The following changes since commit a606a802173272002e37be6475802be8c37481d6:
Cast input argument for json_object_add_value_int to long long (2014-06-24
19:31:22 -0600)
are available in the git repository at:
git://git.kernel.dk/fio.git master
for you to fetch changes up to 4445856ab659ffa41bdb8f5b81aa00704c50a5c6:
Verify: Tighten header length check in verify_header() (2014-06-26 19:30:16
+0200)
----------------------------------------------------------------
Andreas Gruenbacher (3):
update_condensed_str(): Fix for empty input strings
Verify: Fix and improve verify_header()
Verify: Tighten header length check in verify_header()
Tiziano Müller (1):
Add configure flags for gfapi and rbd
configure | 8 +++++--
eta.c | 39 ++++++++++--------------------
verify.c | 80 +++++++++++++++++++++++++------------------------------------
3 files changed, 51 insertions(+), 76 deletions(-)
---
Diff of recent changes:
diff --git a/configure b/configure
index 0e861ee..f1e116e 100755
--- a/configure
+++ b/configure
@@ -156,6 +156,10 @@ for opt do
;;
--disable-numa) disable_numa="yes"
;;
+ --disable-rbd) disable_rbd="yes"
+ ;;
+ --disable-gfapi) disable_gfapi="yes"
+ ;;
--help)
show_help="yes"
;;
@@ -1146,7 +1150,7 @@ int main(int argc, char **argv)
return 0;
}
EOF
-if compile_prog "" "-lrbd -lrados" "rbd"; then
+if test "$disable_rbd" != "yes" && compile_prog "" "-lrbd -lrados" "rbd"; then
LIBS="-lrbd -lrados $LIBS"
rbd="yes"
fi
@@ -1183,7 +1187,7 @@ int main(int argc, char **argv)
return 0;
}
EOF
-if compile_prog "" "-lgfapi -lglusterfs" "gfapi"; then
+if test "$disable_gfapi" != "yes" && compile_prog "" "-lgfapi -lglusterfs"
"gfapi"; then
LIBS="-lgfapi -lglusterfs $LIBS"
gfapi="yes"
fi
diff --git a/eta.c b/eta.c
index bdd5376..850a784 100644
--- a/eta.c
+++ b/eta.c
@@ -12,35 +12,20 @@ static char run_str[__THREAD_RUNSTR_SZ(REAL_MAX_JOBS)];
static void update_condensed_str(char *run_str, char *run_str_condensed)
{
- int i, ci, last, nr;
- size_t len;
-
- len = strlen(run_str);
- if (!len)
- return;
-
- last = 0;
- nr = 0;
- ci = 0;
- for (i = 0; i < len; i++) {
- if (!last) {
-new:
- run_str_condensed[ci] = run_str[i];
- last = run_str[i];
- nr = 1;
- ci++;
- } else if (last == run_str[i]) {
- nr++;
- } else {
- ci += sprintf(&run_str_condensed[ci], "(%u),", nr);
- goto new;
+ if (*run_str) {
+ while (*run_str) {
+ int nr = 1;
+
+ *run_str_condensed++ = *run_str++;
+ while (*(run_str - 1) == *run_str) {
+ run_str++;
+ nr++;
+ }
+ run_str_condensed += sprintf(run_str_condensed,
"(%u),", nr);
}
+ run_str_condensed--;
}
-
- if (nr)
- ci += sprintf(&run_str_condensed[ci], "(%u)", nr);
-
- run_str_condensed[ci + 1] = '\0';
+ *run_str_condensed = '\0';
}
/*
diff --git a/verify.c b/verify.c
index 282a8cf..2615701 100644
--- a/verify.c
+++ b/verify.c
@@ -709,23 +709,42 @@ static int verify_trimmed_io_u(struct thread_data *td,
struct io_u *io_u)
return ret;
}
-static int verify_header(struct io_u *io_u, struct verify_header *hdr)
+static int verify_header(struct io_u *io_u, struct verify_header *hdr,
+ unsigned int hdr_num, unsigned int hdr_len)
{
void *p = hdr;
uint32_t crc;
- if (hdr->magic != FIO_HDR_MAGIC)
- return 1;
- if (hdr->len > io_u->buflen)
- return 2;
- if (hdr->rand_seed != io_u->rand_seed)
- return 3;
+ if (hdr->magic != FIO_HDR_MAGIC) {
+ log_err("verify: bad magic header %x, wanted %x",
+ hdr->magic, FIO_HDR_MAGIC);
+ goto err;
+ }
+ if (hdr->len != hdr_len) {
+ log_err("verify: bad header length %u, wanted %u",
+ hdr->len, hdr_len);
+ goto err;
+ }
+ if (hdr->rand_seed != io_u->rand_seed) {
+ log_err("verify: bad header rand_seed %"PRIu64
+ ", wanted %"PRIu64,
+ hdr->rand_seed, io_u->rand_seed);
+ goto err;
+ }
crc = fio_crc32c(p, offsetof(struct verify_header, crc32));
- if (crc == hdr->crc32)
- return 0;
- log_err("fio: verify header crc %x, calculated %x\n", hdr->crc32, crc);
- return 4;
+ if (crc != hdr->crc32) {
+ log_err("verify: bad header crc %x, calculated %x",
+ hdr->crc32, crc);
+ goto err;
+ }
+ return 0;
+
+err:
+ log_err(" at file %s offset %llu, length %u\n",
+ io_u->file->file_name,
+ io_u->offset + hdr_num * hdr_len, hdr_len);
+ return EILSEQ;
}
int verify_io_u(struct thread_data *td, struct io_u *io_u)
@@ -769,42 +788,9 @@ int verify_io_u(struct thread_data *td, struct io_u *io_u)
if (td->o.verifysort || (td->flags & TD_F_VER_BACKLOG))
io_u->rand_seed = hdr->rand_seed;
- ret = verify_header(io_u, hdr);
- switch (ret) {
- case 0:
- break;
- case 1:
- log_err("verify: bad magic header %x, wanted %x at "
- "file %s offset %llu, length %u\n",
- hdr->magic, FIO_HDR_MAGIC,
- io_u->file->file_name,
- io_u->offset + hdr_num * hdr->len, hdr->len);
- return EILSEQ;
- break;
- case 2:
- log_err("fio: verify header exceeds buffer length (%u "
- "> %lu)\n", hdr->len, io_u->buflen);
- return EILSEQ;
- break;
- case 3:
- log_err("verify: bad header rand_seed %"PRIu64
- ", wanted %"PRIu64" at file %s offset %llu, "
- "length %u\n",
- hdr->rand_seed, io_u->rand_seed,
- io_u->file->file_name,
- io_u->offset + hdr_num * hdr->len, hdr->len);
- return EILSEQ;
- break;
- case 4:
- return EILSEQ;
- break;
- default:
- log_err("verify: unknown header error at file %s "
- "offset %llu, length %u\n",
- io_u->file->file_name,
- io_u->offset + hdr_num * hdr->len, hdr->len);
- return EILSEQ;
- }
+ ret = verify_header(io_u, hdr, hdr_num, hdr_inc);
+ if (ret)
+ return ret;
if (td->o.verify != VERIFY_NONE)
verify_type = td->o.verify;
--
To unsubscribe from this list: send the line "unsubscribe fio" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html