1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196
|
//@HEADER
// ************************************************************************
//
// Kokkos v. 4.0
// Copyright (2022) National Technology & Engineering
// Solutions of Sandia, LLC (NTESS).
//
// Under the terms of Contract DE-NA0003525 with NTESS,
// the U.S. Government retains certain rights in this software.
//
// Part of Kokkos, under the Apache License v2.0 with LLVM Exceptions.
// See https://kokkos.org/LICENSE for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//@HEADER
#include <Kokkos_Core.hpp>
#include <gtest/gtest.h>
template <class View, class ExecutionSpace>
struct TestViewMemoryAccessViolation {
View v;
static constexpr auto rank = View::rank;
template <std::size_t... Is>
KOKKOS_FUNCTION decltype(auto) bad_access(std::index_sequence<Is...>) const {
return v((Is * 0)...);
}
KOKKOS_FUNCTION void operator()(int) const {
++bad_access(std::make_index_sequence<rank>{});
}
TestViewMemoryAccessViolation(View w, ExecutionSpace const& s,
std::string const& matcher)
: v(std::move(w)) {
constexpr bool view_accessible_from_execution_space =
Kokkos::SpaceAccessibility<
/*AccessSpace=*/ExecutionSpace,
/*MemorySpace=*/typename View::memory_space>::accessible;
EXPECT_FALSE(view_accessible_from_execution_space);
EXPECT_DEATH(
{
Kokkos::parallel_for(Kokkos::RangePolicy<ExecutionSpace>(s, 0, 1),
*this);
Kokkos::fence();
},
matcher);
}
};
template <class View, class ExecutionSpace>
void test_view_memory_access_violation(View v, ExecutionSpace const& s,
std::string const& m) {
TestViewMemoryAccessViolation<View, ExecutionSpace>(std::move(v), s, m);
}
template <class View, class LblOrPtr, std::size_t... Is>
auto make_view_impl(LblOrPtr x, std::index_sequence<Is...>) {
return View(x, (Is + 1)...);
}
template <class View, class LblOrPtr>
auto make_view(LblOrPtr x) {
return make_view_impl<View>(std::move(x),
std::make_index_sequence<View::rank>());
}
template <class ExecutionSpace>
void test_view_memory_access_violations_from_host() {
Kokkos::DefaultHostExecutionSpace const host_exec_space{};
// clang-format off
using V0 = Kokkos::View<int, ExecutionSpace>;
using V1 = Kokkos::View<int*, ExecutionSpace>;
using V2 = Kokkos::View<int**, ExecutionSpace>;
using V3 = Kokkos::View<int***, ExecutionSpace>;
using V4 = Kokkos::View<int****, ExecutionSpace>;
using V5 = Kokkos::View<int*****, ExecutionSpace>;
using V6 = Kokkos::View<int******, ExecutionSpace>;
using V7 = Kokkos::View<int*******, ExecutionSpace>;
using V8 = Kokkos::View<int********, ExecutionSpace>;
std::string const prefix = "Kokkos::View ERROR: attempt to access inaccessible memory space";
std::string const lbl = "my_label";
test_view_memory_access_violation(make_view<V0>(lbl), host_exec_space, prefix + ".*" + lbl);
test_view_memory_access_violation(make_view<V1>(lbl), host_exec_space, prefix + ".*" + lbl);
test_view_memory_access_violation(make_view<V2>(lbl), host_exec_space, prefix + ".*" + lbl);
test_view_memory_access_violation(make_view<V3>(lbl), host_exec_space, prefix + ".*" + lbl);
test_view_memory_access_violation(make_view<V4>(lbl), host_exec_space, prefix + ".*" + lbl);
test_view_memory_access_violation(make_view<V5>(lbl), host_exec_space, prefix + ".*" + lbl);
test_view_memory_access_violation(make_view<V6>(lbl), host_exec_space, prefix + ".*" + lbl);
test_view_memory_access_violation(make_view<V7>(lbl), host_exec_space, prefix + ".*" + lbl);
test_view_memory_access_violation(make_view<V8>(lbl), host_exec_space, prefix + ".*" + lbl);
V0 v0("v0"); // obtain a valid pointer for an allocation in the right space
int* const ptr = v0.data();
test_view_memory_access_violation(make_view<V0>(ptr), host_exec_space, prefix + ".*UNMANAGED");
test_view_memory_access_violation(make_view<V1>(ptr), host_exec_space, prefix + ".*UNMANAGED");
test_view_memory_access_violation(make_view<V2>(ptr), host_exec_space, prefix + ".*UNMANAGED");
test_view_memory_access_violation(make_view<V3>(ptr), host_exec_space, prefix + ".*UNMANAGED");
test_view_memory_access_violation(make_view<V4>(ptr), host_exec_space, prefix + ".*UNMANAGED");
test_view_memory_access_violation(make_view<V5>(ptr), host_exec_space, prefix + ".*UNMANAGED");
test_view_memory_access_violation(make_view<V6>(ptr), host_exec_space, prefix + ".*UNMANAGED");
test_view_memory_access_violation(make_view<V7>(ptr), host_exec_space, prefix + ".*UNMANAGED");
test_view_memory_access_violation(make_view<V8>(ptr), host_exec_space, prefix + ".*UNMANAGED");
// clang-format on
}
template <class ExecutionSpace>
void test_view_memory_access_violations_from_device() {
ExecutionSpace const exec_space{};
// clang-format off
using V0 = Kokkos::View<int, Kokkos::HostSpace>;
using V1 = Kokkos::View<int*, Kokkos::HostSpace>;
using V2 = Kokkos::View<int**, Kokkos::HostSpace>;
using V3 = Kokkos::View<int***, Kokkos::HostSpace>;
using V4 = Kokkos::View<int****, Kokkos::HostSpace>;
using V5 = Kokkos::View<int*****, Kokkos::HostSpace>;
using V6 = Kokkos::View<int******, Kokkos::HostSpace>;
using V7 = Kokkos::View<int*******, Kokkos::HostSpace>;
using V8 = Kokkos::View<int********, Kokkos::HostSpace>;
#ifdef KOKKOS_ENABLE_SYCL
// The invalid access is detected directly and we can't capture the error message
std::string const message = ".*";
#else
std::string const message = "Kokkos::View ERROR: attempt to access inaccessible memory space.*UNAVAILABLE";
#endif
std::string const lbl = "my_label";
test_view_memory_access_violation(make_view<V0>(lbl), exec_space, message);
test_view_memory_access_violation(make_view<V1>(lbl), exec_space, message);
test_view_memory_access_violation(make_view<V2>(lbl), exec_space, message);
test_view_memory_access_violation(make_view<V3>(lbl), exec_space, message);
test_view_memory_access_violation(make_view<V4>(lbl), exec_space, message);
test_view_memory_access_violation(make_view<V5>(lbl), exec_space, message);
test_view_memory_access_violation(make_view<V6>(lbl), exec_space, message);
test_view_memory_access_violation(make_view<V7>(lbl), exec_space, message);
test_view_memory_access_violation(make_view<V8>(lbl), exec_space, message);
V0 v0("v0"); // obtain a valid pointer for an allocation in the right space
int* const ptr = v0.data();
test_view_memory_access_violation(make_view<V0>(ptr), exec_space, message);
test_view_memory_access_violation(make_view<V1>(ptr), exec_space, message);
test_view_memory_access_violation(make_view<V2>(ptr), exec_space, message);
test_view_memory_access_violation(make_view<V3>(ptr), exec_space, message);
test_view_memory_access_violation(make_view<V4>(ptr), exec_space, message);
test_view_memory_access_violation(make_view<V5>(ptr), exec_space, message);
test_view_memory_access_violation(make_view<V6>(ptr), exec_space, message);
test_view_memory_access_violation(make_view<V7>(ptr), exec_space, message);
test_view_memory_access_violation(make_view<V8>(ptr), exec_space, message);
// clang-format on
}
TEST(TEST_CATEGORY_DEATH, view_memory_access_violations_from_host) {
::testing::FLAGS_gtest_death_test_style = "threadsafe";
using ExecutionSpace = TEST_EXECSPACE;
if (Kokkos::SpaceAccessibility<
/*AccessSpace=*/Kokkos::HostSpace,
/*MemorySpace=*/typename ExecutionSpace::memory_space>::accessible) {
GTEST_SKIP() << "skipping since no memory access violation would occur";
}
test_view_memory_access_violations_from_host<ExecutionSpace>();
}
TEST(TEST_CATEGORY_DEATH, view_memory_access_violations_from_device) {
::testing::FLAGS_gtest_death_test_style = "threadsafe";
using ExecutionSpace = TEST_EXECSPACE;
if (Kokkos::SpaceAccessibility<
/*AccessSpace=*/ExecutionSpace,
/*MemorySpace=*/Kokkos::HostSpace>::accessible) {
GTEST_SKIP() << "skipping since no memory access violation would occur";
}
#if defined(KOKKOS_ENABLE_SYCL) && defined(NDEBUG) // FIXME_SYCL
if (std::is_same_v<ExecutionSpace, Kokkos::SYCL>) {
GTEST_SKIP() << "skipping because SYCL device-side abort does not work "
"when NDEBUG is defined";
}
#endif
#if defined(KOKKOS_ENABLE_OPENMPTARGET) // FIXME_OPENMPTARGET
if (std::is_same<ExecutionSpace, Kokkos::Experimental::OpenMPTarget>::value) {
GTEST_SKIP() << "skipping because OpenMPTarget backend is currently not "
"able to abort from the device";
}
#endif
#if defined(KOKKOS_ENABLE_OPENACC) // FIXME_OPENACC
if (std::is_same<ExecutionSpace, Kokkos::Experimental::OpenACC>::value) {
GTEST_SKIP() << "skipping because OpenACC backend is currently not "
"able to abort from the device";
}
#endif
test_view_memory_access_violations_from_device<ExecutionSpace>();
}
|