From patchwork Thu Feb 16 22:31:59 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Lakshmipathi.G" X-Patchwork-Id: 9578479 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 2543560244 for ; Thu, 16 Feb 2017 22:33:19 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 0CBE528689 for ; Thu, 16 Feb 2017 22:33:19 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id E3ECE2868C; Thu, 16 Feb 2017 22:33:18 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id BEA8B28689 for ; Thu, 16 Feb 2017 22:33:17 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933569AbdBPWdP (ORCPT ); Thu, 16 Feb 2017 17:33:15 -0500 Received: from p3nlsmtpcp01-04.prod.phx3.secureserver.net ([184.168.200.145]:53552 "EHLO p3nlsmtpcp01-04.prod.phx3.secureserver.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933429AbdBPWdO (ORCPT ); Thu, 16 Feb 2017 17:33:14 -0500 Received: from p3plcpnl0639.prod.phx3.secureserver.net ([50.62.176.166]) by : HOSTING RELAY : with SMTP id eUazcfgunJZDdeUazcp3ZF; Thu, 16 Feb 2017 15:32:13 -0700 Received: from [103.60.74.43] (port=46810 helo=giis.co.in) by p3plcpnl0639.prod.phx3.secureserver.net with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from ) id 1ceUay-0005KB-7q; Thu, 16 Feb 2017 15:32:13 -0700 Date: Fri, 17 Feb 2017 04:01:59 +0530 From: "Lakshmipathi.G" To: quwenruo@cn.fujitsu.com, linux-btrfs@vger.kernel.org Subject: [PATCH v3] btrfs-progs: misc-tests: Superblock corruption and recovery using backup. Message-ID: <20170216223159.GA23242@giis.co.in> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - p3plcpnl0639.prod.phx3.secureserver.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - giis.co.in X-Get-Message-Sender-Via: p3plcpnl0639.prod.phx3.secureserver.net: authenticated_id: lakshmipathi.g@giis.co.in X-Authenticated-Sender: p3plcpnl0639.prod.phx3.secureserver.net: lakshmipathi.g@giis.co.in X-Source: X-Source-Args: X-Source-Dir: X-CMAE-Envelope: MS4wfA2djB5Ft422kS7kmgZNZBmYVhxWORZ8BMspdoCOHLjBZC0Z7t1XjR0yJSMdC491iQtsL59lWntLmIL1yiIqfa6wJUD9Ax9zFx4qo929rAifA0jVs1y1 VV/bBo71jcPqPVOVfQlLGCutDRo4HOPW2oKoC4RkBP+6OEsRZw/XE1sZO+5mBTvh76iwJewTe1sGNa+2+SqHMdCyY9ChLXlBCgFOc/3J8DxPvCk9SwXry2K2 Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Test script to recover damaged primary superblock using backup superblock. Signed-off-by: Lakshmipathi.G --- .../019-fix-superblock-corruption/test.sh | 36 ++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100755 tests/misc-tests/019-fix-superblock-corruption/test.sh diff --git a/tests/misc-tests/019-fix-superblock-corruption/test.sh b/tests/misc-tests/019-fix-superblock-corruption/test.sh new file mode 100755 index 0000000..95815e4 --- /dev/null +++ b/tests/misc-tests/019-fix-superblock-corruption/test.sh @@ -0,0 +1,36 @@ +#!/bin/bash +# +# Corrupt primary superblock and restore it using backup superblock. +# + +source $TOP/tests/common + +check_prereq btrfs-select-super +check_prereq btrfs + +setup_root_helper +prepare_test_dev 512M + +FIRST_SUPERBLOCK_OFFSET=65536 + +test_superblock_restore() +{ + run_check $SUDO_HELPER $TOP/mkfs.btrfs -f $TEST_DEV + + # Corrupt superblock checksum + dd if=/dev/zero of=$TEST_DEV seek=$FIRST_SUPERBLOCK_OFFSET bs=1 \ + count=4 conv=notrunc &> /dev/null + # Run btrfs check to detect corruption + $TOP/btrfs check $TEST_DEV >& /dev/null && \ + _fail "btrfs check should detect corruption" + # Copy backup superblock to primary + run_check $TOP/btrfs-select-super -s 1 $TEST_DEV + + echo "Performing btrfs check" &>> $RESULTS + $TOP/btrfs check $TEST_DEV &>> $RESULTS + if [ $? -ne 0 ]; then + _fail "Failed to fix superblock." + fi +} + +test_superblock_restore