svn commit: r190642 - projects/stress2/misc

Peter Holm pho at FreeBSD.org
Thu Apr 2 09:51:42 PDT 2009


Author: pho
Date: Thu Apr  2 16:51:41 2009
New Revision: 190642
URL: http://svn.freebsd.org/changeset/base/190642

Log:
  Added test case for possible name cache problem that showed up after
  vfs.lookup_shared was enabled.

Added:
  projects/stress2/misc/namecache.sh   (contents, props changed)

Added: projects/stress2/misc/namecache.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ projects/stress2/misc/namecache.sh	Thu Apr  2 16:51:41 2009	(r190642)
@@ -0,0 +1,212 @@
+#!/bin/sh
+
+#
+# Copyright (c) 2009 Peter Holm <pho at FreeBSD.org>
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+#    notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+#    notice, this list of conditions and the following disclaimer in the
+#    documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+# $FreeBSD$
+#
+
+# Test case for vfs.lookup_shared=1 that shows possible name cache
+# inconsistency:
+
+# $ ls -l /tmp/file.05015?
+# ls: /tmp/file.050150: No such file or directory
+# $ fsdb -r /dev/ad4s1e
+# ** /dev/ad4s1e (NO WRITE)
+# Examining file system `/dev/ad4s1e'
+# Last Mounted on /tmp
+# current inode: directory
+# I=2 MODE=41777 SIZE=5120
+#         BTIME=May  7 05:54:47 2006 [0 nsec]
+#         MTIME=Apr  2 11:27:36 2009 [0 nsec]
+#         CTIME=Apr  2 11:27:36 2009 [0 nsec]
+#         ATIME=Apr  2 12:00:30 2009 [0 nsec]
+# OWNER=root GRP=wheel LINKCNT=35 FLAGS=0 BLKCNT=c GEN=65f71df4
+# fsdb (inum: 2)> lookup file.050150
+# component `file.050150': current inode: regular file
+# I=198 MODE=100600 SIZE=0
+#         BTIME=Apr  2 11:24:33 2009 [0 nsec]
+#         MTIME=Apr  2 11:24:33 2009 [0 nsec]
+#         CTIME=Apr  2 11:24:33 2009 [0 nsec]
+#         ATIME=Apr  2 11:24:33 2009 [0 nsec]
+# OWNER=pho GRP=wheel LINKCNT=1 FLAGS=0 BLKCNT=0 GEN=1deaab3a
+# fsdb (inum: 198)> quit
+# $ 
+
+# Consistency is restored by a umount + mount of the FS
+
+. ../default.cfg
+
+odir=`pwd`
+cd /tmp
+sed '1,/^EOF/d' < $odir/$0 > namecache.c
+cc -o namecache -Wall namecache.c
+rm -f namecache.c
+
+rm -f file.0*
+for i in `jot 30`; do
+	for j in `jot 10`; do
+		/tmp/namecache &
+	done
+
+	for j in `jot 10`; do
+		wait
+	done
+done
+
+if ls -l /tmp/file.* 2>/dev/null | grep -q file.0; then
+	echo "ls -l /tmp/file.0*"
+	ls -l /tmp/file.0*
+fi
+
+rm -f /tmp/namecache # /tmp/file.0*
+exit
+EOF
+/* Test scenario for possible name cache problem */
+
+#include <sys/cdefs.h>
+__FBSDID("$FreeBSD$");
+
+#include <sys/types.h>
+#include <dirent.h>
+#include <err.h>
+#include <fcntl.h>
+#include <signal.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/param.h>
+#include <sys/stat.h>
+#include <sys/wait.h>
+#include <unistd.h>
+
+static char path[MAXPATHLEN+1];
+static char buf[8096];
+
+void
+pm(void)
+{
+	int fd, n;
+	int space = sizeof(buf);
+	struct stat statb;
+	long base;
+	struct dirent *dp;
+	char *bp = buf;
+
+        if (stat(".", &statb) != 0)
+                err(1, "stat(%s)", ".");
+
+        if (!S_ISDIR(statb.st_mode))
+                return;
+
+	if ((fd = open(".", O_RDONLY)) == -1)
+		err(1, "open(%s)", ".");
+
+	do {
+		if ((n = getdirentries(fd, bp, space, &base)) == -1)
+			err(1, "getdirentries");
+		space = space - n;
+		bp   = bp + n;
+	} while (n != 0);
+
+	bp = buf;
+	dp = (struct dirent *)bp;
+	for (;;) {
+		if (strcmp(path, dp->d_name) == 0) {
+
+			if (stat(dp->d_name, &statb) == -1) {
+				warn("stat(%s)", dp->d_name);
+				printf("name: %-10s, inode %7d, type %2d, namelen %d, d_reclen %d\n",
+					dp->d_name, dp->d_fileno, dp->d_type, dp->d_namlen, 
+					dp->d_reclen);
+				fflush(stdout);
+			} else {
+				printf("stat(%s) succeeded!\n", path);
+				fflush(stdout);
+			}
+
+		}
+		bp = bp + dp->d_reclen;
+		dp = (struct dirent *)bp;
+		if (dp->d_reclen <= 0)
+			break;
+	}
+}
+
+static void
+reader(void) {
+	int fd;
+
+	if ((fd = open(path, O_RDWR, 0600)) < 0) {
+		warn("open(%s). %s:%d", path, __FILE__, __LINE__);
+		pm();
+		exit(1);
+	}
+	close(fd);
+	return;
+}
+
+static void
+writer(void) {
+	int fd;
+
+	if ((fd = open(path, O_RDWR, 0600)) < 0) {
+		warn("open(%s). %s:%d", path, __FILE__, __LINE__);
+		pm();
+		exit(1);
+	}
+	close(fd);
+	return;
+}
+
+int
+main(int argc, char **argv)
+{
+	pid_t pid;
+	int fd, i, status;
+
+	for (i = 0; i < 10000; i++) {
+		if (sprintf(path, "file.0%d", getpid()) < 0)
+			err(1, "sprintf()");
+		if ((fd = open(path, O_CREAT | O_RDWR, 0600)) == -1)
+			err(1, "open(%s)", path);
+		close(fd);
+
+		if ((pid = fork()) == 0) {
+			writer();
+			exit(EXIT_SUCCESS);
+
+		} else if (pid > 0) {
+			reader();
+			if (waitpid(pid, &status, 0) == -1)
+				warn("waitpid(%d)", pid);
+		} else 
+			err(1, "fork(), %s:%d",  __FILE__, __LINE__);
+
+		if (unlink(path) == -1)
+			err(1, "unlink(%s). %s:%d", path, __FILE__, __LINE__);
+	}
+	return (0);
+}


More information about the svn-src-projects mailing list