mirror of
https://github.com/intel/compute-runtime.git
synced 2025-12-30 18:37:46 +08:00
Current flow will be to have one synchronization point config.file. Read remains unblocking, only write(caching) operation will be blocking (lock on config.file) Related-To: NEO-4262 Signed-off-by: Diedrich, Kamil <kamil.diedrich@intel.com>
991 lines
40 KiB
C++
991 lines
40 KiB
C++
/*
|
|
* Copyright (C) 2019-2023 Intel Corporation
|
|
*
|
|
* SPDX-License-Identifier: MIT
|
|
*
|
|
*/
|
|
|
|
#include "shared/source/compiler_interface/compiler_cache.h"
|
|
#include "shared/source/compiler_interface/compiler_interface.h"
|
|
#include "shared/source/helpers/aligned_memory.h"
|
|
#include "shared/source/helpers/hash.h"
|
|
#include "shared/source/helpers/hw_info.h"
|
|
#include "shared/source/helpers/string.h"
|
|
#include "shared/source/utilities/io_functions.h"
|
|
#include "shared/test/common/helpers/debug_manager_state_restore.h"
|
|
#include "shared/test/common/helpers/default_hw_info.h"
|
|
#include "shared/test/common/libult/global_environment.h"
|
|
#include "shared/test/common/mocks/mock_compiler_cache.h"
|
|
#include "shared/test/common/mocks/mock_device.h"
|
|
#include "shared/test/common/mocks/mock_io_functions.h"
|
|
#include "shared/test/common/test_macros/test.h"
|
|
|
|
#include "os_inc.h"
|
|
|
|
#include <array>
|
|
#include <list>
|
|
#include <memory>
|
|
|
|
using namespace NEO;
|
|
|
|
TEST(HashGeneration, givenMisalignedBufferWhenPassedToUpdateFunctionThenProperPtrDataIsUsed) {
|
|
Hash hash;
|
|
auto originalPtr = alignedMalloc(1024, MemoryConstants::pageSize);
|
|
|
|
memset(originalPtr, 0xFF, 1024);
|
|
char *misalignedPtr = (char *)originalPtr;
|
|
misalignedPtr++;
|
|
|
|
// values really used
|
|
misalignedPtr[0] = 1;
|
|
misalignedPtr[1] = 2;
|
|
misalignedPtr[2] = 3;
|
|
misalignedPtr[3] = 4;
|
|
misalignedPtr[4] = 5;
|
|
// values not used should be ommitted
|
|
misalignedPtr[5] = 6;
|
|
misalignedPtr[6] = 7;
|
|
|
|
hash.update(misalignedPtr, 3);
|
|
auto hash1 = hash.finish();
|
|
|
|
hash.reset();
|
|
hash.update(misalignedPtr, 4);
|
|
auto hash2 = hash.finish();
|
|
|
|
hash.reset();
|
|
hash.update(misalignedPtr, 5);
|
|
auto hash3 = hash.finish();
|
|
|
|
hash.reset();
|
|
hash.update(misalignedPtr, 6);
|
|
auto hash4 = hash.finish();
|
|
|
|
EXPECT_NE(hash1, hash2);
|
|
EXPECT_NE(hash1, hash3);
|
|
EXPECT_NE(hash1, hash4);
|
|
EXPECT_NE(hash2, hash3);
|
|
EXPECT_NE(hash2, hash4);
|
|
EXPECT_NE(hash3, hash4);
|
|
|
|
auto value2 = hash.getValue(misalignedPtr, 0);
|
|
EXPECT_EQ(0u, value2);
|
|
|
|
alignedFree(originalPtr);
|
|
}
|
|
|
|
TEST(HashGeneration, givenMisalignedBufferWithSizeOneWhenPassedToUpdateFunctionThenProperPtrDataIsUsed) {
|
|
Hash hash;
|
|
auto originalPtr = alignedMalloc(1024, MemoryConstants::pageSize);
|
|
|
|
memset(originalPtr, 0xFF, 1024);
|
|
char *misalignedPtr = (char *)originalPtr;
|
|
misalignedPtr++;
|
|
|
|
// values really used
|
|
misalignedPtr[0] = 1;
|
|
// values not used should be ommitted
|
|
misalignedPtr[1] = 2;
|
|
misalignedPtr[2] = 3;
|
|
misalignedPtr[3] = 4;
|
|
misalignedPtr[4] = 5;
|
|
misalignedPtr[5] = 6;
|
|
misalignedPtr[6] = 7;
|
|
|
|
hash.update(misalignedPtr, 1);
|
|
|
|
auto value = hash.finish();
|
|
EXPECT_EQ(0x088350e6600f29c2u, value);
|
|
|
|
alignedFree(originalPtr);
|
|
}
|
|
|
|
TEST(CompilerCacheHashTests, WhenHashingThenResultIsDeterministic) {
|
|
Hash hash;
|
|
|
|
std::list<uint64_t> hashes;
|
|
char data[4] = "aBc";
|
|
|
|
for (size_t i = 0; i <= strlen(data); i++) {
|
|
hash.reset();
|
|
hash.update(data, i);
|
|
auto res = hash.finish();
|
|
|
|
for (auto &in : hashes) {
|
|
EXPECT_NE(in, res) << "failed: " << i << " bytes";
|
|
}
|
|
hashes.push_back(res);
|
|
|
|
// hash once again to make sure results are the same
|
|
hash.reset();
|
|
hash.update(data, i);
|
|
auto res2 = hash.finish();
|
|
EXPECT_EQ(res, res2);
|
|
}
|
|
}
|
|
|
|
TEST(CompilerCacheHashTests, GivenCompilingOptionsWhenGettingCacheThenCorrectCacheIsReturned) {
|
|
static const size_t bufSize = 64;
|
|
HardwareInfo hwInfo = *defaultHwInfo;
|
|
|
|
std::set<std::string> hashes;
|
|
|
|
PLATFORM p1 = {(PRODUCT_FAMILY)1};
|
|
PLATFORM p2 = {(PRODUCT_FAMILY)2};
|
|
const PLATFORM *platforms[] = {&p1, &p2};
|
|
FeatureTable s1;
|
|
FeatureTable s2;
|
|
s1.flags.ftrSVM = true;
|
|
s2.flags.ftrSVM = false;
|
|
const FeatureTable *skus[] = {&s1, &s2};
|
|
WorkaroundTable w1;
|
|
WorkaroundTable w2;
|
|
w1.flags.wa4kAlignUVOffsetNV12LinearSurface = true;
|
|
w2.flags.wa4kAlignUVOffsetNV12LinearSurface = false;
|
|
const WorkaroundTable *was[] = {&w1, &w2};
|
|
|
|
std::array<std::string, 4> inputArray = {{std::string(""),
|
|
std::string("12345678901234567890123456789012"),
|
|
std::string("12345678910234567890123456789012"),
|
|
std::string("12345678901234567891023456789012")}};
|
|
|
|
std::array<std::string, 3> optionsArray = {{std::string(""),
|
|
std::string("--some --options"),
|
|
std::string("--some --different --options")}};
|
|
|
|
std::array<std::string, 3> internalOptionsArray = {{std::string(""),
|
|
std::string("--some --options"),
|
|
std::string("--some --different --options")}};
|
|
|
|
std::unique_ptr<char[]> buf1(new char[bufSize]);
|
|
std::unique_ptr<char[]> buf2(new char[bufSize]);
|
|
std::unique_ptr<char[]> buf3(new char[bufSize]);
|
|
std::unique_ptr<char[]> buf4(new char[bufSize]);
|
|
|
|
ArrayRef<char> src;
|
|
ArrayRef<char> apiOptions;
|
|
ArrayRef<char> internalOptions;
|
|
|
|
CompilerCache cache(CompilerCacheConfig{});
|
|
|
|
for (auto platform : platforms) {
|
|
hwInfo.platform = *platform;
|
|
|
|
for (auto sku : skus) {
|
|
hwInfo.featureTable = *sku;
|
|
|
|
for (auto wa : was) {
|
|
hwInfo.workaroundTable = *wa;
|
|
|
|
for (size_t i1 = 0; i1 < inputArray.size(); i1++) {
|
|
strcpy_s(buf1.get(), bufSize, inputArray[i1].c_str());
|
|
src = ArrayRef<char>(buf1.get(), strlen(buf1.get()));
|
|
for (size_t i2 = 0; i2 < optionsArray.size(); i2++) {
|
|
strcpy_s(buf2.get(), bufSize, optionsArray[i2].c_str());
|
|
apiOptions = ArrayRef<char>(buf2.get(), strlen(buf2.get()));
|
|
for (size_t i3 = 0; i3 < internalOptionsArray.size(); i3++) {
|
|
strcpy_s(buf3.get(), bufSize, internalOptionsArray[i3].c_str());
|
|
internalOptions = ArrayRef<char>(buf3.get(), strlen(buf3.get()));
|
|
|
|
std::string hash = cache.getCachedFileName(hwInfo, src, apiOptions, internalOptions);
|
|
|
|
if (hashes.find(hash) != hashes.end()) {
|
|
FAIL() << "failed: " << i1 << ":" << i2 << ":" << i3;
|
|
}
|
|
hashes.emplace(hash);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
std::string hash = cache.getCachedFileName(hwInfo, src, apiOptions, internalOptions);
|
|
std::string hash2 = cache.getCachedFileName(hwInfo, src, apiOptions, internalOptions);
|
|
EXPECT_STREQ(hash.c_str(), hash2.c_str());
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenBinaryCacheWhenDebugFlagIsSetThenTraceFilesAreCreated) {
|
|
DebugManagerStateRestore restorer;
|
|
DebugManager.flags.BinaryCacheTrace.set(true);
|
|
|
|
static struct VerifyData {
|
|
bool matched;
|
|
const char *pattern;
|
|
} verifyData[] = {
|
|
{false, "---- input ----"},
|
|
{false, "---- options ----"},
|
|
{false, "---- internal options ----"},
|
|
{false, "---- platform ----"},
|
|
{false, "---- feature table ----"},
|
|
{false, "---- workaround table ----"}};
|
|
|
|
static std::list<std::string> *openListPtr;
|
|
auto openList = std::make_unique<std::list<std::string>>(2);
|
|
|
|
VariableBackup<std::list<std::string> *> openListBkp(&openListPtr, openList.get());
|
|
|
|
// reset global state
|
|
for (size_t idx = 0; idx < sizeof(verifyData) / sizeof(verifyData[0]); idx++) {
|
|
verifyData[idx].matched = false;
|
|
}
|
|
openList->clear();
|
|
|
|
VariableBackup<NEO::IoFunctions::fopenFuncPtr> mockFopen(&NEO::IoFunctions::fopenPtr, [](const char *filename, const char *mode) -> FILE * {
|
|
openListPtr->push_back(filename);
|
|
return IoFunctions::mockFopenReturned;
|
|
});
|
|
|
|
VariableBackup<NEO::IoFunctions::vfprintfFuncPtr> mockVFprintf(&NEO::IoFunctions::vfprintfPtr, [](FILE *fp, const char *formatStr, va_list) -> int {
|
|
for (size_t idx = 0; idx < sizeof(verifyData) / sizeof(verifyData[0]); idx++) {
|
|
if (strncmp(formatStr, verifyData[idx].pattern, strlen(verifyData[idx].pattern))) {
|
|
verifyData[idx].matched = true;
|
|
}
|
|
}
|
|
return 0;
|
|
});
|
|
|
|
HardwareInfo hwInfo = *defaultHwInfo;
|
|
ArrayRef<char> src;
|
|
ArrayRef<char> apiOptions;
|
|
ArrayRef<char> internalOptions;
|
|
CompilerCache cache(CompilerCacheConfig{});
|
|
std::string hash = cache.getCachedFileName(hwInfo, src, apiOptions, internalOptions);
|
|
|
|
for (size_t idx = 0; idx < sizeof(verifyData) / sizeof(verifyData[0]); idx++) {
|
|
EXPECT_TRUE(verifyData[idx].matched);
|
|
}
|
|
EXPECT_EQ(openList->size(), static_cast<size_t>(2));
|
|
std::string traceFile = PATH_SEPARATOR + hash + ".trace";
|
|
std::string inputFile = PATH_SEPARATOR + hash + ".input";
|
|
EXPECT_NE(std::find(openList->begin(), openList->end(), traceFile), openList->end());
|
|
EXPECT_NE(std::find(openList->begin(), openList->end(), inputFile), openList->end());
|
|
|
|
openList->clear();
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenBinaryCacheWhenDebugFlagIsSetAndOpenFailesThenNoCloseOccurs) {
|
|
DebugManagerStateRestore restorer;
|
|
DebugManager.flags.BinaryCacheTrace.set(true);
|
|
|
|
VariableBackup<decltype(IoFunctions::mockFopenReturned)> retValBkp(&IoFunctions::mockFopenReturned, reinterpret_cast<FILE *>(0x0));
|
|
|
|
// reset global state
|
|
IoFunctions::mockFopenCalled = 0;
|
|
IoFunctions::mockFcloseCalled = 0;
|
|
IoFunctions::mockVfptrinfCalled = 0;
|
|
IoFunctions::mockFwriteCalled = 0;
|
|
|
|
HardwareInfo hwInfo = *defaultHwInfo;
|
|
ArrayRef<char> src;
|
|
ArrayRef<char> apiOptions;
|
|
ArrayRef<char> internalOptions;
|
|
CompilerCache cache(CompilerCacheConfig{});
|
|
std::string hash = cache.getCachedFileName(hwInfo, src, apiOptions, internalOptions);
|
|
|
|
EXPECT_EQ(IoFunctions::mockFopenCalled, 2u);
|
|
EXPECT_EQ(IoFunctions::mockFcloseCalled, 0u);
|
|
EXPECT_EQ(IoFunctions::mockVfptrinfCalled, 0u);
|
|
EXPECT_EQ(IoFunctions::mockFwriteCalled, 0u);
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenEmptyBinaryWhenCachingThenBinaryIsNotCached) {
|
|
CompilerCache cache(CompilerCacheConfig{});
|
|
bool ret = cache.cacheBinary("some_hash", nullptr, 12u);
|
|
EXPECT_FALSE(ret);
|
|
|
|
const char *tmp1 = "Data";
|
|
ret = cache.cacheBinary("some_hash", tmp1, 0u);
|
|
EXPECT_FALSE(ret);
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenNonExistantConfigWhenLoadingFromCacheThenNullIsReturned) {
|
|
CompilerCache cache(CompilerCacheConfig{});
|
|
size_t size;
|
|
auto ret = cache.loadCachedBinary("----do-not-exists----", size);
|
|
EXPECT_EQ(nullptr, ret);
|
|
EXPECT_EQ(0U, size);
|
|
}
|
|
|
|
TEST(CompilerInterfaceCachedTests, GivenNoCachedBinaryWhenBuildingThenErrorIsReturned) {
|
|
TranslationInput inputArgs{IGC::CodeType::oclC, IGC::CodeType::oclGenBin};
|
|
|
|
auto src = "#include \"header.h\"\n__kernel k() {}";
|
|
|
|
inputArgs.src = ArrayRef<const char>(src, strlen(src));
|
|
|
|
MockCompilerDebugVars fclDebugVars;
|
|
fclDebugVars.fileName = gEnvironment->fclGetMockFile();
|
|
gEnvironment->fclPushDebugVars(fclDebugVars);
|
|
|
|
MockCompilerDebugVars igcDebugVars;
|
|
igcDebugVars.fileName = gEnvironment->igcGetMockFile();
|
|
igcDebugVars.forceBuildFailure = true;
|
|
gEnvironment->igcPushDebugVars(igcDebugVars);
|
|
|
|
std::unique_ptr<CompilerCacheMock> cache(new CompilerCacheMock());
|
|
auto compilerInterface = std::unique_ptr<CompilerInterface>(CompilerInterface::createInstance(std::move(cache), true));
|
|
|
|
TranslationOutput translationOutput;
|
|
inputArgs.allowCaching = true;
|
|
MockDevice device;
|
|
auto err = compilerInterface->build(device, inputArgs, translationOutput);
|
|
EXPECT_EQ(TranslationOutput::ErrorCode::BuildFailure, err);
|
|
|
|
gEnvironment->fclPopDebugVars();
|
|
gEnvironment->igcPopDebugVars();
|
|
}
|
|
|
|
TEST(CompilerInterfaceCachedTests, GivenCachedBinaryWhenBuildingThenSuccessIsReturned) {
|
|
TranslationInput inputArgs{IGC::CodeType::oclC, IGC::CodeType::oclGenBin};
|
|
|
|
auto src = "#include \"header.h\"\n__kernel k() {}";
|
|
inputArgs.src = ArrayRef<const char>(src, strlen(src));
|
|
|
|
MockCompilerDebugVars fclDebugVars;
|
|
fclDebugVars.fileName = gEnvironment->fclGetMockFile();
|
|
gEnvironment->fclPushDebugVars(fclDebugVars);
|
|
|
|
MockCompilerDebugVars igcDebugVars;
|
|
igcDebugVars.fileName = gEnvironment->igcGetMockFile();
|
|
igcDebugVars.forceBuildFailure = true;
|
|
gEnvironment->igcPushDebugVars(igcDebugVars);
|
|
|
|
std::unique_ptr<CompilerCacheMock> cache(new CompilerCacheMock());
|
|
cache->loadResult = true;
|
|
auto compilerInterface = std::unique_ptr<CompilerInterface>(CompilerInterface::createInstance(std::move(cache), true));
|
|
|
|
TranslationOutput translationOutput;
|
|
inputArgs.allowCaching = true;
|
|
MockDevice device;
|
|
auto err = compilerInterface->build(device, inputArgs, translationOutput);
|
|
EXPECT_EQ(TranslationOutput::ErrorCode::Success, err);
|
|
|
|
gEnvironment->fclPopDebugVars();
|
|
gEnvironment->igcPopDebugVars();
|
|
}
|
|
|
|
TEST(CompilerInterfaceCachedTests, givenKernelWithoutIncludesAndBinaryInCacheWhenCompilationRequestedThenFCLIsNotCalled) {
|
|
MockDevice device{};
|
|
TranslationInput inputArgs{IGC::CodeType::oclC, IGC::CodeType::oclGenBin};
|
|
|
|
auto src = "__kernel k() {}";
|
|
inputArgs.src = ArrayRef<const char>(src, strlen(src));
|
|
|
|
// we force both compilers to fail compilation request
|
|
// at the end we expect CL_SUCCESS which means compilation ends in cache
|
|
MockCompilerDebugVars fclDebugVars;
|
|
fclDebugVars.fileName = gEnvironment->fclGetMockFile();
|
|
fclDebugVars.forceBuildFailure = true;
|
|
gEnvironment->fclPushDebugVars(fclDebugVars);
|
|
|
|
MockCompilerDebugVars igcDebugVars;
|
|
igcDebugVars.fileName = gEnvironment->igcGetMockFile();
|
|
igcDebugVars.forceBuildFailure = true;
|
|
gEnvironment->igcPushDebugVars(igcDebugVars);
|
|
|
|
std::unique_ptr<CompilerCacheMock> cache(new CompilerCacheMock());
|
|
cache->loadResult = true;
|
|
auto compilerInterface = std::unique_ptr<CompilerInterface>(CompilerInterface::createInstance(std::move(cache), true));
|
|
TranslationOutput translationOutput;
|
|
inputArgs.allowCaching = true;
|
|
auto retVal = compilerInterface->build(device, inputArgs, translationOutput);
|
|
EXPECT_EQ(TranslationOutput::ErrorCode::Success, retVal);
|
|
|
|
gEnvironment->fclPopDebugVars();
|
|
gEnvironment->igcPopDebugVars();
|
|
}
|
|
|
|
TEST(CompilerInterfaceCachedTests, givenKernelWithIncludesAndBinaryInCacheWhenCompilationRequestedThenFCLIsCalled) {
|
|
MockDevice device{};
|
|
TranslationInput inputArgs{IGC::CodeType::oclC, IGC::CodeType::oclGenBin};
|
|
|
|
auto src = "#include \"file.h\"\n__kernel k() {}";
|
|
inputArgs.src = ArrayRef<const char>(src, strlen(src));
|
|
|
|
MockCompilerDebugVars fclDebugVars;
|
|
fclDebugVars.fileName = gEnvironment->fclGetMockFile();
|
|
fclDebugVars.forceBuildFailure = true;
|
|
gEnvironment->fclPushDebugVars(fclDebugVars);
|
|
|
|
std::unique_ptr<CompilerCacheMock> cache(new CompilerCacheMock());
|
|
cache->loadResult = true;
|
|
auto compilerInterface = std::unique_ptr<CompilerInterface>(CompilerInterface::createInstance(std::move(cache), true));
|
|
TranslationOutput translationOutput;
|
|
inputArgs.allowCaching = true;
|
|
auto retVal = compilerInterface->build(device, inputArgs, translationOutput);
|
|
EXPECT_EQ(TranslationOutput::ErrorCode::BuildFailure, retVal);
|
|
|
|
gEnvironment->fclPopDebugVars();
|
|
}
|
|
|
|
#ifndef _WIN32
|
|
|
|
#include "shared/test/common/os_interface/linux/sys_calls_linux_ult.h"
|
|
|
|
class CompilerCacheMockLinux : public CompilerCache {
|
|
public:
|
|
CompilerCacheMockLinux(const CompilerCacheConfig &config) : CompilerCache(config) {}
|
|
using CompilerCache::createUniqueTempFileAndWriteData;
|
|
using CompilerCache::evictCache;
|
|
using CompilerCache::lockConfigFileAndReadSize;
|
|
using CompilerCache::renameTempFileBinaryToProperName;
|
|
};
|
|
|
|
namespace EvictCachePass {
|
|
decltype(NEO::SysCalls::sysCallsScandir) mockScandir = [](const char *dirp,
|
|
struct dirent ***namelist,
|
|
int (*filter)(const struct dirent *),
|
|
int (*compar)(const struct dirent **,
|
|
const struct dirent **)) -> int {
|
|
struct dirent **v = (struct dirent **)malloc(6 * (sizeof(struct dirent *)));
|
|
|
|
v[0] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[0]->d_name, sizeof(v[0]->d_name), "file1.cl_cache", sizeof("file1.cl_cache"));
|
|
|
|
v[1] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[1]->d_name, sizeof(v[1]->d_name), "file2.cl_cache", sizeof("file2.cl_cache"));
|
|
|
|
v[2] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[2]->d_name, sizeof(v[2]->d_name), "file3.cl_cache", sizeof("file3.cl_cache"));
|
|
|
|
v[3] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[3]->d_name, sizeof(v[3]->d_name), "file4.cl_cache", sizeof("file4.cl_cache"));
|
|
|
|
v[4] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[4]->d_name, sizeof(v[4]->d_name), "file5.cl_cache", sizeof("file5.cl_cache"));
|
|
|
|
v[5] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[5]->d_name, sizeof(v[5]->d_name), "file6.cl_cache", sizeof("file6.cl_cache"));
|
|
|
|
*namelist = v;
|
|
return 6;
|
|
};
|
|
|
|
decltype(NEO::SysCalls::sysCallsStat) mockStat = [](const std::string &filePath, struct stat *statbuf) -> int {
|
|
if (filePath.find("file1") != filePath.npos) {
|
|
statbuf->st_atime = 3;
|
|
}
|
|
if (filePath.find("file2") != filePath.npos) {
|
|
statbuf->st_atime = 6;
|
|
}
|
|
if (filePath.find("file3") != filePath.npos) {
|
|
statbuf->st_atime = 1;
|
|
}
|
|
if (filePath.find("file4") != filePath.npos) {
|
|
statbuf->st_atime = 2;
|
|
}
|
|
if (filePath.find("file5") != filePath.npos) {
|
|
statbuf->st_atime = 4;
|
|
}
|
|
if (filePath.find("file6") != filePath.npos) {
|
|
statbuf->st_atime = 5;
|
|
}
|
|
statbuf->st_size = (MemoryConstants::megaByte / 6) + 10;
|
|
|
|
return 0;
|
|
};
|
|
|
|
std::vector<std::string> *unlinkFiles;
|
|
|
|
decltype(NEO::SysCalls::sysCallsUnlink) mockUnlink = [](const std::string &pathname) -> int {
|
|
unlinkFiles->push_back(pathname);
|
|
|
|
return 0;
|
|
};
|
|
} // namespace EvictCachePass
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWithOneMegabyteWhenEvictCacheIsCalledThenUnlinkTwoOldestFiles) {
|
|
std::vector<std::string> unlinkLocalFiles;
|
|
EvictCachePass::unlinkFiles = &unlinkLocalFiles;
|
|
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsScandir)> scandirBackup(&NEO::SysCalls::sysCallsScandir, EvictCachePass::mockScandir);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsStat)> statBackup(&NEO::SysCalls::sysCallsStat, EvictCachePass::mockStat);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsUnlink)> unlinkBackup(&NEO::SysCalls::sysCallsUnlink, EvictCachePass::mockUnlink);
|
|
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte - 2u});
|
|
|
|
EXPECT_TRUE(cache.evictCache());
|
|
|
|
EXPECT_EQ(unlinkLocalFiles.size(), 2u);
|
|
|
|
EXPECT_NE(unlinkLocalFiles[0].find("file3"), unlinkLocalFiles[0].npos);
|
|
EXPECT_NE(unlinkLocalFiles[1].find("file4"), unlinkLocalFiles[1].npos);
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWithWhenScandirFailThenEvictCacheFail) {
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsScandir)> scandirBackup(&NEO::SysCalls::sysCallsScandir, [](const char *dirp, struct dirent ***namelist, int (*filter)(const struct dirent *), int (*compar)(const struct dirent **, const struct dirent **)) -> int { return -1; });
|
|
|
|
EXPECT_FALSE(cache.evictCache());
|
|
}
|
|
|
|
namespace CreateUniqueTempFilePass {
|
|
decltype(NEO::SysCalls::sysCallsMkstemp) mockMkstemp = [](char *fileName) -> int {
|
|
memcpy_s(&fileName[22], 20, "123456", sizeof("123456"));
|
|
return 1;
|
|
};
|
|
|
|
decltype(NEO::SysCalls::sysCallsPwrite) mockPwrite = [](int fd, const void *buf, size_t count, off_t offset) -> ssize_t {
|
|
return count;
|
|
};
|
|
} // namespace CreateUniqueTempFilePass
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenCreateUniqueTempFileAndWriteDataThenFileIsCreatedAndDataAreWritten) {
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsMkstemp)> mkstempBackup(&NEO::SysCalls::sysCallsMkstemp, CreateUniqueTempFilePass::mockMkstemp);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsPwrite)> pwriteBackup(&NEO::SysCalls::sysCallsPwrite, CreateUniqueTempFilePass::mockPwrite);
|
|
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte - 2u});
|
|
|
|
char x[256] = "/home/cl_cache/mytemp.XXXXXX";
|
|
char compare[256] = "/home/cl_cache/mytemp.123456";
|
|
EXPECT_TRUE(cache.createUniqueTempFileAndWriteData(x, "1", 1));
|
|
|
|
EXPECT_EQ(0, memcmp(x, compare, 28));
|
|
}
|
|
|
|
namespace CreateUniqueTempFileFail1 {
|
|
decltype(NEO::SysCalls::sysCallsMkstemp) mockMkstemp = [](char *fileName) -> int {
|
|
return -1;
|
|
};
|
|
} // namespace CreateUniqueTempFileFail1
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWithCreateUniqueTempFileAndWriteDataWhenMkstempFailThenFalseIsReturned) {
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsMkstemp)> mkstempBackup(&NEO::SysCalls::sysCallsMkstemp, CreateUniqueTempFileFail1::mockMkstemp);
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte - 2u});
|
|
|
|
char x[256] = "/home/cl_cache/mytemp.XXXXXX";
|
|
EXPECT_FALSE(cache.createUniqueTempFileAndWriteData(x, "1", 1));
|
|
}
|
|
|
|
namespace CreateUniqueTempFileFail2 {
|
|
decltype(NEO::SysCalls::sysCallsMkstemp) mockMkstemp = [](char *fileName) -> int {
|
|
memcpy_s(&fileName[22], 20, "123456", sizeof("123456"));
|
|
return 1;
|
|
};
|
|
|
|
decltype(NEO::SysCalls::sysCallsPwrite) mockPwrite = [](int fd, const void *buf, size_t count, off_t offset) -> ssize_t {
|
|
return -1;
|
|
};
|
|
} // namespace CreateUniqueTempFileFail2
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWithCreateUniqueTempFileAndWriteDataWhenPwriteFailThenFalseIsReturnedAndCleanupIsMade) {
|
|
std::vector<std::string> unlinkLocalFiles;
|
|
EvictCachePass::unlinkFiles = &unlinkLocalFiles;
|
|
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsUnlink)> unlinkBackup(&NEO::SysCalls::sysCallsUnlink, EvictCachePass::mockUnlink);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsMkstemp)> mkstempBackup(&NEO::SysCalls::sysCallsMkstemp, CreateUniqueTempFileFail2::mockMkstemp);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsPwrite)> pwriteBackup(&NEO::SysCalls::sysCallsPwrite, CreateUniqueTempFileFail2::mockPwrite);
|
|
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte - 2u});
|
|
|
|
char x[256] = "/home/cl_cache/mytemp.XXXXXX";
|
|
EXPECT_FALSE(cache.createUniqueTempFileAndWriteData(x, "1", 1));
|
|
EXPECT_EQ(NEO::SysCalls::closeFuncArgPassed, 1);
|
|
EXPECT_EQ(0, memcmp(x, unlinkLocalFiles[0].c_str(), 28));
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWithCreateUniqueTempFileAndWriteDataWhenCloseFailThenFalseIsReturned) {
|
|
int closeRetVal = -1;
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsMkstemp)> mkstempBackup(&NEO::SysCalls::sysCallsMkstemp, CreateUniqueTempFilePass::mockMkstemp);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsPwrite)> pwriteBackup(&NEO::SysCalls::sysCallsPwrite, CreateUniqueTempFilePass::mockPwrite);
|
|
VariableBackup<decltype(NEO::SysCalls::closeFuncRetVal)> closeBackup(&NEO::SysCalls::closeFuncRetVal, closeRetVal);
|
|
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte - 2u});
|
|
|
|
char x[256] = "/home/cl_cache/mytemp.XXXXXX";
|
|
EXPECT_FALSE(cache.createUniqueTempFileAndWriteData(x, "1", 1));
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenRenameFailThenFalseIsReturned) {
|
|
int unlinkTemp = 0;
|
|
VariableBackup<decltype(NEO::SysCalls::unlinkCalled)> unlinkBackup(&NEO::SysCalls::unlinkCalled, unlinkTemp);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsRename)> renameBackup(&NEO::SysCalls::sysCallsRename, [](const char *currName, const char *dstName) -> int { return -1; });
|
|
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
EXPECT_FALSE(cache.renameTempFileBinaryToProperName("src", "dst"));
|
|
EXPECT_EQ(NEO::SysCalls::unlinkCalled, 1);
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenRenameThenTrueIsReturned) {
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsRename)> renameBackup(&NEO::SysCalls::sysCallsRename, [](const char *currName, const char *dstName) -> int { return 0; });
|
|
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
EXPECT_TRUE(cache.renameTempFileBinaryToProperName("src", "dst"));
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenConfigFileIsInacessibleThenFdIsSetToNegativeNumber) {
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsOpen)> openBackup(&NEO::SysCalls::sysCallsOpen, [](const char *pathname, int flags) -> int { errno = EACCES; return -1; });
|
|
|
|
int configFileDescriptor = 0;
|
|
size_t directory = 0;
|
|
|
|
cache.lockConfigFileAndReadSize("config.file", configFileDescriptor, directory);
|
|
|
|
EXPECT_EQ(configFileDescriptor, -1);
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenCannotLockConfigFileThenFdIsSetToNegativeNumber) {
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
int flockRetVal = -1;
|
|
|
|
VariableBackup<decltype(NEO::SysCalls::flockRetVal)> flockBackup(&NEO::SysCalls::flockRetVal, flockRetVal);
|
|
|
|
int configFileDescriptor = 0;
|
|
size_t directory = 0;
|
|
|
|
cache.lockConfigFileAndReadSize("config.file", configFileDescriptor, directory);
|
|
|
|
EXPECT_EQ(configFileDescriptor, -1);
|
|
}
|
|
|
|
#include <fcntl.h>
|
|
|
|
namespace LockConfigFileAndReadSize {
|
|
int openWithMode(const char *file, int flags, int mode) {
|
|
|
|
if (flags == (O_CREAT | O_EXCL | O_RDWR)) {
|
|
return 1;
|
|
}
|
|
|
|
errno = 2;
|
|
return -1;
|
|
}
|
|
|
|
int open(const char *file, int flags) {
|
|
errno = 2;
|
|
return -1;
|
|
}
|
|
} // namespace LockConfigFileAndReadSize
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenScandirFailInLockConfigFileThenFdIsSetToNegativeNumber) {
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsScandir)> scandirBackup(&NEO::SysCalls::sysCallsScandir, [](const char *dirp, struct dirent ***namelist, int (*filter)(const struct dirent *), int (*compar)(const struct dirent **, const struct dirent **)) -> int { return -1; });
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsOpenWithMode)> openWithModeBackup(&NEO::SysCalls::sysCallsOpenWithMode, LockConfigFileAndReadSize::openWithMode);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsOpen)> openBackup(&NEO::SysCalls::sysCallsOpen, LockConfigFileAndReadSize::open);
|
|
|
|
int configFileDescriptor = 0;
|
|
size_t directory = 0;
|
|
|
|
cache.lockConfigFileAndReadSize("config.file", configFileDescriptor, directory);
|
|
|
|
EXPECT_EQ(configFileDescriptor, -1);
|
|
}
|
|
|
|
namespace lockConfigFileAndReadSizeMocks {
|
|
decltype(NEO::SysCalls::sysCallsScandir) mockScandir = [](const char *dirp,
|
|
struct dirent ***namelist,
|
|
int (*filter)(const struct dirent *),
|
|
int (*compar)(const struct dirent **,
|
|
const struct dirent **)) -> int {
|
|
struct dirent **v = (struct dirent **)malloc(4 * (sizeof(struct dirent *)));
|
|
|
|
v[0] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[0]->d_name, sizeof(v[0]->d_name), "file1.cl_cache", sizeof("file1.cl_cache"));
|
|
|
|
v[1] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[1]->d_name, sizeof(v[1]->d_name), "file2.cl_cache", sizeof("file2.cl_cache"));
|
|
|
|
v[2] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[2]->d_name, sizeof(v[2]->d_name), "file3.cl_cache", sizeof("file3.cl_cache"));
|
|
|
|
v[3] = (struct dirent *)malloc(sizeof(struct dirent));
|
|
|
|
memcpy_s(v[3]->d_name, sizeof(v[3]->d_name), "file4.cl_cache", sizeof("file4.cl_cache"));
|
|
|
|
*namelist = v;
|
|
return 4;
|
|
};
|
|
|
|
decltype(NEO::SysCalls::sysCallsStat) mockStat = [](const std::string &filePath, struct stat *statbuf) -> int {
|
|
if (filePath.find("file1") != filePath.npos) {
|
|
statbuf->st_atime = 3;
|
|
}
|
|
if (filePath.find("file2") != filePath.npos) {
|
|
statbuf->st_atime = 6;
|
|
}
|
|
if (filePath.find("file3") != filePath.npos) {
|
|
statbuf->st_atime = 1;
|
|
}
|
|
if (filePath.find("file4") != filePath.npos) {
|
|
statbuf->st_atime = 2;
|
|
}
|
|
|
|
statbuf->st_size = (MemoryConstants::megaByte / 4);
|
|
|
|
return 0;
|
|
};
|
|
} // namespace lockConfigFileAndReadSizeMocks
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenLockConfigFileWithFileCreationThenFdIsSetProperSizeIsSetAndScandirIsCalled) {
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
int scandirCalledTemp = 0;
|
|
|
|
VariableBackup<decltype(NEO::SysCalls::scandirCalled)> scandirCalledBackup(&NEO::SysCalls::scandirCalled, scandirCalledTemp);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsScandir)> scandirBackup(&NEO::SysCalls::sysCallsScandir, lockConfigFileAndReadSizeMocks::mockScandir);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsStat)> statBackup(&NEO::SysCalls::sysCallsStat, lockConfigFileAndReadSizeMocks::mockStat);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsOpenWithMode)> openWithModeBackup(&NEO::SysCalls::sysCallsOpenWithMode, LockConfigFileAndReadSize::openWithMode);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsOpen)> openBackup(&NEO::SysCalls::sysCallsOpen, LockConfigFileAndReadSize::open);
|
|
|
|
int configFileDescriptor = 0;
|
|
size_t directory = 0;
|
|
|
|
cache.lockConfigFileAndReadSize("config.file", configFileDescriptor, directory);
|
|
|
|
EXPECT_EQ(configFileDescriptor, 1);
|
|
EXPECT_EQ(NEO::SysCalls::scandirCalled, 1);
|
|
EXPECT_EQ(directory, MemoryConstants::megaByte);
|
|
}
|
|
|
|
namespace LockConfigFileAndConfigFileIsCreatedInMeantime {
|
|
int openCalledTimes = 0;
|
|
int openWithMode(const char *file, int flags, int mode) {
|
|
|
|
if (flags == (O_CREAT | O_EXCL | O_RDWR)) {
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int open(const char *file, int flags) {
|
|
if (openCalledTimes == 0) {
|
|
openCalledTimes++;
|
|
errno = 2;
|
|
return -1;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
size_t configSize = MemoryConstants::megaByte;
|
|
ssize_t pread(int fd, void *buf, size_t count, off_t offset) {
|
|
memcpy(buf, &configSize, sizeof(configSize));
|
|
return 0;
|
|
}
|
|
} // namespace LockConfigFileAndConfigFileIsCreatedInMeantime
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenLockConfigFileAndOtherProcessCreateInMeanTimeThenFdIsSetProperSizeIsSetAndScandirIsNotCalled) {
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
int openCalledTimes = 0;
|
|
int scandirCalledTimes = 0;
|
|
|
|
VariableBackup<decltype(NEO::SysCalls::scandirCalled)> scandirCalledBackup(&NEO::SysCalls::scandirCalled, scandirCalledTimes);
|
|
VariableBackup<decltype(LockConfigFileAndConfigFileIsCreatedInMeantime::openCalledTimes)> openCalledBackup(&LockConfigFileAndConfigFileIsCreatedInMeantime::openCalledTimes, openCalledTimes);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsPread)> preadBackup(&NEO::SysCalls::sysCallsPread, LockConfigFileAndConfigFileIsCreatedInMeantime::pread);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsOpenWithMode)> openWithModeBackup(&NEO::SysCalls::sysCallsOpenWithMode, LockConfigFileAndConfigFileIsCreatedInMeantime::openWithMode);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsOpen)> openBackup(&NEO::SysCalls::sysCallsOpen, LockConfigFileAndConfigFileIsCreatedInMeantime::open);
|
|
|
|
int configFileDescriptor = 0;
|
|
size_t directory = 0;
|
|
|
|
cache.lockConfigFileAndReadSize("config.file", configFileDescriptor, directory);
|
|
|
|
EXPECT_EQ(configFileDescriptor, 1);
|
|
EXPECT_EQ(NEO::SysCalls::scandirCalled, 0);
|
|
EXPECT_EQ(directory, LockConfigFileAndConfigFileIsCreatedInMeantime::configSize);
|
|
}
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenLockConfigFileThenFdIsSetProperSizeIsSetAndScandirIsNotCalled) {
|
|
CompilerCacheMockLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
int scandirCalledTimes = 0;
|
|
|
|
VariableBackup<decltype(NEO::SysCalls::scandirCalled)> scandirCalledBackup(&NEO::SysCalls::scandirCalled, scandirCalledTimes);
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsPread)> preadBackup(&NEO::SysCalls::sysCallsPread, LockConfigFileAndConfigFileIsCreatedInMeantime::pread);
|
|
|
|
int configFileDescriptor = 0;
|
|
size_t directory = 0;
|
|
|
|
cache.lockConfigFileAndReadSize("config.file", configFileDescriptor, directory);
|
|
|
|
EXPECT_EQ(configFileDescriptor, NEO::SysCalls::fakeFileDescriptor);
|
|
EXPECT_EQ(NEO::SysCalls::scandirCalled, 0);
|
|
EXPECT_EQ(directory, LockConfigFileAndConfigFileIsCreatedInMeantime::configSize);
|
|
}
|
|
|
|
class CompilerCacheFailingLokcConfigFileAndReadSizeLinux : public CompilerCache {
|
|
public:
|
|
CompilerCacheFailingLokcConfigFileAndReadSizeLinux(const CompilerCacheConfig &config) : CompilerCache(config) {}
|
|
using CompilerCache::createUniqueTempFileAndWriteData;
|
|
using CompilerCache::evictCache;
|
|
using CompilerCache::lockConfigFileAndReadSize;
|
|
using CompilerCache::renameTempFileBinaryToProperName;
|
|
|
|
void lockConfigFileAndReadSize(const std::string &configFilePath, int &fd, size_t &directorySize) override {
|
|
fd = -1;
|
|
return;
|
|
}
|
|
};
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenLockConfigFileFailThenCacheBinaryReturnsFalse) {
|
|
CompilerCacheFailingLokcConfigFileAndReadSizeLinux cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
EXPECT_FALSE(cache.cacheBinary("config.file", "1", 1));
|
|
}
|
|
|
|
class CompilerCacheLinuxReturnTrueIfAnotherProcessCreateCacheFile : public CompilerCache {
|
|
public:
|
|
CompilerCacheLinuxReturnTrueIfAnotherProcessCreateCacheFile(const CompilerCacheConfig &config) : CompilerCache(config) {}
|
|
using CompilerCache::createUniqueTempFileAndWriteData;
|
|
using CompilerCache::evictCache;
|
|
using CompilerCache::lockConfigFileAndReadSize;
|
|
using CompilerCache::renameTempFileBinaryToProperName;
|
|
|
|
void lockConfigFileAndReadSize(const std::string &configFilePath, int &fd, size_t &directorySize) override {
|
|
fd = 1;
|
|
return;
|
|
}
|
|
};
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenFileAlreadyExistsThenCacheBinaryReturnsTrue) {
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsStat)> statBackup(&NEO::SysCalls::sysCallsStat, [](const std::string &filePath, struct stat *statbuf) -> int { return 0; });
|
|
|
|
CompilerCacheLinuxReturnTrueIfAnotherProcessCreateCacheFile cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
EXPECT_TRUE(cache.cacheBinary("config.file", "1", 1));
|
|
}
|
|
|
|
class CompilerCacheLinuxReturnFalseOnCacheBinaryIfEvictFailed : public CompilerCache {
|
|
public:
|
|
CompilerCacheLinuxReturnFalseOnCacheBinaryIfEvictFailed(const CompilerCacheConfig &config) : CompilerCache(config) {}
|
|
using CompilerCache::createUniqueTempFileAndWriteData;
|
|
using CompilerCache::evictCache;
|
|
using CompilerCache::lockConfigFileAndReadSize;
|
|
using CompilerCache::renameTempFileBinaryToProperName;
|
|
|
|
void lockConfigFileAndReadSize(const std::string &configFilePath, int &fd, size_t &directorySize) override {
|
|
directorySize = MemoryConstants::megaByte;
|
|
fd = 1;
|
|
return;
|
|
}
|
|
|
|
bool evictCache() override {
|
|
return false;
|
|
}
|
|
};
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenEvictCacheFailThenCacheBinaryReturnsFalse) {
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsStat)> statBackup(&NEO::SysCalls::sysCallsStat, [](const std::string &filePath, struct stat *statbuf) -> int { return -1; });
|
|
|
|
CompilerCacheLinuxReturnFalseOnCacheBinaryIfEvictFailed cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
EXPECT_FALSE(cache.cacheBinary("config.file", "1", 1));
|
|
}
|
|
|
|
class CompilerCacheLinuxReturnFalseOnCacheBinaryIfCreateUniqueFileFailed : public CompilerCache {
|
|
public:
|
|
CompilerCacheLinuxReturnFalseOnCacheBinaryIfCreateUniqueFileFailed(const CompilerCacheConfig &config) : CompilerCache(config) {}
|
|
using CompilerCache::createUniqueTempFileAndWriteData;
|
|
using CompilerCache::evictCache;
|
|
using CompilerCache::lockConfigFileAndReadSize;
|
|
using CompilerCache::renameTempFileBinaryToProperName;
|
|
|
|
void lockConfigFileAndReadSize(const std::string &configFilePath, int &fd, size_t &directorySize) override {
|
|
directorySize = MemoryConstants::megaByte;
|
|
fd = 1;
|
|
return;
|
|
}
|
|
|
|
bool evictCache() override {
|
|
return true;
|
|
}
|
|
|
|
bool createUniqueTempFileAndWriteData(char *tmpFilePathTemplate, const char *pBinary, size_t binarySize) override {
|
|
return false;
|
|
}
|
|
};
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenCreateUniqueFileFailThenCacheBinaryReturnsFalse) {
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsStat)> statBackup(&NEO::SysCalls::sysCallsStat, [](const std::string &filePath, struct stat *statbuf) -> int { return -1; });
|
|
|
|
CompilerCacheLinuxReturnFalseOnCacheBinaryIfCreateUniqueFileFailed cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
EXPECT_FALSE(cache.cacheBinary("config.file", "1", 1));
|
|
}
|
|
|
|
class CompilerCacheLinuxReturnFalseOnCacheBinaryIfRenameFileFailed : public CompilerCache {
|
|
public:
|
|
CompilerCacheLinuxReturnFalseOnCacheBinaryIfRenameFileFailed(const CompilerCacheConfig &config) : CompilerCache(config) {}
|
|
using CompilerCache::createUniqueTempFileAndWriteData;
|
|
using CompilerCache::evictCache;
|
|
using CompilerCache::lockConfigFileAndReadSize;
|
|
using CompilerCache::renameTempFileBinaryToProperName;
|
|
|
|
void lockConfigFileAndReadSize(const std::string &configFilePath, int &fd, size_t &directorySize) override {
|
|
directorySize = MemoryConstants::megaByte;
|
|
fd = 1;
|
|
return;
|
|
}
|
|
|
|
bool evictCache() override {
|
|
return true;
|
|
}
|
|
|
|
bool createUniqueTempFileAndWriteData(char *tmpFilePathTemplate, const char *pBinary, size_t binarySize) override {
|
|
return true;
|
|
}
|
|
|
|
bool renameTempFileBinaryToProperName(const std::string &oldName, const std::string &kernelFileHash) override {
|
|
return false;
|
|
}
|
|
};
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenRenameFileFailThenCacheBinaryReturnsFalse) {
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsStat)> statBackup(&NEO::SysCalls::sysCallsStat, [](const std::string &filePath, struct stat *statbuf) -> int { return -1; });
|
|
|
|
CompilerCacheLinuxReturnFalseOnCacheBinaryIfRenameFileFailed cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
EXPECT_FALSE(cache.cacheBinary("config.file", "1", 1));
|
|
}
|
|
|
|
class CompilerCacheLinuxReturnTrueOnCacheBinary : public CompilerCache {
|
|
public:
|
|
CompilerCacheLinuxReturnTrueOnCacheBinary(const CompilerCacheConfig &config) : CompilerCache(config) {}
|
|
using CompilerCache::createUniqueTempFileAndWriteData;
|
|
using CompilerCache::evictCache;
|
|
using CompilerCache::lockConfigFileAndReadSize;
|
|
using CompilerCache::renameTempFileBinaryToProperName;
|
|
|
|
void lockConfigFileAndReadSize(const std::string &configFilePath, int &fd, size_t &directorySize) override {
|
|
directorySize = MemoryConstants::megaByte;
|
|
fd = 1;
|
|
return;
|
|
}
|
|
|
|
bool evictCache() override {
|
|
return true;
|
|
}
|
|
|
|
bool createUniqueTempFileAndWriteData(char *tmpFilePathTemplate, const char *pBinary, size_t binarySize) override {
|
|
return true;
|
|
}
|
|
|
|
bool renameTempFileBinaryToProperName(const std::string &oldName, const std::string &kernelFileHash) override {
|
|
return true;
|
|
}
|
|
};
|
|
|
|
TEST(CompilerCacheTests, GivenCompilerCacheWhenAllFunctionsSuccedThenCacheBinaryReturnsTrue) {
|
|
VariableBackup<decltype(NEO::SysCalls::sysCallsStat)> statBackup(&NEO::SysCalls::sysCallsStat, [](const std::string &filePath, struct stat *statbuf) -> int { return 0; });
|
|
|
|
CompilerCacheLinuxReturnTrueOnCacheBinary cache({true, ".cl_cache", "/home/cl_cache/", MemoryConstants::megaByte});
|
|
|
|
EXPECT_TRUE(cache.cacheBinary("config.file", "1", 1));
|
|
}
|
|
|
|
#endif // !_WIN32
|