* [PATCH] Btrfs-progs: setup framework to corrupt specific fields of an inode
@ 2013-08-19 15:48 Josef Bacik
2013-08-30 22:53 ` David Sterba
0 siblings, 1 reply; 2+ messages in thread
From: Josef Bacik @ 2013-08-19 15:48 UTC (permalink / raw)
To: linux-btrfs
A user reported a problem with his fs where he had a bogus isize on his
directory. In order to make sure my patch for fsck fixes this properly I needed
to be able to corrupt an inode like this, which is what this patch is for.
Eventually I want to extend this to corrupt everything so we can integrate tests
into btrfs-progs to run btrfsck against to make sure we don't regress on fixing
things with btrfsck. Thanks,
Signed-off-by: Josef Bacik <jbacik@fusionio.com>
---
btrfs-corrupt-block.c | 113 ++++++++++++++++++++++++++++++++++++++++++++++++-
1 files changed, 111 insertions(+), 2 deletions(-)
diff --git a/btrfs-corrupt-block.c b/btrfs-corrupt-block.c
index 8176fad..f0b1ae9 100644
--- a/btrfs-corrupt-block.c
+++ b/btrfs-corrupt-block.c
@@ -32,6 +32,8 @@
#include "list.h"
#include "version.h"
+#define FIELD_BUF_LEN 80
+
struct extent_buffer *debug_corrupt_block(struct btrfs_root *root, u64 bytenr,
u32 blocksize, int copy)
{
@@ -93,6 +95,9 @@ static void print_usage(void)
fprintf(stderr, "\t-b Number of bytes to be corrupted\n");
fprintf(stderr, "\t-e Extent to be corrupted\n");
fprintf(stderr, "\t-E The whole extent free to be corrupted\n");
+ fprintf(stderr, "\t-i The inode item to corrupt (must also specify "
+ "the field to corrupt\n");
+ fprintf(stderr, "\t-f The field in the item to corrupt\n");
exit(1);
}
@@ -268,6 +273,83 @@ static void btrfs_corrupt_extent_tree(struct btrfs_trans_handle *trans,
}
}
+enum btrfs_inode_field {
+ BTRFS_INODE_FIELD_ISIZE,
+ BTRFS_INODE_FIELD_BAD,
+};
+
+static enum btrfs_inode_field convert_field(char *field)
+{
+ if (!strncmp(field, "isize", FIELD_BUF_LEN))
+ return BTRFS_INODE_FIELD_ISIZE;
+ return BTRFS_INODE_FIELD_BAD;
+}
+
+static int corrupt_inode(struct btrfs_trans_handle *trans,
+ struct btrfs_root *root, u64 inode, char *field)
+{
+ struct btrfs_inode_item *ei;
+ struct btrfs_path *path;
+ struct btrfs_key key;
+ enum btrfs_inode_field corrupt_field = convert_field(field);
+ u64 bogus;
+ u64 orig;
+ int ret;
+
+ if (corrupt_field == BTRFS_INODE_FIELD_BAD) {
+ fprintf(stderr, "Invalid field %s\n", field);
+ return -EINVAL;
+ }
+
+ key.objectid = inode;
+ key.type = BTRFS_INODE_ITEM_KEY;
+ key.offset = (u64)-1;
+
+ path = btrfs_alloc_path();
+ if (!path)
+ return -ENOMEM;
+
+ ret = btrfs_search_slot(trans, root, &key, path, 0, 1);
+ if (ret < 0)
+ goto out;
+ if (ret) {
+ if (!path->slots[0]) {
+ fprintf(stderr, "Couldn't find inode %Lu\n", inode);
+ ret = -ENOENT;
+ goto out;
+ }
+ path->slots[0]--;
+ ret = 0;
+ }
+
+ btrfs_item_key_to_cpu(path->nodes[0], &key, path->slots[0]);
+ if (key.objectid != inode) {
+ fprintf(stderr, "Couldn't find inode %Lu\n", inode);
+ ret = -ENOENT;
+ goto out;
+ }
+
+ ei = btrfs_item_ptr(path->nodes[0], path->slots[0],
+ struct btrfs_inode_item);
+ switch (corrupt_field) {
+ case BTRFS_INODE_FIELD_ISIZE:
+ orig = btrfs_inode_size(path->nodes[0], ei);
+ do {
+ bogus = rand();
+ } while (bogus == orig);
+
+ btrfs_set_inode_size(path->nodes[0], ei, bogus);
+ break;
+ default:
+ ret = -EINVAL;
+ break;
+ }
+ btrfs_mark_buffer_dirty(path->nodes[0]);
+out:
+ btrfs_free_path(path);
+ return ret;
+}
+
static struct option long_options[] = {
/* { "byte-count", 1, NULL, 'b' }, */
{ "logical", 1, NULL, 'l' },
@@ -276,6 +358,8 @@ static struct option long_options[] = {
{ "extent-record", 0, NULL, 'e' },
{ "extent-tree", 0, NULL, 'E' },
{ "keys", 0, NULL, 'k' },
+ { "inode", 1, NULL, 'i'},
+ { "field", 1, NULL, 'f'},
{ 0, 0, 0, 0}
};
@@ -294,12 +378,15 @@ int main(int ac, char **av)
int extent_rec = 0;
int extent_tree = 0;
int corrupt_block_keys = 0;
+ u64 inode = 0;
+ char field[FIELD_BUF_LEN];
+ field[0] = '\0';
srand(128);
while(1) {
int c;
- c = getopt_long(ac, av, "l:c:b:eEk", long_options,
+ c = getopt_long(ac, av, "l:c:b:eEki:f:", long_options,
&option_index);
if (c < 0)
break;
@@ -337,6 +424,17 @@ int main(int ac, char **av)
case 'k':
corrupt_block_keys = 1;
break;
+ case 'i':
+ inode = atoll(optarg);
+ if (inode == 0) {
+ fprintf(stderr,
+ "invalid inode number\n");
+ print_usage();
+ }
+ break;
+ case 'f':
+ strncpy(field, optarg, FIELD_BUF_LEN);
+ break;
default:
print_usage();
}
@@ -344,10 +442,12 @@ int main(int ac, char **av)
ac = ac - optind;
if (ac == 0)
print_usage();
- if (logical == 0 && !extent_tree)
+ if (logical == 0 && (!extent_tree && !inode))
print_usage();
if (copy < 0)
print_usage();
+ if ((inode && !strlen(field)) || (strlen(field) && !inode))
+ print_usage();
dev = av[optind];
@@ -374,6 +474,15 @@ int main(int ac, char **av)
btrfs_commit_transaction(trans, root);
goto out_close;
}
+ if (inode) {
+ struct btrfs_trans_handle *trans;
+
+ printf("corrupting inode\n");
+ trans = btrfs_start_transaction(root, 1);
+ ret = corrupt_inode(trans, root, inode, field);
+ btrfs_commit_transaction(trans, root);
+ goto out_close;
+ }
if (bytes == 0)
bytes = root->sectorsize;
--
1.7.7.6
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH] Btrfs-progs: setup framework to corrupt specific fields of an inode
2013-08-19 15:48 [PATCH] Btrfs-progs: setup framework to corrupt specific fields of an inode Josef Bacik
@ 2013-08-30 22:53 ` David Sterba
0 siblings, 0 replies; 2+ messages in thread
From: David Sterba @ 2013-08-30 22:53 UTC (permalink / raw)
To: Josef Bacik; +Cc: linux-btrfs
On Mon, Aug 19, 2013 at 11:48:32AM -0400, Josef Bacik wrote:
> @@ -344,10 +442,12 @@ int main(int ac, char **av)
> ac = ac - optind;
> if (ac == 0)
> print_usage();
> - if (logical == 0 && !extent_tree)
> + if (logical == 0 && (!extent_tree && !inode))
There's a conflict with the chunk-recovery patches and this check does
not make sense with the -i & -f options. The one below is the one I'd
expect here, thus removing the one above.
> print_usage();
> if (copy < 0)
> print_usage();
> + if ((inode && !strlen(field)) || (strlen(field) && !inode))
> + print_usage();
>
> dev = av[optind];
>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2013-08-30 22:53 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-08-19 15:48 [PATCH] Btrfs-progs: setup framework to corrupt specific fields of an inode Josef Bacik
2013-08-30 22:53 ` David Sterba
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).