Skip to content

Commit 6262eed

Browse files
Improve Sysman windows ult coverage
Related-To: LOCI-4141 Signed-off-by: Mayank Raghuwanshi <mayank.raghuwanshi@intel.com> Source: d0fd7c1
1 parent 63f66e8 commit 6262eed

File tree

7 files changed

+261
-4
lines changed

7 files changed

+261
-4
lines changed

level_zero/tools/test/unit_tests/sources/sysman/events/windows/test_zes_events.cpp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (C) 2020-2022 Intel Corporation
2+
* Copyright (C) 2020-2023 Intel Corporation
33
*
44
* SPDX-License-Identifier: MIT
55
*
@@ -67,7 +67,7 @@ class SysmanEventsFixture : public SysmanDeviceFixture {
6767
}
6868
};
6969

70-
TEST_F(SysmanEventsFixture, DISABLED_GivenValidDeviceHandleWhenListeningForResetRequiredEventsThenEventListenAPIReturnsAfterTimingOutWithNoEvent) {
70+
TEST_F(SysmanEventsFixture, GivenValidDeviceHandleWhenListeningForResetRequiredEventsThenEventListenAPIReturnsAfterTimingOutWithNoEvent) {
7171
init(true);
7272
EXPECT_EQ(ZE_RESULT_SUCCESS, zesDeviceEventRegister(device->toHandle(), ZES_EVENT_TYPE_FLAG_DEVICE_DETACH));
7373
zes_device_handle_t *phDevices = new zes_device_handle_t[1];
@@ -80,7 +80,7 @@ TEST_F(SysmanEventsFixture, DISABLED_GivenValidDeviceHandleWhenListeningForReset
8080
delete[] pDeviceEvents;
8181
}
8282

83-
TEST_F(SysmanEventsFixture, DISABLED_GivenValidDeviceHandleWhenListeningForResetRequiredEventsThenEventListenAPIReturnsAfterReceivingEventOnInfiniteWait) {
83+
TEST_F(SysmanEventsFixture, GivenValidDeviceHandleWhenListeningForResetRequiredEventsThenEventListenAPIReturnsAfterReceivingEventOnInfiniteWait) {
8484
init(true);
8585
EXPECT_EQ(ZE_RESULT_SUCCESS, zesDeviceEventRegister(device->toHandle(), ZES_EVENT_TYPE_FLAG_DEVICE_DETACH));
8686
zes_device_handle_t *phDevices = new zes_device_handle_t[1];
@@ -96,7 +96,7 @@ TEST_F(SysmanEventsFixture, DISABLED_GivenValidDeviceHandleWhenListeningForReset
9696
delete[] pDeviceEvents;
9797
}
9898

99-
TEST_F(SysmanEventsFixture, DISABLED_GivenValidDeviceHandleWhenListeningForResetRequiredEventsThenEventListenAPIReturnsAfterReceivingEventOnInfiniteWaitMultipleTimes) {
99+
TEST_F(SysmanEventsFixture, GivenValidDeviceHandleWhenListeningForResetRequiredEventsThenEventListenAPIReturnsAfterReceivingEventOnInfiniteWaitMultipleTimes) {
100100
init(true);
101101
EXPECT_EQ(ZE_RESULT_SUCCESS, zesDeviceEventRegister(device->toHandle(), ZES_EVENT_TYPE_FLAG_DEVICE_DETACH));
102102
zes_device_handle_t *phDevices = new zes_device_handle_t[1];
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
#
2+
# Copyright (C) 2023 Intel Corporation
3+
#
4+
# SPDX-License-Identifier: MIT
5+
#
6+
7+
if(WIN32)
8+
target_sources(${TARGET_NAME}
9+
PRIVATE
10+
${CMAKE_CURRENT_SOURCE_DIR}/CMakeLists.txt
11+
${CMAKE_CURRENT_SOURCE_DIR}/test_zes_fabric_port.cpp
12+
)
13+
endif()
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
/*
2+
* Copyright (C) 2023 Intel Corporation
3+
*
4+
* SPDX-License-Identifier: MIT
5+
*
6+
*/
7+
8+
#include "level_zero/tools/source/sysman/fabric_port/fabric_port_imp.h"
9+
#include "level_zero/tools/test/unit_tests/sources/sysman/windows/mock_sysman_fixture.h"
10+
11+
extern bool sysmanUltsEnable;
12+
13+
namespace L0 {
14+
namespace ult {
15+
16+
class SysmanFabricPortFixture : public SysmanDeviceFixture {
17+
protected:
18+
std::unique_ptr<FabricDeviceImp> pFabricDevice;
19+
std::unique_ptr<FabricPortImp> pFabricPortImp;
20+
void SetUp() override {
21+
if (!sysmanUltsEnable) {
22+
GTEST_SKIP();
23+
}
24+
SysmanDeviceFixture::SetUp();
25+
pFabricDevice.reset(new FabricDeviceImp(pOsSysman));
26+
pFabricPortImp.reset(new FabricPortImp(pFabricDevice.get(), 0u));
27+
}
28+
void TearDown() override {
29+
if (!sysmanUltsEnable) {
30+
GTEST_SKIP();
31+
}
32+
SysmanDeviceFixture::TearDown();
33+
}
34+
};
35+
36+
TEST_F(SysmanFabricPortFixture, GivenValidFabricPortHandleWhenCallingFabricPortGetPropertiesThenFailureIsReturned) {
37+
zes_fabric_port_properties_t pProperties = {};
38+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pFabricPortImp->fabricPortGetProperties(&pProperties));
39+
}
40+
41+
TEST_F(SysmanFabricPortFixture, GivenValidFabricPortHandleWhenCallingFabricPortGetConfigThenFailureIsReturned) {
42+
zes_fabric_port_config_t pConfig = {};
43+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pFabricPortImp->fabricPortGetConfig(&pConfig));
44+
}
45+
46+
TEST_F(SysmanFabricPortFixture, GivenValidFabricPortHandleWhenCallingFabricPortSetConfigThenFailureIsReturned) {
47+
zes_fabric_port_config_t pConfig = {};
48+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pFabricPortImp->fabricPortSetConfig(&pConfig));
49+
}
50+
51+
TEST_F(SysmanFabricPortFixture, GivenValidFabricPortHandleWhenCallingFabricPortGetStateThenFailureIsReturned) {
52+
zes_fabric_port_state_t pState = {};
53+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pFabricPortImp->fabricPortGetState(&pState));
54+
}
55+
56+
TEST_F(SysmanFabricPortFixture, GivenValidFabricPortHandleWhenCallingFabricPortGetThroughputThenFailureIsReturned) {
57+
zes_fabric_port_throughput_t pThroughput = {};
58+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pFabricPortImp->fabricPortGetThroughput(&pThroughput));
59+
}
60+
61+
TEST_F(SysmanFabricPortFixture, GivenValidFabricPortHandleWhenCallingFabricPortGetErrorCountersThenFailureIsReturned) {
62+
zes_fabric_port_error_counters_t pErrors = {};
63+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pFabricPortImp->fabricPortGetErrorCounters(&pErrors));
64+
}
65+
66+
TEST_F(SysmanFabricPortFixture, GivenValidFabricPortHandleWhenCallingFabricPortGetLinkTupeThenFailureIsReturned) {
67+
zes_fabric_link_type_t pLinkType = {};
68+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pFabricPortImp->fabricPortGetLinkType(&pLinkType));
69+
}
70+
71+
} // namespace ult
72+
} // namespace L0
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
#
2+
# Copyright (C) 2023 Intel Corporation
3+
#
4+
# SPDX-License-Identifier: MIT
5+
#
6+
7+
if(WIN32)
8+
target_sources(${TARGET_NAME}
9+
PRIVATE
10+
${CMAKE_CURRENT_SOURCE_DIR}/CMakeLists.txt
11+
${CMAKE_CURRENT_SOURCE_DIR}/test_zes_ras.cpp
12+
)
13+
endif()
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
/*
2+
* Copyright (C) 2023 Intel Corporation
3+
*
4+
* SPDX-License-Identifier: MIT
5+
*
6+
*/
7+
8+
#include "level_zero/tools/source/sysman/ras/ras_imp.h"
9+
#include "level_zero/tools/test/unit_tests/sources/sysman/windows/mock_sysman_fixture.h"
10+
11+
extern bool sysmanUltsEnable;
12+
13+
namespace L0 {
14+
namespace ult {
15+
16+
constexpr uint32_t mockHandleCount = 0u;
17+
class SysmanRasFixture : public SysmanDeviceFixture {
18+
protected:
19+
void SetUp() override {
20+
if (!sysmanUltsEnable) {
21+
GTEST_SKIP();
22+
}
23+
SysmanDeviceFixture::SetUp();
24+
}
25+
void TearDown() override {
26+
if (!sysmanUltsEnable) {
27+
GTEST_SKIP();
28+
}
29+
SysmanDeviceFixture::TearDown();
30+
}
31+
32+
std::vector<zes_ras_handle_t> getRasHandles(uint32_t count) {
33+
std::vector<zes_ras_handle_t> handles(count, nullptr);
34+
EXPECT_EQ(zesDeviceEnumRasErrorSets(device->toHandle(), &count, handles.data()), ZE_RESULT_SUCCESS);
35+
return handles;
36+
}
37+
};
38+
39+
TEST_F(SysmanRasFixture, GivenValidSysmanHandleWhenRasErrorSetsThenCorrectCountIsReported) {
40+
uint32_t count = 0;
41+
ze_result_t result = zesDeviceEnumRasErrorSets(device->toHandle(), &count, NULL);
42+
EXPECT_EQ(ZE_RESULT_SUCCESS, result);
43+
EXPECT_EQ(count, mockHandleCount);
44+
}
45+
46+
TEST_F(SysmanRasFixture, GivenValidRasHandleRetrievingRasPropertiesThenSuccessIsReturned) {
47+
auto pRasImp = std::make_unique<RasImp>(pOsSysman, ZES_RAS_ERROR_TYPE_CORRECTABLE, device->toHandle());
48+
zes_ras_properties_t properties = {};
49+
pRasImp->init();
50+
EXPECT_EQ(ZE_RESULT_SUCCESS, pRasImp->rasGetProperties(&properties));
51+
}
52+
53+
TEST_F(SysmanRasFixture, GivenValidRasHandleWhenCallingRasGetStateThenFailureIsReturned) {
54+
auto pRasImp = std::make_unique<RasImp>(pOsSysman, ZES_RAS_ERROR_TYPE_CORRECTABLE, device->toHandle());
55+
zes_ras_state_t state = {};
56+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pRasImp->rasGetState(&state, false));
57+
}
58+
59+
TEST_F(SysmanRasFixture, GivenValidRasHandleWhenCallingRasGetConfigThenFailureIsReturned) {
60+
auto pRasImp = std::make_unique<RasImp>(pOsSysman, ZES_RAS_ERROR_TYPE_CORRECTABLE, device->toHandle());
61+
zes_ras_config_t config = {};
62+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pRasImp->rasGetConfig(&config));
63+
}
64+
65+
TEST_F(SysmanRasFixture, GivenValidRasHandleWhenCallingRasSetConfigThenFailureIsReturned) {
66+
auto pRasImp = std::make_unique<RasImp>(pOsSysman, ZES_RAS_ERROR_TYPE_CORRECTABLE, device->toHandle());
67+
zes_ras_config_t config = {};
68+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pRasImp->rasSetConfig(&config));
69+
}
70+
71+
} // namespace ult
72+
} // namespace L0
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
#
2+
# Copyright (C) 2023 Intel Corporation
3+
#
4+
# SPDX-License-Identifier: MIT
5+
#
6+
7+
if(WIN32)
8+
target_sources(${TARGET_NAME}
9+
PRIVATE
10+
${CMAKE_CURRENT_SOURCE_DIR}/CMakeLists.txt
11+
${CMAKE_CURRENT_SOURCE_DIR}/test_zes_sysman_standby.cpp
12+
)
13+
endif()
Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
/*
2+
* Copyright (C) 2023 Intel Corporation
3+
*
4+
* SPDX-License-Identifier: MIT
5+
*
6+
*/
7+
8+
#include "level_zero/tools/source/sysman/standby/standby_imp.h"
9+
#include "level_zero/tools/test/unit_tests/sources/sysman/windows/mock_sysman_fixture.h"
10+
11+
extern bool sysmanUltsEnable;
12+
13+
namespace L0 {
14+
namespace ult {
15+
16+
constexpr uint32_t mockHandleCount = 0u;
17+
18+
class ZesStandbyFixture : public SysmanDeviceFixture {
19+
protected:
20+
void SetUp() override {
21+
if (!sysmanUltsEnable) {
22+
GTEST_SKIP();
23+
}
24+
SysmanDeviceFixture::SetUp();
25+
}
26+
27+
void TearDown() override {
28+
if (!sysmanUltsEnable) {
29+
GTEST_SKIP();
30+
}
31+
SysmanDeviceFixture::TearDown();
32+
}
33+
};
34+
35+
TEST_F(ZesStandbyFixture, GivenValidSysmanHandleWhenRetrievingStandbyHandlesThenCorrectCountIsReported) {
36+
std::vector<zes_standby_handle_t> standbyHandle = {};
37+
uint32_t count = 0;
38+
39+
ze_result_t result = zesDeviceEnumStandbyDomains(device, &count, nullptr);
40+
41+
EXPECT_EQ(ZE_RESULT_SUCCESS, result);
42+
EXPECT_EQ(count, mockHandleCount);
43+
44+
uint32_t testCount = count + 1;
45+
46+
result = zesDeviceEnumStandbyDomains(device, &testCount, nullptr);
47+
48+
EXPECT_EQ(ZE_RESULT_SUCCESS, result);
49+
EXPECT_EQ(testCount, count);
50+
}
51+
52+
TEST_F(ZesStandbyFixture, GivenValidStandbyHandleWhenRetrievingStandbyPropertiesThenSuccessIsReturned) {
53+
auto pStandbyImp = std::make_unique<StandbyImp>(pOsSysman, device->toHandle());
54+
zes_standby_properties_t properties = {};
55+
pStandbyImp->init();
56+
EXPECT_EQ(ZE_RESULT_SUCCESS, pStandbyImp->standbyGetProperties(&properties));
57+
}
58+
59+
TEST_F(ZesStandbyFixture, GivenValidStandbyHandleWhenCallingGetModeThenFailureIsReturned) {
60+
auto pStandbyImp = std::make_unique<StandbyImp>(pOsSysman, device->toHandle());
61+
zes_standby_promo_mode_t mode = {};
62+
pStandbyImp->init();
63+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pStandbyImp->standbyGetMode(&mode));
64+
}
65+
66+
TEST_F(ZesStandbyFixture, GivenValidStandbyHandleWhenCallingSetModeThenFailureIsReturned) {
67+
auto pStandbyImp = std::make_unique<StandbyImp>(pOsSysman, device->toHandle());
68+
zes_standby_promo_mode_t mode = {};
69+
pStandbyImp->init();
70+
EXPECT_EQ(ZE_RESULT_ERROR_UNSUPPORTED_FEATURE, pStandbyImp->standbySetMode(mode));
71+
}
72+
73+
} // namespace ult
74+
} // namespace L0

0 commit comments

Comments
 (0)