Laurent Carlier | 749294b | 2020-06-01 09:03:17 +0100 | [diff] [blame] | 1 | // |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 2 | // Copyright © 2017 Arm Ltd and Contributors. All rights reserved. |
David Beck | ecb56cd | 2018-09-05 12:52:57 +0100 | [diff] [blame] | 3 | // SPDX-License-Identifier: MIT |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 4 | // |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 5 | |
Aron Virginas-Tar | c26ba75 | 2018-10-22 13:32:01 +0100 | [diff] [blame] | 6 | #include <armnn/Descriptors.hpp> |
| 7 | #include <armnn/IRuntime.hpp> |
| 8 | #include <armnn/INetwork.hpp> |
Jim Flynn | f771321 | 2020-07-14 09:50:59 +0100 | [diff] [blame] | 9 | #include <Processes.hpp> |
Aron Virginas-Tar | c9cc804 | 2018-11-01 16:15:57 +0000 | [diff] [blame] | 10 | #include <Runtime.hpp> |
Aron Virginas-Tar | c26ba75 | 2018-10-22 13:32:01 +0100 | [diff] [blame] | 11 | #include <armnn/TypesUtils.hpp> |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 12 | |
Nikhil Raj | 77fe76b | 2021-06-09 14:55:32 +0100 | [diff] [blame] | 13 | #include <common/include/LabelsAndEventClasses.hpp> |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 14 | #include <test/ProfilingTestUtils.hpp> |
| 15 | |
Aron Virginas-Tar | c9cc804 | 2018-11-01 16:15:57 +0000 | [diff] [blame] | 16 | #include <HeapProfiling.hpp> |
| 17 | #include <LeakChecking.hpp> |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 18 | |
| 19 | #ifdef WITH_VALGRIND |
Aron Virginas-Tar | c26ba75 | 2018-10-22 13:32:01 +0100 | [diff] [blame] | 20 | #include <valgrind/memcheck.h> |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 21 | #endif |
| 22 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 23 | #include <doctest/doctest.h> |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 24 | #include "RuntimeTests.hpp" |
Sadik Armagan | ea41b57 | 2020-03-19 18:16:46 +0000 | [diff] [blame] | 25 | #include "TestUtils.hpp" |
Aron Virginas-Tar | c26ba75 | 2018-10-22 13:32:01 +0100 | [diff] [blame] | 26 | |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 27 | namespace armnn |
| 28 | { |
| 29 | |
Kevin May | d92a6e4 | 2021-02-04 10:27:41 +0000 | [diff] [blame] | 30 | void RuntimeLoadedNetworksReserve(armnn::RuntimeImpl* runtime) |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 31 | { |
| 32 | runtime->m_LoadedNetworks.reserve(1); |
| 33 | } |
| 34 | |
| 35 | } |
| 36 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 37 | TEST_SUITE("Runtime") |
| 38 | { |
| 39 | TEST_CASE("RuntimeUnloadNetwork") |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 40 | { |
| 41 | // build 2 mock-networks and load them into the runtime |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 42 | armnn::IRuntime::CreationOptions options; |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 43 | armnn::IRuntimePtr runtime(armnn::IRuntime::Create(options)); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 44 | |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 45 | // Mock network 1. |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 46 | armnn::NetworkId networkIdentifier1 = 1; |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 47 | armnn::INetworkPtr mockNetwork1(armnn::INetwork::Create()); |
| 48 | mockNetwork1->AddInputLayer(0, "test layer"); |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 49 | std::vector<armnn::BackendId> backends = { armnn::Compute::CpuRef }; |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 50 | runtime->LoadNetwork(networkIdentifier1, Optimize(*mockNetwork1, backends, runtime->GetDeviceSpec())); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 51 | |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 52 | // Mock network 2. |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 53 | armnn::NetworkId networkIdentifier2 = 2; |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 54 | armnn::INetworkPtr mockNetwork2(armnn::INetwork::Create()); |
| 55 | mockNetwork2->AddInputLayer(0, "test layer"); |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 56 | runtime->LoadNetwork(networkIdentifier2, Optimize(*mockNetwork2, backends, runtime->GetDeviceSpec())); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 57 | |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 58 | // Unloads one by its networkID. |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 59 | CHECK(runtime->UnloadNetwork(networkIdentifier1) == armnn::Status::Success); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 60 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 61 | CHECK(runtime->UnloadNetwork(networkIdentifier1) == armnn::Status::Failure); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 62 | } |
| 63 | |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 64 | TEST_CASE("RuntimePreImportInputs") |
| 65 | { |
| 66 | armnn::IRuntime::CreationOptions options; |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 67 | armnn::IRuntimePtr runtime(armnn::IRuntime::Create(options)); |
| 68 | armnn::NetworkId networkId = 1; |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 69 | armnn::INetworkPtr testNetwork(armnn::INetwork::Create()); |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 70 | |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 71 | auto inputLayer1 = testNetwork->AddInputLayer(0, "input 1 layer"); |
| 72 | auto inputLayer2 = testNetwork->AddInputLayer(1, "input 2 layer"); |
| 73 | auto addLayer = testNetwork->AddAdditionLayer("add layer"); |
| 74 | auto outputLayer = testNetwork->AddOutputLayer(2, "output layer"); |
| 75 | |
| 76 | TensorInfo tensorInfo{{4}, armnn::DataType::Signed32}; |
| 77 | |
| 78 | inputLayer1->GetOutputSlot(0).Connect(addLayer->GetInputSlot(0)); |
| 79 | inputLayer1->GetOutputSlot(0).SetTensorInfo(tensorInfo); |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 80 | |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 81 | inputLayer2->GetOutputSlot(0).Connect(addLayer->GetInputSlot(1)); |
| 82 | inputLayer2->GetOutputSlot(0).SetTensorInfo(tensorInfo); |
| 83 | |
| 84 | addLayer->GetOutputSlot(0).Connect(outputLayer->GetInputSlot(0)); |
| 85 | addLayer->GetOutputSlot(0).SetTensorInfo(tensorInfo); |
| 86 | |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 87 | std::vector<armnn::BackendId> backends = {armnn::Compute::CpuRef}; |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 88 | |
| 89 | std::string er; |
| 90 | armnn::INetworkProperties networkProperties(true, MemorySource::Malloc, MemorySource::Undefined); |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 91 | runtime->LoadNetwork(networkId, |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 92 | Optimize(*testNetwork, backends, runtime->GetDeviceSpec()), |
| 93 | er, |
| 94 | networkProperties); |
| 95 | |
| 96 | std::vector<int> inputData1(4, 10); |
| 97 | std::vector<int> inputData2(4, 20); |
| 98 | std::vector<int> output(4); |
| 99 | |
Cathal Corbett | 5b8093c | 2021-10-22 11:12:07 +0100 | [diff] [blame^] | 100 | ConstTensor inputTensor1({{4}, armnn::DataType::Signed32, 0.0f, 0, true}, inputData1.data()); |
| 101 | ConstTensor inputTensor2({{4}, armnn::DataType::Signed32, 0.0f, 0, true}, inputData2.data()); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 102 | Tensor outputTensor({{4}, armnn::DataType::Signed32}, output.data()); |
| 103 | |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 104 | auto importedInputVec1 = runtime->ImportInputs(networkId, {{0, inputTensor1}}); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 105 | CHECK(importedInputVec1.size() == 1); |
| 106 | CHECK(importedInputVec1[0] == 0); |
| 107 | |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 108 | auto memHandle = runtime->CreateWorkingMemHandle(networkId); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 109 | |
| 110 | runtime->Execute(*memHandle.get(), {{1, inputTensor2}}, {{2, outputTensor}}, {0 /* pre-imported id */}); |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 111 | for (auto val: output) { |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 112 | CHECK(val == 30); |
| 113 | } |
| 114 | |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 115 | auto importedInputVec2 = runtime->ImportInputs(networkId, {{1, inputTensor2}}); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 116 | CHECK(importedInputVec2.size() == 1); |
| 117 | CHECK(importedInputVec2[0] == 1); |
| 118 | |
| 119 | runtime->Execute(*memHandle.get(), {{0, inputTensor1}}, {{2, outputTensor}}, {1 /* pre-imported id */}); |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 120 | for (auto val: output) { |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 121 | CHECK(val == 30); |
| 122 | } |
| 123 | |
| 124 | runtime->Execute(*memHandle.get(), {}, {{2, outputTensor}}, {0, 1}); |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 125 | for (auto val: output) { |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 126 | CHECK(val == 30); |
| 127 | } |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 128 | // Duplicate ImportedInputId and LayerBindingId |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 129 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {}, {{2, outputTensor}}, {0, 0});, |
| 130 | armnn::InvalidArgumentException); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 131 | // Duplicate LayerBindingId |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 132 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {{1, inputTensor2}}, {{2, outputTensor}}, {1});, |
| 133 | armnn::InvalidArgumentException); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 134 | // Incorrect ImportedInputId |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 135 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {{1, inputTensor2}}, {{2, outputTensor}}, {10});, |
| 136 | armnn::InvalidArgumentException); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 137 | // Incorrect LayerBindingId |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 138 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {{-2, inputTensor2}}, {{2, outputTensor}}, {1});, |
| 139 | armnn::InvalidArgumentException); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 140 | // Incorrect layer binding id and ImportedInputId |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 141 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {{-2, inputTensor2}}, {{2, outputTensor}}, {10});, |
| 142 | armnn::InvalidArgumentException); |
| 143 | auto importedInputVec3 = runtime->ImportInputs(networkId, {{1, inputTensor2}}); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 144 | CHECK(importedInputVec3[0] == 2); |
| 145 | // Too many ImportedInputIds |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 146 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {}, {{2, outputTensor}}, {0, 1, 2});, |
| 147 | armnn::InvalidArgumentException); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 148 | // Too many InputTensors |
| 149 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 150 | {{0, inputTensor2}, |
| 151 | {1, inputTensor2}, |
| 152 | {2, inputTensor2}}, |
| 153 | {{2, outputTensor}});, armnn::InvalidArgumentException); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 154 | // Too few ImportedInputIds |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 155 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {}, {{2, outputTensor}}, {0});, |
| 156 | armnn::InvalidArgumentException); |
| 157 | runtime->ClearImportedInputs(networkId, {1}); |
| 158 | runtime->Execute(*memHandle.get(), {{1, inputTensor2}}, {{2, outputTensor}}, {0}, {}); |
| 159 | for (auto val: output) { |
| 160 | CHECK(val == 30); |
| 161 | } |
| 162 | // Using deleted pre-imported input |
| 163 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {}, {{2, outputTensor}}, {0, 1}, {});, |
| 164 | armnn::InvalidArgumentException); |
| 165 | |
| 166 | // Trying to delete deleted pre-imported tensor |
| 167 | CHECK_THROWS_AS(runtime->ClearImportedInputs(networkId, {1});, armnn::InvalidArgumentException); |
| 168 | |
| 169 | // Trying to delete unknown pre-imported tensor |
| 170 | CHECK_THROWS_AS(runtime->ClearImportedInputs(networkId, {10});, armnn::InvalidArgumentException); |
| 171 | } |
| 172 | TEST_CASE("RuntimePreImportOutputs") |
| 173 | { |
| 174 | armnn::IRuntime::CreationOptions options; |
| 175 | armnn::IRuntimePtr runtime(armnn::IRuntime::Create(options)); |
| 176 | |
| 177 | armnn::NetworkId networkId = 1; |
| 178 | |
| 179 | armnn::INetworkPtr testNetwork(armnn::INetwork::Create()); |
Cathal Corbett | 5b8093c | 2021-10-22 11:12:07 +0100 | [diff] [blame^] | 180 | TensorInfo tensorInfo{{4}, armnn::DataType::Float32, 0.0f, 0, true}; |
Finn Williams | 8636bc7 | 2021-10-02 15:06:39 +0100 | [diff] [blame] | 181 | |
| 182 | auto inputLayer1 = testNetwork->AddInputLayer(0, "input 1 layer"); |
| 183 | inputLayer1->GetOutputSlot(0).SetTensorInfo(tensorInfo); |
| 184 | |
| 185 | ActivationDescriptor activationDescriptor; |
| 186 | activationDescriptor.m_Function = ActivationFunction::BoundedReLu; |
| 187 | activationDescriptor.m_A = 2.0f; |
| 188 | activationDescriptor.m_B = 0.0f; |
| 189 | auto activationLayer1 = testNetwork->AddActivationLayer(activationDescriptor, "add layer"); |
| 190 | auto outputLayer1 = testNetwork->AddOutputLayer(2, "output layer"); |
| 191 | |
| 192 | inputLayer1->GetOutputSlot(0).Connect(activationLayer1->GetInputSlot(0)); |
| 193 | |
| 194 | activationLayer1->GetOutputSlot(0).Connect(outputLayer1->GetInputSlot(0)); |
| 195 | activationLayer1->GetOutputSlot(0).SetTensorInfo(tensorInfo); |
| 196 | |
| 197 | auto inputLayer2 = testNetwork->AddInputLayer(1, "input 1 layer"); |
| 198 | |
| 199 | activationDescriptor.m_A = 4.0f; |
| 200 | activationDescriptor.m_B = 2.0f; |
| 201 | auto activationLayer2 = testNetwork->AddActivationLayer(activationDescriptor, "add layer"); |
| 202 | auto outputLayer2 = testNetwork->AddOutputLayer(3, "output layer"); |
| 203 | |
| 204 | inputLayer2->GetOutputSlot(0).Connect(activationLayer2->GetInputSlot(0)); |
| 205 | inputLayer2->GetOutputSlot(0).SetTensorInfo(tensorInfo); |
| 206 | |
| 207 | activationLayer2->GetOutputSlot(0).Connect(outputLayer2->GetInputSlot(0)); |
| 208 | activationLayer2->GetOutputSlot(0).SetTensorInfo(tensorInfo); |
| 209 | |
| 210 | std::vector<armnn::BackendId> backends = { armnn::Compute::CpuRef }; |
| 211 | |
| 212 | std::string er; |
| 213 | armnn::INetworkProperties networkProperties(true, MemorySource::Malloc, MemorySource::Malloc); |
| 214 | runtime->LoadNetwork(networkId, |
| 215 | Optimize(*testNetwork, backends, runtime->GetDeviceSpec()), |
| 216 | er, |
| 217 | networkProperties); |
| 218 | |
| 219 | std::vector<float> inputData1(4, 1.0f); |
| 220 | std::vector<float> inputData2(4, 3.0f); |
| 221 | |
| 222 | std::vector<float> outputData1(4); |
| 223 | std::vector<float> outputData2(4); |
| 224 | |
| 225 | ConstTensor inputTensor1(tensorInfo, inputData1.data()); |
| 226 | ConstTensor inputTensor2(tensorInfo, inputData2.data()); |
| 227 | |
| 228 | Tensor outputTensor1{tensorInfo, outputData1.data()}; |
| 229 | Tensor outputTensor2{tensorInfo, outputData2.data()}; |
| 230 | |
| 231 | InputTensors inputTensors = {{0, inputTensor1}, {1, inputTensor2}}; |
| 232 | |
| 233 | std::pair<LayerBindingId, class Tensor> output1{2, outputTensor1}; |
| 234 | std::pair<LayerBindingId, class Tensor> output2{3, outputTensor2}; |
| 235 | |
| 236 | auto testOutputs = [&]() |
| 237 | { |
| 238 | for (auto val : outputData1) |
| 239 | { |
| 240 | CHECK(val == 1.0f); |
| 241 | } |
| 242 | |
| 243 | for (auto val : outputData2) |
| 244 | { |
| 245 | CHECK(val == 3.0f); |
| 246 | } |
| 247 | }; |
| 248 | |
| 249 | auto memHandle = runtime->CreateWorkingMemHandle(networkId); |
| 250 | |
| 251 | runtime->Execute(*memHandle.get(),inputTensors, {output1, output2}); |
| 252 | testOutputs(); |
| 253 | |
| 254 | auto importedOutputVec = runtime->ImportOutputs(networkId, {output1, output2 }); |
| 255 | CHECK(importedOutputVec.size() == 2); |
| 256 | CHECK(importedOutputVec[0] == 0); |
| 257 | CHECK(importedOutputVec[1] == 1); |
| 258 | |
| 259 | runtime->Execute(*memHandle.get(), inputTensors, {}, {}, importedOutputVec); |
| 260 | testOutputs(); |
| 261 | |
| 262 | runtime->Execute(*memHandle.get(), inputTensors, {output1}, {}, {1}); |
| 263 | testOutputs(); |
| 264 | |
| 265 | runtime->Execute(*memHandle.get(), inputTensors, {output2}, {}, {0}); |
| 266 | testOutputs(); |
| 267 | |
| 268 | auto importedInputVec = runtime->ImportInputs(networkId, inputTensors); |
| 269 | CHECK(importedInputVec.size() == 2); |
| 270 | CHECK(importedInputVec[0] == 0); |
| 271 | CHECK(importedInputVec[1] == 1); |
| 272 | |
| 273 | runtime->Execute(*memHandle.get(), {}, {}, importedInputVec, importedOutputVec); |
| 274 | testOutputs(); |
| 275 | |
| 276 | runtime->Execute(*memHandle.get(), {{0, inputTensor1}}, {output2}, {1}, {0}); |
| 277 | testOutputs(); |
| 278 | |
| 279 | // Too many ids |
| 280 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {output1, output2}, {}, {0, 1});, |
| 281 | armnn::InvalidArgumentException); |
| 282 | |
| 283 | // Duplicate ids |
| 284 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {output2}, {}, {1});, |
| 285 | armnn::InvalidArgumentException); |
| 286 | |
| 287 | // Duplicate ids |
| 288 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {output1, output1}, {}, {});, |
| 289 | armnn::InvalidArgumentException); |
| 290 | |
| 291 | // Duplicate ids |
| 292 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {}, {}, {0, 0}), |
| 293 | armnn::InvalidArgumentException); |
| 294 | |
| 295 | // Unknown id |
| 296 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {output1}, {}, {3});, |
| 297 | armnn::InvalidArgumentException); |
| 298 | |
| 299 | // Unknown id |
| 300 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {{4, outputTensor2}}, {}, {1});, |
| 301 | armnn::InvalidArgumentException); |
| 302 | |
| 303 | // Input id for output |
| 304 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {{0, outputTensor2}}, {}, {1});, |
| 305 | armnn::InvalidArgumentException); |
| 306 | |
| 307 | // Input id for output |
| 308 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {{0, outputTensor2}}, {}, {1});, |
| 309 | armnn::InvalidArgumentException); |
| 310 | |
| 311 | // Output id for input |
| 312 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), {{2, inputTensor1}}, {{0, outputTensor2}}, {1}, {1, 0});, |
| 313 | armnn::InvalidArgumentException); |
| 314 | |
| 315 | runtime->ClearImportedOutputs(networkId, {1}); |
| 316 | |
| 317 | runtime->Execute(*memHandle.get(), inputTensors, {output2}, {}, {0}); |
| 318 | testOutputs(); |
| 319 | |
| 320 | // Trying to use deleted pre-imported tensor |
| 321 | CHECK_THROWS_AS(runtime->Execute(*memHandle.get(), inputTensors, {}, {}, importedOutputVec), |
| 322 | armnn::InvalidArgumentException); |
| 323 | |
| 324 | // Trying to delete deleted pre-imported tensor |
| 325 | CHECK_THROWS_AS(runtime->ClearImportedOutputs(networkId, {1});, armnn::InvalidArgumentException); |
| 326 | |
| 327 | // Trying to delete unknown pre-imported tensor |
| 328 | CHECK_THROWS_AS(runtime->ClearImportedOutputs(networkId, {10});, armnn::InvalidArgumentException); |
Finn Williams | f37b970 | 2021-09-01 18:06:04 +0100 | [diff] [blame] | 329 | } |
| 330 | |
surmeh01 | 3537c2c | 2018-05-18 16:31:43 +0100 | [diff] [blame] | 331 | // Note: the current builds we don't do valgrind and gperftools based leak checking at the same |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 332 | // time, so in practice WITH_VALGRIND and ARMNN_LEAK_CHECKING_ENABLED are exclusive. The |
| 333 | // valgrind tests can stay for x86 builds, but on hikey Valgrind is just way too slow |
| 334 | // to be integrated into the CI system. |
surmeh01 | 3537c2c | 2018-05-18 16:31:43 +0100 | [diff] [blame] | 335 | |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 336 | #ifdef ARMNN_LEAK_CHECKING_ENABLED |
| 337 | |
| 338 | struct DisableGlobalLeakChecking |
| 339 | { |
| 340 | DisableGlobalLeakChecking() |
| 341 | { |
| 342 | ARMNN_LOCAL_LEAK_CHECKING_ONLY(); |
| 343 | } |
| 344 | }; |
| 345 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 346 | TEST_CASE_FIXTURE(DisableGlobalLeakChecking, "RuntimeHeapMemoryUsageSanityChecks") |
surmeh01 | 3537c2c | 2018-05-18 16:31:43 +0100 | [diff] [blame] | 347 | { |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 348 | CHECK(ARMNN_LEAK_CHECKER_IS_ACTIVE()); |
surmeh01 | 3537c2c | 2018-05-18 16:31:43 +0100 | [diff] [blame] | 349 | { |
| 350 | ARMNN_SCOPED_LEAK_CHECKER("Sanity_Check_Outer"); |
| 351 | { |
| 352 | ARMNN_SCOPED_LEAK_CHECKER("Sanity_Check_Inner"); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 353 | CHECK(ARMNN_NO_LEAKS_IN_SCOPE() == true); |
surmeh01 | 3537c2c | 2018-05-18 16:31:43 +0100 | [diff] [blame] | 354 | std::unique_ptr<char[]> dummyAllocation(new char[1000]); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 355 | // "A leak of 1000 bytes is expected here. " |
| 356 | // "Please make sure environment variable: HEAPCHECK=draconian is set!" |
| 357 | CHECK((ARMNN_NO_LEAKS_IN_SCOPE() == false)); |
| 358 | CHECK(ARMNN_BYTES_LEAKED_IN_SCOPE() == 1000); |
| 359 | CHECK(ARMNN_OBJECTS_LEAKED_IN_SCOPE() == 1); |
surmeh01 | 3537c2c | 2018-05-18 16:31:43 +0100 | [diff] [blame] | 360 | } |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 361 | CHECK(ARMNN_NO_LEAKS_IN_SCOPE()); |
| 362 | CHECK(ARMNN_BYTES_LEAKED_IN_SCOPE() == 0); |
| 363 | CHECK(ARMNN_OBJECTS_LEAKED_IN_SCOPE() == 0); |
surmeh01 | 3537c2c | 2018-05-18 16:31:43 +0100 | [diff] [blame] | 364 | } |
| 365 | } |
| 366 | |
surmeh01 | 3537c2c | 2018-05-18 16:31:43 +0100 | [diff] [blame] | 367 | #endif // ARMNN_LEAK_CHECKING_ENABLED |
| 368 | |
| 369 | // Note: this part of the code is due to be removed when we fully trust the gperftools based results. |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 370 | #ifdef WITH_VALGRIND |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 371 | // Run with the following command to get all the amazing output (in the devenv/build folder) :) |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 372 | // valgrind --leak-check=full --show-leak-kinds=all --log-file=Valgrind_Memcheck_Leak_Report.txt armnn/test/UnitTests |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 373 | TEST_CASE("RuntimeMemoryLeak") |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 374 | { |
| 375 | // From documentation: |
| 376 | |
| 377 | // This means that no pointer to the block can be found. The block is classified as "lost", |
| 378 | // because the programmer could not possibly have freed it at program exit, since no pointer to it exists. |
| 379 | unsigned long leakedBefore = 0; |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 380 | unsigned long leakedAfter = 0; |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 381 | |
| 382 | // A start-pointer or chain of start-pointers to the block is found. Since the block is still pointed at, |
| 383 | // the programmer could, at least in principle, have freed it before program exit. |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 384 | // We want to test this in case memory is not freed as early as it could have been. |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 385 | unsigned long reachableBefore = 0; |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 386 | unsigned long reachableAfter = 0; |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 387 | |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 388 | // Needed as out params but we don't test them. |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 389 | unsigned long dubious = 0; |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 390 | unsigned long suppressed = 0; |
| 391 | |
| 392 | armnn::NetworkId networkIdentifier1 = 1; |
| 393 | |
| 394 | // ensure that runtime is large enough before checking for memory leaks |
| 395 | // otherwise when loading the network it will automatically reserve memory that won't be released until destruction |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 396 | armnn::IRuntime::CreationOptions options; |
Kevin May | d92a6e4 | 2021-02-04 10:27:41 +0000 | [diff] [blame] | 397 | armnn::RuntimeImpl runtime(options); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 398 | armnn::RuntimeLoadedNetworksReserve(&runtime); |
| 399 | |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 400 | { |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 401 | std::vector<armnn::BackendId> backends = { armnn::Compute::CpuRef }; |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 402 | |
Francis Murtagh | 3d2b4b2 | 2021-02-15 18:23:17 +0000 | [diff] [blame] | 403 | armnn::INetworkPtr mockNetwork1(armnn::INetwork::Create()); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 404 | mockNetwork1->AddInputLayer(0, "test layer"); |
| 405 | |
Matteo Martincigh | 9326aab | 2018-11-15 10:54:54 +0000 | [diff] [blame] | 406 | // Warm-up load/unload pair to put the runtime in a stable state (memory-wise). |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 407 | runtime.LoadNetwork(networkIdentifier1, Optimize(*mockNetwork1, backends, runtime.GetDeviceSpec())); |
Matteo Martincigh | 9326aab | 2018-11-15 10:54:54 +0000 | [diff] [blame] | 408 | runtime.UnloadNetwork(networkIdentifier1); |
| 409 | |
| 410 | // Checks for leaks before we load the network and record them so that we can see the delta after unloading. |
| 411 | VALGRIND_DO_QUICK_LEAK_CHECK; |
| 412 | VALGRIND_COUNT_LEAKS(leakedBefore, dubious, reachableBefore, suppressed); |
| 413 | |
| 414 | // The actual test. |
| 415 | runtime.LoadNetwork(networkIdentifier1, Optimize(*mockNetwork1, backends, runtime.GetDeviceSpec())); |
| 416 | runtime.UnloadNetwork(networkIdentifier1); |
| 417 | |
| 418 | VALGRIND_DO_ADDED_LEAK_CHECK; |
| 419 | VALGRIND_COUNT_LEAKS(leakedAfter, dubious, reachableAfter, suppressed); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 420 | } |
| 421 | |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 422 | // If we're not running under Valgrind, these vars will have been initialised to 0, so this will always pass. |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 423 | CHECK(leakedBefore == leakedAfter); |
| 424 | CHECK(reachableBefore == reachableAfter); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 425 | |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 426 | // These are needed because VALGRIND_COUNT_LEAKS is a macro that assigns to the parameters |
| 427 | // so they are assigned to, but still considered unused, causing a warning. |
Jan Eilers | 8eb2560 | 2020-03-09 12:13:48 +0000 | [diff] [blame] | 428 | IgnoreUnused(dubious); |
| 429 | IgnoreUnused(suppressed); |
telsoa01 | 4fcda01 | 2018-03-09 14:13:49 +0000 | [diff] [blame] | 430 | } |
Aron Virginas-Tar | c26ba75 | 2018-10-22 13:32:01 +0100 | [diff] [blame] | 431 | #endif // WITH_VALGRIND |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 432 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 433 | TEST_CASE("RuntimeCpuRef") |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 434 | { |
| 435 | using namespace armnn; |
| 436 | |
| 437 | // Create runtime in which test will run |
| 438 | armnn::IRuntime::CreationOptions options; |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 439 | armnn::IRuntimePtr runtime(armnn::IRuntime::Create(options)); |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 440 | |
| 441 | // build up the structure of the network |
| 442 | INetworkPtr net(INetwork::Create()); |
| 443 | |
| 444 | IConnectableLayer* input = net->AddInputLayer(0); |
| 445 | |
| 446 | // This layer configuration isn't supported by CpuAcc, should be fall back to CpuRef. |
| 447 | NormalizationDescriptor descriptor; |
| 448 | IConnectableLayer* normalize = net->AddNormalizationLayer(descriptor); |
| 449 | |
| 450 | IConnectableLayer* output = net->AddOutputLayer(0); |
| 451 | |
| 452 | input->GetOutputSlot(0).Connect(normalize->GetInputSlot(0)); |
| 453 | normalize->GetOutputSlot(0).Connect(output->GetInputSlot(0)); |
| 454 | |
| 455 | input->GetOutputSlot(0).SetTensorInfo(TensorInfo({ 1, 1, 4, 4 }, DataType::Float32)); |
| 456 | normalize->GetOutputSlot(0).SetTensorInfo(TensorInfo({ 1, 1, 4, 4 }, DataType::Float32)); |
| 457 | |
| 458 | // optimize the network |
David Beck | f0b4845 | 2018-10-19 15:20:56 +0100 | [diff] [blame] | 459 | std::vector<armnn::BackendId> backends = { armnn::Compute::CpuRef }; |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 460 | IOptimizedNetworkPtr optNet = Optimize(*net, backends, runtime->GetDeviceSpec()); |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 461 | |
| 462 | // Load it into the runtime. It should success. |
| 463 | armnn::NetworkId netId; |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 464 | CHECK(runtime->LoadNetwork(netId, std::move(optNet)) == Status::Success); |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 465 | } |
| 466 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 467 | TEST_CASE("RuntimeFallbackToCpuRef") |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 468 | { |
| 469 | using namespace armnn; |
| 470 | |
| 471 | // Create runtime in which test will run |
| 472 | armnn::IRuntime::CreationOptions options; |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 473 | armnn::IRuntimePtr runtime(armnn::IRuntime::Create(options)); |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 474 | |
| 475 | // build up the structure of the network |
| 476 | INetworkPtr net(INetwork::Create()); |
| 477 | |
| 478 | IConnectableLayer* input = net->AddInputLayer(0); |
| 479 | |
| 480 | // This layer configuration isn't supported by CpuAcc, should be fall back to CpuRef. |
| 481 | NormalizationDescriptor descriptor; |
| 482 | IConnectableLayer* normalize = net->AddNormalizationLayer(descriptor); |
| 483 | |
| 484 | IConnectableLayer* output = net->AddOutputLayer(0); |
| 485 | |
| 486 | input->GetOutputSlot(0).Connect(normalize->GetInputSlot(0)); |
| 487 | normalize->GetOutputSlot(0).Connect(output->GetInputSlot(0)); |
| 488 | |
| 489 | input->GetOutputSlot(0).SetTensorInfo(TensorInfo({ 1, 1, 4, 4 }, DataType::Float32)); |
| 490 | normalize->GetOutputSlot(0).SetTensorInfo(TensorInfo({ 1, 1, 4, 4 }, DataType::Float32)); |
| 491 | |
| 492 | // Allow fallback to CpuRef. |
David Beck | f0b4845 | 2018-10-19 15:20:56 +0100 | [diff] [blame] | 493 | std::vector<armnn::BackendId> backends = { armnn::Compute::CpuAcc, armnn::Compute::CpuRef }; |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 494 | // optimize the network |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 495 | IOptimizedNetworkPtr optNet = Optimize(*net, backends, runtime->GetDeviceSpec()); |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 496 | |
| 497 | // Load it into the runtime. It should succeed. |
| 498 | armnn::NetworkId netId; |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 499 | CHECK(runtime->LoadNetwork(netId, std::move(optNet)) == Status::Success); |
telsoa01 | c577f2c | 2018-08-31 09:22:23 +0100 | [diff] [blame] | 500 | } |
| 501 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 502 | TEST_CASE("IVGCVSW_1929_QuantizedSoftmaxIssue") |
jimfly01 | 6b0b53d | 2018-10-08 14:43:01 +0100 | [diff] [blame] | 503 | { |
| 504 | // Test for issue reported by Chris Nix in https://jira.arm.com/browse/IVGCVSW-1929 |
| 505 | using namespace armnn; |
| 506 | |
| 507 | // Create runtime in which test will run |
| 508 | armnn::IRuntime::CreationOptions options; |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 509 | armnn::IRuntimePtr runtime(armnn::IRuntime::Create(options)); |
jimfly01 | 6b0b53d | 2018-10-08 14:43:01 +0100 | [diff] [blame] | 510 | |
| 511 | // build up the structure of the network |
| 512 | INetworkPtr net(INetwork::Create()); |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 513 | armnn::IConnectableLayer* input = net->AddInputLayer(0,"input"); |
| 514 | armnn::IConnectableLayer* softmax = net->AddSoftmaxLayer(armnn::SoftmaxDescriptor(), "softmax"); |
| 515 | armnn::IConnectableLayer* output = net->AddOutputLayer(0, "output"); |
jimfly01 | 6b0b53d | 2018-10-08 14:43:01 +0100 | [diff] [blame] | 516 | |
| 517 | input->GetOutputSlot(0).Connect(softmax->GetInputSlot(0)); |
| 518 | softmax->GetOutputSlot(0).Connect(output->GetInputSlot(0)); |
| 519 | |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 520 | input->GetOutputSlot(0).SetTensorInfo(armnn::TensorInfo(armnn::TensorShape({ 1, 5 }), |
| 521 | armnn::DataType::QAsymmU8, |
| 522 | 1.0f / 255, |
| 523 | 0)); |
jimfly01 | 6b0b53d | 2018-10-08 14:43:01 +0100 | [diff] [blame] | 524 | |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 525 | softmax->GetOutputSlot(0).SetTensorInfo(armnn::TensorInfo(armnn::TensorShape({ 1, 5 }), |
| 526 | armnn::DataType::QAsymmU8)); |
jimfly01 | 6b0b53d | 2018-10-08 14:43:01 +0100 | [diff] [blame] | 527 | |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 528 | std::vector<armnn::BackendId> backends = { armnn::Compute::CpuRef }; |
| 529 | std::vector<std::string> errMessages; |
Mike Kelly | 3a613cc | 2020-09-29 20:50:35 +0100 | [diff] [blame] | 530 | |
| 531 | try |
| 532 | { |
| 533 | armnn::IOptimizedNetworkPtr optNet = Optimize(*net, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 534 | backends, |
| 535 | runtime->GetDeviceSpec(), |
| 536 | OptimizerOptions(), |
| 537 | errMessages); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 538 | FAIL("An exception should have been thrown"); |
Mike Kelly | 3a613cc | 2020-09-29 20:50:35 +0100 | [diff] [blame] | 539 | } |
Rob Hughes | c013bc8 | 2021-07-14 09:31:31 +0100 | [diff] [blame] | 540 | catch (const InvalidArgumentException&) |
Mike Kelly | 3a613cc | 2020-09-29 20:50:35 +0100 | [diff] [blame] | 541 | { |
| 542 | // Different exceptions are thrown on different backends |
| 543 | } |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 544 | CHECK(errMessages.size() > 0); |
jimfly01 | 6b0b53d | 2018-10-08 14:43:01 +0100 | [diff] [blame] | 545 | } |
| 546 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 547 | TEST_CASE("RuntimeBackendOptions") |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 548 | { |
| 549 | using namespace armnn; |
| 550 | |
| 551 | IRuntime::CreationOptions creationOptions; |
| 552 | auto& backendOptions = creationOptions.m_BackendOptions; |
| 553 | |
| 554 | |
| 555 | // Define Options on explicit construction |
| 556 | BackendOptions options1("FakeBackend1", |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 557 | { |
| 558 | { "Option1", 1.3f }, |
| 559 | { "Option2", true } |
| 560 | }); |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 561 | |
| 562 | // Add an option after construction |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 563 | options1.AddOption({ "Option3", "some_value" }); |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 564 | |
| 565 | // Add the options to CreationOptions struct |
| 566 | backendOptions.push_back(options1); |
| 567 | |
| 568 | // Add more Options via inplace explicit construction |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 569 | backendOptions.emplace_back(BackendOptions{ "FakeBackend1", |
| 570 | {{ "Option4", 42 }} |
| 571 | }); |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 572 | |
| 573 | |
| 574 | // First group |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 575 | CHECK(backendOptions[0].GetBackendId().Get() == "FakeBackend1"); |
| 576 | CHECK(backendOptions[0].GetOption(0).GetName() == "Option1"); |
| 577 | CHECK(backendOptions[0].GetOption(0).GetValue().IsFloat() == true); |
| 578 | CHECK(backendOptions[0].GetOption(0).GetValue().AsFloat() == 1.3f); |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 579 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 580 | CHECK(backendOptions[0].GetOption(1).GetName() == "Option2"); |
| 581 | CHECK(backendOptions[0].GetOption(1).GetValue().IsBool() == true); |
| 582 | CHECK(backendOptions[0].GetOption(1).GetValue().AsBool() == true); |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 583 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 584 | CHECK(backendOptions[0].GetOption(2).GetName() == "Option3"); |
| 585 | CHECK(backendOptions[0].GetOption(2).GetValue().IsString() == true); |
| 586 | CHECK(backendOptions[0].GetOption(2).GetValue().AsString() == "some_value"); |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 587 | |
| 588 | // Second group |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 589 | CHECK(backendOptions[1].GetBackendId().Get() == "FakeBackend1"); |
| 590 | CHECK(backendOptions[1].GetOption(0).GetName() == "Option4"); |
| 591 | CHECK(backendOptions[1].GetOption(0).GetValue().IsInt() == true); |
| 592 | CHECK(backendOptions[1].GetOption(0).GetValue().AsInt() == 42); |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 593 | } |
| 594 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 595 | TEST_CASE("ProfilingDisable") |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 596 | { |
| 597 | using namespace armnn; |
| 598 | |
| 599 | // Create runtime in which the test will run |
| 600 | armnn::IRuntime::CreationOptions options; |
Kevin May | d92a6e4 | 2021-02-04 10:27:41 +0000 | [diff] [blame] | 601 | armnn::RuntimeImpl runtime(options); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 602 | |
| 603 | // build up the structure of the network |
| 604 | INetworkPtr net(INetwork::Create()); |
| 605 | |
| 606 | IConnectableLayer* input = net->AddInputLayer(0); |
| 607 | |
| 608 | // This layer configuration isn't supported by CpuAcc, should fall back to CpuRef. |
| 609 | NormalizationDescriptor descriptor; |
| 610 | IConnectableLayer* normalize = net->AddNormalizationLayer(descriptor); |
| 611 | |
| 612 | IConnectableLayer* output = net->AddOutputLayer(0); |
| 613 | |
| 614 | input->GetOutputSlot(0).Connect(normalize->GetInputSlot(0)); |
| 615 | normalize->GetOutputSlot(0).Connect(output->GetInputSlot(0)); |
| 616 | |
| 617 | input->GetOutputSlot(0).SetTensorInfo(TensorInfo({ 1, 1, 4, 4 }, DataType::Float32)); |
| 618 | normalize->GetOutputSlot(0).SetTensorInfo(TensorInfo({ 1, 1, 4, 4 }, DataType::Float32)); |
| 619 | |
| 620 | // optimize the network |
| 621 | std::vector<armnn::BackendId> backends = { armnn::Compute::CpuRef }; |
Sadik Armagan | 3184c90 | 2020-03-18 10:57:30 +0000 | [diff] [blame] | 622 | IOptimizedNetworkPtr optNet = Optimize(*net, backends, runtime.GetDeviceSpec()); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 623 | |
| 624 | // Load it into the runtime. It should succeed. |
| 625 | armnn::NetworkId netId; |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 626 | CHECK(runtime.LoadNetwork(netId, std::move(optNet)) == Status::Success); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 627 | |
Sadik Armagan | 3184c90 | 2020-03-18 10:57:30 +0000 | [diff] [blame] | 628 | profiling::ProfilingServiceRuntimeHelper profilingServiceHelper(GetProfilingService(&runtime)); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 629 | profiling::BufferManager& bufferManager = profilingServiceHelper.GetProfilingBufferManager(); |
| 630 | auto readableBuffer = bufferManager.GetReadableBuffer(); |
| 631 | |
| 632 | // Profiling is not enabled, the post-optimisation structure should not be created |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 633 | CHECK(!readableBuffer); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 634 | } |
| 635 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 636 | TEST_CASE("ProfilingEnableCpuRef") |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 637 | { |
| 638 | using namespace armnn; |
| 639 | using namespace armnn::profiling; |
| 640 | |
| 641 | // Create runtime in which the test will run |
| 642 | armnn::IRuntime::CreationOptions options; |
| 643 | options.m_ProfilingOptions.m_EnableProfiling = true; |
Keith Davis | 33ed221 | 2020-03-30 10:43:41 +0100 | [diff] [blame] | 644 | options.m_ProfilingOptions.m_TimelineEnabled = true; |
| 645 | |
Kevin May | d92a6e4 | 2021-02-04 10:27:41 +0000 | [diff] [blame] | 646 | armnn::RuntimeImpl runtime(options); |
Keith Davis | 33ed221 | 2020-03-30 10:43:41 +0100 | [diff] [blame] | 647 | GetProfilingService(&runtime).ResetExternalProfilingOptions(options.m_ProfilingOptions, false); |
| 648 | |
| 649 | profiling::ProfilingServiceRuntimeHelper profilingServiceHelper(GetProfilingService(&runtime)); |
| 650 | profilingServiceHelper.ForceTransitionToState(ProfilingState::NotConnected); |
| 651 | profilingServiceHelper.ForceTransitionToState(ProfilingState::WaitingForAck); |
| 652 | profilingServiceHelper.ForceTransitionToState(ProfilingState::Active); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 653 | |
| 654 | // build up the structure of the network |
| 655 | INetworkPtr net(INetwork::Create()); |
| 656 | |
| 657 | IConnectableLayer* input = net->AddInputLayer(0, "input"); |
| 658 | |
| 659 | NormalizationDescriptor descriptor; |
| 660 | IConnectableLayer* normalize = net->AddNormalizationLayer(descriptor, "normalization"); |
| 661 | |
| 662 | IConnectableLayer* output = net->AddOutputLayer(0, "output"); |
| 663 | |
| 664 | input->GetOutputSlot(0).Connect(normalize->GetInputSlot(0)); |
| 665 | normalize->GetOutputSlot(0).Connect(output->GetInputSlot(0)); |
| 666 | |
| 667 | input->GetOutputSlot(0).SetTensorInfo(TensorInfo({ 1, 1, 4, 4 }, DataType::Float32)); |
| 668 | normalize->GetOutputSlot(0).SetTensorInfo(TensorInfo({ 1, 1, 4, 4 }, DataType::Float32)); |
| 669 | |
| 670 | // optimize the network |
| 671 | std::vector<armnn::BackendId> backends = { armnn::Compute::CpuRef }; |
Sadik Armagan | 3184c90 | 2020-03-18 10:57:30 +0000 | [diff] [blame] | 672 | IOptimizedNetworkPtr optNet = Optimize(*net, backends, runtime.GetDeviceSpec()); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 673 | |
| 674 | ProfilingGuid optNetGuid = optNet->GetGuid(); |
| 675 | |
| 676 | // Load it into the runtime. It should succeed. |
| 677 | armnn::NetworkId netId; |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 678 | CHECK(runtime.LoadNetwork(netId, std::move(optNet)) == Status::Success); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 679 | |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 680 | profiling::BufferManager& bufferManager = profilingServiceHelper.GetProfilingBufferManager(); |
| 681 | auto readableBuffer = bufferManager.GetReadableBuffer(); |
| 682 | |
| 683 | // Profiling is enabled, the post-optimisation structure should be created |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 684 | CHECK(readableBuffer != nullptr); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 685 | |
| 686 | unsigned int size = readableBuffer->GetSize(); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 687 | |
| 688 | const unsigned char* readableData = readableBuffer->GetReadableData(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 689 | CHECK(readableData != nullptr); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 690 | |
| 691 | unsigned int offset = 0; |
| 692 | |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 693 | // Verify Header |
Jim Flynn | f771321 | 2020-07-14 09:50:59 +0100 | [diff] [blame] | 694 | VerifyTimelineHeaderBinary(readableData, offset, size - 8); |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 695 | |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 696 | // Post-optimisation network |
| 697 | // Network entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 698 | VerifyTimelineEntityBinaryPacketData(optNetGuid, readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 699 | |
| 700 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 701 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 702 | EmptyOptional(), |
| 703 | optNetGuid, |
| 704 | LabelsAndEventClasses::NETWORK_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 705 | LabelsAndEventClasses::TYPE_GUID, |
| 706 | readableData, |
| 707 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 708 | |
Jim Flynn | f771321 | 2020-07-14 09:50:59 +0100 | [diff] [blame] | 709 | // Network - START OF LIFE |
| 710 | ProfilingGuid networkSolEventGuid = VerifyTimelineEventBinaryPacket(EmptyOptional(), |
| 711 | EmptyOptional(), |
| 712 | EmptyOptional(), |
| 713 | readableData, |
| 714 | offset); |
Jim Flynn | f771321 | 2020-07-14 09:50:59 +0100 | [diff] [blame] | 715 | |
| 716 | // Network - START OF LIFE event relationship |
| 717 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 718 | EmptyOptional(), |
| 719 | optNetGuid, |
| 720 | networkSolEventGuid, |
| 721 | LabelsAndEventClasses::ARMNN_PROFILING_SOL_EVENT_CLASS, |
| 722 | readableData, |
| 723 | offset); |
Jim Flynn | f771321 | 2020-07-14 09:50:59 +0100 | [diff] [blame] | 724 | |
| 725 | // Process ID Label |
| 726 | int processID = armnnUtils::Processes::GetCurrentId(); |
| 727 | std::stringstream ss; |
| 728 | ss << processID; |
| 729 | std::string processIdLabel = ss.str(); |
| 730 | VerifyTimelineLabelBinaryPacketData(EmptyOptional(), processIdLabel, readableData, offset); |
Jim Flynn | f771321 | 2020-07-14 09:50:59 +0100 | [diff] [blame] | 731 | |
| 732 | // Entity - Process ID relationship |
| 733 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 734 | EmptyOptional(), |
| 735 | optNetGuid, |
| 736 | EmptyOptional(), |
| 737 | LabelsAndEventClasses::PROCESS_ID_GUID, |
| 738 | readableData, |
| 739 | offset); |
Jim Flynn | f771321 | 2020-07-14 09:50:59 +0100 | [diff] [blame] | 740 | |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 741 | // Input layer |
| 742 | // Input layer entity |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 743 | VerifyTimelineEntityBinaryPacketData(input->GetGuid(), readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 744 | |
| 745 | // Name Entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 746 | ProfilingGuid inputLabelGuid = VerifyTimelineLabelBinaryPacketData(EmptyOptional(), "input", readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 747 | |
| 748 | // Entity - Name relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 749 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 750 | EmptyOptional(), |
| 751 | input->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 752 | inputLabelGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 753 | LabelsAndEventClasses::NAME_GUID, |
| 754 | readableData, |
| 755 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 756 | |
| 757 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 758 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 759 | EmptyOptional(), |
| 760 | input->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 761 | LabelsAndEventClasses::LAYER_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 762 | LabelsAndEventClasses::TYPE_GUID, |
| 763 | readableData, |
| 764 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 765 | |
| 766 | // Network - Input layer relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 767 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 768 | EmptyOptional(), |
| 769 | optNetGuid, |
| 770 | input->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 771 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 772 | readableData, |
| 773 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 774 | |
| 775 | // Normalization layer |
| 776 | // Normalization layer entity |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 777 | VerifyTimelineEntityBinaryPacketData(normalize->GetGuid(), readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 778 | |
| 779 | // Name entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 780 | ProfilingGuid normalizationLayerNameGuid = VerifyTimelineLabelBinaryPacketData( |
| 781 | EmptyOptional(), "normalization", readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 782 | |
| 783 | // Entity - Name relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 784 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 785 | EmptyOptional(), |
| 786 | normalize->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 787 | normalizationLayerNameGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 788 | LabelsAndEventClasses::NAME_GUID, |
| 789 | readableData, |
| 790 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 791 | |
| 792 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 793 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 794 | EmptyOptional(), |
| 795 | normalize->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 796 | LabelsAndEventClasses::LAYER_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 797 | LabelsAndEventClasses::TYPE_GUID, |
| 798 | readableData, |
| 799 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 800 | |
| 801 | // Network - Normalize layer relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 802 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 803 | EmptyOptional(), |
| 804 | optNetGuid, |
| 805 | normalize->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 806 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 807 | readableData, |
| 808 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 809 | |
| 810 | // Input layer - Normalize layer relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 811 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 812 | EmptyOptional(), |
| 813 | input->GetGuid(), |
| 814 | normalize->GetGuid(), |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 815 | LabelsAndEventClasses::CONNECTION_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 816 | readableData, |
| 817 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 818 | |
| 819 | // Normalization workload |
| 820 | // Normalization workload entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 821 | ProfilingGuid normalizationWorkloadGuid = VerifyTimelineEntityBinaryPacketData( |
| 822 | EmptyOptional(), readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 823 | |
| 824 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 825 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 826 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 827 | normalizationWorkloadGuid, |
| 828 | LabelsAndEventClasses::WORKLOAD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 829 | LabelsAndEventClasses::TYPE_GUID, |
| 830 | readableData, |
| 831 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 832 | |
| 833 | // BackendId entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 834 | ProfilingGuid cpuRefLabelGuid = VerifyTimelineLabelBinaryPacketData( |
| 835 | EmptyOptional(), "CpuRef", readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 836 | |
| 837 | // Entity - BackendId relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 838 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 839 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 840 | normalizationWorkloadGuid, |
| 841 | cpuRefLabelGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 842 | LabelsAndEventClasses::BACKENDID_GUID, |
| 843 | readableData, |
| 844 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 845 | |
| 846 | // Normalize layer - Normalize workload relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 847 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 848 | EmptyOptional(), |
| 849 | normalize->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 850 | normalizationWorkloadGuid, |
| 851 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 852 | readableData, |
| 853 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 854 | |
| 855 | // Output layer |
| 856 | // Output layer entity |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 857 | VerifyTimelineEntityBinaryPacketData(output->GetGuid(), readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 858 | |
| 859 | // Name entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 860 | ProfilingGuid outputLabelGuid = VerifyTimelineLabelBinaryPacketData( |
| 861 | EmptyOptional(), "output", readableData, offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 862 | |
| 863 | // Entity - Name relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 864 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 865 | EmptyOptional(), |
| 866 | output->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 867 | outputLabelGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 868 | LabelsAndEventClasses::NAME_GUID, |
| 869 | readableData, |
| 870 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 871 | |
| 872 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 873 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 874 | EmptyOptional(), |
| 875 | output->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 876 | LabelsAndEventClasses::LAYER_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 877 | LabelsAndEventClasses::TYPE_GUID, |
| 878 | readableData, |
| 879 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 880 | |
| 881 | // Network - Output layer relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 882 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 883 | EmptyOptional(), |
| 884 | optNetGuid, |
| 885 | output->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 886 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 887 | readableData, |
| 888 | offset); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 889 | |
| 890 | // Normalize layer - Output layer relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 891 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 892 | EmptyOptional(), |
| 893 | normalize->GetGuid(), |
| 894 | output->GetGuid(), |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 895 | LabelsAndEventClasses::CONNECTION_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 896 | readableData, |
| 897 | offset); |
Derek Lamberti | 836b27b | 2019-11-20 10:51:57 +0000 | [diff] [blame] | 898 | |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 899 | bufferManager.MarkRead(readableBuffer); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 900 | |
| 901 | // Creates structures for input & output. |
| 902 | std::vector<float> inputData(16); |
| 903 | std::vector<float> outputData(16); |
| 904 | |
Cathal Corbett | 5b8093c | 2021-10-22 11:12:07 +0100 | [diff] [blame^] | 905 | TensorInfo inputTensorInfo = runtime.GetInputTensorInfo(netId, 0); |
| 906 | inputTensorInfo.SetConstant(true); |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 907 | InputTensors inputTensors |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 908 | { |
Cathal Corbett | 5b8093c | 2021-10-22 11:12:07 +0100 | [diff] [blame^] | 909 | {0, ConstTensor(inputTensorInfo, inputData.data())} |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 910 | }; |
| 911 | OutputTensors outputTensors |
| 912 | { |
Sadik Armagan | 3184c90 | 2020-03-18 10:57:30 +0000 | [diff] [blame] | 913 | {0, Tensor(runtime.GetOutputTensorInfo(netId, 0), outputData.data())} |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 914 | }; |
| 915 | |
| 916 | // Does the inference. |
Sadik Armagan | 3184c90 | 2020-03-18 10:57:30 +0000 | [diff] [blame] | 917 | runtime.EnqueueWorkload(netId, inputTensors, outputTensors); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 918 | |
Finn Williams | b6a402f | 2020-03-24 13:46:22 +0000 | [diff] [blame] | 919 | // Get readable buffer for input workload |
| 920 | auto inputReadableBuffer = bufferManager.GetReadableBuffer(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 921 | CHECK(inputReadableBuffer != nullptr); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 922 | |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 923 | // Get readable buffer for output workload |
| 924 | auto outputReadableBuffer = bufferManager.GetReadableBuffer(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 925 | CHECK(outputReadableBuffer != nullptr); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 926 | |
Finn Williams | b6a402f | 2020-03-24 13:46:22 +0000 | [diff] [blame] | 927 | // Get readable buffer for inference timeline |
| 928 | auto inferenceReadableBuffer = bufferManager.GetReadableBuffer(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 929 | CHECK(inferenceReadableBuffer != nullptr); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 930 | |
| 931 | // Validate input workload data |
| 932 | size = inputReadableBuffer->GetSize(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 933 | CHECK(size == 164); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 934 | |
| 935 | readableData = inputReadableBuffer->GetReadableData(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 936 | CHECK(readableData != nullptr); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 937 | |
| 938 | offset = 0; |
| 939 | |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 940 | // Verify Header |
Finn Williams | 0a336dc | 2020-05-11 15:39:58 +0100 | [diff] [blame] | 941 | VerifyTimelineHeaderBinary(readableData, offset, 156); |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 942 | |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 943 | // Input workload |
| 944 | // Input workload entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 945 | ProfilingGuid inputWorkloadGuid = VerifyTimelineEntityBinaryPacketData(EmptyOptional(), readableData, offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 946 | |
| 947 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 948 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 949 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 950 | inputWorkloadGuid, |
| 951 | LabelsAndEventClasses::WORKLOAD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 952 | LabelsAndEventClasses::TYPE_GUID, |
| 953 | readableData, |
| 954 | offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 955 | |
| 956 | // BackendId entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 957 | ProfilingGuid CpuRefLabelGuid = VerifyTimelineLabelBinaryPacketData( |
| 958 | EmptyOptional(), "CpuRef", readableData, offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 959 | |
| 960 | // Entity - BackendId relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 961 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 962 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 963 | inputWorkloadGuid, |
| 964 | CpuRefLabelGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 965 | LabelsAndEventClasses::BACKENDID_GUID, |
| 966 | readableData, |
| 967 | offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 968 | |
| 969 | // Input layer - Input workload relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 970 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 971 | EmptyOptional(), |
| 972 | input->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 973 | inputWorkloadGuid, |
| 974 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 975 | readableData, |
| 976 | offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 977 | |
| 978 | bufferManager.MarkRead(inputReadableBuffer); |
| 979 | |
| 980 | // Validate output workload data |
| 981 | size = outputReadableBuffer->GetSize(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 982 | CHECK(size == 164); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 983 | |
| 984 | readableData = outputReadableBuffer->GetReadableData(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 985 | CHECK(readableData != nullptr); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 986 | |
| 987 | offset = 0; |
| 988 | |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 989 | // Verify Header |
Finn Williams | 0a336dc | 2020-05-11 15:39:58 +0100 | [diff] [blame] | 990 | VerifyTimelineHeaderBinary(readableData, offset, 156); |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 991 | |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 992 | // Output workload |
| 993 | // Output workload entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 994 | ProfilingGuid outputWorkloadGuid = VerifyTimelineEntityBinaryPacketData(EmptyOptional(), readableData, offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 995 | |
| 996 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 997 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 998 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 999 | outputWorkloadGuid, |
| 1000 | LabelsAndEventClasses::WORKLOAD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1001 | LabelsAndEventClasses::TYPE_GUID, |
| 1002 | readableData, |
| 1003 | offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 1004 | |
| 1005 | // BackendId entity |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1006 | VerifyTimelineLabelBinaryPacketData(EmptyOptional(), "CpuRef", readableData, offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 1007 | |
| 1008 | // Entity - BackendId relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1009 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 1010 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1011 | outputWorkloadGuid, |
| 1012 | CpuRefLabelGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1013 | LabelsAndEventClasses::BACKENDID_GUID, |
| 1014 | readableData, |
| 1015 | offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 1016 | |
| 1017 | // Output layer - Output workload relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1018 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 1019 | EmptyOptional(), |
| 1020 | output->GetGuid(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1021 | outputWorkloadGuid, |
| 1022 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1023 | readableData, |
| 1024 | offset); |
Narumol Prangnawarat | aa68e01 | 2019-11-29 17:17:43 +0000 | [diff] [blame] | 1025 | |
| 1026 | bufferManager.MarkRead(outputReadableBuffer); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1027 | |
| 1028 | // Validate inference data |
| 1029 | size = inferenceReadableBuffer->GetSize(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 1030 | CHECK(size == 976 + 8 * ThreadIdSize); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1031 | |
| 1032 | readableData = inferenceReadableBuffer->GetReadableData(); |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 1033 | CHECK(readableData != nullptr); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1034 | |
| 1035 | offset = 0; |
| 1036 | |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1037 | // Verify Header |
Finn Williams | 0a336dc | 2020-05-11 15:39:58 +0100 | [diff] [blame] | 1038 | VerifyTimelineHeaderBinary(readableData, offset, 968 + 8 * ThreadIdSize); |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1039 | |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1040 | // Inference timeline trace |
| 1041 | // Inference entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1042 | ProfilingGuid inferenceGuid = VerifyTimelineEntityBinaryPacketData(EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1043 | |
| 1044 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1045 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 1046 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1047 | inferenceGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1048 | LabelsAndEventClasses::INFERENCE_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1049 | LabelsAndEventClasses::TYPE_GUID, |
| 1050 | readableData, |
| 1051 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1052 | |
| 1053 | // Network - Inference relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1054 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 1055 | EmptyOptional(), |
| 1056 | optNetGuid, |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1057 | inferenceGuid, |
| 1058 | LabelsAndEventClasses::EXECUTION_OF_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1059 | readableData, |
| 1060 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1061 | |
| 1062 | // Start Inference life |
| 1063 | // Event packet - timeline, threadId, eventGuid |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1064 | ProfilingGuid inferenceEventGuid = VerifyTimelineEventBinaryPacket( |
| 1065 | EmptyOptional(), EmptyOptional(), EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1066 | |
| 1067 | // Inference - event relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1068 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 1069 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1070 | inferenceGuid, |
| 1071 | inferenceEventGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1072 | LabelsAndEventClasses::ARMNN_PROFILING_SOL_EVENT_CLASS, |
| 1073 | readableData, |
| 1074 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1075 | |
| 1076 | // Execution |
| 1077 | // Input workload execution |
| 1078 | // Input workload execution entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1079 | ProfilingGuid inputWorkloadExecutionGuid = VerifyTimelineEntityBinaryPacketData( |
| 1080 | EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1081 | |
| 1082 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1083 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 1084 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1085 | inputWorkloadExecutionGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1086 | LabelsAndEventClasses::WORKLOAD_EXECUTION_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1087 | LabelsAndEventClasses::TYPE_GUID, |
| 1088 | readableData, |
| 1089 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1090 | |
| 1091 | // Inference - Workload execution relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1092 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 1093 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1094 | inferenceGuid, |
| 1095 | inputWorkloadExecutionGuid, |
| 1096 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1097 | readableData, |
| 1098 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1099 | |
| 1100 | // Workload - Workload execution relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1101 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 1102 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1103 | inputWorkloadGuid, |
| 1104 | inputWorkloadExecutionGuid, |
| 1105 | LabelsAndEventClasses::EXECUTION_OF_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1106 | readableData, |
| 1107 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1108 | |
| 1109 | // Start Input workload execution life |
| 1110 | // Event packet - timeline, threadId, eventGuid |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1111 | ProfilingGuid inputWorkloadExecutionSOLEventId = VerifyTimelineEventBinaryPacket( |
| 1112 | EmptyOptional(), EmptyOptional(), EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1113 | |
| 1114 | // Input workload execution - event relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1115 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 1116 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1117 | inputWorkloadExecutionGuid, |
| 1118 | inputWorkloadExecutionSOLEventId, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1119 | LabelsAndEventClasses::ARMNN_PROFILING_SOL_EVENT_CLASS, |
| 1120 | readableData, |
| 1121 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1122 | |
| 1123 | // End of Input workload execution life |
| 1124 | // Event packet - timeline, threadId, eventGuid |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1125 | ProfilingGuid inputWorkloadExecutionEOLEventId = VerifyTimelineEventBinaryPacket( |
| 1126 | EmptyOptional(), EmptyOptional(), EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1127 | |
| 1128 | // Input workload execution - event relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1129 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 1130 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1131 | inputWorkloadExecutionGuid, |
| 1132 | inputWorkloadExecutionEOLEventId, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1133 | LabelsAndEventClasses::ARMNN_PROFILING_EOL_EVENT_CLASS, |
| 1134 | readableData, |
| 1135 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1136 | |
| 1137 | // Normalize workload execution |
| 1138 | // Normalize workload execution entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1139 | ProfilingGuid normalizeWorkloadExecutionGuid = VerifyTimelineEntityBinaryPacketData( |
| 1140 | EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1141 | |
| 1142 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1143 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 1144 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1145 | normalizeWorkloadExecutionGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1146 | LabelsAndEventClasses::WORKLOAD_EXECUTION_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1147 | LabelsAndEventClasses::TYPE_GUID, |
| 1148 | readableData, |
| 1149 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1150 | |
| 1151 | // Inference - Workload execution relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1152 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 1153 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1154 | inferenceGuid, |
| 1155 | normalizeWorkloadExecutionGuid, |
| 1156 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1157 | readableData, |
| 1158 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1159 | |
| 1160 | // Workload - Workload execution relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1161 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 1162 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1163 | normalizationWorkloadGuid, |
| 1164 | normalizeWorkloadExecutionGuid, |
| 1165 | LabelsAndEventClasses::EXECUTION_OF_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1166 | readableData, |
| 1167 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1168 | |
| 1169 | // Start Normalize workload execution life |
| 1170 | // Event packet - timeline, threadId, eventGuid |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1171 | ProfilingGuid normalizationWorkloadExecutionSOLEventGuid = VerifyTimelineEventBinaryPacket( |
| 1172 | EmptyOptional(), EmptyOptional(), EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1173 | |
| 1174 | // Normalize workload execution - event relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1175 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 1176 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1177 | normalizeWorkloadExecutionGuid, |
| 1178 | normalizationWorkloadExecutionSOLEventGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1179 | LabelsAndEventClasses::ARMNN_PROFILING_SOL_EVENT_CLASS, |
| 1180 | readableData, |
| 1181 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1182 | |
| 1183 | // End of Normalize workload execution life |
| 1184 | // Event packet - timeline, threadId, eventGuid |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1185 | ProfilingGuid normalizationWorkloadExecutionEOLEventGuid = VerifyTimelineEventBinaryPacket( |
| 1186 | EmptyOptional(), EmptyOptional(), EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1187 | |
| 1188 | // Normalize workload execution - event relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1189 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 1190 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1191 | normalizeWorkloadExecutionGuid, |
| 1192 | normalizationWorkloadExecutionEOLEventGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1193 | LabelsAndEventClasses::ARMNN_PROFILING_EOL_EVENT_CLASS, |
| 1194 | readableData, |
| 1195 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1196 | |
| 1197 | // Output workload execution |
| 1198 | // Output workload execution entity |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1199 | ProfilingGuid outputWorkloadExecutionGuid = VerifyTimelineEntityBinaryPacketData( |
| 1200 | EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1201 | |
| 1202 | // Entity - Type relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1203 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::LabelLink, |
| 1204 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1205 | outputWorkloadExecutionGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1206 | LabelsAndEventClasses::WORKLOAD_EXECUTION_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1207 | LabelsAndEventClasses::TYPE_GUID, |
| 1208 | readableData, |
| 1209 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1210 | |
| 1211 | // Inference - Workload execution relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1212 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 1213 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1214 | inferenceGuid, |
| 1215 | outputWorkloadExecutionGuid, |
| 1216 | LabelsAndEventClasses::CHILD_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1217 | readableData, |
| 1218 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1219 | |
| 1220 | // Workload - Workload execution relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1221 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::RetentionLink, |
| 1222 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1223 | outputWorkloadGuid, |
| 1224 | outputWorkloadExecutionGuid, |
| 1225 | LabelsAndEventClasses::EXECUTION_OF_GUID, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1226 | readableData, |
| 1227 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1228 | |
| 1229 | // Start Output workload execution life |
| 1230 | // Event packet - timeline, threadId, eventGuid |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1231 | ProfilingGuid outputWorkloadExecutionSOLEventGuid = VerifyTimelineEventBinaryPacket( |
| 1232 | EmptyOptional(), EmptyOptional(), EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1233 | |
| 1234 | // Output workload execution - event relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1235 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 1236 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1237 | outputWorkloadExecutionGuid, |
| 1238 | outputWorkloadExecutionSOLEventGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1239 | LabelsAndEventClasses::ARMNN_PROFILING_SOL_EVENT_CLASS, |
| 1240 | readableData, |
| 1241 | offset); |
Finn Williams | 0a336dc | 2020-05-11 15:39:58 +0100 | [diff] [blame] | 1242 | |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1243 | // End of Normalize workload execution life |
| 1244 | // Event packet - timeline, threadId, eventGuid |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1245 | ProfilingGuid outputWorkloadExecutionEOLEventGuid = VerifyTimelineEventBinaryPacket( |
| 1246 | EmptyOptional(), EmptyOptional(), EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1247 | |
| 1248 | // Output workload execution - event relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1249 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 1250 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1251 | outputWorkloadExecutionGuid, |
| 1252 | outputWorkloadExecutionEOLEventGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1253 | LabelsAndEventClasses::ARMNN_PROFILING_EOL_EVENT_CLASS, |
| 1254 | readableData, |
| 1255 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1256 | |
| 1257 | // End of Inference life |
| 1258 | // Event packet - timeline, threadId, eventGuid |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1259 | ProfilingGuid inferenceEOLEventGuid = VerifyTimelineEventBinaryPacket( |
| 1260 | EmptyOptional(), EmptyOptional(), EmptyOptional(), readableData, offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1261 | |
| 1262 | // Inference - event relationship |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1263 | VerifyTimelineRelationshipBinaryPacketData(ProfilingRelationshipType::ExecutionLink, |
| 1264 | EmptyOptional(), |
Jim Flynn | 6398a98 | 2020-05-27 17:05:21 +0100 | [diff] [blame] | 1265 | inferenceGuid, |
| 1266 | inferenceEOLEventGuid, |
Keith Davis | 97da5e2 | 2020-03-05 16:25:28 +0000 | [diff] [blame] | 1267 | LabelsAndEventClasses::ARMNN_PROFILING_EOL_EVENT_CLASS, |
| 1268 | readableData, |
| 1269 | offset); |
David Monahan | 6198fe0 | 2019-12-02 08:35:43 +0000 | [diff] [blame] | 1270 | |
| 1271 | bufferManager.MarkRead(inferenceReadableBuffer); |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 1272 | } |
| 1273 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 1274 | TEST_CASE("ProfilingPostOptimisationStructureCpuRef") |
Narumol Prangnawarat | df31cfe | 2019-11-22 11:26:06 +0000 | [diff] [blame] | 1275 | { |
| 1276 | VerifyPostOptimisationStructureTestImpl(armnn::Compute::CpuRef); |
| 1277 | } |
| 1278 | |
Sadik Armagan | 1625efc | 2021-06-10 18:24:34 +0100 | [diff] [blame] | 1279 | } |