = " << memUtils[it].vfMemUtilized << std::endl;
}
}

View File

@@ -1,5 +1,5 @@
/*
* Copyright (C) 2024 Intel Corporation
* Copyright (C) 2024-2025 Intel Corporation
*
* SPDX-License-Identifier: MIT
*
@@ -78,8 +78,8 @@ TEST_F(ZesVfFixture, GivenValidVfHandleWhenQueryingVfCapabilitiesThenPciAddressR
auto handles = getEnabledVfHandles(mockHandleCount);
for (auto hSysmanVf : handles) {
ASSERT_NE(nullptr, hSysmanVf);
zes_vf_exp_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
zes_vf_exp2_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp2(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
EXPECT_EQ(capabilities.address.domain, mockedDomain);
EXPECT_EQ(capabilities.address.bus, mockedBus);
EXPECT_EQ(capabilities.address.device, mockedDevice);
@@ -92,8 +92,8 @@ TEST_F(ZesVfFixture, GivenValidVfHandleAndSysfsGetRealPathFailsWhenQueryingVfCap
auto handles = getEnabledVfHandles(mockHandleCount);
for (auto hSysmanVf : handles) {
ASSERT_NE(nullptr, hSysmanVf);
zes_vf_exp_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
zes_vf_exp2_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp2(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
EXPECT_EQ(capabilities.address.domain, (uint32_t)0);
EXPECT_EQ(capabilities.address.bus, (uint32_t)0);
EXPECT_EQ(capabilities.address.device, (uint32_t)0);
@@ -107,8 +107,8 @@ TEST_F(ZesVfFixture, GivenValidVfHandleAndInvalidBDFWithImproperTokensWhenQueryi
auto handles = getEnabledVfHandles(mockHandleCount);
for (auto hSysmanVf : handles) {
ASSERT_NE(nullptr, hSysmanVf);
zes_vf_exp_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
zes_vf_exp2_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp2(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
EXPECT_EQ(capabilities.address.domain, (uint32_t)0);
EXPECT_EQ(capabilities.address.bus, (uint32_t)0);
EXPECT_EQ(capabilities.address.device, (uint32_t)0);
@@ -122,8 +122,8 @@ TEST_F(ZesVfFixture, GivenValidVfHandleAndInvalidBDFWhenQueryingVfCapabilitiesTh
auto handles = getEnabledVfHandles(mockHandleCount);
for (auto hSysmanVf : handles) {
ASSERT_NE(nullptr, hSysmanVf);
zes_vf_exp_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
zes_vf_exp2_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp2(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
EXPECT_EQ(capabilities.address.domain, (uint32_t)0);
EXPECT_EQ(capabilities.address.bus, (uint32_t)0);
EXPECT_EQ(capabilities.address.device, (uint32_t)0);
@@ -135,9 +135,9 @@ TEST_F(ZesVfFixture, GivenValidVfHandleWhenQueryingVfCapabilitiesThenParamsRetur
auto handles = getEnabledVfHandles(mockHandleCount);
for (auto hSysmanVf : handles) {
ASSERT_NE(nullptr, hSysmanVf);
zes_vf_exp_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
EXPECT_EQ(capabilities.vfDeviceMemSize, mockLmemQuota / 1024);
zes_vf_exp2_capabilities_t capabilities = {};
EXPECT_EQ(zesVFManagementGetVFCapabilitiesExp2(hSysmanVf, &capabilities), ZE_RESULT_SUCCESS);
EXPECT_EQ(capabilities.vfDeviceMemSize, mockLmemQuota);
EXPECT_GT(capabilities.vfID, (uint32_t)0);
}
}
@@ -152,7 +152,7 @@ TEST_F(ZesVfFixture, GivenValidVfHandleWhenQueryingMemoryUtilizationThenMemoryPa
std::vector<zes_vf_util_mem_exp2_t> memUtils(count);
EXPECT_EQ(zesVFManagementGetVFMemoryUtilizationExp2(hSysmanVf, &count, memUtils.data()), ZE_RESULT_SUCCESS);
for (uint32_t it = 0; it < count; it++) {
EXPECT_EQ(memUtils[it].vfMemUtilized, mockLmemUsed / 1024);
EXPECT_EQ(memUtils[it].vfMemUtilized, mockLmemUsed);
EXPECT_EQ(memUtils[it].vfMemLocation, ZES_MEM_LOC_DEVICE);
}
}
@@ -207,7 +207,7 @@ TEST_F(ZesVfFixture, GivenValidVfHandleWhenCallingZesVFManagementGetVFEngineUtil
TEST_F(ZesVfFixture, GivenValidVfHandleWhenQueryingVfCapabilitiesAndSysfsReadForMemoryQuotaValueFailsThenErrorIsReturned) {
pSysfsAccess->mockError = ZE_RESULT_ERROR_UNKNOWN;
zes_vf_exp_capabilities_t capabilities = {};
zes_vf_exp2_capabilities_t capabilities = {};
auto pVfImp = std::make_unique<PublicLinuxVfImp>(pOsSysman, 1);
EXPECT_EQ(pVfImp->vfOsGetCapabilities(&capabilities), ZE_RESULT_ERROR_UNSUPPORTED_FEATURE);
}

View File

@@ -1,5 +1,5 @@
/*
* Copyright (C) 2024 Intel Corporation
* Copyright (C) 2024-2025 Intel Corporation
*
* SPDX-License-Identifier: MIT
*
@@ -58,8 +58,8 @@ TEST_F(ZesVfFixture, GivenValidVfHandleWhenQueryingVfCapabilitiesThenZeroPciAddr
uint32_t vfId = 1;
std::unique_ptr<VfManagement> pVfManagement = std::make_unique<VfImp>(pOsSysman, vfId);
zes_vf_handle_t vfHandle = pVfManagement->toVfManagementHandle();
zes_vf_exp_capabilities_t capabilities = {};
ze_result_t result = zesVFManagementGetVFCapabilitiesExp(vfHandle, &capabilities);
zes_vf_exp2_capabilities_t capabilities = {};
ze_result_t result = zesVFManagementGetVFCapabilitiesExp2(vfHandle, &capabilities);
EXPECT_EQ(result, ZE_RESULT_SUCCESS);
EXPECT_EQ(capabilities.address.domain, (uint32_t)0);
EXPECT_EQ(capabilities.address.bus, (uint32_t)0);
@@ -70,7 +70,7 @@ TEST_F(ZesVfFixture, GivenValidVfHandleWhenQueryingVfCapabilitiesThenZeroPciAddr
TEST_F(ZesVfFixture, GivenValidVfHandleWhenQueryingOsVfCapabilitiesThenErrorIsReturned) {
auto pWddmVfImp = std::make_unique<WddmVfImp>();
zes_vf_exp_capabilities_t capabilities = {};
zes_vf_exp2_capabilities_t capabilities = {};
ze_result_t result = pWddmVfImp->vfOsGetCapabilities(&capabilities);
EXPECT_EQ(result, ZE_RESULT_ERROR_UNSUPPORTED_FEATURE);
}