From patchwork Thu Dec 28 01:36:32 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Zhihao Cheng X-Patchwork-Id: 183602 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:6f82:b0:100:9c79:88ff with SMTP id tb2csp1756010dyb; Wed, 27 Dec 2023 17:35:01 -0800 (PST) X-Google-Smtp-Source: AGHT+IEUCZOxHVAiUwKGh0s8R8Aq1a2HrVjvU4uOdHhyglWoF6WdU5QMvyfcq3bkFWMCxgMJHsuF X-Received: by 2002:a17:903:120a:b0:1d4:85a8:5f6 with SMTP id l10-20020a170903120a00b001d485a805f6mr1168292plh.108.1703727301461; Wed, 27 Dec 2023 17:35:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703727301; cv=none; d=google.com; s=arc-20160816; b=SDmNYmYIHZcFJmma3kd4uH+4RhdAIuhXTRBlP7Sq/CZFlFhs3MU9RgWEZfWUAEOHej kn+HwgUtNtCz8eP8FOWtkscEF+7M+SBLf8OGMmernKwQ4oy2Hzgre3KH8ySX93qJzb3S ckvJH/9b4vK5VXTrVDXKvIQjRYt8Erqx9CEzp6XhI0m3OPSA2Va6oajvFKprRCANqyHU VCxiixy2mTBkyzW0zvGM4l2DKmel/RS8v5T7HyaJIngjHuIwFeXHCHwKsmDUrO+FjQWE Q/Qlam1nS0EyA8TDZiCNgAJwFuDppell3RqMd6bOPUj4+ELUg8Fc6SI8oSlUCixhOGgQ AEQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from; bh=9ZNvxyKSjkZvRcksHFuuB6Ai063/O3sWmyjt3fNx1AY=; fh=3kaVOPShTC55oj708yh1yJALapWuogKx6Yvc3sQq9zY=; b=MpkzoMqpQ+CBdlURV+UhRyHAeFBm778BMOdq5vzrgiLWoOJ6PX6eloBwHjxgfFLfU8 vI97K4Sy/QW++SVQapdAwJA8UR5B1IYQ6t7YyOuTQyCx6knEadCIGg7iZjWegyRmxquq 4bUF5fK+xTMrZrJ11s7raUw0Hcs1GBohc0qkxij88u4qbf431IH3UPyPgmEmlSkJai+4 YM0sPOIn14ogpVNNhSS/ss+/jJwJOjvgW02pStuv96xIvHG/6HlO90HBdvXm2WmlAMtD DW9QFhlu8K7r/mXo9WYwYCTcb8vLR14G+mDGx2E8wUc3ORzrOzKElYXjrAqIXN4f4FE8 a+gA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-12340-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-12340-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id l2-20020a170902f68200b001d43ebbd741si7687700plg.387.2023.12.27.17.35.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Dec 2023 17:35:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-12340-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-12340-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-12340-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 5B65F283A06 for ; Thu, 28 Dec 2023 01:34:53 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 856C163C5; Thu, 28 Dec 2023 01:33:48 +0000 (UTC) X-Original-To: linux-kernel@vger.kernel.org Received: from szxga05-in.huawei.com (szxga05-in.huawei.com [45.249.212.191]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1192710F2 for ; Thu, 28 Dec 2023 01:33:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=huawei.com Received: from mail.maildlp.com (unknown [172.19.163.17]) by szxga05-in.huawei.com (SkyGuard) with ESMTP id 4T0rXR3vnZz1FGHJ; Thu, 28 Dec 2023 09:29:43 +0800 (CST) Received: from kwepemm000013.china.huawei.com (unknown [7.193.23.81]) by mail.maildlp.com (Postfix) with ESMTPS id 764441A0172; Thu, 28 Dec 2023 09:33:35 +0800 (CST) Received: from huawei.com (10.175.127.227) by kwepemm000013.china.huawei.com (7.193.23.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 28 Dec 2023 09:33:34 +0800 From: Zhihao Cheng To: , , , , CC: , Subject: [PATCH mtd-utils 04/11] tests: ubifs_repair: Add powercut+repair+mount test Date: Thu, 28 Dec 2023 09:36:32 +0800 Message-ID: <20231228013639.2827205-5-chengzhihao1@huawei.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20231228013639.2827205-1-chengzhihao1@huawei.com> References: <20231228013639.2827205-1-chengzhihao1@huawei.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To kwepemm000013.china.huawei.com (7.193.23.81) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1786487558545176956 X-GMAIL-MSGID: 1786487558545176956 Inject powercut while doing fsstress on mounted UBIFS for kinds of flashes (eg. nand, nor). This testcase mainly makes sure that ubifs_repair can make UBIFS image be consistent on different flashes (eg. nand, nor). Because the min_io_size of nor flash is 1, the UBIFS image on nor flash will be different from nand flash after doing powercut, so we need make sure ubifs_repair can handle these two types of flash. Signed-off-by: Zhihao Cheng --- .gitignore | 1 + configure.ac | 3 +- tests/ubifs_repair-tests/Makemodule.am | 3 +- .../tests/powercut_repair_mount.sh.in | 138 +++++++++++++++++++++ 4 files changed, 143 insertions(+), 2 deletions(-) create mode 100755 tests/ubifs_repair-tests/tests/powercut_repair_mount.sh.in diff --git a/.gitignore b/.gitignore index 1a5fe7e..d47282c 100644 --- a/.gitignore +++ b/.gitignore @@ -115,6 +115,7 @@ tests/ubi-tests/ubi-stress-test.sh tests/ubifs_repair-tests/lib/common.sh tests/ubifs_repair-tests/tests/authentication_refuse.sh tests/ubifs_repair-tests/tests/cycle_mount_repair_check.sh +tests/ubifs_repair-tests/tests/powercut_repair_mount.sh # # Files generated by autotools diff --git a/configure.ac b/configure.ac index 73a3853..349e4ad 100644 --- a/configure.ac +++ b/configure.ac @@ -357,6 +357,7 @@ AC_CONFIG_FILES([tests/fs-tests/fs_help_all.sh tests/ubi-tests/ubi-stress-test.sh tests/ubifs_repair-tests/lib/common.sh tests/ubifs_repair-tests/tests/authentication_refuse.sh - tests/ubifs_repair-tests/tests/cycle_mount_repair_check.sh]) + tests/ubifs_repair-tests/tests/cycle_mount_repair_check.sh + tests/ubifs_repair-tests/tests/powercut_repair_mount.sh]) AC_OUTPUT([Makefile]) diff --git a/tests/ubifs_repair-tests/Makemodule.am b/tests/ubifs_repair-tests/Makemodule.am index c2556f5..92f288a 100644 --- a/tests/ubifs_repair-tests/Makemodule.am +++ b/tests/ubifs_repair-tests/Makemodule.am @@ -1,4 +1,5 @@ test_SCRIPTS += \ tests/ubifs_repair-tests/lib/common.sh \ tests/ubifs_repair-tests/tests/authentication_refuse.sh \ - tests/ubifs_repair-tests/tests/cycle_mount_repair_check.sh + tests/ubifs_repair-tests/tests/cycle_mount_repair_check.sh \ + tests/ubifs_repair-tests/tests/powercut_repair_mount.sh diff --git a/tests/ubifs_repair-tests/tests/powercut_repair_mount.sh.in b/tests/ubifs_repair-tests/tests/powercut_repair_mount.sh.in new file mode 100755 index 0000000..a5c7da6 --- /dev/null +++ b/tests/ubifs_repair-tests/tests/powercut_repair_mount.sh.in @@ -0,0 +1,138 @@ +#!/bin/sh +# Copyright (c), 2023-2024, Huawei Technologies Co, Ltd. +# Author: Zhihao Cheng +# +# Test Description: +# For many kinds of flash, do following things +# 1. mount UBIFS +# 2. fsstress & powercut & unmount +# 3. repair ubifs +# 4. check UBIFS mounting result +# Running time: 1h + +TESTBINDIR=@TESTBINDIR@ +source $TESTBINDIR/common.sh + +function run_test() +{ + local simulator="$1"; + local size="$2"; + local peb_size="$3"; + local page_size="$4"; + local encryption=$5; + + echo "======================================================================" + printf "%s" "$simulator: ${size}MiB PEB size ${peb_size}KiB" + if [ "$simulator" = "nandsim" ]; then + printf " %s" "page size ${page_size}KiB" + fi + printf " $encryption\n" + + if [ "$simulator" = "nandsim" ]; then + $TESTBINDIR/load_nandsim.sh "$size" "$peb_size" "$page_size" || echo "cannot load nandsim"; + mtdnum="$(find_mtd_device "$nandsim_patt")" + elif [ "$simulator" = "mtdram" ]; then + load_mtdram "$size" "$peb_size" || echo "cannot load mtdram" + mtdnum="$(find_mtd_device "$mtdram_patt")" + else + fatal "$simulator is not supported" + fi + + flash_eraseall /dev/mtd$mtdnum + modprobe ubi mtd="$mtdnum,$page_size,0,0,1" fm_autoconvert || fatal "modprobe ubi fail" + ubimkvol -N vol_test -m -n 0 /dev/ubi$UBI_NUM || fatal "mkvol fail" + modprobe ubifs || fatal "modprobe ubifs fail" + mount_ubifs $DEV $MNT || fatal "mount ubifs fail" + if [[ "$encryption" == "encrypted" ]]; then + encryption_gen_key + encryption_set_key $MNT + fi + + fsstress -d $MNT -l0 -p4 -n10000 & + sleep $((RANDOM % 120)) + powercut + + ps -e | grep -w fsstress > /dev/null 2>&1 + while [ $? -eq 0 ] + do + killall -9 fsstress > /dev/null 2>&1 + sleep 1 + ps -e | grep -w fsstress > /dev/null 2>&1 + done + + while true + do + res=`mount | grep "$MNT"` + if [[ "$res" == "" ]] + then + break; + fi + umount $MNT + sleep 0.1 + done + + echo 'format "UBIFS DBG repair" +pflmt' > /sys/kernel/debug/dynamic_debug/control + echo "$DEV" > /sys/kernel/debug/ubifs/repair_fs + res=$? + if [[ $res != 0 ]] + then + fatal "repair fail $res" + fi + + check_memleak + + dmesg -c > /dev/null # powercut and repairing could reproduce error messages + + enable_chkfs + + mount_ubifs $DEV $MNT + res=$? + if [[ $res != 0 ]] + then + fatal "mount fail $res" + fi + + if [[ "$encryption" == "encrypted" ]]; then + encryption_set_key $MNT + fi + + du -sh $MNT > /dev/null # Make sure all files are accessible + ret=$? + if [[ $ret != 0 ]]; then + fatal "Cannot access all files" + fi + check_err_msg + + umount $MNT + res=$? + if [[ $res != 0 ]] + then + fatal "unmount fail $res" + fi + + check_err_msg + + modprobe -r ubifs + modprobe -r ubi + modprobe -r $simulator + + echo "----------------------------------------------------------------------" +} + +check_fsstress +start_t=$(date +%s) +echo "Do powercut+repair+mount test in kinds of flashes" +for simulator in "mtdram" "nandsim"; do + for encryption in "encrypted" "noencrypted"; do + run_test "$simulator" "16" "16" "512" $encryption + run_test "$simulator" "64" "16" "512" $encryption + run_test "$simulator" "128" "64" "2048" $encryption + run_test "$simulator" "256" "128" "2048" $encryption + run_test "$simulator" "512" "128" "2048" $encryption + run_test "$simulator" "1024" "512" "2048" $encryption + done +done +end_t=$(date +%s) +time_cost=$(( end_t - start_t )) +echo "Success, cost $time_cost seconds" +exit 0