From nobody Sat Dec 27 01:29:19 2025 Received: from szxga05-in.huawei.com (szxga05-in.huawei.com [45.249.212.191]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 33CC26FA8 for ; Thu, 28 Dec 2023 01:34:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=huawei.com Received: from mail.maildlp.com (unknown [172.19.88.214]) by szxga05-in.huawei.com (SkyGuard) with ESMTP id 4T0rby129Mz1g0DD; Thu, 28 Dec 2023 09:32:46 +0800 (CST) Received: from kwepemm000013.china.huawei.com (unknown [7.193.23.81]) by mail.maildlp.com (Postfix) with ESMTPS id 2F2161A0196; Thu, 28 Dec 2023 09:33:51 +0800 (CST) Received: from huawei.com (10.175.127.227) by kwepemm000013.china.huawei.com (7.193.23.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 28 Dec 2023 09:33:35 +0800 From: Zhihao Cheng To: , , , , CC: , Subject: [PATCH mtd-utils 06/11] tests: ubifs_repair: Add cycle_powercut+repair test Date: Thu, 28 Dec 2023 09:36:34 +0800 Message-ID: <20231228013639.2827205-7-chengzhihao1@huawei.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20231228013639.2827205-1-chengzhihao1@huawei.com> References: <20231228013639.2827205-1-chengzhihao1@huawei.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To kwepemm000013.china.huawei.com (7.193.23.81) Content-Type: text/plain; charset="utf-8" Inject powercut while doing fsstress on mounted UBIFS, check the consistency of UBIFS after repairing. This testscase mainly makes sure that ubifs_repair can make UBIFS image be consistent in common stress cases and powercut cases. Signed-off-by: Zhihao Cheng --- .gitignore | 1 + configure.ac | 3 +- tests/ubifs_repair-tests/Makemodule.am | 3 +- .../tests/cycle_powercut_mount_repair.sh.in | 132 +++++++++++++++++= ++++ 4 files changed, 137 insertions(+), 2 deletions(-) create mode 100755 tests/ubifs_repair-tests/tests/cycle_powercut_mount_rep= air.sh.in diff --git a/.gitignore b/.gitignore index 52396e6..7077b8d 100644 --- a/.gitignore +++ b/.gitignore @@ -117,6 +117,7 @@ tests/ubifs_repair-tests/tests/authentication_refuse.sh tests/ubifs_repair-tests/tests/cycle_mount_repair_check.sh tests/ubifs_repair-tests/tests/powercut_repair_mount.sh tests/ubifs_repair-tests/tests/cycle_corrupted_repair_fault_inject.sh +tests/ubifs_repair-tests/tests/cycle_powercut_mount_repair.sh =20 # # Files generated by autotools diff --git a/configure.ac b/configure.ac index 31a7184..b3dd453 100644 --- a/configure.ac +++ b/configure.ac @@ -359,6 +359,7 @@ AC_CONFIG_FILES([tests/fs-tests/fs_help_all.sh tests/ubifs_repair-tests/tests/authentication_refuse.sh tests/ubifs_repair-tests/tests/cycle_mount_repair_check.sh tests/ubifs_repair-tests/tests/powercut_repair_mount.sh - tests/ubifs_repair-tests/tests/cycle_corrupted_repair_fault_inject.sh]) + tests/ubifs_repair-tests/tests/cycle_corrupted_repair_fault_inject.sh + tests/ubifs_repair-tests/tests/cycle_powercut_mount_repair.sh]) =20 AC_OUTPUT([Makefile]) diff --git a/tests/ubifs_repair-tests/Makemodule.am b/tests/ubifs_repair-te= sts/Makemodule.am index 0a9fb48..4a7f5ed 100644 --- a/tests/ubifs_repair-tests/Makemodule.am +++ b/tests/ubifs_repair-tests/Makemodule.am @@ -3,4 +3,5 @@ test_SCRIPTS +=3D \ tests/ubifs_repair-tests/tests/authentication_refuse.sh \ tests/ubifs_repair-tests/tests/cycle_mount_repair_check.sh \ tests/ubifs_repair-tests/tests/powercut_repair_mount.sh \ - tests/ubifs_repair-tests/tests/cycle_corrupted_repair_fault_inject.sh + tests/ubifs_repair-tests/tests/cycle_corrupted_repair_fault_inject.sh \ + tests/ubifs_repair-tests/tests/cycle_powercut_mount_repair.sh diff --git a/tests/ubifs_repair-tests/tests/cycle_powercut_mount_repair.sh.= in b/tests/ubifs_repair-tests/tests/cycle_powercut_mount_repair.sh.in new file mode 100755 index 0000000..792f360 --- /dev/null +++ b/tests/ubifs_repair-tests/tests/cycle_powercut_mount_repair.sh.in @@ -0,0 +1,132 @@ +#!/bin/sh +# Copyright (c), 2023-2024, Huawei Technologies Co, Ltd. +# Author: Zhihao Cheng +# +# Test Description: +# Do many cycles of mount/fsstress/powercut/umount/repair/mount, check whe= ther +# mount is successful. +# Running time: 9h + +TESTBINDIR=3D@TESTBINDIR@ +source $TESTBINDIR/common.sh + +ID=3D"0x20,0xa7,0x00,0x26" # 4G 256KB 4KB 2KB-sub-page + +function run_test() +{ + local encryption=3D$1 + + echo "Do cycle mount+powercut+repair+umount($encryption) test" + modprobe nandsim id_bytes=3D$ID + mtdnum=3D"$(find_mtd_device "$nandsim_patt")" + flash_eraseall /dev/mtd$mtdnum + + dmesg -c > /dev/null + + modprobe ubi mtd=3D"$mtdnum,4096,0,0,1" fm_autoconvert || fatal "modprobe= ubi fail" + ubimkvol -N vol_test -m -n 0 /dev/ubi$UBI_NUM || fatal "mkvol fail" + modprobe ubifs || fatal "modprobe ubifs fail" + + if [[ "$encryption" =3D=3D "encrypted" ]]; then + encryption_gen_key + fi + + round=3D0 + while [[ $round -lt 60 ]] + do + echo "---------------------- ROUND $round ----------------------" + let round=3D$round+1 + + mount_ubifs $DEV $MNT || fatal "mount ubifs fail" + if [[ "$encryption" =3D=3D "encrypted" ]]; then + encryption_set_key $MNT + fi + + if [[ $(($round % 30)) =3D=3D 0 ]] + then + echo "Clean files" + rm -rf $MNT/* + check_err_msg + fi + + fsstress -d $MNT -l0 -p4 -n10000 & + sleep $((RANDOM % 30)) + check_err_msg # Make sure new operations are okay after repairing UBIFS + powercut + + ps -e | grep -w fsstress > /dev/null 2>&1 + while [ $? -eq 0 ] + do + killall -9 fsstress > /dev/null 2>&1 + sleep 1 + ps -e | grep -w fsstress > /dev/null 2>&1 + done + + while true + do + res=3D`mount | grep "$MNT"` + if [[ "$res" =3D=3D "" ]] + then + break; + fi + umount $MNT + sleep 0.1 + done + + echo 'format "UBIFS DBG repair" +pflmt' > /sys/kernel/debug/dynamic_debu= g/control + echo "$DEV" > /sys/kernel/debug/ubifs/repair_fs + res=3D$? + if [[ $res !=3D 0 ]] + then + fatal "repair fail $res" + fi + + check_memleak + + dmesg -c > /dev/null # powercut and repairing could reproduce error mess= ages + + enable_chkfs + + mount_ubifs $DEV $MNT + res=3D$? + if [[ $res !=3D 0 ]] + then + fatal "mount fail $res" + fi + + if [[ "$encryption" =3D=3D "encrypted" ]]; then + encryption_set_key $MNT + fi + + du -sh $MNT > /dev/null # Make sure all files are accessible + ret=3D$? + if [[ $ret !=3D 0 ]]; then + fatal "Cannot access all files" + fi + check_err_msg + + umount $MNT + res=3D$? + if [[ $res !=3D 0 ]] + then + fatal "unmount fail $res" + fi + + check_err_msg + + disable_chkfs + done + + modprobe -r ubifs + modprobe -r ubi + modprobe -r nandsim +} + +check_fsstress +start_t=3D$(date +%s) +run_test "encrypted" +run_test "noencrypted" +end_t=3D$(date +%s) +time_cost=3D$(( end_t - start_t )) +echo "Success, cost $time_cost seconds" +exit 0 --=20 2.13.6