From patchwork Sun Nov 6 17:45:59 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Zorro Lang X-Patchwork-Id: 9486377 X-Mozilla-Keys: nonjunk Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on sandeen.net X-Spam-Level: X-Spam-Status: No, score=-7.0 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,RP_MATCHES_RCVD autolearn=unavailable autolearn_force=no version=3.4.0 X-Spam-HP: BAYES_00=-1.9,HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_HI=-5,RP_MATCHES_RCVD=-0.1 X-Original-To: sandeen@sandeen.net Delivered-To: sandeen@sandeen.net Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by sandeen.net (Postfix) with ESMTP id 87AE6170B58 for ; Sun, 6 Nov 2016 11:45:48 -0600 (CST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751350AbcKFRqF (ORCPT ); Sun, 6 Nov 2016 12:46:05 -0500 Received: from mx1.redhat.com ([209.132.183.28]:36576 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751095AbcKFRqF (ORCPT ); Sun, 6 Nov 2016 12:46:05 -0500 Received: from int-mx13.intmail.prod.int.phx2.redhat.com (int-mx13.intmail.prod.int.phx2.redhat.com [10.5.11.26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B8979C193747; Sun, 6 Nov 2016 17:46:04 +0000 (UTC) Received: from localhost.localdomain (vpn1-5-61.pek2.redhat.com [10.72.5.61]) by int-mx13.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id uA6Hk2Rh015035; Sun, 6 Nov 2016 12:46:03 -0500 From: Zorro Lang To: fstests@vger.kernel.org Cc: linux-xfs@vger.kernel.org Subject: [PATCH] fstests: multi-threads freeze/unfreeze test under fsstress stress Date: Mon, 7 Nov 2016 01:45:59 +0800 Message-Id: <1478454359-27154-1-git-send-email-zlang@redhat.com> X-Scanned-By: MIMEDefang 2.68 on 10.5.11.26 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Sun, 06 Nov 2016 17:46:04 +0000 (UTC) Sender: linux-xfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-xfs@vger.kernel.org Multi-threads freeze/unfreeze maybe trigger some bugs, e.g: panic, hang or data corruption etc. It does't check the return value of freeze/unfreeze, but it trys to make sure fsstress won't run fails, and no any other bugs happen. Signed-off-by: Zorro Lang --- Hi, I can trigger some different hang or panic bugs on different linux versions. But it test passed on linux v4.9-rc2 at least. Thanks, Zorro tests/generic/999 | 95 +++++++++++++++++++++++++++++++++++++++++++++++++++ tests/generic/999.out | 2 ++ tests/generic/group | 3 +- 3 files changed, 99 insertions(+), 1 deletion(-) create mode 100755 tests/generic/999 create mode 100644 tests/generic/999.out diff --git a/tests/generic/999 b/tests/generic/999 new file mode 100755 index 0000000..a759927 --- /dev/null +++ b/tests/generic/999 @@ -0,0 +1,95 @@ +#! /bin/bash +# FS QA Test 999 +# +# Multi-threads freeze/unfreeze testing. This's a stress test case, +# it won't do functional check. +# +#----------------------------------------------------------------------- +# Copyright (c) 2016 Red Hat, Inc. All Rights Reserved. +# +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License as +# published by the Free Software Foundation. +# +# This program is distributed in the hope that it would be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write the Free Software Foundation, +# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA +#----------------------------------------------------------------------- +# + +seq=`basename $0` +seqres=$RESULT_DIR/$seq +echo "QA output created by $seq" + +here=`pwd` +tmp=/tmp/$$ +status=1 # failure is the default! +trap "_cleanup; exit \$status" 0 1 2 3 15 + +_cleanup() +{ + cd / + rm -f $tmp.* +} + +# get standard environment, filters and checks +. ./common/rc +. ./common/filter + +# remove previous $seqres.full before test +rm -f $seqres.full + +# real QA test starts here +echo "Silence is golden" + +# Modify as appropriate. +_supported_fs generic +_supported_os Linux +_require_scratch +_require_freeze + +_scratch_mkfs >>$seqres.full 2>&1 +_scratch_mount >>$seqres.full 2>&1 + +num_cpus=`$here/src/feature -o` + +# Start fsstress in background +procs=$num_cpus +if [ $procs -gt 20 ]; then + procs=20 +elif [ $procs -le 1 ]; then + procs=2 +fi +nops=600 +STRESS_DIR="$SCRATCH_MNT/fsstress_test_dir" +mkdir "$STRESS_DIR" +FSSTRESS_ARGS=`_scale_fsstress_args -d $STRESS_DIR -p $procs -n $nops $FSSTRESS_AVOID` +$FSSTRESS_PROG $FSSTRESS_ARGS >>$seqres.full 2>&1 & +fsstress_pid=$! + +# Start multi-threads freeze/unfreeze +for ((i=0; i<$procs; i++)) +do + while [ $(ps -ef | grep "fsstress" | grep -v -c grep) -gt 0 ] + do + xfs_freeze -f $SCRATCH_MNT 2>/dev/null + xfs_freeze -u $SCRATCH_MNT 2>/dev/null + done & + freeze_pids="$! $freeze_pids" +done + +wait $fsstress_pid +result=$? +wait $freeze_pids + +# Make sure $SCRATCH_MNT is unfreezed +xfs_freeze -u $SCRATCH_MNT 2>/dev/null + +# Exit with fsstress return value +status=$result +exit diff --git a/tests/generic/999.out b/tests/generic/999.out new file mode 100644 index 0000000..3b276ca --- /dev/null +++ b/tests/generic/999.out @@ -0,0 +1,2 @@ +QA output created by 999 +Silence is golden diff --git a/tests/generic/group b/tests/generic/group index 08007d7..39e1876 100644 --- a/tests/generic/group +++ b/tests/generic/group @@ -1,4 +1,4 @@ -# QA groups control file +G# QA groups control file # Defines test groups and nominal group owners # - do not start group names with a digit # - comment line before each group is "new" description @@ -392,3 +392,4 @@ 387 auto clone 388 auto log metadata 389 auto quick acl +999 auto freeze stress dangerous