X-Git-Url: https://git.kernel.dk/?p=fio.git;a=blobdiff_plain;f=verify.c;h=47335107452a13dee3cded9fc2fe5907e1d3cb14;hp=12eb7c984f01c4f25d99347c0e0d0b554fc1fecc;hb=8de8f047bd025f12d23cfc3fc1793434c6d8ff94;hpb=e29d1b70a21e29801fb35dfbc1b236b7c8514055 diff --git a/verify.c b/verify.c index 12eb7c98..47335107 100644 --- a/verify.c +++ b/verify.c @@ -38,8 +38,8 @@ static void hexdump(void *buffer, int len) int i; for (i = 0; i < len; i++) - fprintf(f_out, "%02x", p[i]); - fprintf(f_out, "\n"); + log_info("%02x", p[i]); + log_info("\n"); } static int verify_io_u_crc32(struct verify_header *hdr, struct io_u *io_u) @@ -51,7 +51,7 @@ static int verify_io_u_crc32(struct verify_header *hdr, struct io_u *io_u) c = crc32(p, hdr->len - sizeof(*hdr)); if (c != hdr->crc32) { - log_err("crc32: verify failed at %llu/%u\n", io_u->offset, io_u->buflen); + log_err("crc32: verify failed at %llu/%lu\n", io_u->offset, io_u->buflen); log_err("crc32: wanted %lx, got %lx\n", hdr->crc32, c); return 1; } @@ -69,7 +69,7 @@ static int verify_io_u_md5(struct verify_header *hdr, struct io_u *io_u) md5_update(&md5_ctx, p, hdr->len - sizeof(*hdr)); if (memcmp(hdr->md5_digest, md5_ctx.hash, sizeof(md5_ctx.hash))) { - log_err("md5: verify failed at %llu/%u\n", io_u->offset, io_u->buflen); + log_err("md5: verify failed at %llu/%lu\n", io_u->offset, io_u->buflen); hexdump(hdr->md5_digest, sizeof(hdr->md5_digest)); hexdump(md5_ctx.hash, sizeof(md5_ctx.hash)); return 1; @@ -78,24 +78,32 @@ static int verify_io_u_md5(struct verify_header *hdr, struct io_u *io_u) return 0; } -int verify_io_u(struct io_u *io_u) +int verify_io_u(struct thread_data *td, struct io_u *io_u) { struct verify_header *hdr = (struct verify_header *) io_u->buf; int ret; - if (hdr->fio_magic != FIO_HDR_MAGIC) - return 1; + if (td->o.verify == VERIFY_NULL) + return 0; + + if (hdr->fio_magic != FIO_HDR_MAGIC) { + log_err("Bad verify header %x\n", hdr->fio_magic); + return EIO; + } if (hdr->verify_type == VERIFY_MD5) ret = verify_io_u_md5(hdr, io_u); else if (hdr->verify_type == VERIFY_CRC32) ret = verify_io_u_crc32(hdr, io_u); else { - log_err("Bad verify type %d\n", hdr->verify_type); + log_err("Bad verify type %u\n", hdr->verify_type); ret = 1; } - return ret; + if (ret) + return EIO; + + return 0; } static void fill_crc32(struct verify_header *hdr, void *p, unsigned int len) @@ -121,15 +129,18 @@ void populate_verify_io_u(struct thread_data *td, struct io_u *io_u) unsigned char *p = (unsigned char *) io_u->buf; struct verify_header hdr; + if (td->o.verify == VERIFY_NULL) + return; + hdr.fio_magic = FIO_HDR_MAGIC; hdr.len = io_u->buflen; p += sizeof(hdr); fill_random_bytes(td, p, io_u->buflen - sizeof(hdr)); - if (td->verify == VERIFY_MD5) { + if (td->o.verify == VERIFY_MD5) { fill_md5(&hdr, p, io_u->buflen - sizeof(hdr)); hdr.verify_type = VERIFY_MD5; - } else { + } else if (td->o.verify == VERIFY_CRC32) { fill_crc32(&hdr, p, io_u->buflen - sizeof(hdr)); hdr.verify_type = VERIFY_CRC32; } @@ -139,16 +150,31 @@ void populate_verify_io_u(struct thread_data *td, struct io_u *io_u) int get_next_verify(struct thread_data *td, struct io_u *io_u) { - struct io_piece *ipo; + struct io_piece *ipo = NULL; - if (!list_empty(&td->io_hist_list)) { - ipo = list_entry(td->io_hist_list.next, struct io_piece, list); + /* + * this io_u is from a requeue, we already filled the offsets + */ + if (io_u->file) + return 0; + if (!RB_EMPTY_ROOT(&td->io_hist_tree)) { + struct rb_node *n = rb_first(&td->io_hist_tree); + + ipo = rb_entry(n, struct io_piece, rb_node); + rb_erase(n, &td->io_hist_tree); + } else if (!list_empty(&td->io_hist_list)) { + ipo = list_entry(td->io_hist_list.next, struct io_piece, list); list_del(&ipo->list); + } + if (ipo) { io_u->offset = ipo->offset; io_u->buflen = ipo->len; + io_u->file = ipo->file; io_u->ddir = DDIR_READ; + io_u->xfer_buf = io_u->buf; + io_u->xfer_buflen = io_u->buflen; free(ipo); return 0; }