From patchwork Wed Feb 15 09:03:38 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Lakshmipathi.G" X-Patchwork-Id: 9573607 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id D99D860493 for ; Wed, 15 Feb 2017 09:05:11 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C85B72842B for ; Wed, 15 Feb 2017 09:05:11 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id BC82928451; Wed, 15 Feb 2017 09:05:11 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.4 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_HI, RCVD_IN_SORBS_SPAM autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id A48382842B for ; Wed, 15 Feb 2017 09:05:10 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751022AbdBOJFD (ORCPT ); Wed, 15 Feb 2017 04:05:03 -0500 Received: from p3nlsmtpcp01-04.prod.phx3.secureserver.net ([184.168.200.145]:58486 "EHLO p3nlsmtpcp01-04.prod.phx3.secureserver.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750806AbdBOJEw (ORCPT ); Wed, 15 Feb 2017 04:04:52 -0500 Received: from p3plcpnl0639.prod.phx3.secureserver.net ([50.62.176.166]) by : HOSTING RELAY : with SMTP id dvV9cGBeaJZDddvV9cSJW8; Wed, 15 Feb 2017 02:03:51 -0700 Received: from [42.109.132.231] (port=59239 helo=giis.co.in) by p3plcpnl0639.prod.phx3.secureserver.net with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from ) id 1cdvV8-0000dL-PD; Wed, 15 Feb 2017 02:03:51 -0700 Date: Wed, 15 Feb 2017 14:33:38 +0530 From: "Lakshmipathi.G" To: linux-btrfs@vger.kernel.org, quwenruo@cn.fujitsu.com, kreijack@inwind.it Subject: [PATCH] btrfs-progs: RAID5:Inject data stripe corruption and verify scrub fixes it. Message-ID: <20170215090338.GA11666@giis.co.in> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - p3plcpnl0639.prod.phx3.secureserver.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - giis.co.in X-Get-Message-Sender-Via: p3plcpnl0639.prod.phx3.secureserver.net: authenticated_id: lakshmipathi.g@giis.co.in X-Authenticated-Sender: p3plcpnl0639.prod.phx3.secureserver.net: lakshmipathi.g@giis.co.in X-Source: X-Source-Args: X-Source-Dir: X-CMAE-Envelope: MS4wfJ0NuwF3AqD/9ixc+DKHfc2isnV49fURQdCP6Pb6L038/ozyIFjdqYRuEBN1cOsVl1rM0c4Hd0tuKdI5Pfk8CBxLIJN8oHRsQ/m5GNeT96rVVhxOjDwa lCfRmy4Ugf5kcfYGqrCbybFt5c6S1bsYZrvcT+fvSMeQgW+nlTOrH9DdB1b9lymmlg6SZklFcJIL5Qh5Ql0CI4GMpDK0bi2J8qvIcA2YBYdv2AL9IH5UO2Kh Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Signed-off-by: Lakshmipathi.G --- .../020-raid5-datastripe-corruption/test.sh | 224 +++++++++++++++++++++ 1 file changed, 224 insertions(+) create mode 100755 tests/misc-tests/020-raid5-datastripe-corruption/test.sh diff --git a/tests/misc-tests/020-raid5-datastripe-corruption/test.sh b/tests/misc-tests/020-raid5-datastripe-corruption/test.sh new file mode 100755 index 0000000..d04c430 --- /dev/null +++ b/tests/misc-tests/020-raid5-datastripe-corruption/test.sh @@ -0,0 +1,224 @@ +#!/bin/bash +# +# Raid5: Inject data stripe corruption and fix them using scrub. +# +# Script will perform the following: +# 1) Create Raid5 using 3 loopback devices. +# 2) Ensure file layout is created in a predictable manner. +# Each data stripe(64KB) should uniquely start with 'DNxxxx', +# where N represents the data stripe number.(ex:D0xxxx,D1xxxx etc) +# 3) Once file is created with specific layout, gather data stripe details +# like devicename, position and actual on-disk data. +# 4) Now use 'dd' to verify the data-stripe against its expected value +# and inject corruption by zero'ing out contents. +# 5) After injecting corruption, running online-scrub is expected to fix +# the corrupted data stripe with the help of parity block and +# corresponding data stripe. +# 6) Finally, validate the data stripe has original un-corrupted value. +# +# Note: This script doesn't handle parity block corruption. + +source $TOP/tests/common + +check_prereq btrfs +check_prereq mkfs.btrfs + +setup_root_helper +prepare_test_dev 512M + +ndevs=3 +declare -a devs +device_name="" +stripe_offset="" +stripe_content="" + +LAYOUT_TMP=$(mktemp --tmpdir btrfs-progs-raid5-file.layoutXXXXXX) +STRIPEINFO_TMP=$(mktemp --tmpdir btrfs-progs-raid5-file.infoXXXXXX) + +prepare_devices() +{ + for i in `seq $ndevs`; do + touch img$i + chmod a+rw img$i + truncate -s0 img$i + truncate -s512M img$i + devs[$i]=`run_check_stdout $SUDO_HELPER losetup --find --show img$i` + done +} + +cleanup_devices() +{ + for dev in ${devs[@]}; do + run_check $SUDO_HELPER losetup -d $dev + done + for i in `seq $ndevs`; do + truncate -s0 img$i + done + run_check $SUDO_HELPER losetup --all +} + +test_do_mkfs() +{ + run_check $SUDO_HELPER $TOP/mkfs.btrfs -f \ + $@ +} + +test_mkfs_multi() +{ + test_do_mkfs $@ ${devs[@]} +} + +#$1 Filename +#$2 Expected no.of data stripes for the file. +create_layout(){ + fname=$1 + size=$(( $2 * 65536 )) + n=0 + bs_value=1 + stripe=0 + while (( $n < $size )) + do + if [ $(( $n % 65536 )) -eq 0 ]; then + val='D'$stripe + echo -n $val + stripe=$(( $stripe+1 )) + # ensure proper value + bs_value=`echo "${#val}"` + else + echo -n 'x' + bs_value=1 + fi + n=$(( $n+$bs_value )) + done | dd of="$TEST_MNT"/$fname bs=$bs_value conv=notrunc &> /dev/null +} + +find_data_stripe_details(){ + for dev in ${devs[@]}; do + echo $dev >> $LAYOUT_TMP + $SUDO_HELPER cat $dev | hexdump -e '"%010_ad|" 16/1 "%_p" "|\n"' | + grep -P 'D[0-9]+xx' >> $LAYOUT_TMP + done +} + +#Collect data stripe information in a readable manner. +save_data_stripe_details(){ + devname="" + for entry in `cat $LAYOUT_TMP`; do + echo $entry | grep -q '^\/dev\/loop' > /dev/null + + if [ $? -eq 0 ]; then + devname=$entry + else + echo $devname"|"$entry >> $STRIPEINFO_TMP + fi + done + #Order by data stripe. D0 comes before D1. + sort -t'|' -k3 $STRIPEINFO_TMP -o $STRIPEINFO_TMP +} + +#Corrupt given data stripe +corrupt_data_stripe(){ + + data_stripe_num=$1 + data_stripe_entry="D"${data_stripe_num}"xxxx" + stripe_entry=`grep "${data_stripe_entry}" $STRIPEINFO_TMP` + + #Each entry will have format like "device|position|16-byte content" + #Example: /dev/loop1|0063176704|D0xxxxxxxxxxxxxx| + device_name=$(echo $stripe_entry | awk -F"|" '{print $1}') + stripe_offset=$(echo $stripe_entry | awk -F"|" '{print $2}') + #Remove leading zeros + stripe_offset=$(echo $stripe_offset | sed 's/^0*//') + stripe_content=$(echo $stripe_entry | awk -F"|" '{print $3}') + + echo "Corrupting $device_name at position $stripe_offset \ + which has $stripe_content" >> "$RESULTS" + + #verify the value at this position + original_value=$($SUDO_HELPER dd 2>/dev/null if=$device_name bs=1 \ + count=16 skip=$stripe_offset) + + if [ $original_value != $stripe_content ];then + echo "$original_value != $stripe_content" + _fail "Data stripe mismatch. Possible use of incorrect block." + else + echo "Found on-disk value: $original_value " >> "$RESULTS" + fi + + #Corrupt the given data stripe + $SUDO_HELPER dd if=/dev/zero of=$device_name bs=1 count=4 \ + seek=$stripe_offset conv=notrunc &> /dev/null + + #Fetch value again. + corrupted_value=$($SUDO_HELPER dd 2>/dev/null if=$device_name \ + bs=1 count=16 skip=$stripe_offset) + + if [ $corrupted_value == $original_value ];then + echo "original:$original_value corrupted:$corrupted_value" + _fail "Corruption failed. Possible use of incorrect block." + else + echo "Corruption completed at $stripe_offset" >> "$RESULTS" + fi + +# Corruption done. +} + +#Verify data stripe after scrub +verify_data_stripe(){ + + value_after_scrub=$($SUDO_HELPER dd 2>/dev/null if=$device_name bs=1 \ + count=16 skip=$stripe_offset) + if [ $value_after_scrub != $stripe_content ];then + _fail "Scrub failed to fix data stripe corruption." + else + echo "Scrub corrected value: $value_after_scrub" >> "$RESULTS" + fi +} + +#$1 Filename +#$2 File with 'n' no.of data stripes +#$3 Data stripe to corrupt +test_raid5_datastripe_corruption(){ + filename=$1 + stripe_num=$2 + test_stripe=$3 + + prepare_devices + dev1=${devs[1]} + dev2=${devs[2]} + dev3=${devs[3]} + + test_mkfs_multi -d raid5 -m raid5 + run_check $SUDO_HELPER mount $dev1 $TEST_MNT + create_layout $filename $stripe_num + run_check $SUDO_HELPER umount "$TEST_MNT" + + #Gather data stripe informations like specific device,offset + find_data_stripe_details + save_data_stripe_details + corrupt_data_stripe $test_stripe + + #Mount the device and start scrub + run_check $SUDO_HELPER mount $dev1 $TEST_MNT + run_check $SUDO_HELPER btrfs scrub start $TEST_MNT + #Introduce delay, hopefully scrubbing will be finished. + sleep 10 + + #Validate + verify_data_stripe + + #cleanup + run_check $SUDO_HELPER umount "$TEST_MNT" + cleanup_devices + rm -f $LAYOUT_TMP + rm -f $STRIPEINFO_TMP +} + + +test_raid5_datastripe_corruption file128k.txt 2 1 #file with 2 stripe,corrupt 1st. +test_raid5_datastripe_corruption file192k.txt 3 2 #file with 3 stripe,corrupt 2nd. +test_raid5_datastripe_corruption file256k.txt 4 3 +test_raid5_datastripe_corruption file512k.txt 8 6 +test_raid5_datastripe_corruption file768k.txt 12 10 +test_raid5_datastripe_corruption file1m.txt 16 14 #1MB file, corrupt 14th stripe. +test_raid5_datastripe_corruption file1m.txt 32 23 #2MB file, corrupt 23rd stripe