[Devel] Re: [PATCH][cr-test]: filelock1: Test restore of adivsory locks during restart
Serge E. Hallyn
serue at us.ibm.com
Thu Jan 21 13:37:09 PST 2010
thanks, both applied. seems to do fine on s390 on v19-5.
Quoting Sukadev Bhattiprolu (sukadev at linux.vnet.ibm.com):
>
> This test currently fails during restart on ckpt-v19-rc2.
>
> On Serge's cr-next it fails cleanly during checkpoint due to:
>
> commit 5d1f1227384876dd13a66cad1f286d98f9b1891b
> Author: Dave Hansen <dave at linux.vnet.ibm.com>
> Date: Thu Dec 17 09:35:13 2009 -0800
>
> ckpt-files: error out on file locks and leases
>
> ---
> From: Sukadev Bhattiprolu <sukadev at linux.vnet.ibm.com>
> Date: Fri, 15 Jan 2010 15:33:55 -0800
> Subject: [PATCH] filelock1: Test restore of adivsory locks during restart
>
> Test that any byte-range locks held by a process at the time of
> checkpoint are restored correctly after restart.
>
> Signed-off-by: Sukadev Bhattiprolu <sukadev at linux.vnet.ibm.com>
> ---
> fileio/Makefile | 9 +-
> fileio/filelock1.c | 383 +++++++++++++++++++++++++++++++++++++++++++++++
> fileio/run-filelock1.sh | 218 +++++++++++++++++++++++++++
> 3 files changed, 608 insertions(+), 2 deletions(-)
> create mode 100644 fileio/filelock1.c
> create mode 100755 fileio/run-filelock1.sh
>
> diff --git a/fileio/Makefile b/fileio/Makefile
> index 071a9eb..40d19da 100644
> --- a/fileio/Makefile
> +++ b/fileio/Makefile
> @@ -1,6 +1,11 @@
> -targets = fileio1
> +targets = fileio1 filelock1
>
> -all: $(targets)
> +INCLUDE = ../libcrtest
> +LIBCRTEST = ../libcrtest/common.o
> +CFLAGS = -I $(INCLUDE)
> +LDFLAGS = $(LIBCRTEST)
> +
> +all: $(LIBCRTEST) $(targets)
>
> clean:
> rm -f $(targets)
> diff --git a/fileio/filelock1.c b/fileio/filelock1.c
> new file mode 100644
> index 0000000..305cbeb
> --- /dev/null
> +++ b/fileio/filelock1.c
> @@ -0,0 +1,383 @@
> +#include <stdio.h>
> +#include <unistd.h>
> +#include <fcntl.h>
> +#include <string.h>
> +#include <signal.h>
> +#include <errno.h>
> +#include "libcrtest.h"
> +
> +#define TEST_FILE "data.d/data.filelock1"
> +#define LOG_FILE "logs.d/log.filelock1"
> +
> +typedef unsigned long long u64;
> +
> +extern FILE *logfp;
> +int test_fd;
> +int event_fd1;
> +int event_fd2;
> +
> +/*
> + * Description:
> + * Ensure that F_RDLCK and F_WRLCK byte-range locks held by a process at
> + * the time of checkpoint are properly restored when the process is
> + * restarted from the checkpoint.
> + *
> + * Implementation:
> + * Two processes, P0 and P1 acquire the set of locks described by
> + * locks_list[] below. Then, they notify the parent that they are ready for
> + * checkpoint and wait for checkpoint to be done. When they are restarted
> + * (i.e when test_done() is TRUE), each process verifies that it has the
> + * locks it had at the time of checkpoint and that it cannot grab a lock
> + * held by the other process.
> + */
> +
> +setup_notification()
> +{
> + int efd;
> +
> + efd = eventfd(0, 0);
> + if (efd < 0) {
> + fprintf(logfp, "ERROR: eventfd(): %s\n", strerror(errno));
> + do_exit(1);
> + }
> + return efd;
> +}
> +
> +wait_for_events(int efd, u64 total)
> +{
> + int n;
> + u64 events;
> + u64 count = (u64)0;
> +
> + do {
> + fprintf(logfp, "%d: wait_for_events: fd %d, reading for %llu\n",
> + getpid(), efd, total);
> + fflush(logfp);
> +
> + n = read(efd, &events, sizeof(events));
> + if (n != sizeof(events)) {
> + fprintf(logfp, "ERROR: read(event_fd) %s\n",
> + strerror(errno));
> + do_exit(1);
> + }
> + fprintf(logfp, "%d: wait_for_events: fd %d read %llu\n",
> + getpid(), efd, events);
> +
> + count += events;
> + } while (count < total);
> +}
> +
> +notify_one_event(int efd)
> +{
> + int n;
> + u64 event = (u64)1;
> +
> + fprintf(logfp, "%d: Notifying one event on fd %d\n", getpid(), efd);
> + fflush(logfp);
> +
> + n = write(efd, &event, sizeof(event));
> + if (n != sizeof(event)) {
> + fprintf(logfp, "ERROR: write(event_fd) %s\n", strerror(errno));
> + do_exit(1);
> + }
> +}
> +
> +struct test_arg {
> + int child_idx;
> + int type;
> + int start;
> + int len;
> +};
> +
> +struct test_arg locks_list[] = {
> + { 0, F_WRLCK, 0, 17 },
> + { 1, F_WRLCK, 18, 16 },
> + { 0, F_WRLCK, 35, 27 },
> + { 1, F_WRLCK, 63, 17 },
> + { 0, F_RDLCK, 81, 25 },
> + { 1, F_RDLCK, 81, 25 },
> +};
> +
> +void set_lock(int fd, struct test_arg *tlock)
> +{
> + int rc;
> + struct flock lock;
> +
> + lock.l_type = tlock->type;
> + lock.l_whence = SEEK_SET;
> + lock.l_start = (off_t)tlock->start;
> + lock.l_len = (off_t)tlock->len;
> +
> + rc = fcntl(fd, F_SETLK, &lock);
> + if (rc < 0 && errno != EAGAIN) {
> + fprintf(logfp, "%d: set_lock(): ERROR [%d, %llu, %llu]: %s\n",
> + getpid(), tlock->type, (u64)tlock->start,
> + (u64)tlock->len, strerror(errno));
> + fflush(logfp);
> + kill(getppid(), SIGUSR1);
> + do_exit(1);
> + }
> +
> + fprintf(logfp, "%d: set_lock(): [%d, %llu, %llu] %s\n", getpid(),
> + tlock->type, (u64)tlock->start, (u64)tlock->len,
> + rc < 0 ? strerror(errno) : "done");
> +}
> +/*
> + * If @set is TRUE, ensure that the given lock is set.
> + * If @set is FALSE, ensure that the given lock is NOT set.
> + */
> +void test_lock(int fd, int locked_by_me, struct test_arg *tlock)
> +{
> + int rc;
> + int conflict;
> + struct flock lock;
> + char lock_info[512];
> +
> + lock.l_type = tlock->type;
> + lock.l_whence = SEEK_SET;
> + lock.l_start = (off_t)tlock->start;
> + lock.l_len = (off_t)tlock->len;
> + lock.l_pid = 0;
> +
> + sprintf(lock_info, "lock [%d, %llu, %llu] ", tlock->type,
> + (u64)tlock->start, (u64)tlock->len);
> +
> + conflict = 0;
> + rc = fcntl(fd, F_SETLK, &lock);
> + if (rc < 0 && (errno == EAGAIN || errno == EACCES)) {
> + rc = fcntl(fd, F_GETLK, &lock);
> + if (rc < 0) {
> + fprintf(logfp, "ERROR: fcntl(F_GETLK): %s, error %s\n",
> + lock_info, strerror(errno));
> + goto error;
> + }
> +
> + if (lock.l_type == F_UNLCK || lock.l_pid == 0) {
> + fprintf(logfp, "%d: ERROR: %s F_SETLK / F_GETLK "
> + "mismatch !!!\n", getpid(), lock_info);
> + goto error;
> + }
> + conflict = 1;
> + } else if (rc < 0) {
> + fprintf(logfp, "ERROR: fcntl(F_SETLK): %s, error %s\n",
> + lock_info, strerror(errno));
> + goto error;
> + }
> +
> + fprintf(logfp, "%d: %s, locked_by_me: %d, conflict %d\n", getpid(),
> + lock_info, locked_by_me, conflict);
> +
> + if (locked_by_me && conflict) {
> + fprintf(logfp, "%d: FAIL: %s is NOT set by me !!!\n", getpid(),
> + lock_info);
> + goto error;
> + } else if (!locked_by_me && !conflict) {
> + fprintf(logfp, "%d: FAIL: %s is NOT set by peer !!!\n",
> + getpid(), lock_info);
> + goto error;
> + } else {
> + fprintf(logfp, "%d: PASS: %s is %sset by me\n",
> + getpid(), lock_info, conflict ? "not " : "");
> + return;
> + }
> +
> +error:
> + fflush(logfp);
> + kill(getppid(), SIGUSR1);
> + do_exit(1);
> +}
> +
> +void handler(int sig)
> +{
> + /*
> + * We completed the test and siblings have completed their test.
> + * So, safe to drop our locks and exit.
> + */
> + fprintf(logfp, "%d: Ok to exit...\n", getpid());
> + fflush(logfp);
> + do_exit(0);
> +}
> +
> +int do_child1(int idx)
> +{
> + int rc;
> + int locked_by_me;
> + int i;
> + int num_locks;
> + int failed;
> +
> + signal(SIGINT, handler);
> +
> + num_locks = sizeof(locks_list) / sizeof(struct test_arg);
> +
> + for (i = 0; i < num_locks; i++) {
> + if (idx != locks_list[i].child_idx)
> + continue;
> +
> + set_lock(test_fd, &locks_list[i]);
> + }
> +
> + /*
> + * Tell parent we are ready for checkpoint...
> + */
> + notify_one_event(event_fd1);
> +
> + /*
> + * Wait for checkpoint/restart
> + */
> + fprintf(logfp, "%d: waiting for test-done\n", idx);
> + fflush(logfp);
> + while(!test_done()) {
> + sleep(1);
> + }
> + fprintf(logfp, "%d: Found test-done\n", idx);
> + fflush(logfp);
> +
> + for (i = 0; i < num_locks; i++) {
> + /*
> + * If we had (not) set the lock earlier, ensure we still have
> + * it (not) set.
> + */
> + locked_by_me = 0;
> + if (idx == locks_list[i].child_idx ||
> + locks_list[i].type == F_RDLCK)
> + locked_by_me = 1;
> +
> + test_lock(test_fd, locked_by_me, &locks_list[i]);
> + }
> +
> + /*
> + * Notify parent that we are done testing the locks.
> + */
> + notify_one_event(event_fd2);
> +
> + /*
> + * Hold onto our locks and wait for siblings to complete their
> + * test on our locks. Parent will SIGINT us when it is safe to
> + * exit.
> + */
> + pause();
> +
> + do_exit(0);
> +}
> +
> +/*
> + * Populate the test file so the children can lock some portions of
> + * the file
> + */
> +void setup_test_file()
> +{
> + char buf[256];
> +
> + test_fd = open(TEST_FILE, O_RDWR|O_CREAT|O_TRUNC, 0666);
> + if (test_fd < 0) {
> + fprintf(logfp, "ERROR: open(%s): %s\n", TEST_FILE,
> + strerror(errno));
> + do_exit(1);
> + }
> +
> + memset(buf, 0, sizeof(buf));
> + write(test_fd, buf, sizeof(buf));
> +}
> +
> +int pid1, pid2;
> +void child_handler(int sig)
> +{
> + /*
> + * Wait for the child that exited prematurely
> + */
> + fprintf(logfp, "%d: Got signal %d\n", getpid(), sig);
> + fflush(logfp);
> +
> + if (sig == SIGCHLD)
> + do_wait(1);
> + fprintf(logfp, "%d: Test case FAILED\n", getpid());
> + fflush(logfp);
> + /*
> + * Kill (remaining) children and exit.
> + */
> + kill(pid1, SIGKILL);
> + kill(pid2, SIGKILL);
> +
> + do_exit(-1);
> +}
> +
> +main(int argc, char *argv[])
> +{
> + int i, status, rc;
> +
> + if (test_done()) {
> + printf("Remove %s before running test\n", TEST_DONE);
> + do_exit(1);
> + }
> +
> + logfp = fopen(LOG_FILE, "w");
> + if (!logfp) {
> + perror("open() logfile");
> + do_exit(1);
> + }
> +
> + printf("%s: Closing stdio fds and writing messages to %s\n",
> + argv[0], LOG_FILE);
> +
> + for (i=0; i<100; i++) {
> + if (fileno(logfp) != i)
> + close(i);
> + }
> +
> + setup_test_file();
> + event_fd1 = setup_notification();
> + event_fd2 = setup_notification();
> +
> + /*
> + * Before waiting for events below, ensure we will be notified
> + * if a child encounters an error and/or exits prematurely.
> + */
> + signal(SIGUSR1, child_handler);
> + signal(SIGCHLD, child_handler);
> +
> + /*
> + * Create the first child and wait for it take its record locks
> + */
> + pid1 = fork();
> + if (pid1 == 0)
> + do_child1(0);
> + wait_for_events(event_fd1, 1);
> +
> + /*
> + * Create the second child and wait for it take its locks.
> + */
> + pid2 = fork();
> + if (pid2 == 0)
> + do_child1(1);
> + wait_for_events(event_fd1, 1);
> +
> + /*
> + * Now that the test processes are ready, tell any wrapper scripts,
> + * we are ready for checkpoint
> + */
> + set_checkpoint_ready();
> +
> + fprintf(logfp, "***** %d: Ready for checkpoint\n", getpid());
> + fflush(logfp);
> +
> + /*
> + * Wait for all children to test the locks. Since a processes locks
> + * are dropped on exit, if process P1 exits before process P2 has
> + * completed testing a conflicting lock, P2 may acquire the lock
> + * supposed to be held by P1 and wrongly assume that test failed.
> + */
> + wait_for_events(event_fd2, 2);
> +
> + signal(SIGCHLD, SIG_IGN);
> +
> + /*
> + * Tell children it is safe to exit
> + */
> + kill(pid1, SIGINT);
> + kill(pid2, SIGINT);
> +
> + do_wait(2);
> +
> + do_exit(0);
> +}
> diff --git a/fileio/run-filelock1.sh b/fileio/run-filelock1.sh
> new file mode 100755
> index 0000000..0ba2d18
> --- /dev/null
> +++ b/fileio/run-filelock1.sh
> @@ -0,0 +1,218 @@
> +#!/bin/bash
> +
> +source ../common.sh
> +
> +dir=`mktemp -p . -d -t cr_filelock1_XXXXXXX` || (echo "mktemp failed"; exit 1)
> +
> +# NOTE: As of ckpt-v15-dev, the --container option to 'ckpt' causes this
> +# test to fail with "container not isolated" message due to the
> +# log-file being shared between the application threads.
> +#
> +CHECKPOINT="`which checkpoint` --container"
> +RESTART=`which restart`
> +ECHO="/bin/echo -e"
> +
> +TEST_CMD="../filelock1"
> +TEST_ARGS=""
> +TEST_LOG="logs.d/log.filelock1"
> +SCRIPT_LOG="logs.d/log.run-filelock1"
> +TEST_PID_FILE="pid.filelock1";
> +
> +SNAPSHOT_DIR="snap1.d"
> +
> +TEST_DONE="test-done"
> +CHECKPOINT_FILE="checkpoint-filelock1";
> +CHECKPOINT_READY="checkpoint-ready"
> +CHECKPOINT_DONE="checkpoint-done"
> +
> +LOGS_DIR="logs.d"
> +DATA_DIR="data.d"
> +
> +NS_EXEC="../../ns_exec"
> +NS_EXEC_ARGS="-cgpuimP $TEST_PID_FILE"
> +
> +checkpoint()
> +{
> + local pid=$1
> +
> + $ECHO "\t- Checkpoint: $CHECKPOINT $pid \> $CHECKPOINT_FILE"
> + $CHECKPOINT $pid > $CHECKPOINT_FILE
> + ret=$?
> + if [ $ret -ne 0 ]; then
> + $ECHO "***** FAIL: Checkpoint of $pid failed"
> + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG
> + exit 1;
> + fi
> +}
> +
> +function wait_for_checkpoint_ready()
> +{
> + # Wait for test to finish setup
> + while [ ! -f $CHECKPOINT_READY ]; do
> + $ECHO "\t- Waiting for $CHECKPOINT_READY"
> + sleep 1;
> + done;
> +}
> +
> +function create_container()
> +{
> + local pid;
> +
> + cmdline="$NS_EXEC $NS_EXEC_ARGS -- $TEST_CMD $TEST_ARGS"
> +
> + $ECHO "\t- Creating container:"
> + $ECHO "\t- $cmdline"
> +
> + $cmdline &
> +
> + wait_for_checkpoint_ready;
> +
> + # Find global pid of container-init
> + pid=`cat $TEST_PID_FILE`;
> + if [ "x$pid" == "x" ]; then
> + $ECHO "***** FAIL: Invalid container-init pid $pid"
> + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG
> + exit 1
> + fi
> + $ECHO "Created container with pid $pid" >> $SCRIPT_LOG
> +}
> +
> +function restart_container
> +{
> + local ret;
> +
> + cmdline="$RESTART --pids --pidns --wait"
> + $ECHO "\t- $cmdline"
> +
> + sleep 1
> +
> + $cmdline < $CHECKPOINT_FILE >> $SCRIPT_LOG 2>&1 &
> + ret=$?
> +
> + if [ $ret -ne 0 ]; then
> + $ECHO "***** FAIL: Restart of $pid failed"
> + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG
> + exit 1;
> + fi
> +
> +}
> +
> +function create_fs_snapshot()
> +{
> + # Prepare for snapshot
> + if [ -d $SNAPSHOT_DIR ]; then
> + rm -rf ${SNAPSHOT_DIR}.prev
> + mv $SNAPSHOT_DIR ${SNAPSHOT_DIR}.prev
> + mkdir $SNAPSHOT_DIR
> + fi
> +
> + # Snapshot the log files
> + cp ${LOGS_DIR}/* $SNAPSHOT_DIR
> +}
> +
> +function restore_fs_snapshot()
> +{
> + # Restore the snapshot after the main process has been killed
> + /bin/cp ${SNAPSHOT_DIR}/* $LOGS_DIR
> +}
> +
> +cd $dir
> +echo "Current directory: `pwd`"
> +
> +if [ ! -d $LOGS_DIR ]; then
> + mkdir $LOGS_DIR
> +fi
> +
> +if [ ! -d $DATA_DIR ]; then
> + mkdir $DATA_DIR
> +fi
> +
> +if [ ! -d $SNAPSHOT_DIR ]; then
> + mkdir $SNAPSHOT_DIR
> +fi
> +
> +if [ ! -f $INPUT_DATA ]; then
> + $FILEIO -C $INPUT_DATA
> +fi
> +
> +# Make sure no stray filelock1 process from another run is still going
> +killall $TEST_CMD > $SCRIPT_LOG 2>&1
> +
> +> $SCRIPT_LOG;
> +cnt=1
> +while [ $cnt -lt 20 ]; do
> + $ECHO "===== Iteration $cnt"
> +
> + # Remove any 'state' files, start the app and let it tell us
> + # when it is ready
> + rm -f $CHECKPOINT_READY $TEST_DONE $TEST_PID_FILE
> +
> + create_container
> + wait_for_checkpoint_ready
> +
> + pid=`cat $TEST_PID_FILE`
> +
> + $ECHO "\t- Done creating container, cinit-pid $pid"
> +
> + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG
> +
> + # override default freezerdir
> + if [ -d $freezerdir ]; then
> + rmdir $freezerdir
> + fi
> + freezerdir=$freezermountpoint/$pid
> + freeze_pid $pid
> +
> + num_pids1=`ps -efL |grep $TEST_CMD | wc -l`
> +
> + create_fs_snapshot
> +
> + checkpoint $pid
> +
> + touch $CHECKPOINT_DONE
> +
> + killall -9 `basename $TEST_CMD`
> +
> + thaw
> +
> + sleep 3
> +
> + restore_fs_snapshot
> +
> + restart_container
> +
> + sleep 3;
> +
> + num_pids2=`ps -efL |grep $TEST_CMD | wc -l`
> + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG
> + $ECHO "\t- num_pids1 $num_pids1, num_pids2 $num_pids2";
> +
> + # ns_exec pid is parent-pid of restarted-container-init
> + nspid=`pidof restart`
> +
> + if [ "x$nspid" == "x" ]; then
> + $ECHO "***** FAIL: Can't find pid of $RESTART"
> + exit 1;
> + fi
> +
> + # End test gracefully
> + touch $TEST_DONE
> +
> + $ECHO "\t- Waiting for restarted container to exit (gloabl-pid $nspid)"
> + wait $nspid;
> + ret=$?
> +
> + grep --binary-files=text FAIL $PWD/$TEST_LOG > /dev/null 2>&1
> + if [ $? -eq 0 ]; then
> + $ECHO "\t***** Application FAILED after restart" >> $SCRIPT_LOG
> + $ECHO "\t***** See $TEST_LOG for details" >> $SCRIPT_LOG
> +
> + $ECHO "\t***** Application FAILED after restart"
> + $ECHO "\tSee $PWD/$TEST_LOG for details"
> + exit 1;
> + fi
> +
> + $ECHO "\t- Container exited, status $ret"
> +
> + cnt=$((cnt+1))
> +done
> --
> 1.6.0.4
_______________________________________________
Containers mailing list
Containers at lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
More information about the Devel
mailing list