1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
|
#!/bin/sh
# Copyright (c), 2024, Huawei Technologies Co, Ltd.
# Author: Zhihao Cheng <chengzhihao1@huawei.com>
#
# Provide basic functions.
UBI_NUM=0
DEV=/dev/ubi0_0
MNT=/mnt/test_file_system
TMP_FILE=/tmp/ubifs_test_file
LOG_FILE=/tmp/ubifs_log
KEY_FILE=/tmp/key
nandsim_patt="NAND simulator"
mtdram_patt="mtdram test device"
# fsck returning code
FSCK_OK=0 # No errors
FSCK_NONDESTRUCT=1 # File system errors corrected
FSCK_REBOOT=2 # System should be rebooted
FSCK_UNCORRECTED=4 # File system errors left uncorrected
FSCK_ERROR=8 # Operational error
FSCK_USAGE=16 # Usage or syntax error
FSCK_CANCELED=32 # Aborted with a signal or ^
FSCK_LIBRARY=128 # Shared library error
function fatal()
{
echo "Error: $1" 1>&2
exit 1
}
# All loaded modules(mtdram/nandsim/ubi/ubifs) won't be removed if errors
# happen, it is useful to debug based on the UBIFS image.
function cleanup_handler()
{
local ret="$1"
if [ "$ret" == "0" ]; then
umount $MNT >/dev/null 2>&1 ||:
modprobe -r ubifs >/dev/null 2>&1 ||:
modprobe -r ubi >/dev/null 2>&1 ||:
modprobe -r nandsim >/dev/null 2>&1 ||:
modprobe -r mtdram >/dev/null 2>&1 ||:
rm -rf $MNT >/dev/null 2>&1 ||:
rm -f $TMP_FILE >/dev/null 2>&1 ||:
rm -f $KEY_FILE >/dev/null 2>&1 ||:
rm -f $LOG_FILE >/dev/null 2>&1 ||:
exit 0
else
exit 1
fi
}
trap 'cleanup_handler $?' EXIT
trap 'cleanup_handler 1' HUP PIPE INT QUIT TERM
function find_mtd_device()
{
printf "%s" "$(grep "$1" /proc/mtd | sed -e "s/^mtd\([0-9]\+\):.*$/\1/")"
}
function powercut()
{
dmesg -c > /dev/null
echo 1 > /sys/kernel/debug/ubifs/tst_recovery;
while true;
do
msg=`dmesg -c | grep "Power cut emulated"`;
if [[ "$msg" != "" ]];
then
break;
fi
ro_error=`cat /sys/kernel/debug/ubifs/ubi${UBI_NUM}_0/ro_error`
if [[ $ro_error != 0 ]]; then
break;
fi
done
echo 0 > /sys/kernel/debug/ubifs/tst_recovery
}
# Load mtdram with specified size and PEB size
# Usage: load_mtdram <flash size> <PEB size>
# 1. Flash size is specified in MiB
# 2. PEB size is specified in KiB
function load_mtdram()
{
local size="$1"; shift
local peb_size="$1"; shift
size="$(($size * 1024))"
modprobe mtdram total_size="$size" erase_size="$peb_size"
}
function check_fsstress()
{
cmd=`fsstress | grep "op_name"`
if ! [[ "$cmd" =~ "op_name" ]]; then
fatal "fsstress is not found"
fi
}
# Check error messages
function check_err_msg()
{
msg=`dmesg | grep -E "dump_stack|UBIFS error|switched to read-only mode"`;
if [[ "$msg" != "" ]]
then
dmesg
fatal "error message detected!"
fi
dmesg -c > /dev/null
}
# Iterate all files under certain dir
# $1: dir
# $2: "md5sum" means that need record md5 for regular file, otherwise don't record md5 for regular file
function read_dir() {
for file in `ls -a $1`
do
cur_f=$1"/"$file
if [ -b $cur_f ]
then
major=`stat -c %t $cur_f`
minor=`stat -c %T $cur_f`
echo "block $cur_f $major $minor" >> $TMP_FILE
elif [ -c $cur_f ]
then
major=`stat -c %t $cur_f`
minor=`stat -c %T $cur_f`
echo "char $cur_f $major $minor" >> $TMP_FILE
elif [ -L $cur_f ]
then
link=`stat -c %N $cur_f`
echo "symlink $cur_f $link" >> $TMP_FILE
elif [ -S $cur_f ]
then
echo "sock $cur_f" >> $TMP_FILE
elif [ -p $cur_f ]
then
echo "fifo $cur_f" >> $TMP_FILE
elif [ -f $cur_f ]
then
sz=`stat -c %s $cur_f`
if [[ "$2" != "md5sum" ]]; then
echo "reg $cur_f $sz" >> $TMP_FILE
else
md5=`md5sum $cur_f | awk '{print $1}'`
echo "reg $cur_f $md5 $sz" >> $TMP_FILE
fi
elif [ -d $cur_f ]
then
if [[ $file != '.' && $file != '..' ]]
then
echo "dir $cur_f" >> $TMP_FILE
read_dir $1"/"$file $2
fi
else
fatal "record unknown file type $cur_f"
fi
done
}
# Check whether there are files lost after fsck/mkfs
# $1: "md5sum" means need record md5 for regular file, otherwise don't check md5 for regular file
function parse_dir()
{
while read line
do
array=(${line//\ / });
f_type=${array[0]};
cur_f=${array[1]};
cur_info=""
if [[ "$f_type" =~ "block" ]]
then
major=`stat -c %t $cur_f`
minor=`stat -c %T $cur_f`
cur_info="block $cur_f $major $minor"
elif [[ "$f_type" =~ "char" ]]
then
major=`stat -c %t $cur_f`
minor=`stat -c %T $cur_f`
cur_info="char $cur_f $major $minor"
elif [[ "$f_type" =~ "symlink" ]]
then
link=`stat -c %N $cur_f`
cur_info="symlink $cur_f $link"
elif [[ "$f_type" =~ "sock" ]]
then
cur_info="sock $cur_f"
elif [[ "$f_type" =~ "fifo" ]]
then
cur_info="fifo $cur_f"
elif [[ "$f_type" =~ "reg" ]]
then
sz=`stat -c %s $cur_f`
if [[ "$1" != "md5sum" ]]; then
cur_info="reg $cur_f $sz"
else
md5=`md5sum $cur_f | awk '{print $1}'`
cur_info="reg $cur_f $md5 $sz"
fi
elif [[ "$f_type" =~ "dir" ]]
then
cur_info="dir $cur_f"
else
fatal "parse unknown file type $cur_f"
fi
if [[ "$cur_info" != "$line" ]]
then
fatal "current info $cur_info, but expect $line"
fi
done < $TMP_FILE
}
function authentication()
{
keyctl clear @s
res=$?
if [[ $res != 0 ]]; then
fatal "keyctl is not found"
fi
keyctl add logon ubifs:foo 12345678901234567890123456789012 @s
}
function encryption_gen_key()
{
# CONFIG_FS_ENCRYPTION=y
head -c 64 /dev/urandom > $KEY_FILE
cmd=`fscryptctl -h | grep "set_policy"`
if ! [[ "$cmd" =~ "set_policy" ]]; then
fatal "fscryptctl is not found"
fi
}
function encryption_set_key()
{
mnt=$1
# https://github.com/google/fscryptctl
key=$(fscryptctl add_key $mnt < $KEY_FILE)
fscryptctl set_policy $key $mnt
#fscryptctl get_policy $mnt
ret=$?
if [[ $ret != 0 ]]; then
fatal "set encryption policy failed"
fi
}
function mount_ubifs()
{
local dev=$1;
local mnt=$2;
local auth=$3;
local noatime=$4;
local option="";
if [[ "$noatime" == "noatime" ]]; then
option="-o noatime"
fi
if [[ "$auth" == "authentication" ]]; then
authentication
if [[ "$option" == "" ]]; then
option="-o auth_key=ubifs:foo,auth_hash_name=sha256"
else
option="$option,auth_key=ubifs:foo,auth_hash_name=sha256"
fi
fi
mount -t ubifs $option $dev $mnt
}
function enable_chkfs()
{
echo 1 > /sys/kernel/debug/ubifs/chk_fs
echo 1 > /sys/kernel/debug/ubifs/chk_general
echo 1 > /sys/kernel/debug/ubifs/chk_index
echo 1 > /sys/kernel/debug/ubifs/chk_lprops
echo 1 > /sys/kernel/debug/ubifs/chk_orphans
}
function disable_chkfs()
{
echo 0 > /sys/kernel/debug/ubifs/chk_fs
echo 0 > /sys/kernel/debug/ubifs/chk_general
echo 0 > /sys/kernel/debug/ubifs/chk_index
echo 0 > /sys/kernel/debug/ubifs/chk_lprops
echo 0 > /sys/kernel/debug/ubifs/chk_orphans
}
function inject_mem_err()
{
# CONFIG_FAILSLAB=y
# CONFIG_FAIL_PAGE_ALLOC=y
local pid=$1;
if ! [ -f /sys/kernel/debug/failslab/probability ]; then
fatal "failslab is not enabled, injection failed"
fi
if ! [ -f /sys/kernel/debug/fail_page_alloc/probability ]; then
fatal "fail_page_alloc is not enabled, injection failed"
fi
echo 1 > /proc/$pid/make-it-fail
echo Y > /sys/kernel/debug/failslab/task-filter
echo 1 > /sys/kernel/debug/failslab/probability # 1% failure
echo 10000 > /sys/kernel/debug/failslab/times
echo 1 > /sys/kernel/debug/failslab/verbose
echo N > /sys/kernel/debug/failslab/ignore-gfp-wait
echo Y > /sys/kernel/debug/fail_page_alloc/task-filter
echo 1 > /sys/kernel/debug/fail_page_alloc/probability
echo 10000 > /sys/kernel/debug/fail_page_alloc/times
echo 0 > /sys/kernel/debug/fail_page_alloc/verbose
echo N > /sys/kernel/debug/fail_page_alloc/ignore-gfp-wait
}
function cancel_mem_err()
{
echo 0 > /sys/kernel/debug/failslab/probability
echo 0 > /sys/kernel/debug/failslab/times
echo 0 > /sys/kernel/debug/failslab/verbose
echo N > /sys/kernel/debug/failslab/task-filter
echo Y > /sys/kernel/debug/failslab/ignore-gfp-wait
echo 0 > /sys/kernel/debug/fail_page_alloc/probability
echo 0 > /sys/kernel/debug/fail_page_alloc/times
echo 1 > /sys/kernel/debug/fail_page_alloc/verbose
echo N > /sys/kernel/debug/fail_page_alloc/task-filter
echo Y > /sys/kernel/debug/fail_page_alloc/ignore-gfp-wait
}
function inject_io_err()
{
if ! [ -f /sys/kernel/debug/ubi/ubi$UBI_NUM/tst_emulate_io_failures ]; then
fatal "tst_emulate_io_failures is not enabled, skip injection"
fi
echo 1 > /sys/kernel/debug/ubi/ubi$UBI_NUM/tst_emulate_io_failures
}
function cancel_io_err()
{
echo 0 > /sys/kernel/debug/ubi/ubi$UBI_NUM/tst_emulate_io_failures
}
if ! [ -d $MNT ]; then
mkdir -p $MNT
fi
modprobe ubi || fatal "common.sh: cannot load ubi"
modprobe ubifs || fatal "common.sh: cannot load ubifs"
modprobe -r ubifs
modprobe -r ubi
|