commit 86c1977a50afe73ef8caf738cc68c325c407c8d0 Author: augustin64 Date: Fri Jun 7 10:38:56 2024 +0200 Initial commit diff --git a/cache_measurements.yml b/cache_measurements.yml new file mode 100644 index 0000000..a299f8a --- /dev/null +++ b/cache_measurements.yml @@ -0,0 +1,96 @@ +#============================================================================== +# +# DESCRIPTION: Recipe to build a custom Grid'5000 environment on top of an +# existing pre-built one (such as one supported by the technical team). +# The recipe downloads everything needed to launch an experiment on the cache +# +#============================================================================== +--- +extend: grid5000/from_grid5000_environment/base.yaml + +global: + ### Grid'5000 environment information + ## (Uncomment and change any line if needed) + + ## Frontend to run kaenv3 on + #grid5000_frontend: "frontend" + + ## Site used in the build + grid5000_site: "rennes" + + ## Environment to build from + #grid5000_environment_import_name: "debian11-min" + #grid5000_environment_import_user: "deploy" + #grid5000_environment_import_version: "" + #grid5000_environment_import_arch: "x86_64" + + ## New environment description + #grid5000_environment_export_name: "$${kameleon_recipe_name}" + #grid5000_environment_export_format: "tar.zst" + #grid5000_environment_export_description: "Customized $${grid5000_environment_import_name}" + #grid5000_environment_export_visibility: "shared" + + ## Set where to store the environment and the assiated kadeploy URL base + #grid5000_environment_export_dir: "$HOME/public/" + #grid5000_environment_export_baseurl: "local://$HOME/public/" + + ## Optionaly, the environment postinstall script can be changed, e.g. to + ## enable NFS homes, LDAP accounts, if not enabled in the imported env. + #grid5000_environment_export_postinstall_script: "g5k-postinstall --net debian --fstab nfs --restrict-user current" + + ## Optionaly, an additional postinstall can be given, e.g. to do some custom + ## operations. Use the following variables to set the archive name and script. + #grid5000_environment_export_additional_postinstall_archive: "$${kameleon_recipe_name}-additional-postinstall.tar.gz" + #grid5000_environment_export_additional_postinstall_script: "additional_postinstall.sh" + ## The recipe will have to prepare the additional postinstall content in a + ## directory to create in the local context and name "additional_postinstall" + ## by default (next line to change it). The archive is created by the export. + #grid5000_environment_export_additional_postinstall_dir: "additional_postinstall" + + ### Target machine/CPU architecture + ## If building an environment for another architecture than x86_64, you may need to + ## uncomment and adapt the next lines, in order for qemu to function. + ## Set the qemu arch name: qemu uses ppc64, not ppc64le. + #qemu_arch: ppc64 + ## Make qemu use UEFI (required for aarch64 and ppc64). + #qemu_uefi: true + + ### You can add below any other global variable definition + ## See the variables which can be overloaded, by running: + ## kameleon info cache_measurements.yaml + ## Or define any new variable you would need. e.g.: + #my_variable: my_value + +bootstrap: + ### The bootstrap section takes in charge the import of the Grid'5000 + ## environment to customize. No modification should be needed here. + - "@base" + +setup: + ### The setup section is where to place your customization. Add all steps + ## required by your customization. + ## The following is given as example only, replace with your steps. + - install_packages: + - install_from_apt: + - exec_in: apt-get update + - exec_in: apt-get install libcpupower-dev linux-cpupower curl git bzip2 gcc -y + - install_rustup: + - exec_in: curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- --default-toolchain none -y + - exec_in: bash -c 'source "$HOME/.cargo/env" && rustup toolchain install nightly --profile minimal --component cargo && rustup default nightly' + - build_exp_code: + - git_clone: + - exec_in: git clone https://gitea.augustin64.fr/l3-ENSL/dendrobates-t-azureus /tmp/dendrobates-t-azureus + - build: + - exec_in: bash -c 'source "$HOME/.cargo/env" && cd /tmp/dendrobates-t-azureus/cache_utils && cargo build --release --bin two_thread_cal' + - copy_to_bin: + - exec_in: cp /tmp/dendrobates-t-azureus/target/release/two_thread_cal /usr/bin/two_thread_cal + - clean: + - remove_build_dir: + - exec_in: rm /tmp/dendrobates-t-azureus -rf + - remove_packages: + - exec_in: apt-get --purge autoremove curl git gcc libcpupower-dev + +export: + ### The export section takes in charge the export of your customized Grid'5000 + ## environment. No modification should be needed here. + - "@base" diff --git a/data/paravance/lscpu.txt b/data/paravance/lscpu.txt new file mode 100644 index 0000000..49432e3 --- /dev/null +++ b/data/paravance/lscpu.txt @@ -0,0 +1,51 @@ +Architecture: x86_64 +CPU op-mode(s): 32-bit, 64-bit +Byte Order: Little Endian +Address sizes: 46 bits physical, 48 bits virtual +CPU(s): 32 +On-line CPU(s) list: 0-31 +Thread(s) per core: 2 +Core(s) per socket: 8 +Socket(s): 2 +NUMA node(s): 2 +Vendor ID: GenuineIntel +CPU family: 6 +Model: 63 +Model name: Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.40GHz +Stepping: 2 +CPU MHz: 1233.594 +CPU max MHz: 3200.0000 +CPU min MHz: 1200.0000 +BogoMIPS: 4800.18 +Virtualization: VT-x +L1d cache: 512 KiB +L1i cache: 512 KiB +L2 cache: 4 MiB +L3 cache: 40 MiB +NUMA node0 CPU(s): 0,2,4,6,8,10,12,14,16,18,20,22,24,26,28,30 +NUMA node1 CPU(s): 1,3,5,7,9,11,13,15,17,19,21,23,25,27,29,31 +Vulnerability Gather data sampling: Not affected +Vulnerability Itlb multihit: KVM: Mitigation: VMX disabled +Vulnerability L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulner + able +Vulnerability Mds: Mitigation; Clear CPU buffers; SMT vulnerable +Vulnerability Meltdown: Mitigation; PTI +Vulnerability Mmio stale data: Mitigation; Clear CPU buffers; SMT vulnerable +Vulnerability Retbleed: Not affected +Vulnerability Spec rstack overflow: Not affected +Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp +Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization +Vulnerability Spectre v2: Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional + , RSB filling, PBRSB-eIBRS Not affected +Vulnerability Srbds: Not affected +Vulnerability Tsx async abort: Not affected +Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat ps + e36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1 + gb rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopol + ogy nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl + vmx smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid dca sse4_1 sse4_ + 2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand l + ahf_lm abm cpuid_fault epb invpcid_single pti ssbd ibrs ibpb stibp t + pr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 + avx2 smep bmi2 erms invpcid cqm xsaveopt cqm_llc cqm_occup_llc dthe + rm ida arat pln pts md_clear flush_l1d diff --git a/data/paravance/results-paravance-37.txt.bz2 b/data/paravance/results-paravance-37.txt.bz2 new file mode 100644 index 0000000..d536d51 Binary files /dev/null and b/data/paravance/results-paravance-37.txt.bz2 differ