From patchwork Wed Feb 15 20:50:24 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Lakshmipathi.G" X-Patchwork-Id: 9575005 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 64E8660493 for ; Wed, 15 Feb 2017 20:51:44 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 53AAC2851F for ; Wed, 15 Feb 2017 20:51:44 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 4880728535; Wed, 15 Feb 2017 20:51:44 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.4 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_HI, RCVD_IN_SORBS_SPAM autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 7F13F2851F for ; Wed, 15 Feb 2017 20:51:43 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750791AbdBOUvj (ORCPT ); Wed, 15 Feb 2017 15:51:39 -0500 Received: from p3nlsmtpcp01-01.prod.phx3.secureserver.net ([184.168.200.138]:47664 "EHLO p3nlsmtpcp01-01.prod.phx3.secureserver.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750905AbdBOUvi (ORCPT ); Wed, 15 Feb 2017 15:51:38 -0500 Received: from p3plcpnl0639.prod.phx3.secureserver.net ([50.62.176.166]) by : HOSTING RELAY : with SMTP id e6X7cNnoNk2ite6X7ccHc4; Wed, 15 Feb 2017 13:50:37 -0700 Received: from [42.109.196.92] (port=39503 helo=giis.co.in) by p3plcpnl0639.prod.phx3.secureserver.net with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from ) id 1ce6X6-0001CX-UH; Wed, 15 Feb 2017 13:50:37 -0700 Date: Thu, 16 Feb 2017 02:20:24 +0530 From: "Lakshmipathi.G" To: quwenruo@cn.fujitsu.com, linux-btrfs@vger.kernel.org Subject: [PATCH v2] btrfs-progs: misc-tests: Superblock corruption and recovery using backup. Message-ID: <20170215205024.GA2486@giis.co.in> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - p3plcpnl0639.prod.phx3.secureserver.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - giis.co.in X-Get-Message-Sender-Via: p3plcpnl0639.prod.phx3.secureserver.net: authenticated_id: lakshmipathi.g@giis.co.in X-Authenticated-Sender: p3plcpnl0639.prod.phx3.secureserver.net: lakshmipathi.g@giis.co.in X-Source: X-Source-Args: X-Source-Dir: X-CMAE-Envelope: MS4wfF0z3xYfzeDesSaAvqgSIHF2GDF3fUwZQcDGrSeYml+u0Ka9NHo0rHqZ+uT7TgSCURqxaSPSpDe2T38fzSpU+mNINRpwAB1cr1PrC+a+3wSr3SmhXkyu GNOCo0JElCsGBNy51qWse28j8wmQqRWhEFIC53uVKG7iu6QCd/Tv1tT8ZliFyn3EoyTJpk72aiWMoxuvVKH1dG+gbljQyZG3XmTs9IODYcPFYQOaGzX0sSrg Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Signed-off-by: Lakshmipathi.G --- .../019-fix-superblock-corruption/test.sh | 38 ++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100755 tests/misc-tests/019-fix-superblock-corruption/test.sh diff --git a/tests/misc-tests/019-fix-superblock-corruption/test.sh b/tests/misc-tests/019-fix-superblock-corruption/test.sh new file mode 100755 index 0000000..55159dc --- /dev/null +++ b/tests/misc-tests/019-fix-superblock-corruption/test.sh @@ -0,0 +1,38 @@ +#!/bin/bash +# +# Corrupt primary superblock and restore it using backup superblock. +# + +source $TOP/tests/common + +check_prereq btrfs-select-super +check_prereq btrfs + +setup_root_helper +prepare_test_dev 512M + +FIRST_SUPERBLOCK_OFFSET=65536 + +test_superblock_restore() +{ + run_check $SUDO_HELPER $TOP/mkfs.btrfs -f $TEST_DEV + + # Corrupt superblock checksum + dd if=/dev/zero of=$TEST_DEV seek=$FIRST_SUPERBLOCK_OFFSET bs=1 \ + count=4 conv=notrunc &> /dev/null + + # Run btrfs check to detect corruption + $TOP/btrfs check $TEST_DEV >& /dev/null && \ + _fail "btrfs check should detect corruption" + + # Copy backup superblock to primary + run_check $TOP/btrfs-select-super -s 1 $TEST_DEV + + echo "Performing btrfs check" &>> $RESULTS + $TOP/btrfs check $TEST_DEV &>> $RESULTS + if [ $? -ne 0 ]; then + _fail "Failed to fix superblock." + fi +} + +test_superblock_restore