diff options
| author | Hansang Bae <hansang.bae@intel.com> | 2019-05-30 18:35:07 +0000 |
|---|---|---|
| committer | Hansang Bae <hansang.bae@intel.com> | 2019-05-30 18:35:07 +0000 |
| commit | ec1b4d1f6fb0fe0c11ef4532db0c657067baf14c (patch) | |
| tree | 30ffbf8e1f3668e54e3285cda5119702b536c17b /openmp/runtime/test | |
| parent | 778e445c58c52d5b23aafe89855b93a00eac46e5 (diff) | |
| download | bcm5719-llvm-ec1b4d1f6fb0fe0c11ef4532db0c657067baf14c.tar.gz bcm5719-llvm-ec1b4d1f6fb0fe0c11ef4532db0c657067baf14c.zip | |
Fix OMP_TARGET_OFFLOAD parsing
Current parsing allows trailing string after the permitted value,
MANDATORY|DISABLED|DEFAULT -- e.g., "mandatorynot" is also recognized
as "MANDATORY". Such cases should be recognized as incorrect/unknown
value.
Differential Revision: https://reviews.llvm.org/D62431
llvm-svn: 362125
Diffstat (limited to 'openmp/runtime/test')
| -rw-r--r-- | openmp/runtime/test/env/omp_target_offload.c | 62 |
1 files changed, 62 insertions, 0 deletions
diff --git a/openmp/runtime/test/env/omp_target_offload.c b/openmp/runtime/test/env/omp_target_offload.c new file mode 100644 index 00000000000..91ce108b55b --- /dev/null +++ b/openmp/runtime/test/env/omp_target_offload.c @@ -0,0 +1,62 @@ +// RUN: %libomp-compile-and-run +#include <string.h> +#include <stdlib.h> + +enum kmp_target_offload_kind { + tgt_disabled = 0, + tgt_default = 1, + tgt_mandatory = 2 +}; + +extern int __kmpc_get_target_offload(); + +const char *disabled_examples[] = { + // Allowed inputs + "disabled", "DISABLED", "Disabled", "dIsAbLeD", "DiSaBlEd"}; + +const char *default_examples[] = { + // Allowed inputs + "default", "DEFAULT", "Default", "deFAulT", "DEfaULt", + // These should be changed to default (failed match) + "mandatry", "defaults", "disable", "enabled", "mandatorynot"}; + +const char *mandatory_examples[] = { + // Allowed inputs + "mandatory", "MANDATORY", "Mandatory", "manDatoRy", "MANdATOry"}; + +// Return target-offload-var ICV +int get_target_offload_icv() { +#pragma omp parallel + {} + return __kmpc_get_target_offload(); +} + +int main() { + int i; + const char *omp_target_offload = "OMP_TARGET_OFFLOAD="; + char buf[80]; + + for (i = 0; i < sizeof(disabled_examples) / sizeof(char *); ++i) { + strcpy(buf, omp_target_offload); + strcat(buf, disabled_examples[i]); + kmp_set_defaults(buf); + if (tgt_disabled != get_target_offload_icv()) + return EXIT_FAILURE; + } + for (i = 0; i < sizeof(default_examples) / sizeof(char *); ++i) { + strcpy(buf, omp_target_offload); + strcat(buf, default_examples[i]); + kmp_set_defaults(buf); + if (tgt_default != get_target_offload_icv()) + return EXIT_FAILURE; + } + for (i = 0; i < sizeof(mandatory_examples) / sizeof(char *); ++i) { + strcpy(buf, omp_target_offload); + strcat(buf, mandatory_examples[i]); + kmp_set_defaults(buf); + if (tgt_mandatory != get_target_offload_icv()) + return EXIT_FAILURE; + } + + return EXIT_SUCCESS; +} |

