X-Git-Url: https://git.kernel.dk/?a=blobdiff_plain;f=verify.c;h=e59a4b29051065cd9ebd1caf0ab1b9494f313211;hb=3ce3ad33ea92d9a4b032566249a3ad86dc3bd2a7;hp=9eb532a28e080a66a2483943f09fed16efd9ecfa;hpb=844ea60273f4e7862150d9c6430cdb15768e2f34;p=fio.git diff --git a/verify.c b/verify.c index 9eb532a2..e59a4b29 100644 --- a/verify.c +++ b/verify.c @@ -226,16 +226,32 @@ struct vcont { unsigned int crc_len; }; +#define DUMP_BUF_SZ 255 +static int dump_buf_warned; + static void dump_buf(char *buf, unsigned int len, unsigned long long offset, const char *type, struct fio_file *f) { - char *ptr, fname[256]; + char *ptr, fname[DUMP_BUF_SZ]; + size_t buf_left = DUMP_BUF_SZ; int ret, fd; ptr = strdup(f->file_name); - strcpy(fname, basename(ptr)); - sprintf(fname + strlen(fname), ".%llu.%s", offset, type); + fname[DUMP_BUF_SZ - 1] = '\0'; + strncpy(fname, basename(ptr), DUMP_BUF_SZ - 1); + + buf_left -= strlen(fname); + if (buf_left <= 0) { + if (!dump_buf_warned) { + log_err("fio: verify failure dump buffer too small\n"); + dump_buf_warned = 1; + } + free(ptr); + return; + } + + snprintf(fname + strlen(fname), buf_left, ".%llu.%s", offset, type); fd = open(fname, O_CREAT | O_TRUNC | O_WRONLY, 0644); if (fd < 0) { @@ -693,23 +709,42 @@ static int verify_trimmed_io_u(struct thread_data *td, struct io_u *io_u) return ret; } -static int verify_header(struct io_u *io_u, struct verify_header *hdr) +static int verify_header(struct io_u *io_u, struct verify_header *hdr, + unsigned int hdr_num, unsigned int hdr_len) { void *p = hdr; uint32_t crc; - if (hdr->magic != FIO_HDR_MAGIC) - return 1; - if (hdr->len > io_u->buflen) - return 2; - if (hdr->rand_seed != io_u->rand_seed) - return 3; + if (hdr->magic != FIO_HDR_MAGIC) { + log_err("verify: bad magic header %x, wanted %x", + hdr->magic, FIO_HDR_MAGIC); + goto err; + } + if (hdr->len != hdr_len) { + log_err("verify: bad header length %u, wanted %u", + hdr->len, hdr_len); + goto err; + } + if (hdr->rand_seed != io_u->rand_seed) { + log_err("verify: bad header rand_seed %"PRIu64 + ", wanted %"PRIu64, + hdr->rand_seed, io_u->rand_seed); + goto err; + } crc = fio_crc32c(p, offsetof(struct verify_header, crc32)); - if (crc == hdr->crc32) - return 0; - log_err("fio: verify header crc %x, calculated %x\n", hdr->crc32, crc); - return 4; + if (crc != hdr->crc32) { + log_err("verify: bad header crc %x, calculated %x", + hdr->crc32, crc); + goto err; + } + return 0; + +err: + log_err(" at file %s offset %llu, length %u\n", + io_u->file->file_name, + io_u->offset + hdr_num * hdr_len, hdr_len); + return EILSEQ; } int verify_io_u(struct thread_data *td, struct io_u *io_u) @@ -753,42 +788,9 @@ int verify_io_u(struct thread_data *td, struct io_u *io_u) if (td->o.verifysort || (td->flags & TD_F_VER_BACKLOG)) io_u->rand_seed = hdr->rand_seed; - ret = verify_header(io_u, hdr); - switch (ret) { - case 0: - break; - case 1: - log_err("verify: bad magic header %x, wanted %x at " - "file %s offset %llu, length %u\n", - hdr->magic, FIO_HDR_MAGIC, - io_u->file->file_name, - io_u->offset + hdr_num * hdr->len, hdr->len); - return EILSEQ; - break; - case 2: - log_err("fio: verify header exceeds buffer length (%u " - "> %lu)\n", hdr->len, io_u->buflen); - return EILSEQ; - break; - case 3: - log_err("verify: bad header rand_seed %"PRIu64 - ", wanted %"PRIu64" at file %s offset %llu, " - "length %u\n", - hdr->rand_seed, io_u->rand_seed, - io_u->file->file_name, - io_u->offset + hdr_num * hdr->len, hdr->len); - return EILSEQ; - break; - case 4: - return EILSEQ; - break; - default: - log_err("verify: unknown header error at file %s " - "offset %llu, length %u\n", - io_u->file->file_name, - io_u->offset + hdr_num * hdr->len, hdr->len); - return EILSEQ; - } + ret = verify_header(io_u, hdr, hdr_num, hdr_inc); + if (ret) + return ret; if (td->o.verify != VERIFY_NONE) verify_type = td->o.verify; @@ -845,7 +847,7 @@ int verify_io_u(struct thread_data *td, struct io_u *io_u) done: if (ret && td->o.verify_fatal) - td->terminate = 1; + fio_mark_td_terminate(td); return ret; } @@ -1080,7 +1082,7 @@ int get_next_verify(struct thread_data *td, struct io_u *io_u) assert(ipo->flags & IP_F_ONRB); ipo->flags &= ~IP_F_ONRB; } else if (!flist_empty(&td->io_hist_list)) { - ipo = flist_entry(td->io_hist_list.next, struct io_piece, list); + ipo = flist_first_entry(&td->io_hist_list, struct io_piece, list); /* * Ensure that the associated IO has completed @@ -1185,7 +1187,7 @@ static void *verify_async_thread(void *data) continue; while (!flist_empty(&list)) { - io_u = flist_entry(list.next, struct io_u, verify_list); + io_u = flist_first_entry(&list, struct io_u, verify_list); flist_del(&io_u->verify_list); ret = verify_io_u(td, io_u); @@ -1203,7 +1205,7 @@ static void *verify_async_thread(void *data) if (ret) { td_verror(td, ret, "async_verify"); if (td->o.verify_fatal) - td->terminate = 1; + fio_mark_td_terminate(td); } done: