From: Dmitry Monakhov Subject: [PATCH 10/10] xfstests: add disk failure simulation test Date: Wed, 20 Feb 2013 14:42:15 +0400 Message-ID: <1361356935-29153-11-git-send-email-dmonakhov@openvz.org> References: <1361356935-29153-1-git-send-email-dmonakhov@openvz.org> Cc: linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org, dchinner@redhat.com, Dmitry Monakhov To: xfs@oss.sgi.com Return-path: In-Reply-To: <1361356935-29153-1-git-send-email-dmonakhov@openvz.org> Sender: linux-fsdevel-owner@vger.kernel.org List-Id: linux-ext4.vger.kernel.org There are many situations where disk may fail for example 1) brutal usb dongle unplug 2) iscsi (or any other netbdev) failure due to network issues In this situation filesystem which use this blockdevice is expected to fail(force RO remount, abort, etc) but whole system should still be operational. In other words: 1) Kernel should not panic 2) Memory should not leak 3) Data integrity operations (sync,fsync,fdatasync, directio) should fail for affected filesystem 4) It should be possible to umount broken filesystem Later when disk becomes available again we expect(only for journaled filesystems): 5) It will be possible to mount filesystem w/o explicit fsck (in order to caught issues like https://patchwork.kernel.org/patch/1983981/) 6) Filesystem should be operational 7) After mount/umount has being done all errors should be fixed so fsck should not spot any issues. This test use fault enjection (CONFIG_FAIL_MAKE_REQUEST=y config option ) which force all new IO requests to fail for a given device. Xfs already has XFS_IOC_GOINGDOWN ioctl which provides similar behaviour, but it is fsspeciffic and it does it in an easy way because it perform freeze_bdev() before actual shotdown. Test run fsstress in background and then force disk failure. Once disk failed it check that (1)-(4) is true. Then makes disk available again and check that (5)-(7) is also true BE CAREFUL!! test known to cause memory corruption for XFS see: https://gist.github.com/dmonakhov/4953045 Signed-off-by: Dmitry Monakhov --- 303 | 186 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 303.out | 9 +++ common.config | 1 + common.rc | 13 ++++ group | 3 +- 5 files changed, 211 insertions(+), 1 deletions(-) create mode 100755 303 create mode 100644 303.out diff --git a/303 b/303 new file mode 100755 index 0000000..01bc5f1 --- /dev/null +++ b/303 @@ -0,0 +1,186 @@ +#! /bin/bash +# FSQA Test No. 303 +# +# Run fsstress and fio(dio/aio and mmap) and simulate disk failure +# check filesystem consistency at the end. +# +#----------------------------------------------------------------------- +# (c) 2013 Dmitry Monakhov +# +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License as +# published by the Free Software Foundation. +# +# This program is distributed in the hope that it would be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write the Free Software Foundation, +# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA +# +#----------------------------------------------------------------------- +# +# creator +owner=dmonakhov@openvz.org + +seq=`basename $0` +echo "QA output created by $seq" + +here=`pwd` +tmp=/tmp/$$ +status=1 # failure is the default! + +# get standard environment, filters and checks +. ./common.rc +. ./common.filter +_supported_fs ext3 ext4 xfs btrfs reiserfs +_supported_os Linux +_need_to_be_root +_require_scratch +_require_fail_make_request + +# TODO: Function are common enough to be moved to common.blkdev +SCRATCH_REAL_DEV=`readlink -f $SCRATCH_DEV` +SCRATCH_BDEV=`basename $SCRATCH_REAL_DEV` + +allow_fail_make_request() +{ + echo "Allow global fail_make_request feature" + echo 100 > $DEBUGFS_MNT/fail_make_request/probability + echo 9999999 > $DEBUGFS_MNT/fail_make_request/times + echo 0 > /sys/kernel/debug/fail_make_request/verbose +} + +disallow_fail_make_request() +{ + echo "Disallow global fail_make_request feature" + echo 0 > $DEBUGFS_MNT/fail_make_request/probability + echo 0 > $DEBUGFS_MNT/fail_make_request/times +} + +start_fail_scratch_dev() +{ + echo "Force SCRATCH_DEV device failure" + echo " echo 1 > /sys/block/$SCRATCH_BDEV/make-it-fail" >> $here/$seq.full + echo 1 > /sys/block/$SCRATCH_BDEV/make-it-fail + +} + +stop_fail_scratch_dev() +{ + echo "Make SCRATCH_DEV device operable again" + echo " echo 0 > /sys/block/$SCRATCH_BDEV/make-it-fail" >> $here/$seq.full + echo 0 > /sys/block/$SCRATCH_BDEV/make-it-fail + +} + +_cleanup() +{ + poweron_scratch_dev + disallow_fail_make_request +} +trap "_cleanup; exit \$status" 1 2 3 15 + +RUN_TIME=$((20+10*$TIME_FACTOR)) +NUM_JOBS=$((4*LOAD_FACTOR)) +BLK_DEV_SIZE=`blockdev --getsz $SCRATCH_DEV` +FILE_SIZE=$((BLK_DEV_SIZE * 512)) + +cat >$tmp-$seq.fio <> $here/$seq.full + $FSSTRESS_PROG $args > /dev/null 2>&1 & + fs_pid=$! + echo "Start fio.." + cat $tmp-$seq.fio >> $seq.full + $FIO_PROG $tmp-$seq.fio >> $here/$seq.full 2>&1 & + fio_pid=$! + + # Let's it work for awhile, and force device failure + sleep $RUN_TIME + start_fail_scratch_dev + # After device turns in to failed state filesystem may yet not know about + # that so buffered write(2) may succeed, but any integrity operations + # such as (sync, fsync, fdatasync, direct-io) should fail. + dd if=/dev/zero of=$SCRATCH_MNT/touch_failed_filesystem count=1 bs=4k conv=fsync \ + >> $here/$seq.full 2>&1 && \ + _fail "failed: still able to perform integrity fsync on $SCRATCH_MNT" + + kill $fs_pid + wait $fs_pid + wait $fio_pid + + # We expect that broken FS still can be umounted + run_check umount $SCRATCH_DEV + # Once filesystem was umounted no one is able to write to block device + # It is now safe to bring device back to normal state + stop_fail_scratch_dev + + # In order to check that filesystem is able to recover journal on mount(2) + # perform mount/umount, after that all errors should be fixed + run_check _scratch_mount + run_check _scratch_unmount + _check_scratch_fs +} + +# real QA test starts here + +_scratch_mkfs >> $here/$seq.full 2>&1 || _fail "mkfs failed" +_scratch_mount || _fail "mount failed" +allow_fail_make_request +_workout +status=$? +disallow_fail_make_request +exit diff --git a/303.out b/303.out new file mode 100644 index 0000000..a936471 --- /dev/null +++ b/303.out @@ -0,0 +1,9 @@ +QA output created by 303 +Allow global fail_make_request feature + +Start fsstress.. + +Start fio.. +Force SCRATCH_DEV device failure +Make SCRATCH_DEV device operable again +Disallow global fail_make_request feature diff --git a/common.config b/common.config index 8efc7f8..8643c0b 100644 --- a/common.config +++ b/common.config @@ -75,6 +75,7 @@ export BENCH_PASSES=${BENCH_PASSES:=5} export XFS_MKFS_OPTIONS=${XFS_MKFS_OPTIONS:=-bsize=4096} export TIME_FACTOR=${TIME_FACTOR:=1} export LOAD_FACTOR=${LOAD_FACTOR:=1} +export DEBUGFS_MNT=${DEBUGFS_MNT:="/sys/kernel/debug"} export PWD=`pwd` #export DEBUG=${DEBUG:=...} # arbitrary CFLAGS really. diff --git a/common.rc b/common.rc index e7ae9bf..b795c22 100644 --- a/common.rc +++ b/common.rc @@ -1049,6 +1049,19 @@ _require_sparse_files() esac } +_require_debugfs() +{ + #boot_params always present in debugfs + [ -d "$DEBUGFS_MNT/boot_params" ] || _notrun "Debugfs not mounted" +} + +_require_fail_make_request() +{ + [ -f "$DEBUGFS_MNT/fail_make_request/probability" ] \ + || _notrun "$DEBUGFS_MNT/fail_make_request \ + not found. Seems that CONFIG_FAIL_MAKE_REQUEST kernel config option not enabled" +} + # check that a FS on a device is mounted # if so, return mount point # diff --git a/group b/group index 2fe406b..20b7a9c 100644 --- a/group +++ b/group @@ -425,4 +425,5 @@ stress 299 aio dangerous ioctl rw stress 300 aio dangerous ioctl rw stress 301 aio dangerous ioctl rw stress -302 aio dangerous ioctl rw stress \ No newline at end of file +302 aio dangerous ioctl rw stress +303 aio dangerous enospc rw stress \ No newline at end of file -- 1.7.1