Commit | Line | Data |
---|---|---|
e29d1b70 JA |
1 | /* |
2 | * IO verification helpers | |
3 | */ | |
4 | #include <unistd.h> | |
5 | #include <fcntl.h> | |
6 | #include <string.h> | |
7 | ||
8 | #include "fio.h" | |
9 | #include "os.h" | |
10 | ||
11 | static void fill_random_bytes(struct thread_data *td, | |
12 | unsigned char *p, unsigned int len) | |
13 | { | |
14 | unsigned int todo; | |
15 | double r; | |
16 | ||
17 | while (len) { | |
18 | r = os_random_double(&td->verify_state); | |
19 | ||
20 | /* | |
21 | * lrand48_r seems to be broken and only fill the bottom | |
22 | * 32-bits, even on 64-bit archs with 64-bit longs | |
23 | */ | |
24 | todo = sizeof(r); | |
25 | if (todo > len) | |
26 | todo = len; | |
27 | ||
28 | memcpy(p, &r, todo); | |
29 | ||
30 | len -= todo; | |
31 | p += todo; | |
32 | } | |
33 | } | |
34 | ||
35 | static void hexdump(void *buffer, int len) | |
36 | { | |
37 | unsigned char *p = buffer; | |
38 | int i; | |
39 | ||
40 | for (i = 0; i < len; i++) | |
41 | fprintf(f_out, "%02x", p[i]); | |
42 | fprintf(f_out, "\n"); | |
43 | } | |
44 | ||
45 | static int verify_io_u_crc32(struct verify_header *hdr, struct io_u *io_u) | |
46 | { | |
47 | unsigned char *p = (unsigned char *) io_u->buf; | |
48 | unsigned long c; | |
49 | ||
50 | p += sizeof(*hdr); | |
51 | c = crc32(p, hdr->len - sizeof(*hdr)); | |
52 | ||
53 | if (c != hdr->crc32) { | |
a4f4fdd7 | 54 | log_err("crc32: verify failed at %llu/%lu\n", io_u->offset, io_u->buflen); |
e29d1b70 JA |
55 | log_err("crc32: wanted %lx, got %lx\n", hdr->crc32, c); |
56 | return 1; | |
57 | } | |
58 | ||
59 | return 0; | |
60 | } | |
61 | ||
62 | static int verify_io_u_md5(struct verify_header *hdr, struct io_u *io_u) | |
63 | { | |
64 | unsigned char *p = (unsigned char *) io_u->buf; | |
65 | struct md5_ctx md5_ctx; | |
66 | ||
67 | memset(&md5_ctx, 0, sizeof(md5_ctx)); | |
68 | p += sizeof(*hdr); | |
69 | md5_update(&md5_ctx, p, hdr->len - sizeof(*hdr)); | |
70 | ||
71 | if (memcmp(hdr->md5_digest, md5_ctx.hash, sizeof(md5_ctx.hash))) { | |
a4f4fdd7 | 72 | log_err("md5: verify failed at %llu/%lu\n", io_u->offset, io_u->buflen); |
e29d1b70 JA |
73 | hexdump(hdr->md5_digest, sizeof(hdr->md5_digest)); |
74 | hexdump(md5_ctx.hash, sizeof(md5_ctx.hash)); | |
75 | return 1; | |
76 | } | |
77 | ||
78 | return 0; | |
79 | } | |
80 | ||
3af6ef39 | 81 | int verify_io_u(struct io_u *io_u) |
e29d1b70 JA |
82 | { |
83 | struct verify_header *hdr = (struct verify_header *) io_u->buf; | |
84 | int ret; | |
85 | ||
36167d82 JA |
86 | if (hdr->fio_magic != FIO_HDR_MAGIC) { |
87 | log_err("Bad verify header %x\n", hdr->fio_magic); | |
e29d1b70 | 88 | return 1; |
36167d82 | 89 | } |
e29d1b70 JA |
90 | |
91 | if (hdr->verify_type == VERIFY_MD5) | |
92 | ret = verify_io_u_md5(hdr, io_u); | |
93 | else if (hdr->verify_type == VERIFY_CRC32) | |
94 | ret = verify_io_u_crc32(hdr, io_u); | |
95 | else { | |
1e97cce9 | 96 | log_err("Bad verify type %u\n", hdr->verify_type); |
e29d1b70 JA |
97 | ret = 1; |
98 | } | |
99 | ||
100 | return ret; | |
101 | } | |
102 | ||
103 | static void fill_crc32(struct verify_header *hdr, void *p, unsigned int len) | |
104 | { | |
105 | hdr->crc32 = crc32(p, len); | |
106 | } | |
107 | ||
108 | static void fill_md5(struct verify_header *hdr, void *p, unsigned int len) | |
109 | { | |
110 | struct md5_ctx md5_ctx; | |
111 | ||
112 | memset(&md5_ctx, 0, sizeof(md5_ctx)); | |
113 | md5_update(&md5_ctx, p, len); | |
114 | memcpy(hdr->md5_digest, md5_ctx.hash, sizeof(md5_ctx.hash)); | |
115 | } | |
116 | ||
117 | /* | |
118 | * fill body of io_u->buf with random data and add a header with the | |
119 | * crc32 or md5 sum of that data. | |
120 | */ | |
121 | void populate_verify_io_u(struct thread_data *td, struct io_u *io_u) | |
122 | { | |
123 | unsigned char *p = (unsigned char *) io_u->buf; | |
124 | struct verify_header hdr; | |
125 | ||
126 | hdr.fio_magic = FIO_HDR_MAGIC; | |
127 | hdr.len = io_u->buflen; | |
128 | p += sizeof(hdr); | |
129 | fill_random_bytes(td, p, io_u->buflen - sizeof(hdr)); | |
130 | ||
131 | if (td->verify == VERIFY_MD5) { | |
132 | fill_md5(&hdr, p, io_u->buflen - sizeof(hdr)); | |
133 | hdr.verify_type = VERIFY_MD5; | |
134 | } else { | |
135 | fill_crc32(&hdr, p, io_u->buflen - sizeof(hdr)); | |
136 | hdr.verify_type = VERIFY_CRC32; | |
137 | } | |
138 | ||
139 | memcpy(io_u->buf, &hdr, sizeof(hdr)); | |
140 | } | |
141 | ||
142 | int get_next_verify(struct thread_data *td, struct io_u *io_u) | |
143 | { | |
144 | struct io_piece *ipo; | |
145 | ||
d2d7fa53 JA |
146 | /* |
147 | * this io_u is from a requeue, we already filled the offsets | |
148 | */ | |
149 | if (io_u->file) | |
150 | return 0; | |
151 | ||
e29d1b70 JA |
152 | if (!list_empty(&td->io_hist_list)) { |
153 | ipo = list_entry(td->io_hist_list.next, struct io_piece, list); | |
154 | ||
155 | list_del(&ipo->list); | |
156 | ||
157 | io_u->offset = ipo->offset; | |
158 | io_u->buflen = ipo->len; | |
36167d82 | 159 | io_u->file = ipo->file; |
e29d1b70 | 160 | io_u->ddir = DDIR_READ; |
36167d82 JA |
161 | io_u->xfer_buf = io_u->buf; |
162 | io_u->xfer_buflen = io_u->buflen; | |
e29d1b70 JA |
163 | free(ipo); |
164 | return 0; | |
165 | } | |
166 | ||
167 | return 1; | |
168 | } |