thanks, both applied. seems to do fine on s390 on v19-5. Quoting Sukadev Bhattiprolu (sukadev@xxxxxxxxxxxxxxxxxx): > > This test currently fails during restart on ckpt-v19-rc2. > > On Serge's cr-next it fails cleanly during checkpoint due to: > > commit 5d1f1227384876dd13a66cad1f286d98f9b1891b > Author: Dave Hansen <dave@xxxxxxxxxxxxxxxxxx> > Date: Thu Dec 17 09:35:13 2009 -0800 > > ckpt-files: error out on file locks and leases > > --- > From: Sukadev Bhattiprolu <sukadev@xxxxxxxxxxxxxxxxxx> > Date: Fri, 15 Jan 2010 15:33:55 -0800 > Subject: [PATCH] filelock1: Test restore of adivsory locks during restart > > Test that any byte-range locks held by a process at the time of > checkpoint are restored correctly after restart. > > Signed-off-by: Sukadev Bhattiprolu <sukadev@xxxxxxxxxxxxxxxxxx> > --- > fileio/Makefile | 9 +- > fileio/filelock1.c | 383 +++++++++++++++++++++++++++++++++++++++++++++++ > fileio/run-filelock1.sh | 218 +++++++++++++++++++++++++++ > 3 files changed, 608 insertions(+), 2 deletions(-) > create mode 100644 fileio/filelock1.c > create mode 100755 fileio/run-filelock1.sh > > diff --git a/fileio/Makefile b/fileio/Makefile > index 071a9eb..40d19da 100644 > --- a/fileio/Makefile > +++ b/fileio/Makefile > @@ -1,6 +1,11 @@ > -targets = fileio1 > +targets = fileio1 filelock1 > > -all: $(targets) > +INCLUDE = ../libcrtest > +LIBCRTEST = ../libcrtest/common.o > +CFLAGS = -I $(INCLUDE) > +LDFLAGS = $(LIBCRTEST) > + > +all: $(LIBCRTEST) $(targets) > > clean: > rm -f $(targets) > diff --git a/fileio/filelock1.c b/fileio/filelock1.c > new file mode 100644 > index 0000000..305cbeb > --- /dev/null > +++ b/fileio/filelock1.c > @@ -0,0 +1,383 @@ > +#include <stdio.h> > +#include <unistd.h> > +#include <fcntl.h> > +#include <string.h> > +#include <signal.h> > +#include <errno.h> > +#include "libcrtest.h" > + > +#define TEST_FILE "data.d/data.filelock1" > +#define LOG_FILE "logs.d/log.filelock1" > + > +typedef unsigned long long u64; > + > +extern FILE *logfp; > +int test_fd; > +int event_fd1; > +int event_fd2; > + > +/* > + * Description: > + * Ensure that F_RDLCK and F_WRLCK byte-range locks held by a process at > + * the time of checkpoint are properly restored when the process is > + * restarted from the checkpoint. > + * > + * Implementation: > + * Two processes, P0 and P1 acquire the set of locks described by > + * locks_list[] below. Then, they notify the parent that they are ready for > + * checkpoint and wait for checkpoint to be done. When they are restarted > + * (i.e when test_done() is TRUE), each process verifies that it has the > + * locks it had at the time of checkpoint and that it cannot grab a lock > + * held by the other process. > + */ > + > +setup_notification() > +{ > + int efd; > + > + efd = eventfd(0, 0); > + if (efd < 0) { > + fprintf(logfp, "ERROR: eventfd(): %s\n", strerror(errno)); > + do_exit(1); > + } > + return efd; > +} > + > +wait_for_events(int efd, u64 total) > +{ > + int n; > + u64 events; > + u64 count = (u64)0; > + > + do { > + fprintf(logfp, "%d: wait_for_events: fd %d, reading for %llu\n", > + getpid(), efd, total); > + fflush(logfp); > + > + n = read(efd, &events, sizeof(events)); > + if (n != sizeof(events)) { > + fprintf(logfp, "ERROR: read(event_fd) %s\n", > + strerror(errno)); > + do_exit(1); > + } > + fprintf(logfp, "%d: wait_for_events: fd %d read %llu\n", > + getpid(), efd, events); > + > + count += events; > + } while (count < total); > +} > + > +notify_one_event(int efd) > +{ > + int n; > + u64 event = (u64)1; > + > + fprintf(logfp, "%d: Notifying one event on fd %d\n", getpid(), efd); > + fflush(logfp); > + > + n = write(efd, &event, sizeof(event)); > + if (n != sizeof(event)) { > + fprintf(logfp, "ERROR: write(event_fd) %s\n", strerror(errno)); > + do_exit(1); > + } > +} > + > +struct test_arg { > + int child_idx; > + int type; > + int start; > + int len; > +}; > + > +struct test_arg locks_list[] = { > + { 0, F_WRLCK, 0, 17 }, > + { 1, F_WRLCK, 18, 16 }, > + { 0, F_WRLCK, 35, 27 }, > + { 1, F_WRLCK, 63, 17 }, > + { 0, F_RDLCK, 81, 25 }, > + { 1, F_RDLCK, 81, 25 }, > +}; > + > +void set_lock(int fd, struct test_arg *tlock) > +{ > + int rc; > + struct flock lock; > + > + lock.l_type = tlock->type; > + lock.l_whence = SEEK_SET; > + lock.l_start = (off_t)tlock->start; > + lock.l_len = (off_t)tlock->len; > + > + rc = fcntl(fd, F_SETLK, &lock); > + if (rc < 0 && errno != EAGAIN) { > + fprintf(logfp, "%d: set_lock(): ERROR [%d, %llu, %llu]: %s\n", > + getpid(), tlock->type, (u64)tlock->start, > + (u64)tlock->len, strerror(errno)); > + fflush(logfp); > + kill(getppid(), SIGUSR1); > + do_exit(1); > + } > + > + fprintf(logfp, "%d: set_lock(): [%d, %llu, %llu] %s\n", getpid(), > + tlock->type, (u64)tlock->start, (u64)tlock->len, > + rc < 0 ? strerror(errno) : "done"); > +} > +/* > + * If @set is TRUE, ensure that the given lock is set. > + * If @set is FALSE, ensure that the given lock is NOT set. > + */ > +void test_lock(int fd, int locked_by_me, struct test_arg *tlock) > +{ > + int rc; > + int conflict; > + struct flock lock; > + char lock_info[512]; > + > + lock.l_type = tlock->type; > + lock.l_whence = SEEK_SET; > + lock.l_start = (off_t)tlock->start; > + lock.l_len = (off_t)tlock->len; > + lock.l_pid = 0; > + > + sprintf(lock_info, "lock [%d, %llu, %llu] ", tlock->type, > + (u64)tlock->start, (u64)tlock->len); > + > + conflict = 0; > + rc = fcntl(fd, F_SETLK, &lock); > + if (rc < 0 && (errno == EAGAIN || errno == EACCES)) { > + rc = fcntl(fd, F_GETLK, &lock); > + if (rc < 0) { > + fprintf(logfp, "ERROR: fcntl(F_GETLK): %s, error %s\n", > + lock_info, strerror(errno)); > + goto error; > + } > + > + if (lock.l_type == F_UNLCK || lock.l_pid == 0) { > + fprintf(logfp, "%d: ERROR: %s F_SETLK / F_GETLK " > + "mismatch !!!\n", getpid(), lock_info); > + goto error; > + } > + conflict = 1; > + } else if (rc < 0) { > + fprintf(logfp, "ERROR: fcntl(F_SETLK): %s, error %s\n", > + lock_info, strerror(errno)); > + goto error; > + } > + > + fprintf(logfp, "%d: %s, locked_by_me: %d, conflict %d\n", getpid(), > + lock_info, locked_by_me, conflict); > + > + if (locked_by_me && conflict) { > + fprintf(logfp, "%d: FAIL: %s is NOT set by me !!!\n", getpid(), > + lock_info); > + goto error; > + } else if (!locked_by_me && !conflict) { > + fprintf(logfp, "%d: FAIL: %s is NOT set by peer !!!\n", > + getpid(), lock_info); > + goto error; > + } else { > + fprintf(logfp, "%d: PASS: %s is %sset by me\n", > + getpid(), lock_info, conflict ? "not " : ""); > + return; > + } > + > +error: > + fflush(logfp); > + kill(getppid(), SIGUSR1); > + do_exit(1); > +} > + > +void handler(int sig) > +{ > + /* > + * We completed the test and siblings have completed their test. > + * So, safe to drop our locks and exit. > + */ > + fprintf(logfp, "%d: Ok to exit...\n", getpid()); > + fflush(logfp); > + do_exit(0); > +} > + > +int do_child1(int idx) > +{ > + int rc; > + int locked_by_me; > + int i; > + int num_locks; > + int failed; > + > + signal(SIGINT, handler); > + > + num_locks = sizeof(locks_list) / sizeof(struct test_arg); > + > + for (i = 0; i < num_locks; i++) { > + if (idx != locks_list[i].child_idx) > + continue; > + > + set_lock(test_fd, &locks_list[i]); > + } > + > + /* > + * Tell parent we are ready for checkpoint... > + */ > + notify_one_event(event_fd1); > + > + /* > + * Wait for checkpoint/restart > + */ > + fprintf(logfp, "%d: waiting for test-done\n", idx); > + fflush(logfp); > + while(!test_done()) { > + sleep(1); > + } > + fprintf(logfp, "%d: Found test-done\n", idx); > + fflush(logfp); > + > + for (i = 0; i < num_locks; i++) { > + /* > + * If we had (not) set the lock earlier, ensure we still have > + * it (not) set. > + */ > + locked_by_me = 0; > + if (idx == locks_list[i].child_idx || > + locks_list[i].type == F_RDLCK) > + locked_by_me = 1; > + > + test_lock(test_fd, locked_by_me, &locks_list[i]); > + } > + > + /* > + * Notify parent that we are done testing the locks. > + */ > + notify_one_event(event_fd2); > + > + /* > + * Hold onto our locks and wait for siblings to complete their > + * test on our locks. Parent will SIGINT us when it is safe to > + * exit. > + */ > + pause(); > + > + do_exit(0); > +} > + > +/* > + * Populate the test file so the children can lock some portions of > + * the file > + */ > +void setup_test_file() > +{ > + char buf[256]; > + > + test_fd = open(TEST_FILE, O_RDWR|O_CREAT|O_TRUNC, 0666); > + if (test_fd < 0) { > + fprintf(logfp, "ERROR: open(%s): %s\n", TEST_FILE, > + strerror(errno)); > + do_exit(1); > + } > + > + memset(buf, 0, sizeof(buf)); > + write(test_fd, buf, sizeof(buf)); > +} > + > +int pid1, pid2; > +void child_handler(int sig) > +{ > + /* > + * Wait for the child that exited prematurely > + */ > + fprintf(logfp, "%d: Got signal %d\n", getpid(), sig); > + fflush(logfp); > + > + if (sig == SIGCHLD) > + do_wait(1); > + fprintf(logfp, "%d: Test case FAILED\n", getpid()); > + fflush(logfp); > + /* > + * Kill (remaining) children and exit. > + */ > + kill(pid1, SIGKILL); > + kill(pid2, SIGKILL); > + > + do_exit(-1); > +} > + > +main(int argc, char *argv[]) > +{ > + int i, status, rc; > + > + if (test_done()) { > + printf("Remove %s before running test\n", TEST_DONE); > + do_exit(1); > + } > + > + logfp = fopen(LOG_FILE, "w"); > + if (!logfp) { > + perror("open() logfile"); > + do_exit(1); > + } > + > + printf("%s: Closing stdio fds and writing messages to %s\n", > + argv[0], LOG_FILE); > + > + for (i=0; i<100; i++) { > + if (fileno(logfp) != i) > + close(i); > + } > + > + setup_test_file(); > + event_fd1 = setup_notification(); > + event_fd2 = setup_notification(); > + > + /* > + * Before waiting for events below, ensure we will be notified > + * if a child encounters an error and/or exits prematurely. > + */ > + signal(SIGUSR1, child_handler); > + signal(SIGCHLD, child_handler); > + > + /* > + * Create the first child and wait for it take its record locks > + */ > + pid1 = fork(); > + if (pid1 == 0) > + do_child1(0); > + wait_for_events(event_fd1, 1); > + > + /* > + * Create the second child and wait for it take its locks. > + */ > + pid2 = fork(); > + if (pid2 == 0) > + do_child1(1); > + wait_for_events(event_fd1, 1); > + > + /* > + * Now that the test processes are ready, tell any wrapper scripts, > + * we are ready for checkpoint > + */ > + set_checkpoint_ready(); > + > + fprintf(logfp, "***** %d: Ready for checkpoint\n", getpid()); > + fflush(logfp); > + > + /* > + * Wait for all children to test the locks. Since a processes locks > + * are dropped on exit, if process P1 exits before process P2 has > + * completed testing a conflicting lock, P2 may acquire the lock > + * supposed to be held by P1 and wrongly assume that test failed. > + */ > + wait_for_events(event_fd2, 2); > + > + signal(SIGCHLD, SIG_IGN); > + > + /* > + * Tell children it is safe to exit > + */ > + kill(pid1, SIGINT); > + kill(pid2, SIGINT); > + > + do_wait(2); > + > + do_exit(0); > +} > diff --git a/fileio/run-filelock1.sh b/fileio/run-filelock1.sh > new file mode 100755 > index 0000000..0ba2d18 > --- /dev/null > +++ b/fileio/run-filelock1.sh > @@ -0,0 +1,218 @@ > +#!/bin/bash > + > +source ../common.sh > + > +dir=`mktemp -p . -d -t cr_filelock1_XXXXXXX` || (echo "mktemp failed"; exit 1) > + > +# NOTE: As of ckpt-v15-dev, the --container option to 'ckpt' causes this > +# test to fail with "container not isolated" message due to the > +# log-file being shared between the application threads. > +# > +CHECKPOINT="`which checkpoint` --container" > +RESTART=`which restart` > +ECHO="/bin/echo -e" > + > +TEST_CMD="../filelock1" > +TEST_ARGS="" > +TEST_LOG="logs.d/log.filelock1" > +SCRIPT_LOG="logs.d/log.run-filelock1" > +TEST_PID_FILE="pid.filelock1"; > + > +SNAPSHOT_DIR="snap1.d" > + > +TEST_DONE="test-done" > +CHECKPOINT_FILE="checkpoint-filelock1"; > +CHECKPOINT_READY="checkpoint-ready" > +CHECKPOINT_DONE="checkpoint-done" > + > +LOGS_DIR="logs.d" > +DATA_DIR="data.d" > + > +NS_EXEC="../../ns_exec" > +NS_EXEC_ARGS="-cgpuimP $TEST_PID_FILE" > + > +checkpoint() > +{ > + local pid=$1 > + > + $ECHO "\t- Checkpoint: $CHECKPOINT $pid \> $CHECKPOINT_FILE" > + $CHECKPOINT $pid > $CHECKPOINT_FILE > + ret=$? > + if [ $ret -ne 0 ]; then > + $ECHO "***** FAIL: Checkpoint of $pid failed" > + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG > + exit 1; > + fi > +} > + > +function wait_for_checkpoint_ready() > +{ > + # Wait for test to finish setup > + while [ ! -f $CHECKPOINT_READY ]; do > + $ECHO "\t- Waiting for $CHECKPOINT_READY" > + sleep 1; > + done; > +} > + > +function create_container() > +{ > + local pid; > + > + cmdline="$NS_EXEC $NS_EXEC_ARGS -- $TEST_CMD $TEST_ARGS" > + > + $ECHO "\t- Creating container:" > + $ECHO "\t- $cmdline" > + > + $cmdline & > + > + wait_for_checkpoint_ready; > + > + # Find global pid of container-init > + pid=`cat $TEST_PID_FILE`; > + if [ "x$pid" == "x" ]; then > + $ECHO "***** FAIL: Invalid container-init pid $pid" > + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG > + exit 1 > + fi > + $ECHO "Created container with pid $pid" >> $SCRIPT_LOG > +} > + > +function restart_container > +{ > + local ret; > + > + cmdline="$RESTART --pids --pidns --wait" > + $ECHO "\t- $cmdline" > + > + sleep 1 > + > + $cmdline < $CHECKPOINT_FILE >> $SCRIPT_LOG 2>&1 & > + ret=$? > + > + if [ $ret -ne 0 ]; then > + $ECHO "***** FAIL: Restart of $pid failed" > + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG > + exit 1; > + fi > + > +} > + > +function create_fs_snapshot() > +{ > + # Prepare for snapshot > + if [ -d $SNAPSHOT_DIR ]; then > + rm -rf ${SNAPSHOT_DIR}.prev > + mv $SNAPSHOT_DIR ${SNAPSHOT_DIR}.prev > + mkdir $SNAPSHOT_DIR > + fi > + > + # Snapshot the log files > + cp ${LOGS_DIR}/* $SNAPSHOT_DIR > +} > + > +function restore_fs_snapshot() > +{ > + # Restore the snapshot after the main process has been killed > + /bin/cp ${SNAPSHOT_DIR}/* $LOGS_DIR > +} > + > +cd $dir > +echo "Current directory: `pwd`" > + > +if [ ! -d $LOGS_DIR ]; then > + mkdir $LOGS_DIR > +fi > + > +if [ ! -d $DATA_DIR ]; then > + mkdir $DATA_DIR > +fi > + > +if [ ! -d $SNAPSHOT_DIR ]; then > + mkdir $SNAPSHOT_DIR > +fi > + > +if [ ! -f $INPUT_DATA ]; then > + $FILEIO -C $INPUT_DATA > +fi > + > +# Make sure no stray filelock1 process from another run is still going > +killall $TEST_CMD > $SCRIPT_LOG 2>&1 > + > +> $SCRIPT_LOG; > +cnt=1 > +while [ $cnt -lt 20 ]; do > + $ECHO "===== Iteration $cnt" > + > + # Remove any 'state' files, start the app and let it tell us > + # when it is ready > + rm -f $CHECKPOINT_READY $TEST_DONE $TEST_PID_FILE > + > + create_container > + wait_for_checkpoint_ready > + > + pid=`cat $TEST_PID_FILE` > + > + $ECHO "\t- Done creating container, cinit-pid $pid" > + > + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG > + > + # override default freezerdir > + if [ -d $freezerdir ]; then > + rmdir $freezerdir > + fi > + freezerdir=$freezermountpoint/$pid > + freeze_pid $pid > + > + num_pids1=`ps -efL |grep $TEST_CMD | wc -l` > + > + create_fs_snapshot > + > + checkpoint $pid > + > + touch $CHECKPOINT_DONE > + > + killall -9 `basename $TEST_CMD` > + > + thaw > + > + sleep 3 > + > + restore_fs_snapshot > + > + restart_container > + > + sleep 3; > + > + num_pids2=`ps -efL |grep $TEST_CMD | wc -l` > + ps -efL |grep $TEST_CMD >> $SCRIPT_LOG > + $ECHO "\t- num_pids1 $num_pids1, num_pids2 $num_pids2"; > + > + # ns_exec pid is parent-pid of restarted-container-init > + nspid=`pidof restart` > + > + if [ "x$nspid" == "x" ]; then > + $ECHO "***** FAIL: Can't find pid of $RESTART" > + exit 1; > + fi > + > + # End test gracefully > + touch $TEST_DONE > + > + $ECHO "\t- Waiting for restarted container to exit (gloabl-pid $nspid)" > + wait $nspid; > + ret=$? > + > + grep --binary-files=text FAIL $PWD/$TEST_LOG > /dev/null 2>&1 > + if [ $? -eq 0 ]; then > + $ECHO "\t***** Application FAILED after restart" >> $SCRIPT_LOG > + $ECHO "\t***** See $TEST_LOG for details" >> $SCRIPT_LOG > + > + $ECHO "\t***** Application FAILED after restart" > + $ECHO "\tSee $PWD/$TEST_LOG for details" > + exit 1; > + fi > + > + $ECHO "\t- Container exited, status $ret" > + > + cnt=$((cnt+1)) > +done > -- > 1.6.0.4 _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linux-foundation.org/mailman/listinfo/containers