hdf5/test/mirror_vfd.c

2766 lines
83 KiB
C
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* Copyright by The HDF Group. *
* All rights reserved. *
* *
* This file is part of HDF5. The full HDF5 copyright notice, including *
* terms governing use, modification, and redistribution, is contained in *
* the COPYING file, which can be found at the root of the source code *
* distribution tree, or in https://support.hdfgroup.org/ftp/HDF5/releases. *
* If you do not have access to either file, you may request a copy from *
* help@hdfgroup.org. *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
/*
* Purpose: Test the Mirror VFD functionality.
*/
/* WARNING: The use of realpath() is probably system-dependent, as are
* other things here such as the socket calls.
* Notable to realpath() in particular is the use of "PATH_MAX", which
* apparently has some major potential issues if paths are abused.
* http://insanecoding.blogspot.com/2007/11/pathmax-simply-isnt.html
* so BE CAREFUL about the paths we throw around?
*/
#include "h5test.h"
#include "cache_common.h"
#include "genall5.h"
#ifdef H5_HAVE_MIRROR_VFD
#include "H5FDmirror_priv.h" /* Private header for the mirror VFD */
/* For future consideration, IP address and port number might be
* environment variables?
*/
#define SERVER_IP_ADDRESS "127.0.0.1"
/* Primary listening port on server. */
#define SERVER_HANDSHAKE_PORT 3000
#define DATABUFFER_SIZE 128
#define DSET_NAME_LEN 16
/* Parameters for the "large chunked dataset" writing */
#define MAX_DSET_COUNT 255
#define DSET_DIM 32
#define CHUNK_DIM 8
#define CONCURRENT_COUNT 3 /* Number of files in concurrent test */
/* Macro: LOGPRINT()
* Prints logging and debugging messages to the output stream based
* on the level of verbosity.
* 0 : no logging
* 1 : errors only
* 2 : details
* 3 : all
*/
#define DEFAULT_VERBOSITY 1
static unsigned int g_verbosity = DEFAULT_VERBOSITY;
/* Macro for selective debug printing / logging */
#define LOGPRINT(lvl, ...) \
do { \
if ((lvl) <= g_verbosity) { \
fprintf(g_log_stream, __VA_ARGS__); \
fflush(g_log_stream); \
} \
} while (0)
#define MIRROR_RW_DIR "mirror_rw/"
#define MIRROR_WO_DIR "mirror_wo/"
/* String buffer for error messages */
#define MIRR_MESG_SIZE 128
static char mesg[MIRR_MESG_SIZE + 1];
/* Convenience structure for passing file names via helper functions.
*/
struct mirrortest_filenames {
char rw[H5FD_SPLITTER_PATH_MAX+1];
char wo[H5FD_SPLITTER_PATH_MAX+1];
char log[H5FD_SPLITTER_PATH_MAX+1];
};
static FILE *g_log_stream = NULL; /* initialized at runtime */
static herr_t _verify_datasets(unsigned min_dset, unsigned max_dset,
hid_t *filespace_id, hid_t *dataset_id, hid_t memspace_id);
static herr_t _create_chunking_ids(hid_t file_id, unsigned min_dset,
unsigned max_dset, hsize_t *chunk_dims, hsize_t *dset_dims,
hid_t *dataspace_ids, hid_t *filespace_ids, hid_t *dataset_ids,
hid_t *memspace_id);
static herr_t _close_chunking_ids(unsigned min_dset, unsigned max_dset,
hid_t *dataspace_ids, hid_t *filespace_ids, hid_t *dataset_ids,
hid_t *memspace_id);
static herr_t _populate_filepath(const char *dirname, const char *_basename,
hid_t fapl_id, char *path_out, hbool_t h5suffix);
static hid_t create_mirroring_split_fapl(const char *_basename,
struct mirrortest_filenames *names);
static void mybzero(void *dest, size_t size);
/* ----------------------------------------------------------------------------
* Function: mybzero
*
* Purpose: Have bzero simplicity and abstraction in (possible) absence of
* it being available.
*
* Programmer: Jacob Smith
* 2020-03-30
* ----------------------------------------------------------------------------
*/
static void
mybzero(void *dest, size_t size)
{
size_t i = 0;
char *s = NULL;
HDassert(dest != NULL);
s = (char *)dest;
for (i = 0; i < size; i++) {
*(s+i) = 0;
}
} /* end mybzero() */
/* ----------------------------------------------------------------------------
* Function: _populate_filepath
*
* Purpose: Given a directory name and a base name, concatenate the two and
* run h5fixname() to get the "actual" path to the intented target.
* `h5suffix' should be FALSE to keep the base name unaltered;
* TRUE will append the '.h5' h5suffix to the basename...
* FALSE -> h5fixname_no_suffix(), TRUE -> h5fixname()
* <h5fixname_prefix> / <dirname> / <_basename> <h5prefix?>
*
* Programmer: Jacob Smith
* 2019-08-16
* ----------------------------------------------------------------------------
*/
static herr_t
_populate_filepath(const char *dirname, const char *_basename, hid_t fapl_id,
char *path_out, hbool_t h5suffix)
{
char _path[H5FD_SPLITTER_PATH_MAX];
if ((_basename == NULL) ||
(*_basename == 0) ||
(dirname == NULL) ||
(*dirname == 0) ||
(path_out == NULL))
{
TEST_ERROR;
}
if (HDsnprintf(_path, H5FD_SPLITTER_PATH_MAX, "%s%s%s", dirname,
(dirname[strlen(dirname)] == '/') ? "" : "/", /* slash iff needed */
_basename)
> H5FD_SPLITTER_PATH_MAX)
{
TEST_ERROR;
}
if (h5suffix == TRUE) {
if (h5_fixname(_path, fapl_id, path_out,
H5FD_SPLITTER_PATH_MAX)
== NULL)
{
TEST_ERROR;
}
}
else {
if (h5_fixname_no_suffix(_path, fapl_id, path_out,
H5FD_SPLITTER_PATH_MAX)
== NULL)
{
TEST_ERROR;
}
}
return SUCCEED;
error:
return FAIL;
} /* end _populate_filepath() */
/* ---------------------------------------------------------------------------
* Function: build_paths
*
* Purpose: Convenience function to create the three file paths used in
* most mirror tests.
*
* Return: SUCCEED/FAIL
*
* Programmer: Jacob Smith
* 2019-08-16
* ---------------------------------------------------------------------------
*/
static herr_t
build_paths(
const char *_basename,
H5FD_splitter_vfd_config_t *splitter_config,
struct mirrortest_filenames *names)
{
char baselogname[H5FD_SPLITTER_PATH_MAX];
if (_populate_filepath(MIRROR_RW_DIR, _basename,
splitter_config->rw_fapl_id, names->rw, TRUE)
== FAIL)
{
TEST_ERROR;
}
if (_populate_filepath(MIRROR_WO_DIR, _basename,
splitter_config->wo_fapl_id, names->wo, TRUE)
== FAIL)
{
TEST_ERROR;
}
if (_basename == NULL || *_basename == 0)
return FAIL;
if (HDsnprintf(baselogname, H5FD_SPLITTER_PATH_MAX, "%s_err.log",
_basename)
> H5FD_SPLITTER_PATH_MAX)
{
TEST_ERROR;
}
if (_populate_filepath(MIRROR_WO_DIR, baselogname,
splitter_config->wo_fapl_id, names->log, FALSE)
== FAIL)
{
TEST_ERROR;
}
return SUCCEED;
error:
return FAIL;
} /* end build_paths() */
/* ---------------------------------------------------------------------------
* Function: test_fapl_configuration
*
* Purpose: Test FAPL configuration and examination.
*
* Return: Success: 0
* Failure: -1
*
* Programmer: Jacob Smith
* 2019-03-12
* ---------------------------------------------------------------------------
*/
static int
test_fapl_configuration(void)
{
hid_t fapl_id;
H5FD_mirror_fapl_t mirror_conf = {
H5FD_MIRROR_FAPL_MAGIC, /* magic */
H5FD_MIRROR_CURR_FAPL_T_VERSION, /* version */
SERVER_HANDSHAKE_PORT, /* handhake_port */
SERVER_IP_ADDRESS, /* remote_ip "IP address" */
};
H5FD_mirror_fapl_t fa_out = {0, 0, 0, ""};
TESTING("Mirror fapl configuration (set/get)");
fapl_id = H5Pcreate(H5P_FILE_ACCESS);
if (H5I_INVALID_HID == fapl_id) {
TEST_ERROR;
}
if (H5Pset_fapl_mirror(fapl_id, &mirror_conf) == FAIL) {
TEST_ERROR;
}
if (H5Pget_fapl_mirror(fapl_id, &fa_out) == FAIL) {
TEST_ERROR;
}
if (H5FD_MIRROR_FAPL_MAGIC != fa_out.magic) {
TEST_ERROR;
}
if (H5FD_MIRROR_CURR_FAPL_T_VERSION != fa_out.version) {
TEST_ERROR;
}
if (SERVER_HANDSHAKE_PORT != fa_out.handshake_port) {
TEST_ERROR;
}
if (HDstrncmp(SERVER_IP_ADDRESS, (const char *)fa_out.remote_ip,
H5FD_MIRROR_MAX_IP_LEN))
{
TEST_ERROR;
}
if (H5Pclose(fapl_id) == FAIL) {
TEST_ERROR;
}
PASSED();
return 0;
error:
if (H5I_INVALID_HID != fapl_id) {
(void)H5Pclose(fapl_id);
}
return -1;
} /* end test_fapl_configuration() */
#define PRINT_BUFFER_DIFF(act, exp, len) do { \
size_t _x = 0; \
while ((act)[_x] == (exp)[_x]) { \
_x++; \
} \
if (_x != (len)) { \
size_t _y = 0; \
HDprintf("First bytes differ at %zu\n", _x); \
HDprintf("exp "); \
for (_y = _x; _y < (len); _y++) { \
HDprintf("%02X", (unsigned char)(exp)[_y]); \
} \
HDprintf("\nact "); \
for (_y = _x; _y < (len); _y++) { \
HDprintf("%02X", (unsigned char)(act)[_y]); \
} \
HDprintf("\n"); \
} \
} while (0); /* end PRINT_BUFFER_DIFF */
/* ---------------------------------------------------------------------------
* Function: test_xmit_encode_decode
*
* Purpose: Test byte-encoding operations for network transport.
*
* Return: Success: 0
* Failure: -1
*
* Programmer: Jacob Smith
* 2020-02-02
* ---------------------------------------------------------------------------
*/
static int
test_xmit_encode_decode(void)
{
H5FD_mirror_xmit_t xmit_mock; /* re-used header in various xmit tests */
TESTING("Mirror encode/decode of xmit elements");
/* Set bogus values matching expected; encoding doesn't care
* Use sequential values to easily generate the expected buffer with a
* for loop.
*/
xmit_mock.magic = 0x00010203;
xmit_mock.version = 0x04;
xmit_mock.session_token = 0x05060708;
xmit_mock.xmit_count = 0x090A0B0C;
xmit_mock.op = 0x0D;
/* Test uint8_t encode/decode
*/
do {
unsigned char buf[8];
unsigned char expected[8];
const uint8_t v = 200;
unsigned char out = 0;
/* Start of buffer uint8_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[0] = 200;
out = 0;
if (H5FD__mirror_xmit_encode_uint8(buf, v) != 1) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint8(&out, buf) != 1) {
TEST_ERROR;
}
if (v != out) {
TEST_ERROR;
}
/* Middle of buffer uint8_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[3] = v;
out = 0;
if (H5FD__mirror_xmit_encode_uint8((buf+3), v) != 1) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint8(&out, (buf+3)) != 1) {
TEST_ERROR;
}
if (v != out) {
TEST_ERROR;
}
/* End of buffer uint8_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[7] = v;
out = 0;
if (H5FD__mirror_xmit_encode_uint8((buf+7), v) != 1) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint8(&out, (buf+7)) != 1) {
TEST_ERROR;
}
if (v != out) {
TEST_ERROR;
}
} while (0); /* end uint8_t en/decode */
/* Test uint16_t encode/decode
*/
do {
unsigned char buf[8];
unsigned char expected[8];
const uint16_t v = 0x8F02;
uint16_t out = 0;
/* Start of buffer uint16_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[0] = 0x8F;
expected[1] = 0x02;
out = 0;
if (H5FD__mirror_xmit_encode_uint16(buf, v) != 2) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint16(&out, buf) != 2) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
/* Middle of buffer uint16_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[3] = 0x8F;
expected[4] = 0x02;
out = 0;
if (H5FD__mirror_xmit_encode_uint16((buf+3), v) != 2) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint16(&out, (buf+3)) != 2) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
/* slice */
if (H5FD__mirror_xmit_decode_uint16(&out, (buf+4)) != 2) {
TEST_ERROR;
}
if (out != 0x0200) {
TEST_ERROR;
}
/* End of buffer uint16_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[6] = 0x8F;
expected[7] = 0x02;
out = 0;
if (H5FD__mirror_xmit_encode_uint16((buf+6), v) != 2) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint16(&out, (buf+6)) != 2) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
} while (0); /* end uint16_t en/decode */
/* Test uint32_t encode/decode
*/
do {
unsigned char buf[8];
unsigned char expected[8];
const uint32_t v = 0x8F020048;
uint32_t out = 0;
/* Start of buffer uint32_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[0] = 0x8F;
expected[1] = 0x02;
expected[2] = 0x00;
expected[3] = 0x48;
out = 0;
if (H5FD__mirror_xmit_encode_uint32(buf, v) != 4) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint32(&out, buf) != 4) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
/* Middle of buffer uint32_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[3] = 0x8F;
expected[4] = 0x02;
expected[5] = 0x00;
expected[6] = 0x48;
out = 0;
if (H5FD__mirror_xmit_encode_uint32((buf+3), v) != 4) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint32(&out, (buf+3)) != 4) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
/* slice */
if (H5FD__mirror_xmit_decode_uint32(&out, (buf+4)) != 4) {
TEST_ERROR;
}
if (out != 0x02004800) {
TEST_ERROR;
}
/* End of buffer uint32_t
*/
mybzero(buf, 8);
mybzero(expected, 8);
expected[4] = 0x8F;
expected[5] = 0x02;
expected[6] = 0x00;
expected[7] = 0x48;
out = 0;
if (H5FD__mirror_xmit_encode_uint32((buf+4), v) != 4) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 8);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint32(&out, (buf+4)) != 4) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
} while (0); /* end uint32_t en/decode */
/* Test uint64_t encode/decode
*/
do {
unsigned char buf[16];
unsigned char expected[16];
const uint64_t v = 0x90DCBE17939CE4BB;
uint64_t out = 0;
/* Start of buffer uint64_t
*/
mybzero(buf, 16);
mybzero(expected, 16);
expected[0] = 0x90;
expected[1] = 0xDC;
expected[2] = 0xBE;
expected[3] = 0x17;
expected[4] = 0x93;
expected[5] = 0x9C;
expected[6] = 0xE4;
expected[7] = 0xBB;
out = 0;
if (H5FD__mirror_xmit_encode_uint64(buf, v) != 8) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 16) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 16);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint64(&out, buf) != 8) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
/* Middle of buffer uint64_t
*/
mybzero(buf, 16);
mybzero(expected, 16);
expected[3] = 0x90;
expected[4] = 0xDC;
expected[5] = 0xBE;
expected[6] = 0x17;
expected[7] = 0x93;
expected[8] = 0x9C;
expected[9] = 0xE4;
expected[10] = 0xBB;
out = 0;
if (H5FD__mirror_xmit_encode_uint64((buf+3), v) != 8) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 16) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 16);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint64(&out, (buf+3)) != 8) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
/* slice */
if (H5FD__mirror_xmit_decode_uint64(&out, (buf+6)) != 8) {
TEST_ERROR;
}
if (out != 0x17939CE4BB000000) {
TEST_ERROR;
}
/* End of buffer uint64_t
*/
mybzero(buf, 16);
mybzero(expected, 16);
expected[8] = 0x90;
expected[9] = 0xDC;
expected[10] = 0xBE;
expected[11] = 0x17;
expected[12] = 0x93;
expected[13] = 0x9C;
expected[14] = 0xE4;
expected[15] = 0xBB;
out = 0;
if (H5FD__mirror_xmit_encode_uint64((buf+8), v) != 8) {
TEST_ERROR;
}
if (HDmemcmp(buf, expected, 16) != 0) {
PRINT_BUFFER_DIFF(buf, expected, 16);
TEST_ERROR;
}
if (H5FD__mirror_xmit_decode_uint64(&out, (buf+8)) != 8) {
TEST_ERROR;
}
if (out != v) {
TEST_ERROR;
}
} while (0); /* end uint64_t en/decode */
/* Test xmit header structure encode/decode
* Write bogus but easily verifiable data to inside a buffer, and compare.
* Then decode the buffer and compare the structure contents.
* Then repeat from a different offset in the buffer and compare.
*/
do {
unsigned char buf[H5FD_MIRROR_XMIT_HEADER_SIZE+8];
unsigned char expected[H5FD_MIRROR_XMIT_HEADER_SIZE+8];
H5FD_mirror_xmit_t xmit_out;
size_t i = 0;
/* sanity check */
if (14 != H5FD_MIRROR_XMIT_HEADER_SIZE) {
FAIL_PUTS_ERROR("Header size definition does not match test\n");
}
/* Populate the expected buffer; expect end padding of 0xFF
*/
HDmemset(expected, 0xFF, H5FD_MIRROR_XMIT_HEADER_SIZE+8);
for (i=0; i < H5FD_MIRROR_XMIT_HEADER_SIZE; i++) {
expected[i+2] = (unsigned char)i;
}
/* Encode, and compare buffer contents
* Initial buffer is filled with 0xFF to match expected padding
*/
HDmemset(buf, 0xFF, H5FD_MIRROR_XMIT_HEADER_SIZE+8);
if (H5FD_mirror_xmit_encode_header((buf+2), &xmit_mock)
!= H5FD_MIRROR_XMIT_HEADER_SIZE)
{
TEST_ERROR;
}
if (HDmemcmp(buf, expected, H5FD_MIRROR_XMIT_HEADER_SIZE+8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, H5FD_MIRROR_XMIT_HEADER_SIZE+8);
TEST_ERROR;
}
/* Decode from buffer
*/
if (H5FD_mirror_xmit_decode_header(&xmit_out, (buf+2))
!= H5FD_MIRROR_XMIT_HEADER_SIZE)
{
TEST_ERROR;
}
if (xmit_out.magic != xmit_mock.magic) TEST_ERROR;
if (xmit_out.version != xmit_mock.version) TEST_ERROR;
if (xmit_out.session_token != xmit_mock.session_token) TEST_ERROR;
if (xmit_out.xmit_count != xmit_mock.xmit_count) TEST_ERROR;
if (xmit_out.op != xmit_mock.op) TEST_ERROR;
/* Decode from different offset in buffer
* Observe changes when ingesting the padding
*/
if (H5FD_mirror_xmit_decode_header(&xmit_out, (buf))
!= H5FD_MIRROR_XMIT_HEADER_SIZE)
{
TEST_ERROR;
}
if (xmit_out.magic != 0xFFFF0001) TEST_ERROR;
if (xmit_out.version != 0x02) TEST_ERROR;
if (xmit_out.session_token != 0x03040506) TEST_ERROR;
if (xmit_out.xmit_count != 0x0708090A) TEST_ERROR;
if (xmit_out.op != 0x0B) TEST_ERROR;
} while (0); /* end xmit header en/decode */
/* Test xmit set-eoa structure encode/decode
* Write bogus but easily verifiable data to inside a buffer, and compare.
* Then decode the buffer and compare the structure contents.
* Then repeat from a different offset in the buffer and compare.
*/
do {
unsigned char buf[H5FD_MIRROR_XMIT_EOA_SIZE+8];
unsigned char expected[H5FD_MIRROR_XMIT_EOA_SIZE+8];
H5FD_mirror_xmit_eoa_t xmit_in;
H5FD_mirror_xmit_eoa_t xmit_out;
size_t i = 0;
/* sanity check */
if ((14+9) != H5FD_MIRROR_XMIT_EOA_SIZE) {
FAIL_PUTS_ERROR("Header size definition does not match test\n");
}
if (xmit_mock.op != 0x0D) {
FAIL_PUTS_ERROR("shared header structure is not in expected state");
}
/* Populate the expected buffer; expect end padding of 0xFF
*/
HDmemset(expected, 0xFF, H5FD_MIRROR_XMIT_EOA_SIZE+8);
for (i=0; i < H5FD_MIRROR_XMIT_EOA_SIZE; i++) {
expected[i+2] = (unsigned char)i;
}
/* Set xmit_in
*/
xmit_in.pub = xmit_mock; /* shared/common */
xmit_in.type = 0x0E;
xmit_in.eoa_addr = 0x0F10111213141516;
/* Encode, and compare buffer contents
* Initial buffer is filled with 0xFF to match expected padding
*/
HDmemset(buf, 0xFF, H5FD_MIRROR_XMIT_EOA_SIZE+8);
if (H5FD_mirror_xmit_encode_set_eoa((buf+2), &xmit_in)
!= H5FD_MIRROR_XMIT_EOA_SIZE)
{
TEST_ERROR;
}
if (HDmemcmp(buf, expected, H5FD_MIRROR_XMIT_EOA_SIZE+8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, H5FD_MIRROR_XMIT_EOA_SIZE+8);
TEST_ERROR;
}
/* Decode from buffer
*/
if (H5FD_mirror_xmit_decode_set_eoa(&xmit_out, (buf+2))
!= H5FD_MIRROR_XMIT_EOA_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != xmit_mock.magic) TEST_ERROR;
if (xmit_out.pub.version != xmit_mock.version) TEST_ERROR;
if (xmit_out.pub.session_token != xmit_mock.session_token) TEST_ERROR;
if (xmit_out.pub.xmit_count != xmit_mock.xmit_count) TEST_ERROR;
if (xmit_out.pub.op != xmit_mock.op) TEST_ERROR;
if (xmit_out.type != 0x0E) TEST_ERROR;
if (xmit_out.eoa_addr != 0x0F10111213141516) TEST_ERROR;
/* Decode from different offset in buffer
* Observe changes when ingesting the padding
*/
if (H5FD_mirror_xmit_decode_set_eoa(&xmit_out, (buf))
!= H5FD_MIRROR_XMIT_EOA_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != 0xFFFF0001) TEST_ERROR;
if (xmit_out.pub.version != 0x02) TEST_ERROR;
if (xmit_out.pub.session_token != 0x03040506) TEST_ERROR;
if (xmit_out.pub.xmit_count != 0x0708090A) TEST_ERROR;
if (xmit_out.pub.op != 0x0B) TEST_ERROR;
if (xmit_out.type != 0x0C) TEST_ERROR;
if (xmit_out.eoa_addr != 0x0D0E0F1011121314) TEST_ERROR;
} while (0); /* end xmit set-eoa en/decode */
/* Test xmit lock structure encode/decode
* Write bogus but easily verifiable data to inside a buffer, and compare.
* Then decode the buffer and compare the structure contents.
* Then repeat from a different offset in the buffer and compare.
*/
do {
unsigned char buf[H5FD_MIRROR_XMIT_LOCK_SIZE+8];
unsigned char expected[H5FD_MIRROR_XMIT_LOCK_SIZE+8];
H5FD_mirror_xmit_lock_t xmit_in;
H5FD_mirror_xmit_lock_t xmit_out;
size_t i = 0;
/* sanity check */
if ((14+8) != H5FD_MIRROR_XMIT_LOCK_SIZE) {
FAIL_PUTS_ERROR("Header size definition does not match test\n");
}
if (xmit_mock.op != 0x0D) {
FAIL_PUTS_ERROR("shared header structure is not in expected state");
}
/* Populate the expected buffer; expect end padding of 0xFF
*/
HDmemset(expected, 0xFF, H5FD_MIRROR_XMIT_LOCK_SIZE+8);
for (i=0; i < H5FD_MIRROR_XMIT_LOCK_SIZE; i++) {
expected[i+2] = (unsigned char)i;
}
/* Set xmit_in
*/
xmit_in.pub = xmit_mock; /* shared/common */
xmit_in.rw = 0x0E0F101112131415;
/* Encode, and compare buffer contents
* Initial buffer is filled with 0xFF to match expected padding
*/
HDmemset(buf, 0xFF, H5FD_MIRROR_XMIT_LOCK_SIZE+8);
if (H5FD_mirror_xmit_encode_lock((buf+2), &xmit_in)
!= H5FD_MIRROR_XMIT_LOCK_SIZE)
{
TEST_ERROR;
}
if (HDmemcmp(buf, expected, H5FD_MIRROR_XMIT_LOCK_SIZE+8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, H5FD_MIRROR_XMIT_LOCK_SIZE+8);
TEST_ERROR;
}
/* Decode from buffer
*/
if (H5FD_mirror_xmit_decode_lock(&xmit_out, (buf+2))
!= H5FD_MIRROR_XMIT_LOCK_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != xmit_mock.magic) TEST_ERROR;
if (xmit_out.pub.version != xmit_mock.version) TEST_ERROR;
if (xmit_out.pub.session_token != xmit_mock.session_token) TEST_ERROR;
if (xmit_out.pub.xmit_count != xmit_mock.xmit_count) TEST_ERROR;
if (xmit_out.pub.op != xmit_mock.op) TEST_ERROR;
if (xmit_out.rw != 0x0E0F101112131415) TEST_ERROR;
/* Decode from different offset in buffer
* Observe changes when ingesting the padding
*/
if (H5FD_mirror_xmit_decode_lock(&xmit_out, (buf))
!= H5FD_MIRROR_XMIT_LOCK_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != 0xFFFF0001) TEST_ERROR;
if (xmit_out.pub.version != 0x02) TEST_ERROR;
if (xmit_out.pub.session_token != 0x03040506) TEST_ERROR;
if (xmit_out.pub.xmit_count != 0x0708090A) TEST_ERROR;
if (xmit_out.pub.op != 0x0B) TEST_ERROR;
if (xmit_out.rw != 0x0C0D0E0F10111213) TEST_ERROR;
} while (0); /* end xmit lock en/decode */
/* Test xmit open structure encode/decode
* Write bogus but easily verifiable data to inside a buffer, and compare.
* Then decode the buffer and compare the structure contents.
* Then repeat from a different offset in the buffer and compare.
*
* Verifies that the first zero character in the filepath will end the
* string, with all following bytes in the encoded buffer being zeroed.
*/
do {
unsigned char buf[H5FD_MIRROR_XMIT_OPEN_SIZE+8];
unsigned char expected[H5FD_MIRROR_XMIT_OPEN_SIZE+8];
H5FD_mirror_xmit_open_t xmit_in;
H5FD_mirror_xmit_open_t xmit_out;
size_t i = 0;
/* sanity check */
if ((14+20+4097) != H5FD_MIRROR_XMIT_OPEN_SIZE) {
FAIL_PUTS_ERROR("Header size definition does not match test\n");
}
if (xmit_mock.op != 0x0D) {
FAIL_PUTS_ERROR("shared header structure is not in expected state");
}
/* Populate the expected buffer; expect end padding of 0xFF
*/
HDmemset(expected, 0xFF, H5FD_MIRROR_XMIT_OPEN_SIZE+8);
for (i=0; i < H5FD_MIRROR_XMIT_OPEN_SIZE; i++) {
/* 0x100 is "zero" in a byte, so encode will treat it as a NULL-
* terminator in the filepath string. Expect all zeroes following.
*/
expected[i+2] = (i > 0xFF) ? 0 : (unsigned char)i;
}
/* Set xmit_in
*/
xmit_in.pub = xmit_mock; /* shared/common */
xmit_in.flags = 0x0E0F1011;
xmit_in.maxaddr = 0x1213141516171819;
xmit_in.size_t_blob = 0x1A1B1C1D1E1F2021;
for (i=0x22; i < H5FD_MIRROR_XMIT_FILEPATH_MAX+0x22; i++) {
/* nonzero values repeat after 0x100, but will not be encoded */
xmit_in.filename[i-0x22] = (char)(i % 0x100);
}
xmit_in.filename[H5FD_MIRROR_XMIT_FILEPATH_MAX-1] = 0;
/* Encode, and compare buffer contents
* Initial buffer is filled with 0xFF to match expected padding
*/
HDmemset(buf, 0xFF, H5FD_MIRROR_XMIT_OPEN_SIZE+8);
if (H5FD_mirror_xmit_encode_open((buf+2), &xmit_in)
!= H5FD_MIRROR_XMIT_OPEN_SIZE)
{
TEST_ERROR;
}
if (HDmemcmp(buf, expected, H5FD_MIRROR_XMIT_OPEN_SIZE+8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, H5FD_MIRROR_XMIT_OPEN_SIZE+8);
TEST_ERROR;
}
/* Decode from buffer
*/
if (H5FD_mirror_xmit_decode_open(&xmit_out, (buf+2))
!= H5FD_MIRROR_XMIT_OPEN_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != xmit_mock.magic) TEST_ERROR;
if (xmit_out.pub.version != xmit_mock.version) TEST_ERROR;
if (xmit_out.pub.session_token != xmit_mock.session_token) TEST_ERROR;
if (xmit_out.pub.xmit_count != xmit_mock.xmit_count) TEST_ERROR;
if (xmit_out.pub.op != xmit_mock.op) TEST_ERROR;
if (xmit_out.flags != xmit_in.flags) TEST_ERROR;
if (xmit_out.maxaddr != xmit_in.maxaddr) TEST_ERROR;
if (xmit_out.size_t_blob != xmit_in.size_t_blob) TEST_ERROR;
if (HDstrncmp(xmit_out.filename, xmit_in.filename,
H5FD_MIRROR_XMIT_FILEPATH_MAX)
!= 0)
{
PRINT_BUFFER_DIFF(xmit_out.filename, xmit_in.filename,
H5FD_MIRROR_XMIT_FILEPATH_MAX);
TEST_ERROR;
}
/* Decode from different offset in buffer
* Observe changes when ingesting the padding
*/
if (H5FD_mirror_xmit_decode_open(&xmit_out, (buf))
!= H5FD_MIRROR_XMIT_OPEN_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != 0xFFFF0001) TEST_ERROR;
if (xmit_out.pub.version != 0x02) TEST_ERROR;
if (xmit_out.pub.session_token != 0x03040506) TEST_ERROR;
if (xmit_out.pub.xmit_count != 0x0708090A) TEST_ERROR;
if (xmit_out.pub.op != 0x0B) TEST_ERROR;
if (xmit_out.flags != 0x0C0D0E0F) TEST_ERROR;
if (xmit_out.maxaddr != 0x1011121314151617) TEST_ERROR;
if (xmit_out.size_t_blob != 0x18191A1B1C1D1E1F) TEST_ERROR;
/* update expected "filepath" in structure */
for (i=0x20; i < H5FD_MIRROR_XMIT_FILEPATH_MAX+0x20; i++) {
xmit_in.filename[i-0x20] = (i > 0xFF) ? 0 : (char)i;
}
if (HDstrncmp(xmit_out.filename, xmit_in.filename,
H5FD_MIRROR_XMIT_FILEPATH_MAX)
!= 0)
{
PRINT_BUFFER_DIFF(xmit_out.filename, xmit_in.filename,
H5FD_MIRROR_XMIT_FILEPATH_MAX);
TEST_ERROR;
}
} while (0); /* end xmit open en/decode */
/* Test xmit reply structure encode/decode
* Write bogus but easily verifiable data to inside a buffer, and compare.
* Then decode the buffer and compare the structure contents.
* Then repeat from a different offset in the buffer and compare.
*
* Verifies that the first zero character in the filepath will end the
* string, with all following bytes in the encoded buffer being zeroed.
*/
do {
unsigned char buf[H5FD_MIRROR_XMIT_REPLY_SIZE+8];
unsigned char expected[H5FD_MIRROR_XMIT_REPLY_SIZE+8];
H5FD_mirror_xmit_reply_t xmit_in;
H5FD_mirror_xmit_reply_t xmit_out;
size_t i = 0;
/* sanity check */
if ((14+4+256) != H5FD_MIRROR_XMIT_REPLY_SIZE) {
FAIL_PUTS_ERROR("Header size definition does not match test\n");
}
if (xmit_mock.op != 0x0D) {
FAIL_PUTS_ERROR("shared header structure is not in expected state");
}
/* Populate the expected buffer; expect end padding of 0xFF
*/
HDmemset(expected, 0xFF, H5FD_MIRROR_XMIT_REPLY_SIZE+8);
for (i=0; i < H5FD_MIRROR_XMIT_REPLY_SIZE; i++) {
/* 0x100 is "zero" in a byte, so encode will treat it as a NULL-
* terminator in the filepath string. Expect all zeroes following.
*/
expected[i+2] = (i > 0xFF) ? 0 : (unsigned char)i;
}
/* Set xmit_in
*/
xmit_in.pub = xmit_mock; /* shared/common */
xmit_in.status = 0x0E0F1011;
for (i=0x12; i < H5FD_MIRROR_STATUS_MESSAGE_MAX+0x12; i++) {
/* nonzero values repeat after 0x100, but will not be encoded */
xmit_in.message[i-0x12] = (char)(i % 0x100);
}
xmit_in.message[H5FD_MIRROR_STATUS_MESSAGE_MAX-1] = 0;
/* Encode, and compare buffer contents
* Initial buffer is filled with 0xFF to match expected padding
*/
HDmemset(buf, 0xFF, H5FD_MIRROR_XMIT_REPLY_SIZE+8);
if (H5FD_mirror_xmit_encode_reply((buf+2), &xmit_in)
!= H5FD_MIRROR_XMIT_REPLY_SIZE)
{
TEST_ERROR;
}
if (HDmemcmp(buf, expected, H5FD_MIRROR_XMIT_REPLY_SIZE+8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, H5FD_MIRROR_XMIT_REPLY_SIZE+8);
TEST_ERROR;
}
/* Decode from buffer
*/
if (H5FD_mirror_xmit_decode_reply(&xmit_out, (buf+2))
!= H5FD_MIRROR_XMIT_REPLY_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != xmit_mock.magic) TEST_ERROR;
if (xmit_out.pub.version != xmit_mock.version) TEST_ERROR;
if (xmit_out.pub.session_token != xmit_mock.session_token) TEST_ERROR;
if (xmit_out.pub.xmit_count != xmit_mock.xmit_count) TEST_ERROR;
if (xmit_out.pub.op != xmit_mock.op) TEST_ERROR;
if (xmit_out.status != xmit_in.status) TEST_ERROR;
if (HDstrncmp(xmit_out.message, xmit_in.message,
H5FD_MIRROR_STATUS_MESSAGE_MAX)
!= 0)
{
PRINT_BUFFER_DIFF(xmit_out.message, xmit_in.message,
H5FD_MIRROR_STATUS_MESSAGE_MAX);
TEST_ERROR;
}
/* Decode from different offset in buffer
* Observe changes when ingesting the padding
*/
if (H5FD_mirror_xmit_decode_reply(&xmit_out, (buf))
!= H5FD_MIRROR_XMIT_REPLY_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != 0xFFFF0001) TEST_ERROR;
if (xmit_out.pub.version != 0x02) TEST_ERROR;
if (xmit_out.pub.session_token != 0x03040506) TEST_ERROR;
if (xmit_out.pub.xmit_count != 0x0708090A) TEST_ERROR;
if (xmit_out.pub.op != 0x0B) TEST_ERROR;
if (xmit_out.status != 0x0C0D0E0F) TEST_ERROR;
/* update expected "message" in structure */
for (i=0x10; i < H5FD_MIRROR_STATUS_MESSAGE_MAX+0x10; i++) {
xmit_in.message[i-0x10] = (i > 0xFF) ? 0 : (char)i;
}
if (HDstrncmp(xmit_out.message, xmit_in.message,
H5FD_MIRROR_STATUS_MESSAGE_MAX)
!= 0)
{
PRINT_BUFFER_DIFF(xmit_out.message, xmit_in.message,
H5FD_MIRROR_STATUS_MESSAGE_MAX);
TEST_ERROR;
}
} while (0); /* end xmit reply en/decode */
/* Test xmit write structure encode/decode
* Write bogus but easily verifiable data to inside a buffer, and compare.
* Then decode the buffer and compare the structure contents.
* Then repeat from a different offset in the buffer and compare.
*/
do {
unsigned char buf[H5FD_MIRROR_XMIT_WRITE_SIZE+8];
unsigned char expected[H5FD_MIRROR_XMIT_WRITE_SIZE+8];
H5FD_mirror_xmit_write_t xmit_in;
H5FD_mirror_xmit_write_t xmit_out;
size_t i = 0;
/* sanity check */
if ((14+17) != H5FD_MIRROR_XMIT_WRITE_SIZE) {
FAIL_PUTS_ERROR("Header size definition does not match test\n");
}
if (xmit_mock.op != 0x0D) {
FAIL_PUTS_ERROR("shared header structure is not in expected state");
}
/* Populate the expected buffer; expect end padding of 0xFF
*/
HDmemset(expected, 0xFF, H5FD_MIRROR_XMIT_WRITE_SIZE+8);
for (i=0; i < H5FD_MIRROR_XMIT_WRITE_SIZE; i++) {
expected[i+2] = (unsigned char)i;
}
/* Set xmit_in
*/
xmit_in.pub = xmit_mock; /* shared/common */
xmit_in.type = 0x0E;
xmit_in.offset = 0x0F10111213141516;
xmit_in.size = 0x1718191A1B1C1D1E;
/* Encode, and compare buffer contents
* Initial buffer is filled with 0xFF to match expected padding
*/
HDmemset(buf, 0xFF, H5FD_MIRROR_XMIT_WRITE_SIZE+8);
if (H5FD_mirror_xmit_encode_write((buf+2), &xmit_in)
!= H5FD_MIRROR_XMIT_WRITE_SIZE)
{
TEST_ERROR;
}
if (HDmemcmp(buf, expected, H5FD_MIRROR_XMIT_WRITE_SIZE+8) != 0) {
PRINT_BUFFER_DIFF(buf, expected, H5FD_MIRROR_XMIT_WRITE_SIZE+8);
TEST_ERROR;
}
/* Decode from buffer
*/
if (H5FD_mirror_xmit_decode_write(&xmit_out, (buf+2))
!= H5FD_MIRROR_XMIT_WRITE_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != xmit_mock.magic) TEST_ERROR;
if (xmit_out.pub.version != xmit_mock.version) TEST_ERROR;
if (xmit_out.pub.session_token != xmit_mock.session_token) TEST_ERROR;
if (xmit_out.pub.xmit_count != xmit_mock.xmit_count) TEST_ERROR;
if (xmit_out.pub.op != xmit_mock.op) TEST_ERROR;
if (xmit_out.type != 0x0E) TEST_ERROR;
if (xmit_out.offset != 0x0F10111213141516) TEST_ERROR;
if (xmit_out.size != 0x1718191A1B1C1D1E) TEST_ERROR;
/* Decode from different offset in buffer
* Observe changes when ingesting the padding
*/
if (H5FD_mirror_xmit_decode_write(&xmit_out, (buf))
!= H5FD_MIRROR_XMIT_WRITE_SIZE)
{
TEST_ERROR;
}
if (xmit_out.pub.magic != 0xFFFF0001) TEST_ERROR;
if (xmit_out.pub.version != 0x02) TEST_ERROR;
if (xmit_out.pub.session_token != 0x03040506) TEST_ERROR;
if (xmit_out.pub.xmit_count != 0x0708090A) TEST_ERROR;
if (xmit_out.pub.op != 0x0B) TEST_ERROR;
if (xmit_out.type != 0x0C) TEST_ERROR;
if (xmit_out.offset != 0x0D0E0F1011121314) TEST_ERROR;
if (xmit_out.size != 0x15161718191A1B1C) TEST_ERROR;
} while (0); /* end xmit write en/decode */
PASSED();
return 0;
error:
return -1;
} /* end test_xmit_encode_decode */
/* ---------------------------------------------------------------------------
* Function: create_mirroring_split_fapl
*
* Purpose: Create and populate a mirroring FAPL ID.
* Creates target files with the given base name -- ideally the
* test name -- and creates mirroring/split FAPL set to use the
* global mirroring info and a sec2 R/W channel driver.
*
* TODO: receive target IP from caller?
*
* Return: Success: HID of the top-level (splitter) FAPL, a non-negative
* value.
* Failure: H5I_INVALID_HID, a negative value.
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
static hid_t
create_mirroring_split_fapl(const char *_basename,
struct mirrortest_filenames *names)
{
H5FD_splitter_vfd_config_t splitter_config;
H5FD_mirror_fapl_t mirror_conf;
hid_t ret_value = H5I_INVALID_HID;
if (_basename == NULL || *_basename == '\0') {
TEST_ERROR;
}
splitter_config.magic = H5FD_SPLITTER_MAGIC;
splitter_config.version = H5FD_CURR_SPLITTER_VFD_CONFIG_VERSION;
splitter_config.ignore_wo_errs = FALSE;
/* Create Splitter R/W channel driver (sec2)
*/
splitter_config.rw_fapl_id = H5Pcreate(H5P_FILE_ACCESS);
if (H5I_INVALID_HID == splitter_config.rw_fapl_id) {
TEST_ERROR;
}
if (H5Pset_fapl_sec2(splitter_config.rw_fapl_id) == FAIL) {
TEST_ERROR;
}
/* Create Splitter W/O channel driver (mirror)
*/
mirror_conf.magic = H5FD_MIRROR_FAPL_MAGIC;
mirror_conf.version = H5FD_MIRROR_CURR_FAPL_T_VERSION;
mirror_conf.handshake_port = SERVER_HANDSHAKE_PORT;
if (HDstrncpy(mirror_conf.remote_ip, SERVER_IP_ADDRESS,
H5FD_MIRROR_MAX_IP_LEN)
== NULL)
{
TEST_ERROR;
}
splitter_config.wo_fapl_id = H5Pcreate(H5P_FILE_ACCESS);
if (H5I_INVALID_HID == splitter_config.wo_fapl_id) {
TEST_ERROR;
}
if (H5Pset_fapl_mirror(splitter_config.wo_fapl_id, &mirror_conf) == FAIL) {
TEST_ERROR;
}
/* Build r/w, w/o, and log file paths
*/
if (build_paths(_basename, &splitter_config, names) < 0) {
TEST_ERROR;
}
/* Set file paths for w/o and logfile
*/
if (HDstrncpy(splitter_config.wo_path, (const char *)names->wo,
H5FD_SPLITTER_PATH_MAX)
== NULL)
{
TEST_ERROR;
}
if (HDstrncpy(splitter_config.log_file_path, (const char *)names->log,
H5FD_SPLITTER_PATH_MAX)
== NULL)
{
TEST_ERROR;
}
/* Create Splitter FAPL
*/
ret_value = H5Pcreate(H5P_FILE_ACCESS);
if (H5I_INVALID_HID == ret_value) {
TEST_ERROR;
}
if (H5Pset_fapl_splitter(ret_value, &splitter_config) == FAIL) {
TEST_ERROR;
}
/* Close FAPLs created for child channels
*/
if (H5Pclose(splitter_config.rw_fapl_id) < 0) {
TEST_ERROR;
}
splitter_config.rw_fapl_id = H5I_INVALID_HID;
if (H5Pclose(splitter_config.wo_fapl_id) < 0) {
TEST_ERROR;
}
splitter_config.wo_fapl_id = H5I_INVALID_HID;
return ret_value;
error:
if (splitter_config.wo_fapl_id >= 0) {
(void)H5Pclose(splitter_config.wo_fapl_id);
}
if (splitter_config.rw_fapl_id >= 0) {
(void)H5Pclose(splitter_config.rw_fapl_id);
}
if (ret_value >= 0) {
(void)H5Pclose(ret_value);
}
return H5I_INVALID_HID;
} /* end create_mirroring_split_fapl() */
/* ---------------------------------------------------------------------------
* Function: test_create_and_close
*
* Purpose: Test/demonstrate a do-nothing file open and close.
*
* Verifying file existence and contents is part of other tests.
*
* TODO: receive target IP from caller?
*
* Return: Success: 0
* Failure: -1
*
* Programmer: Jacob Smith
* 2019-12-17
* ---------------------------------------------------------------------------
*/
static int
test_create_and_close(void)
{
struct mirrortest_filenames names;
hid_t file_id = H5I_INVALID_HID;
hid_t fapl_id = H5P_DEFAULT;
TESTING("File creation and immediate close");
/* Create FAPL for Splitter[sec2|mirror]
*/
fapl_id = create_mirroring_split_fapl("basic_create", &names);
if (H5I_INVALID_HID == fapl_id) {
TEST_ERROR;
}
/* -------------------- */
/* TEST: Create and Close */
file_id = H5Fcreate(names.rw, H5F_ACC_TRUNC, H5P_DEFAULT, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
/* -------------------- */
/* Standard cleanup */
if (H5Fclose(file_id) == FAIL) {
TEST_ERROR;
}
if (fapl_id != H5P_DEFAULT && fapl_id >= 0) {
if (H5Pclose(fapl_id) == FAIL) {
TEST_ERROR;
}
}
PASSED();
return 0;
error:
H5E_BEGIN_TRY{
(void)H5Fclose(file_id);
(void)H5Pclose(fapl_id);
} H5E_END_TRY;
return -1;
} /* end test_create_and_close() */
/* ----------------------------------------------------------------------------
* Function: create_datasets
*
* Purpose: Given a file ID and least and greateset dataset indices, create
* populated chunked datasets in the target file from min_dset to
* (and including) max_dset.
* Uses #defined constants to determine chunk and dataset sizes
* and values.
*
* Return: SUCCEED/FAIL
*
* Programmer: Jacob Smith
* 2019-08-14
* ----------------------------------------------------------------------------
*/
static herr_t
create_datasets(hid_t file_id,
unsigned min_dset,
unsigned max_dset)
{
hid_t dataspace_ids[MAX_DSET_COUNT + 1];
hid_t dataset_ids[MAX_DSET_COUNT + 1];
hid_t filespace_ids[MAX_DSET_COUNT + 1];
int data_chunk[CHUNK_DIM][CHUNK_DIM];
unsigned int i, j, k, l, m;
hsize_t offset[2];
hid_t memspace_id = H5I_INVALID_HID;
hsize_t a_size[2] = {CHUNK_DIM, CHUNK_DIM};
hsize_t chunk_dims[2] = {CHUNK_DIM, CHUNK_DIM};
hsize_t dset_dims[2] = {DSET_DIM, DSET_DIM};
HDassert(file_id >= 0);
HDassert(min_dset <= max_dset);
HDassert(max_dset <= MAX_DSET_COUNT);
LOGPRINT(2, "create_dataset()\n");
/* ---------------------------------
* "Clear" ID arrays
*/
for (i = 0; i < MAX_DSET_COUNT; i++) {
LOGPRINT(3, "clearing IDs [%d]\n", i);
dataspace_ids[i] = H5I_INVALID_HID;
dataset_ids[i] = H5I_INVALID_HID;
filespace_ids[i] = H5I_INVALID_HID;
}
/* ---------------------------------
* Generate dataspace, dataset, and 'filespace' IDs
*/
if (_create_chunking_ids(file_id, min_dset, max_dset, chunk_dims,
dset_dims, dataspace_ids, filespace_ids, dataset_ids, &memspace_id)
== FAIL)
{
TEST_ERROR;
}
/* ---------------------------------
* Initialize (write) all datasets in a "round robin"...
* for a given chunk 'location', write chunk data to each dataset.
*/
for (i = 0; i < DSET_DIM; i += CHUNK_DIM)
{
LOGPRINT(3, "i: %d\n", i);
for (j = 0; j < DSET_DIM; j += CHUNK_DIM)
{
LOGPRINT(3, " j: %d\n", j);
for (m = min_dset; m <= max_dset; m++)
{
LOGPRINT(3, " m: %d\n", m);
for (k = 0; k < CHUNK_DIM; k++)
{
for (l = 0; l < CHUNK_DIM; l++)
{
data_chunk[k][l] = (int)((DSET_DIM * DSET_DIM * m) +
(DSET_DIM * (i + k)) + j + l);
LOGPRINT(3, " data_chunk[%d][%d]: %d\n",
k, l, data_chunk[k][l]);
}
}
/* select on disk hyperslab */
offset[0] = (hsize_t)i;
offset[1] = (hsize_t)j;
LOGPRINT(3, " H5Sselect_hyperslab()\n");
if (H5Sselect_hyperslab(filespace_ids[m], H5S_SELECT_SET,
offset, NULL, a_size, NULL)
< 0)
{
TEST_ERROR;
}
LOGPRINT(3, " H5Dwrite()\n");
if (H5Dwrite(dataset_ids[m], H5T_NATIVE_INT, memspace_id,
filespace_ids[m], H5P_DEFAULT, data_chunk)
< 0)
{
TEST_ERROR;
}
}
}
}
/* ---------------------------------
* Read and verify data from datasets
*/
if (_verify_datasets(min_dset, max_dset, filespace_ids, dataset_ids,
memspace_id)
== FAIL)
{
TEST_ERROR;
}
/* ---------------------------------
* Cleanup
*/
if (_close_chunking_ids(min_dset, max_dset, dataspace_ids, filespace_ids,
dataset_ids, &memspace_id)
== FAIL)
{
TEST_ERROR;
}
return SUCCEED;
error:
(void)_close_chunking_ids(min_dset, max_dset, dataspace_ids,
filespace_ids, dataset_ids, &memspace_id);
LOGPRINT(1, "create_datasets() FAILED\n");
return FAIL;
} /* end create_datasets() */
/* ----------------------------------------------------------------------------
* Function: _create_chunking_ids
*
* Purpose: Create new IDs to be used with the associated file.
*
* Return: SUCCEED/FAIL
*
* Programer: Jacob Smith
* 2019
* ----------------------------------------------------------------------------
*/
static herr_t
_create_chunking_ids(hid_t file_id,
unsigned min_dset,
unsigned max_dset,
hsize_t *chunk_dims,
hsize_t *dset_dims,
hid_t *dataspace_ids,
hid_t *filespace_ids,
hid_t *dataset_ids,
hid_t *memspace_id)
{
char dset_name[DSET_NAME_LEN + 1];
unsigned m = 0;
hid_t dcpl_id = H5I_INVALID_HID;
LOGPRINT(2, "_create_chunking_ids()\n");
/* --------------------
* Create chunking DCPL
*/
dcpl_id = H5Pcreate(H5P_DATASET_CREATE);
if (dcpl_id < 0) {
TEST_ERROR;
}
if (H5Pset_chunk(dcpl_id, 2, chunk_dims) == FAIL) {
TEST_ERROR;
}
/* --------------------
* Create dataspace IDs
*/
for (m = min_dset; m <= max_dset; m++) {
dataspace_ids[m] = H5Screate_simple(2, dset_dims, NULL);
if (dataspace_ids[m] < 0) {
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to create dataspace ID %d\n", m);
FAIL_PUTS_ERROR(mesg);
}
}
/* --------------------
* Create dataset IDs
*/
for (m = min_dset; m <= max_dset; m++) {
if (HDsnprintf(dset_name, DSET_NAME_LEN, "/dset%03d", m)
> DSET_NAME_LEN)
{
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to compose dset name %d\n", m);
FAIL_PUTS_ERROR(mesg);
}
dataset_ids[m] = H5Dcreate(file_id, dset_name, H5T_STD_I32BE,
dataspace_ids[m], H5P_DEFAULT, dcpl_id, H5P_DEFAULT);
if (dataset_ids[m] < 0) {
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to create dset ID %d\n", m);
FAIL_PUTS_ERROR(mesg);
}
}
/* --------------------
* Get file space IDs
*/
for (m = min_dset; m <= max_dset; m++) {
filespace_ids[m] = H5Dget_space(dataset_ids[m]);
if (filespace_ids[m] < 0) {
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to create filespace ID %d\n", m);
FAIL_PUTS_ERROR(mesg);
}
}
/* --------------------
* Create mem space to be used to read and write chunks
*/
*memspace_id = H5Screate_simple(2, chunk_dims, NULL);
if (*memspace_id < 0) {
TEST_ERROR;
}
/* --------------------
* Clean up the DCPL, even if there were errors before
*/
if (dcpl_id != H5P_DEFAULT && dcpl_id != H5I_INVALID_HID) {
if (H5Pclose(dcpl_id) == FAIL) {
TEST_ERROR;
}
}
return SUCCEED;
error:
if (dcpl_id != H5P_DEFAULT && dcpl_id != H5I_INVALID_HID) {
(void)H5Pclose(dcpl_id);
}
LOGPRINT(1, "_create_chunking_ids() FAILED\n");
return FAIL;
} /* end _create_chunking_ids() */
/* ----------------------------------------------------------------------------
* Function: _open_chunking_ids
*
* Purpose: Open/access IDs from the given file.
*
* Return: SUCCEED/FAIL
*
* Programmer: Jacob Smith
* 2019
* ----------------------------------------------------------------------------
*/
static herr_t
_open_chunking_ids(
hid_t file_id,
unsigned min_dset,
unsigned max_dset,
hsize_t *chunk_dims,
hid_t *filespace_ids,
hid_t *dataset_ids,
hid_t *memspace_id)
{
char dset_name[DSET_NAME_LEN+1];
unsigned m = 0;
LOGPRINT(2, "_open_chunking_ids()\n");
/* --------------------
* Open dataset IDs
*/
for (m = min_dset; m <= max_dset; m++) {
if (HDsnprintf(dset_name, DSET_NAME_LEN, "/dset%03d", m)
> DSET_NAME_LEN)
{
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to compose dset name %d\n", m);
FAIL_PUTS_ERROR(mesg);
}
dataset_ids[m] = H5Dopen2(file_id, dset_name, H5P_DEFAULT);
if (dataset_ids[m] < 0) {
HDsnprintf(mesg, MIRR_MESG_SIZE, "unable to open dset ID %d\n", m);
FAIL_PUTS_ERROR(mesg);
}
}
/* --------------------
* Open filespace IDs
*/
for (m = min_dset; m <= max_dset; m++) {
filespace_ids[m] = H5Dget_space(dataset_ids[m]);
if (filespace_ids[m] < 0) {
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to get filespace ID %d\n", m);
FAIL_PUTS_ERROR(mesg);
}
}
/* --------------------
* Create mem space to be used to read and write chunks
*/
*memspace_id = H5Screate_simple(2, chunk_dims, NULL);
if (*memspace_id < 0) {
TEST_ERROR;
}
return SUCCEED;
error:
LOGPRINT(1, "_open_chunking_ids() FAILED\n");
return FAIL;
} /* end _open_chunking_ids() */
/* ---------------------------------------------------------------------------
* Function: _close_chunking_ids
*
* Purpose: Close IDs that were created or opened.
* Pass NULL into `dataspace_ids` when closing items opened with
* _open_chunking_ids(). (as opposed to created IDs)
*
* Return: SUCCEED/FAIL
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
static herr_t
_close_chunking_ids(unsigned min_dset,
unsigned max_dset,
hid_t *dataspace_ids,
hid_t *filespace_ids,
hid_t *dataset_ids,
hid_t *memspace_id)
{
unsigned m;
LOGPRINT(2, "_close_chunking_ids()\n");
for (m = min_dset; m <= max_dset; m++) {
LOGPRINT(3, "closing ids[%d]\n", m);
if (dataspace_ids) {
if (H5Sclose(dataspace_ids[m]) < 0) {
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to close dataspace_id[%d]\n", m);
FAIL_PUTS_ERROR(mesg);
}
}
if (H5Dclose(dataset_ids[m]) < 0) {
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to close dataset_id[%d]\n", m);
FAIL_PUTS_ERROR(mesg);
}
if (H5Sclose(filespace_ids[m]) < 0) {
HDsnprintf(mesg, MIRR_MESG_SIZE,
"unable to close filespace_id[%d]\n", m);
FAIL_PUTS_ERROR(mesg);
}
}
if ( (*memspace_id != H5I_INVALID_HID) &&
(H5Sclose(*memspace_id) < 0) )
{
TEST_ERROR;
}
return SUCCEED;
error:
LOGPRINT(1, "_close_chunking_ids() FAILED\n");
return FAIL;
} /* end _close_chunking_ids() */
/* ---------------------------------------------------------------------------
* Function: _verify_datasets
*
* Purpose: Check that each chunk's contents are as expected, as pertaining
* to create_datasets().
*
* Return: SUCCEED/FAIL
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
static herr_t
_verify_datasets(unsigned min_dset,
unsigned max_dset,
hid_t *filespace_ids,
hid_t *dataset_ids,
hid_t memspace_id)
{
unsigned i, j, k, l, m;
int data_chunk[CHUNK_DIM][CHUNK_DIM];
hsize_t offset[2];
hsize_t a_size[2] = {CHUNK_DIM, CHUNK_DIM};
LOGPRINT(2, "_verify_datasets()\n");
for (i = 0; i < DSET_DIM; i += CHUNK_DIM)
{
LOGPRINT(3, "i: %d\n", i);
for (j = 0; j < DSET_DIM; j += CHUNK_DIM)
{
LOGPRINT(3, " j: %d\n", j);
for (m = min_dset; m <= max_dset; m++)
{
LOGPRINT(3, " m: %d\n", m);
/* select on disk hyperslab */
offset[0] = (hsize_t)i;
offset[1] = (hsize_t)j;
if (H5Sselect_hyperslab(filespace_ids[m], H5S_SELECT_SET,
offset, NULL, a_size, NULL)
< 0)
{
TEST_ERROR;
}
if (H5Dread(dataset_ids[m], H5T_NATIVE_INT, memspace_id,
filespace_ids[m], H5P_DEFAULT, data_chunk)
< 0)
{
HDsnprintf(mesg, MIRR_MESG_SIZE,
" H5Dread() [%d][%d][%d]\n",
i, j, m);
FAIL_PUTS_ERROR(mesg);
}
for (k = 0; k < CHUNK_DIM; k++) {
for (l = 0; l < CHUNK_DIM; l++) {
if ((unsigned)data_chunk[k][l]
!=
((DSET_DIM * DSET_DIM * m) +
(DSET_DIM * (i + k)) + j + l))
{
HDsnprintf(mesg, MIRR_MESG_SIZE,
" MISMATCH [%d][%d][%d][%d][%d]\n",
i, j, m, k, l);
FAIL_PUTS_ERROR(mesg);
}
}
}
}
}
}
return SUCCEED;
error:
LOGPRINT(1, "_verify_datasets() FAILED\n");
return FAIL;
} /* end _verify_datasets() */
/* ---------------------------------------------------------------------------
* Function: verify_datasets
*
* Purpose: Inspect the datasets in the file created by create_datasets().
* Wrapper for _verify_datasets() -- this function sets up and
* tears down accessor information.
*
* Return: SUCCEED/FAIL
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
static herr_t
verify_datasets(hid_t file_id,
unsigned min_dset,
unsigned max_dset)
{
hid_t dataset_ids[MAX_DSET_COUNT + 1];
hid_t filespace_ids[MAX_DSET_COUNT + 1];
unsigned i;
hid_t memspace_id = H5I_INVALID_HID;
hsize_t chunk_dims[2] = {CHUNK_DIM, CHUNK_DIM};
HDassert(file_id >= 0);
HDassert(min_dset <= max_dset);
HDassert(max_dset <= MAX_DSET_COUNT);
LOGPRINT(2, "verify_datasets()\n");
/* ---------------------------------
* "Clear" ID arrays
*/
for (i = 0; i < MAX_DSET_COUNT; i++) {
LOGPRINT(3, "clearing IDs [%d]\n", i);
dataset_ids[i] = H5I_INVALID_HID;
filespace_ids[i] = H5I_INVALID_HID;
}
/* ---------------------------------
* Generate dataspace, dataset, and 'filespace' IDs
*/
if (_open_chunking_ids(file_id, min_dset, max_dset, chunk_dims,
filespace_ids, dataset_ids, &memspace_id)
== FAIL)
{
TEST_ERROR;
}
/* ---------------------------------
* Read and verify data from datasets
*/
if (_verify_datasets(min_dset, max_dset, filespace_ids, dataset_ids,
memspace_id)
== FAIL)
{
TEST_ERROR;
}
/* ---------------------------------
* Cleanup
*/
if (_close_chunking_ids(min_dset, max_dset, NULL, filespace_ids,
dataset_ids, &memspace_id)
== FAIL)
{
TEST_ERROR;
}
return SUCCEED;
error:
LOGPRINT(1, "verify_datasets() FAILED\n");
(void)_close_chunking_ids(min_dset, max_dset, NULL, filespace_ids,
dataset_ids, &memspace_id);
return FAIL;
} /* end verify_datasets() */
/* ---------------------------------------------------------------------------
* Function: test_basic_dataset_write
*
* Purpose: Create and close files; repoen files and write a dataset,
* close; compare files.
*
* TODO: receive target IP from caller?
*
* Return: Success: 0
* Failure: -1
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
static int
test_basic_dataset_write(void)
{
struct mirrortest_filenames names;
hid_t file_id = H5I_INVALID_HID;
hid_t fapl_id = H5P_DEFAULT;
hid_t dset_id = H5I_INVALID_HID;
hid_t dspace_id = H5I_INVALID_HID;
hid_t dtype_id = H5T_NATIVE_INT;
hsize_t dims[2] = { DATABUFFER_SIZE, DATABUFFER_SIZE };
int *buf = NULL;
int i = 0;
int j = 0;
TESTING("Mirror open and dataset writing");
/* Create FAPL for Splitter[sec2|mirror]
*/
fapl_id = create_mirroring_split_fapl("basic_write", &names);
if (H5I_INVALID_HID == fapl_id) {
TEST_ERROR;
}
/* Prepare data to be written
*/
buf = (int *)HDmalloc(DATABUFFER_SIZE * DATABUFFER_SIZE * sizeof(int));
if (NULL == buf) {
TEST_ERROR;
}
for (i = 0; i < DATABUFFER_SIZE; i++) {
for (j = 0; j < DATABUFFER_SIZE; j++) {
int k = i * DATABUFFER_SIZE + j;
buf[k] = k;
}
}
/* -------------------- */
/* TEST: Create and Close */
file_id = H5Fcreate(names.rw, H5F_ACC_TRUNC, H5P_DEFAULT, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
if (H5Fclose(file_id) == FAIL) {
TEST_ERROR;
}
file_id = H5I_INVALID_HID;
/* -------------------- */
/* TEST: Repoen and Write */
file_id = H5Fopen(names.rw, H5F_ACC_RDWR, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
dspace_id = H5Screate_simple(2, dims, NULL);
if (H5I_INVALID_HID == dspace_id) {
TEST_ERROR;
}
dset_id = H5Dcreate2(file_id, "dataset", dtype_id, dspace_id, H5P_DEFAULT,
H5P_DEFAULT, H5P_DEFAULT);
if (H5I_INVALID_HID == dset_id) {
TEST_ERROR;
}
if (H5Dwrite(dset_id, dtype_id, H5S_ALL, H5S_ALL, H5P_DEFAULT, buf)
== FAIL)
{
TEST_ERROR;
}
/* -------------------- */
/* Standard cleanup */
HDfree(buf);
buf = NULL;
if (H5Dclose(dset_id) == FAIL) {
TEST_ERROR;
}
if (H5Sclose(dspace_id) == FAIL) {
TEST_ERROR;
}
if (H5Fclose(file_id) == FAIL) {
TEST_ERROR;
}
if (fapl_id != H5P_DEFAULT && fapl_id > 0) {
if (H5Pclose(fapl_id) == FAIL) {
TEST_ERROR;
}
}
/* -------------------- */
/* TEST: Verify that the R/W and W/O files are identical */
if (h5_compare_file_bytes(names.rw, names.wo) < 0) {
TEST_ERROR;
}
PASSED();
return 0;
error:
H5E_BEGIN_TRY{
(void)H5Fclose(file_id);
if (buf) {
HDfree(buf);
}
(void)H5Dclose(dset_id);
(void)H5Sclose(dspace_id);
if (fapl_id != H5P_DEFAULT && fapl_id > 0) {
(void)H5Pclose(fapl_id);
}
} H5E_END_TRY;
return -1;
} /* end test_basic_dataset_write() */
/* ---------------------------------------------------------------------------
* Function: test_chunked_dataset_write
*
* Purpose: Create and close files; repoen files and write a dataset,
* close; compare files.
*
* TODO: receive target IP from caller?
*
* Return: Success: 0
* Failure: -1
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
static int
test_chunked_dataset_write(void)
{
struct mirrortest_filenames names;
hid_t file_id = H5I_INVALID_HID;
hid_t fapl_id = H5P_DEFAULT;
TESTING("Mirror open and dataset writing (chunked)");
/* Create FAPL for Splitter[sec2|mirror]
*/
fapl_id = create_mirroring_split_fapl("chunked_write", &names);
if (H5I_INVALID_HID == fapl_id) {
TEST_ERROR;
}
/* -------------------- */
/* TEST: Create and Close */
file_id = H5Fcreate(names.rw, H5F_ACC_TRUNC, H5P_DEFAULT, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
if (H5Fclose(file_id) == FAIL) {
TEST_ERROR;
}
file_id = H5I_INVALID_HID;
/* -------------------- */
/* TEST: Reopen and Write */
file_id = H5Fopen(names.rw, H5F_ACC_RDWR, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
/* Write datasets to file
*/
if (create_datasets(file_id, 0, MAX_DSET_COUNT) == FAIL) {
TEST_ERROR;
}
/* Close to 'flush to disk', and reopen file
*/
if (H5Fclose(file_id) == FAIL) {
TEST_ERROR;
}
file_id = H5I_INVALID_HID;
/* Reopen file
*/
file_id = H5Fopen(names.rw, H5F_ACC_RDWR, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
/* Verify written data integrity
*/
if (verify_datasets(file_id, 0, MAX_DSET_COUNT) == FAIL) {
TEST_ERROR;
}
/* -------------------- */
/* Standard cleanup */
if (H5Fclose(file_id) == FAIL) {
TEST_ERROR;
}
file_id = H5I_INVALID_HID;
if (fapl_id != H5P_DEFAULT && fapl_id > 0) {
if (H5Pclose(fapl_id) == FAIL) {
TEST_ERROR;
}
fapl_id = H5I_INVALID_HID;
}
/* -------------------- */
/* TEST: Verify that the R/W and W/O files are identical */
if (h5_compare_file_bytes(names.rw, names.wo) < 0) {
TEST_ERROR;
}
PASSED();
return 0;
error:
H5E_BEGIN_TRY {
(void)H5Fclose(file_id);
if (fapl_id != H5P_DEFAULT && fapl_id > 0) {
(void)H5Pclose(fapl_id);
}
} H5E_END_TRY;
return -1;
} /* end test_chunked_dataset_write() */
/* ---------------------------------------------------------------------------
* Function: test_on_disk_zoo
*
* Purpose: Verify that the mirror can handle the passing of all the
* various on-disk data structures over the wire, as implemented
* in genall5.c:create_zoo().
*
* TODO: receive target IP from caller?
*
* Return: Success: 0
* Failure: -1
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
static int
test_on_disk_zoo(void)
{
const char grp_name[] = "/only";
struct mirrortest_filenames names;
hid_t file_id = H5I_INVALID_HID;
hid_t grp_id = H5I_INVALID_HID;
hid_t fapl_id = H5P_DEFAULT;
TESTING("'Zoo' of on-disk structures");
/* Create FAPL for Splitter[sec2|mirror]
*/
fapl_id = create_mirroring_split_fapl("zoo", &names);
if (H5I_INVALID_HID == fapl_id) {
TEST_ERROR;
}
/* -------------------- */
/* TEST: Create file */
file_id = H5Fcreate(names.rw, H5F_ACC_TRUNC, H5P_DEFAULT, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
grp_id = H5Gcreate2(file_id, grp_name, H5P_DEFAULT, H5P_DEFAULT,
H5P_DEFAULT);
if (grp_id == H5I_INVALID_HID) {
TEST_ERROR;
}
/* Create datasets in file, close (flush) and reopen, validate.
* Use of ( pass ) a conceit required for using create_ and validate_zoo()
* from cache_common and/or genall5.
*/
if ( pass ) {
create_zoo(file_id, grp_name, 0);
}
if ( pass ) {
if (H5Fclose(file_id) == FAIL) {
TEST_ERROR;
}
file_id = H5Fopen(names.rw, H5F_ACC_RDWR, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
}
if ( pass ) {
validate_zoo(file_id, grp_name, 0); /* sanity-check */
}
if ( !pass ) {
HDprintf(failure_mssg);
TEST_ERROR;
}
/* -------------------- */
/* Standard cleanup */
if (fapl_id != H5P_DEFAULT && fapl_id >= 0) {
if (H5Pclose(fapl_id) == FAIL) {
TEST_ERROR;
}
}
if (H5Gclose(grp_id) == FAIL) {
TEST_ERROR;
}
if (H5Fclose(file_id) == FAIL) {
TEST_ERROR;
}
/* -------------------- */
/* TEST: Verify that the R/W and W/O files are identical */
if (h5_compare_file_bytes(names.rw, names.wo) < 0) {
TEST_ERROR;
}
PASSED();
return 0;
error:
H5E_BEGIN_TRY {
(void)H5Fclose(file_id);
(void)H5Gclose(grp_id);
if (fapl_id != H5P_DEFAULT && fapl_id > 0) {
(void)H5Pclose(fapl_id);
}
} H5E_END_TRY;
return -1;
} /* end test_on_disk_zoo() */
/* ---------------------------------------------------------------------------
* Function: test_vanishing_datasets
*
* Purpose: Verify behavior when writing to a file where data is deleted.
*
* Each dataset is populated with the value of its suffix
* (dset5 is all fives).
*
* Opens 0..15 create one new dataset each, '/dset[i]'.
* Opens 3..18 delete '/dset[1-3]'
*
* Should end with no data in file.
*
* Return: Success: 0
* Failure: -1
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
static int
test_vanishing_datasets(void)
{
struct mirrortest_filenames names;
hid_t file_id = H5I_INVALID_HID;
hid_t fapl_id = H5I_INVALID_HID;
hid_t dset_id = H5I_INVALID_HID;
hid_t dspace_id = H5I_INVALID_HID;
hid_t mirror_fapl_id = H5I_INVALID_HID;
hsize_t dims[2] = {DATABUFFER_SIZE, DATABUFFER_SIZE};
uint32_t buf[DATABUFFER_SIZE][DATABUFFER_SIZE]; /* consider malloc? */
H5G_info_t group_info;
unsigned int i, j, k;
const unsigned int max_loops = 20;
const unsigned int max_at_one_time = 3;
TESTING("Vanishing Datasets");
/* -------------------- */
/* Set up recurrent data (FAPL, dataspace) */
/* Create FAPL for Splitter[sec2|mirror]
*/
fapl_id = create_mirroring_split_fapl("vanishing", &names);
if (H5I_INVALID_HID == fapl_id) {
TEST_ERROR;
}
dspace_id = H5Screate_simple(2, dims, NULL);
if (dspace_id < 0) {
TEST_ERROR;
}
/* create file */
file_id = H5Fcreate(names.rw, H5F_ACC_TRUNC, H5P_DEFAULT, fapl_id);
if (H5I_INVALID_HID == file_id) {
TEST_ERROR;
}
for (i=0; i < max_loops; i++) {
char namebuf[DSET_NAME_LEN + 1];
/* deleting datasets */
if (i >= max_at_one_time) {
if (HDsnprintf(namebuf, DSET_NAME_LEN, "/dset%02d",
(i - max_at_one_time) )
> DSET_NAME_LEN)
{
TEST_ERROR;
}
if (H5Ldelete(file_id, namebuf, H5P_DEFAULT) < 0) {
TEST_ERROR;
}
} /* end if deleting a dataset */
/* writing datasets */
if (i < (max_loops - max_at_one_time)) {
if (HDsnprintf(namebuf, DSET_NAME_LEN, "/dset%02d", i)
> DSET_NAME_LEN)
{
TEST_ERROR;
}
dset_id = H5Dcreate2(file_id, namebuf, H5T_STD_U32LE, dspace_id,
H5P_DEFAULT, H5P_DEFAULT, H5P_DEFAULT);
if (H5I_INVALID_HID == dset_id) {
TEST_ERROR;
}
for (j=0; j < DATABUFFER_SIZE; j++) {
for (k=0; k < DATABUFFER_SIZE; k++) {
buf[j][k] = (uint32_t)i;
}
}
if (H5Dwrite(dset_id, H5T_STD_U32LE, H5S_ALL, H5S_ALL, H5P_DEFAULT,
buf)
< 0)
{
TEST_ERROR;
}
if (H5Dclose(dset_id) < 0) {
TEST_ERROR;
}
dset_id = H5I_INVALID_HID;
} /* end if writing a dataset */
} /* end for dataset create-destroy cycles */
if (H5Fclose(file_id) < 0) {
TEST_ERROR;
}
file_id = H5I_INVALID_HID;
/* verify there are no datasets in file */
file_id = H5Fopen(names.rw, H5F_ACC_RDONLY, H5P_DEFAULT);
if (file_id < 0) {
TEST_ERROR;
}
if (H5Gget_info(file_id, &group_info) < 0) {
TEST_ERROR;
}
if (group_info.nlinks > 0) {
HDfprintf(stderr, "links in rw file: %" PRIuHSIZE "\n",
group_info.nlinks);
HDfflush(stderr);
TEST_ERROR;
}
if (H5Fclose(file_id) < 0) {
TEST_ERROR;
}
file_id = H5Fopen(names.wo, H5F_ACC_RDONLY, H5P_DEFAULT);
if (file_id < 0) {
TEST_ERROR;
}
if (H5Gget_info(file_id, &group_info) < 0) {
TEST_ERROR;
}
if (group_info.nlinks > 0) {
HDfprintf(stderr, "links in wo file: %" PRIuHSIZE "\n",
group_info.nlinks);
HDfflush(stderr);
TEST_ERROR;
}
if (H5Fclose(file_id) < 0) {
TEST_ERROR;
}
file_id = H5I_INVALID_HID;
if (h5_compare_file_bytes(names.rw, names.wo) < 0)
TEST_ERROR;
/* -------------------- */
/* Teardown */
if (H5Sclose(dspace_id) < 0) {
TEST_ERROR;
}
if (H5Pclose(fapl_id) < 0) {
TEST_ERROR;
}
PASSED();
return 0;
error:
H5E_BEGIN_TRY {
if (mirror_fapl_id != H5I_INVALID_HID) {
H5Pclose(mirror_fapl_id);
}
if (fapl_id != H5I_INVALID_HID) {
H5Pclose(fapl_id);
}
if (file_id != H5I_INVALID_HID) {
H5Fclose(file_id);
}
if (dset_id != H5I_INVALID_HID) {
H5Dclose(dset_id);
}
if (dspace_id != H5I_INVALID_HID) {
H5Sclose(dspace_id);
}
} H5E_END_TRY;
return -1;
} /* test_vanishing_datasets() */
/* ---------------------------------------------------------------------------
* Function: test_concurrent_access
*
* Purpose: Verify that more than one file may be opened at a time.
*
* TODO: receive target IP from caller?
*
* Return: Success: 0
* Failure: -1
*
* Programmer: Jacob Smith
* 2020-03-09
* ---------------------------------------------------------------------------
*/
static int
test_concurrent_access(void)
{
struct file_bundle {
struct mirrortest_filenames names;
hid_t dset_id;
hid_t fapl_id;
hid_t file_id;
} bundle[CONCURRENT_COUNT];
hid_t dspace_id = H5I_INVALID_HID;
hid_t dtype_id = H5T_NATIVE_INT;
hsize_t dims[2] = { DATABUFFER_SIZE, DATABUFFER_SIZE };
int *buf = NULL;
int i = 0;
int j = 0;
TESTING("Concurrent opened mirrored files");
/* blank bundle */
for (i = 0; i < CONCURRENT_COUNT; i++) {
bundle[i].dset_id = H5I_INVALID_HID;
bundle[i].fapl_id = H5I_INVALID_HID;
bundle[i].file_id = H5I_INVALID_HID;
*bundle[i].names.rw = '\0';
*bundle[i].names.wo = '\0';
*bundle[i].names.log = '\0';
}
/* Create FAPL for Splitter[sec2|mirror]
*/
for (i = 0; i < CONCURRENT_COUNT; i++) {
char _name[16] = "";
hid_t _fapl_id = H5I_INVALID_HID;
HDsnprintf(_name, 15, "concurrent%d", i);
_fapl_id = create_mirroring_split_fapl(_name, &bundle[i].names);
if (H5I_INVALID_HID == _fapl_id) {
TEST_ERROR;
}
bundle[i].fapl_id = _fapl_id;
}
/* Prepare data to be written
*/
buf = (int *)HDmalloc(DATABUFFER_SIZE * DATABUFFER_SIZE * sizeof(int));
if (NULL == buf) {
TEST_ERROR;
}
for (i = 0; i < DATABUFFER_SIZE; i++) {
for (j = 0; j < DATABUFFER_SIZE; j++) {
int k = i * DATABUFFER_SIZE + j;
buf[k] = k;
}
}
/* Prepare generic dataspace
*/
dspace_id = H5Screate_simple(2, dims, NULL);
if (H5I_INVALID_HID == dspace_id) {
TEST_ERROR;
}
/* -------------------- */
/* TEST: Create file and open elements */
for (i = 0; i < CONCURRENT_COUNT; i++) {
hid_t _file_id = H5I_INVALID_HID;
hid_t _dset_id = H5I_INVALID_HID;
_file_id = H5Fcreate(bundle[i].names.rw, H5F_ACC_TRUNC, H5P_DEFAULT,
bundle[i].fapl_id);
if (H5I_INVALID_HID == _file_id) {
TEST_ERROR;
}
bundle[i].file_id = _file_id;
_dset_id = H5Dcreate2(_file_id, "dataset", dtype_id, dspace_id,
H5P_DEFAULT, H5P_DEFAULT, H5P_DEFAULT);
if (H5I_INVALID_HID == _dset_id) {
TEST_ERROR;
}
bundle[i].dset_id = _dset_id;
}
/* -------------------- */
/* TEST: Write to files */
for (i = 0; i < CONCURRENT_COUNT; i++) {
if (H5Dwrite(bundle[i].dset_id, dtype_id, H5S_ALL, H5S_ALL,
H5P_DEFAULT, buf)
== FAIL)
{
TEST_ERROR;
}
}
/* -------------------- */
/* TEST: Close elements */
for (i = 0; i < CONCURRENT_COUNT; i++) {
if (H5Dclose(bundle[i].dset_id) == FAIL) {
TEST_ERROR;
}
if (H5Fclose(bundle[i].file_id) == FAIL) {
TEST_ERROR;
}
if (H5Pclose(bundle[i].fapl_id) == FAIL) {
TEST_ERROR;
}
}
/* -------------------- */
/* Standard cleanup */
HDfree(buf);
buf = NULL;
if (H5Sclose(dspace_id) == FAIL) {
TEST_ERROR;
}
/* -------------------- */
/* TEST: Verify that the R/W and W/O files are identical */
for (i = 0; i < CONCURRENT_COUNT; i++) {
if (h5_compare_file_bytes(bundle[i].names.rw, bundle[i].names.wo) < 0) {
TEST_ERROR;
}
}
PASSED();
return 0;
error:
H5E_BEGIN_TRY{
if (buf) {
HDfree(buf);
}
(void)H5Sclose(dspace_id);
for (i = 0; i < CONCURRENT_COUNT; i++) {
(void)H5Dclose(bundle[i].dset_id);
(void)H5Fclose(bundle[i].file_id);
(void)H5Pclose(bundle[i].fapl_id);
}
} H5E_END_TRY;
return -1;
} /* end test_concurrent_access() */
/* ---------------------------------------------------------------------------
* Function: main
*
* Purpose: Run tests.
*
* Return: Success: 0
* Failure: 1
*
* Programmer: Jacob Smith
* 2019
* ---------------------------------------------------------------------------
*/
int
main(void)
{
int nerrors = 0;
h5_reset();
g_log_stream = stdout; /* default debug/logging output stream */
HDprintf("Testing Mirror VFD functionality.\n");
/* -------------------- */
/* SETUP */
/* Create directories for test-generated .h5 files
*/
if (nerrors == 0) {
if ((HDmkdir(MIRROR_RW_DIR, (mode_t)0755) < 0) && (errno != EEXIST)) {
nerrors++;
}
}
if (nerrors == 0) {
if ((HDmkdir(MIRROR_WO_DIR, (mode_t)0755) < 0) && (errno != EEXIST)) {
nerrors++;
}
}
/* -------------------- */
/* TESTS */
/* Tests return negative values; `-=' increments nerrors count */
if (nerrors == 0) {
nerrors -= test_fapl_configuration();
nerrors -= test_xmit_encode_decode();
nerrors -= test_create_and_close();
nerrors -= test_basic_dataset_write();
nerrors -= test_chunked_dataset_write();
nerrors -= test_on_disk_zoo();
nerrors -= test_vanishing_datasets();
nerrors -= test_concurrent_access();
}
if (nerrors) {
HDprintf("***** %d Mirror VFD TEST%s FAILED! *****\n",
nerrors, nerrors > 1 ? "S" : "");
return EXIT_FAILURE;
}
HDprintf("All Mirror Virtual File Driver tests passed.\n");
return EXIT_SUCCESS;
} /* end main() */
#else /* H5_HAVE_MIRROR_VFD */
int
main(void)
{
h5_reset();
HDprintf("Testing Mirror VFD functionality.\n");
HDprintf("SKIPPED - Mirror VFD not built.\n");
return EXIT_SUCCESS;
}
#endif /* H5_HAVE_MIRROR_VFD */