mirror of
https://github.com/KhronosGroup/OpenCL-CTS.git
synced 2026-03-19 06:09:01 +00:00
* allocations: Move results array from stack to heap (#1857) * allocations: Fix stack overflow * check format fixes * Fix windows stack overflow. (#1839) * thread_dimensions: Avoid combinations of very small LWS and very large GWS (#1856) Modify the existing condition to include extremely small LWS like 1x1 on large GWS values * c11_atomics: Reduce the loopcounter for sequential consistency tests (#1853) Reduce the loop from 1000000 to 500000 since the former value makes the test run too long and cause system issues on certain platforms * Limit individual allocation size using the global memory size (#1835) Signed-off-by: Ahmed Hesham <ahmed.hesham@arm.com> * geometrics: fix Wsign-compare warnings (#1855) Signed-off-by: Sven van Haastregt <sven.vanhaastregt@arm.com> * integer_ops: fix -Wformat warnings (#1860) The main sources of warnings were: * Printing of a `size_t` which requires the `%zu` specifier. * Printing of `cl_long`/`cl_ulong` which is now done using the `PRI*64` macros to ensure portability across 32 and 64-bit builds. Signed-off-by: Sven van Haastregt <sven.vanhaastregt@arm.com> * Replace OBSOLETE_FORAMT with OBSOLETE_FORMAT (#1776) * Replace OBSOLETE_FORAMT with OBSOLETE_FORMAT In imageHelpers.cpp and few other places in image tests, OBSOLETE_FORMAT is misspelled as OBSOLETE_FORAMT. Fix misspelling by replcaing it with OBSOLETE_FORMAT. Fixes #1769 * Remove code guarded by OBSOLETE_FORMAT Remove code guarded by OBSOLETE_FORMAT as suggested by review comments Fixes #1769 * Fix formating issues for OBSOLETE_FORMAT changes Fix formatting issues observed in files while removing code guarded by OBSOLETE_FORMAT Fixes #1769 * Some more formatting fixes Some more formatting fixes to get CI clean Fixes #1769 * Final Formating fixes Final formatting fixes for #1769 * Enhancement: Thread dimensions user parameters (#1384) * Fix format in the test scope * Add user params to limit testing Add parameters to reduce amount of testing. Helpful for debugging or for machines with lower performance. * Restore default value * Print info only if testing params bigger than 0. * [NFC] conversions: reenable Wunused-but-set-variable (#1845) Remove an assigned-to but unused variable. Reenable the Wunused-but-set-variable warning for the conversions suite, as it now compiles cleanly with this warning enabled. Signed-off-by: Sven van Haastregt <sven.vanhaastregt@arm.com> * Fix bug of conversion from long to double (#1847) * Fix bug of conversion from long to double It the input is long type, it should be load as long type, not ulong. * update long2float * math_brute_force: fix exp/exp2 rlx ULP calculation (#1848) Fix the ULP error calculation for the `exp` and `exp2` builtins in relaxed math mode for the full profile. Previously, the `ulps` value kept being added to while verifying the result buffer in a loop. `ulps` could even become a `NaN` when the input argument being tested was a `NaN`. Signed-off-by: Sven van Haastregt <sven.vanhaastregt@arm.com> * Enable LARGEADDRESSAWARE for 32 bit compilation (#1858) * Enable LARGEADDRESSAWARE for 32 bit compilation 32-bit executables built with MSVC linker have only 2GB virtual memory address space by default, which might not be sufficient for some tests. Enable LARGEADDRESSAWARE linker flag for 32-bit targets to allow tests to handle addresses larger than 2 gigabytes. https://learn.microsoft.com/en-us/cpp/build/reference/largeaddressaware-handle-large-addresses?view=msvc-170 Signed-off-by: Guo, Yilong <yilong.guo@intel.com> * Apply suggestion Co-authored-by: Ben Ashbaugh <ben.ashbaugh@intel.com> --------- Signed-off-by: Guo, Yilong <yilong.guo@intel.com> Co-authored-by: Ben Ashbaugh <ben.ashbaugh@intel.com> * fix return code when readwrite image is not supported (#1873) This function (do_test) starts by testing write and read individually. Both of them can have errors. When readwrite image is not supported, the function returns TEST_SKIPPED_ITSELF potentially masking errors leading to the test returning EXIT_SUCCESS even with errors along the way. * fix macos builds by avoiding double compilation of function_list.cpp for test_spir (#1866) * modernize CMakeLists for test_spir * add the operating system release to the sccache key * include the math brute force function list vs. building it twice * fix the license header on the spirv-new tests (#1865) The source files for the spirv-new tests were using the older Khronos license instead of the proper Apache license. Fixed the license in all source files. * compiler: fix grammar in error message (#1877) Signed-off-by: Sven van Haastregt <sven.vanhaastregt@arm.com> * Updated semaphore tests to use clSemaphoreReImportSyncFdKHR. (#1854) * Updated semaphore tests to use clSemaphoreReImportSyncFdKHR. Additionally updated common semaphore code to handle spec updates that restrict simultaneous importing/exporting of handles. * Fix build issues on CI * gcc build issues * Make clReImportSemaphoreSyncFdKHR a required API call if cl_khr_external_semaphore_sync_fd is present. * Implement signal and wait for all semaphore types. * subgroups: fix for testing too large WG sizes (#1620) It seemed to be a typo; the comment says that it tries to fetch local size for a subgroup count with above max WG size, but it just used the previous subgroup count. The test on purpose sets a SG count to be a larger number than the max work-items in the work group. Given the minimum SG size is 1 WI, it means that there can be a maximum of maximum work-group size of SGs (of 1 WI of size). Thus, if we request a number of SGs that exceeds the local size, the query should fail as expected. * add SPIR-V version testing (#1861) * basic SPIR-V 1.3 testing support * updated script to compile for more SPIR-V versions * switch to general SPIR-V versions test * update copyright text and fix license * improve output while test is running * check for higher SPIR-V versions first * fix formatting * fix the reported platform information for math brute force (#1884) When the math brute force test printed the platform version it always printed information for the first platform in the system, which could be different than the platform for the passed-in device. Fixed by querying the platform from the passed-in device instead. * api tests fix: Use MTdataHolder in test_get_image_info (#1871) * Minor fixes in mutable dispatch tests. (#1829) * Minor fixes in mutable dispatch tests. * Fix size of newWrapper in MutableDispatchSVMArguments. * Fix errnoneus clCommandNDRangeKernelKHR call. Signed-off-by: John Kesapides <john.kesapides@arm.com> * * Set the row_pitch for imageInfo in MutableDispatchImage1DArguments and MutableDispatchImage2DArguments. The row_pitch is used by get_image_size() to calculate the size of the host pointers by generate_random_image_data. Signed-off-by: John Kesapides <john.kesapides@arm.com> --------- Signed-off-by: John Kesapides <john.kesapides@arm.com> * add test for cl_khr_spirv_linkonce_odr (#1226) * initial version of the test with placeholders for linkonce_odr linkage * add OpExtension SPV_KHR_linkonce_odr extension * add check for extension * switch to actual LinkOnceODR linkage * fix formatting * add a test case to ensure a function with linkonce_odr is exported * add back the extension check * fix formatting * undo compiler optimization and actually add the call to function a * [NFC] subgroups: remove unnecessary extern keywords (#1892) In C and C++ all functions have external linkage by default. Also remove the unused `gMTdata` and `test_pipe_functions` declarations. Fixes https://github.com/KhronosGroup/OpenCL-CTS/issues/1137 Signed-off-by: Sven van Haastregt <sven.vanhaastregt@arm.com> * Added cl_khr_fp16 extension support for test_decorate from spirv_new (#1770) * Added cl_khr_fp16 extension support for test_decorate from spirv_new, work in progres * Complemented test_decorate saturation test to support cl_khr_fp16 extension (issue #142) * Fixed clang format * scope of modifications: -changed naming convention of saturation .spvasm files related to test_decorate of spirv_new -restored float to char/uchar saturation tests -few minor corrections * fix ranges for half testing * fix formating * one more formatting fix * remove unused function * use isnan instead of std::isnan isnan is currently implemented as a macro, not as a function, so we can't use std::isnan. * fix Clang warning about inexact conversion --------- Co-authored-by: Ben Ashbaugh <ben.ashbaugh@intel.com> * add support for custom devices (#1891) enable the CTS to run on custom devices --------- Signed-off-by: Ahmed Hesham <ahmed.hesham@arm.com> Signed-off-by: Sven van Haastregt <sven.vanhaastregt@arm.com> Signed-off-by: Guo, Yilong <yilong.guo@intel.com> Signed-off-by: John Kesapides <john.kesapides@arm.com> Co-authored-by: Sreelakshmi Haridas Maruthur <sharidas@quicinc.com> Co-authored-by: Haonan Yang <haonan.yang@intel.com> Co-authored-by: Ahmed Hesham <117350656+ahesham-arm@users.noreply.github.com> Co-authored-by: Sven van Haastregt <sven.vanhaastregt@arm.com> Co-authored-by: niranjanjoshi121 <43807392+niranjanjoshi121@users.noreply.github.com> Co-authored-by: Grzegorz Wawiorko <grzegorz.wawiorko@intel.com> Co-authored-by: Wenwan Xing <wenwan.xing@intel.com> Co-authored-by: Yilong Guo <yilong.guo@intel.com> Co-authored-by: Romaric Jodin <89833130+rjodinchr@users.noreply.github.com> Co-authored-by: joshqti <127994991+joshqti@users.noreply.github.com> Co-authored-by: Pekka Jääskeläinen <pekka.jaaskelainen@tuni.fi> Co-authored-by: imilenkovic00 <155085410+imilenkovic00@users.noreply.github.com> Co-authored-by: John Kesapides <46718829+JohnKesapidesARM@users.noreply.github.com> Co-authored-by: Marcin Hajder <marcin.hajder@gmail.com> Co-authored-by: Aharon Abramson <aharon.abramson@mobileye.com>
391 lines
14 KiB
C++
391 lines
14 KiB
C++
//
|
|
// Copyright (c) 2017 The Khronos Group Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
#include "allocation_execute.h"
|
|
#include "allocation_functions.h"
|
|
|
|
#include <vector>
|
|
|
|
|
|
const char *buffer_kernel_pattern = {
|
|
"__kernel void sample_test(%s __global uint *result, __global %s *array_sizes, uint per_item)\n"
|
|
"{\n"
|
|
"\tint tid = get_global_id(0);\n"
|
|
"\tuint r = 0;\n"
|
|
"\t%s i;\n"
|
|
"\tfor(i=(%s)tid*(%s)per_item; i<(%s)(1+tid)*(%s)per_item; i++) {\n"
|
|
"%s"
|
|
"\t}\n"
|
|
"\tresult[tid] = r;\n"
|
|
"}\n" };
|
|
|
|
const char *image_kernel_pattern = {
|
|
"__kernel void sample_test(%s __global uint *result)\n"
|
|
"{\n"
|
|
"\tuint4 color;\n"
|
|
"\tcolor = (uint4)(0);\n"
|
|
"%s"
|
|
"\tint x, y;\n"
|
|
"%s"
|
|
"\tresult[get_global_id(0)] += color.x + color.y + color.z + color.w;\n"
|
|
"}\n" };
|
|
|
|
const char *read_pattern = {
|
|
"\tfor(y=0; y<get_image_height(image%d); y++)\n"
|
|
"\t\tif (y %s get_global_size(0) == get_global_id(0))\n"
|
|
"\t\t\tfor (x=0; x<get_image_width(image%d); x++) {\n"
|
|
"\t\t\t\tcolor += read_imageui(image%d, sampler, (int2)(x,y));\n"
|
|
"\t\t\t}\n"
|
|
};
|
|
|
|
const char *offset_pattern =
|
|
"\tconst uint4 offset = (uint4)(0,1,2,3);\n";
|
|
|
|
const char *sampler_pattern =
|
|
"\tconst sampler_t sampler = CLK_ADDRESS_CLAMP | CLK_FILTER_NEAREST | CLK_NORMALIZED_COORDS_FALSE;\n";
|
|
|
|
|
|
const char *write_pattern = {
|
|
"\tfor(y=0; y<get_image_height(image%d); y++)\n"
|
|
"\t\tif (y %s get_global_size(0) == get_global_id(0))\n"
|
|
"\t\t\tfor (x=0; x<get_image_width(image%d); x++) {\n"
|
|
"\t\t\t\tcolor = (uint4)x*(uint4)y+offset;\n"
|
|
"\t\t\t\twrite_imageui(image%d, (int2)(x,y), color);\n"
|
|
"\t\t\t}\n"
|
|
"\tbarrier(CLK_LOCAL_MEM_FENCE);\n"
|
|
};
|
|
|
|
|
|
int check_image(cl_command_queue queue, cl_mem mem) {
|
|
int error;
|
|
cl_mem_object_type type;
|
|
size_t width, height;
|
|
size_t origin[3], region[3], x, j;
|
|
cl_uint *data;
|
|
|
|
error = clGetMemObjectInfo(mem, CL_MEM_TYPE, sizeof(type), &type, NULL);
|
|
if (error) {
|
|
print_error(error, "clGetMemObjectInfo failed for CL_MEM_TYPE.");
|
|
return -1;
|
|
}
|
|
|
|
switch (type)
|
|
{
|
|
case CL_MEM_OBJECT_BUFFER:
|
|
log_error("Expected image object, not buffer.\n");
|
|
return -1;
|
|
case CL_MEM_OBJECT_IMAGE2D:
|
|
error = clGetImageInfo(mem, CL_IMAGE_WIDTH, sizeof(width), &width,
|
|
NULL);
|
|
if (error)
|
|
{
|
|
print_error(error,
|
|
"clGetMemObjectInfo failed for CL_IMAGE_WIDTH.");
|
|
return -1;
|
|
}
|
|
error = clGetImageInfo(mem, CL_IMAGE_HEIGHT, sizeof(height),
|
|
&height, NULL);
|
|
if (error)
|
|
{
|
|
print_error(error,
|
|
"clGetMemObjectInfo failed for CL_IMAGE_HEIGHT.");
|
|
return -1;
|
|
}
|
|
break;
|
|
default: log_error("unexpected object type"); return -1;
|
|
}
|
|
|
|
|
|
data = (cl_uint*)malloc(width*4*sizeof(cl_uint));
|
|
if (data == NULL) {
|
|
log_error("Failed to malloc host buffer for writing into image.\n");
|
|
return FAILED_ABORT;
|
|
}
|
|
origin[0] = 0;
|
|
origin[1] = 0;
|
|
origin[2] = 0;
|
|
region[0] = width;
|
|
region[1] = 1;
|
|
region[2] = 1;
|
|
for (origin[1] = 0; origin[1] < height; origin[1]++) {
|
|
error = clEnqueueReadImage(queue, mem, CL_TRUE, origin, region, 0, 0, data, 0, NULL, NULL);
|
|
if (error) {
|
|
print_error(error, "clEnqueueReadImage failed");
|
|
free(data);
|
|
return error;
|
|
}
|
|
|
|
for (x=0; x<width; x++) {
|
|
for (j=0; j<4; j++) {
|
|
if (data[x*4+j] != (cl_uint)(x*origin[1]+j)) {
|
|
log_error("Pixel %d, %d, component %d, expected %u, got %u.\n",
|
|
(int)x, (int)origin[1], (int)j, (cl_uint)(x*origin[1]+j), data[x*4+j]);
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
free(data);
|
|
return 0;
|
|
}
|
|
|
|
|
|
#define NUM_OF_WORK_ITEMS (8192 * 32)
|
|
|
|
int execute_kernel(cl_context context, cl_command_queue *queue, cl_device_id device_id, int test, cl_mem mems[], int number_of_mems_used, int verify_checksum) {
|
|
|
|
char *argument_string;
|
|
char *access_string;
|
|
char *kernel_string;
|
|
int i, error, result;
|
|
clKernelWrapper kernel;
|
|
clProgramWrapper program;
|
|
clMemWrapper result_mem;
|
|
char *ptr;
|
|
size_t global_dims[3];
|
|
cl_uint per_item;
|
|
cl_uint per_item_uint;
|
|
cl_uint final_result;
|
|
std::vector<cl_uint> returned_results(NUM_OF_WORK_ITEMS);
|
|
clEventWrapper event;
|
|
cl_int event_status;
|
|
|
|
// Allocate memory for the kernel source
|
|
argument_string = (char*)malloc(sizeof(char)*MAX_NUMBER_TO_ALLOCATE*64);
|
|
access_string = (char*)malloc(sizeof(char)*MAX_NUMBER_TO_ALLOCATE*(strlen(read_pattern)+10));
|
|
kernel_string = (char*)malloc(sizeof(char)*MAX_NUMBER_TO_ALLOCATE*(strlen(read_pattern)+10+64)+1024);
|
|
argument_string[0] = '\0';
|
|
access_string[0] = '\0';
|
|
kernel_string[0] = '\0';
|
|
|
|
// Zero the results.
|
|
for (i=0; i<NUM_OF_WORK_ITEMS; i++)
|
|
returned_results[i] = 0;
|
|
|
|
// detect if device supports ulong/int64
|
|
//detect whether profile of the device is embedded
|
|
bool support64 = true;
|
|
char profile[1024] = "";
|
|
error = clGetDeviceInfo(device_id, CL_DEVICE_PROFILE, sizeof(profile), profile, NULL);
|
|
test_error(error, "clGetDeviceInfo for CL_DEVICE_PROFILE failed\n" );
|
|
if ((NULL != strstr(profile, "EMBEDDED_PROFILE")) &&
|
|
(!is_extension_available(device_id, "cles_khr_int64"))) {
|
|
support64 = false;
|
|
}
|
|
|
|
// Build the kernel source
|
|
if (test == BUFFER || test == BUFFER_NON_BLOCKING) {
|
|
for(i=0; i<number_of_mems_used; i++) {
|
|
sprintf(argument_string + strlen(argument_string), " __global uint *buffer%d, ", i);
|
|
sprintf(access_string + strlen( access_string), "\t\tif (i<array_sizes[%d]) r += buffer%d[i];\n", i, i);
|
|
}
|
|
char type[10];
|
|
if (support64) {
|
|
sprintf(type, "ulong");
|
|
}
|
|
else {
|
|
sprintf(type, "uint");
|
|
}
|
|
sprintf(kernel_string, buffer_kernel_pattern, argument_string, type, type, type, type, type, type, access_string);
|
|
}
|
|
else if (test == IMAGE_READ || test == IMAGE_READ_NON_BLOCKING) {
|
|
for(i=0; i<number_of_mems_used; i++) {
|
|
sprintf(argument_string + strlen(argument_string), " read_only image2d_t image%d, ", i);
|
|
sprintf(access_string + strlen(access_string), read_pattern, i, "%", i, i);
|
|
}
|
|
sprintf(kernel_string, image_kernel_pattern, argument_string, sampler_pattern, access_string);
|
|
}
|
|
else if (test == IMAGE_WRITE || test == IMAGE_WRITE_NON_BLOCKING) {
|
|
for(i=0; i<number_of_mems_used; i++) {
|
|
sprintf(argument_string + strlen(argument_string), " write_only image2d_t image%d, ", i);
|
|
sprintf(access_string + strlen( access_string), write_pattern, i, "%", i, i);
|
|
}
|
|
sprintf(kernel_string, image_kernel_pattern, argument_string, offset_pattern, access_string);
|
|
}
|
|
ptr = kernel_string;
|
|
|
|
// Create the kernel
|
|
error = create_single_kernel_helper( context, &program, &kernel, 1, (const char **)&ptr, "sample_test" );
|
|
|
|
free(argument_string);
|
|
free(access_string);
|
|
free(kernel_string);
|
|
|
|
result = check_allocation_error(context, device_id, error, queue);
|
|
if (result != SUCCEEDED) {
|
|
if (result == FAILED_TOO_BIG)
|
|
log_info("\t\tCreate kernel failed: %s.\n", IGetErrorString(error));
|
|
else
|
|
print_error(error, "Create kernel and program failed");
|
|
return result;
|
|
}
|
|
|
|
// Set the arguments
|
|
for (i=0; i<number_of_mems_used; i++) {
|
|
error = clSetKernelArg(kernel, i, sizeof(cl_mem), &mems[i]);
|
|
test_error(error, "clSetKernelArg failed");
|
|
}
|
|
|
|
// Set the result
|
|
result_mem = clCreateBuffer(
|
|
context, CL_MEM_READ_WRITE | CL_MEM_COPY_HOST_PTR,
|
|
sizeof(cl_uint) * NUM_OF_WORK_ITEMS, returned_results.data(), &error);
|
|
test_error(error, "clCreateBuffer failed");
|
|
error = clSetKernelArg(kernel, i, sizeof(result_mem), &result_mem);
|
|
test_error(error, "clSetKernelArg failed");
|
|
|
|
// Thread dimensions for execution
|
|
global_dims[0] = NUM_OF_WORK_ITEMS; global_dims[1] = 1; global_dims[2] = 1;
|
|
|
|
// We have extra arguments for the buffer kernel because we need to pass in the buffer sizes
|
|
cl_ulong *ulSizes = NULL;
|
|
cl_uint *uiSizes = NULL;
|
|
if (support64) {
|
|
ulSizes = (cl_ulong*)malloc(sizeof(cl_ulong)*number_of_mems_used);
|
|
}
|
|
else {
|
|
uiSizes = (cl_uint*)malloc(sizeof(cl_uint)*number_of_mems_used);
|
|
}
|
|
cl_ulong max_size = 0;
|
|
clMemWrapper buffer_sizes;
|
|
if (test == BUFFER || test == BUFFER_NON_BLOCKING) {
|
|
for (i=0; i<number_of_mems_used; i++) {
|
|
size_t size;
|
|
error = clGetMemObjectInfo(mems[i], CL_MEM_SIZE, sizeof(size), &size, NULL);
|
|
test_error_abort(error, "clGetMemObjectInfo failed for CL_MEM_SIZE.");
|
|
if (support64) {
|
|
ulSizes[i] = size/sizeof(cl_uint);
|
|
}
|
|
else {
|
|
uiSizes[i] = (cl_uint)size/sizeof(cl_uint);
|
|
}
|
|
if (size/sizeof(cl_uint) > max_size)
|
|
max_size = size/sizeof(cl_uint);
|
|
}
|
|
if (support64) {
|
|
buffer_sizes = clCreateBuffer(context, CL_MEM_COPY_HOST_PTR, sizeof(cl_ulong)*number_of_mems_used, ulSizes, &error);
|
|
}
|
|
else {
|
|
buffer_sizes = clCreateBuffer(context, CL_MEM_COPY_HOST_PTR, sizeof(cl_uint)*number_of_mems_used, uiSizes, &error);
|
|
}
|
|
test_error_abort(error, "clCreateBuffer failed");
|
|
error = clSetKernelArg(kernel, number_of_mems_used+1, sizeof(cl_mem), &buffer_sizes);
|
|
test_error(error, "clSetKernelArg failed");
|
|
per_item = (cl_uint)ceil((double)max_size/global_dims[0]);
|
|
if (per_item > CL_UINT_MAX)
|
|
log_error("Size is too large for a uint parameter to the kernel. Expect invalid results.\n");
|
|
per_item_uint = (cl_uint)per_item;
|
|
error = clSetKernelArg(kernel, number_of_mems_used+2, sizeof(per_item_uint), &per_item_uint);
|
|
test_error(error, "clSetKernelArg failed");
|
|
}
|
|
if (ulSizes) {
|
|
free(ulSizes);
|
|
}
|
|
if (uiSizes) {
|
|
free(uiSizes);
|
|
}
|
|
|
|
size_t local_dims[3] = {1,1,1};
|
|
error = get_max_common_work_group_size(context, kernel, global_dims[0], &local_dims[0]);
|
|
test_error(error, "get_max_common_work_group_size failed");
|
|
|
|
// Execute the kernel
|
|
error = clEnqueueNDRangeKernel(*queue, kernel, 1, NULL, global_dims, local_dims, 0, NULL, &event);
|
|
result = check_allocation_error(context, device_id, error, queue);
|
|
if (result != SUCCEEDED) {
|
|
if (result == FAILED_TOO_BIG)
|
|
log_info("\t\tExecute kernel failed: %s (global dim: %ld, local dim: %ld)\n", IGetErrorString(error), global_dims[0], local_dims[0]);
|
|
else
|
|
print_error(error, "clEnqueueNDRangeKernel failed");
|
|
return result;
|
|
}
|
|
|
|
// Finish the test
|
|
error = clFinish(*queue);
|
|
|
|
result = check_allocation_error(context, device_id, error, queue);
|
|
|
|
if (result != SUCCEEDED) {
|
|
if (result == FAILED_TOO_BIG)
|
|
log_info("\t\tclFinish failed: %s.\n", IGetErrorString(error));
|
|
else
|
|
print_error(error, "clFinish failed");
|
|
return result;
|
|
}
|
|
|
|
// Verify that the event from the execution did not have an error
|
|
error = clGetEventInfo(event, CL_EVENT_COMMAND_EXECUTION_STATUS, sizeof(event_status), &event_status, NULL);
|
|
test_error_abort(error, "clGetEventInfo for CL_EVENT_COMMAND_EXECUTION_STATUS failed");
|
|
if (event_status < 0) {
|
|
result = check_allocation_error(context, device_id, event_status, queue);
|
|
if (result != SUCCEEDED) {
|
|
if (result == FAILED_TOO_BIG)
|
|
log_info("\t\tEvent returned from kernel execution indicates failure: %s.\n", IGetErrorString(event_status));
|
|
else
|
|
print_error(event_status, "clEnqueueNDRangeKernel failed");
|
|
return result;
|
|
}
|
|
}
|
|
|
|
// If we are not verifying the checksum return here
|
|
if (!verify_checksum) {
|
|
log_info("Note: Allocations were not initialized so kernel execution can not verify correct results.\n");
|
|
return SUCCEEDED;
|
|
}
|
|
|
|
// Verify the checksum.
|
|
// Read back the result
|
|
error = clEnqueueReadBuffer(*queue, result_mem, CL_TRUE, 0,
|
|
sizeof(cl_uint) * NUM_OF_WORK_ITEMS,
|
|
returned_results.data(), 0, NULL, NULL);
|
|
test_error_abort(error, "clEnqueueReadBuffer failed");
|
|
final_result = 0;
|
|
if (test == BUFFER || test == IMAGE_READ || test == BUFFER_NON_BLOCKING || test == IMAGE_READ_NON_BLOCKING) {
|
|
// For buffers or read images we are just looking at the sum of what each thread summed up
|
|
for (i=0; i<NUM_OF_WORK_ITEMS; i++) {
|
|
final_result += returned_results[i];
|
|
}
|
|
if (final_result != checksum) {
|
|
log_error("\t\tChecksum failed to verify. Expected %u got %u.\n", checksum, final_result);
|
|
return FAILED_ABORT;
|
|
}
|
|
log_info("\t\tChecksum verified (%u == %u).\n", checksum, final_result);
|
|
} else {
|
|
// For write images we need to verify the values
|
|
for (i=0; i<number_of_mems_used; i++) {
|
|
if (check_image(*queue, mems[i])) {
|
|
log_error("\t\tImage contents failed to verify for image %d.\n", (int)i);
|
|
return FAILED_ABORT;
|
|
}
|
|
}
|
|
log_info("\t\tImage contents verified.\n");
|
|
}
|
|
|
|
// Finish the test
|
|
error = clFinish(*queue);
|
|
result = check_allocation_error(context, device_id, error, queue);
|
|
if (result != SUCCEEDED) {
|
|
if (result == FAILED_TOO_BIG)
|
|
log_info("\t\tclFinish failed: %s.\n", IGetErrorString(error));
|
|
else
|
|
print_error(error, "clFinish failed");
|
|
return result;
|
|
}
|
|
|
|
return SUCCEEDED;
|
|
}
|
|
|
|
|