3 # Run select tests by setting ONLY, or as arguments to the script.
4 # Skip specific tests by setting EXCEPT.
6 # e.g. ONLY="22 23" or ONLY="`seq 32 39`" or EXCEPT="31"
11 LUSTRE=${LUSTRE:-$(dirname $0)/..}
12 . $LUSTRE/tests/test-framework.sh
16 ALWAYS_EXCEPT="$SANITY_GSS_EXCEPT"
18 [ "$SLOW" = "no" ] && EXCEPT_SLOW="100 101"
22 require_dsh_mds || exit 0
24 # $RUNAS_ID may get set incorrectly somewhere else
25 [ $UID -eq 0 -a $RUNAS_ID -eq 0 ] &&
26 error "RUNAS_ID set to 0, but UID is also 0!"
28 # remove $SEC, we'd like to control everything by ourselves
32 # global variables of this sanity
40 # Overwrite RUNAS command to use su - instead,
41 # to initialize the process more completely.
42 # This is required to get proper access to keyrings.
43 RUNAS="runas_su $(id -n -u $RUNAS_ID)"
46 which klist || skip "Kerberos env not setup"
47 which kinit || skip "Kerberos env not setup"
50 prepare_krb5_creds() {
51 echo prepare krb5 cred
53 $RUNAS krb5_login.sh || exit 1
59 # we want double mount
60 MOUNT_2=${MOUNT_2:-"yes"}
61 check_and_setup_lustre
63 rm -rf $DIR/[df][0-9]*
65 check_runas_id $RUNAS_ID $RUNAS_ID $RUNAS
69 local NPROC=$(grep -c ^processor /proc/cpuinfo)
70 [ $NPROC -gt 2 ] && NPROC=2
71 bash rundbench -D $DIR/$tdir $NPROC 1>/dev/null &
75 num=$(ps --no-headers -p $DBENCH_PID 2>/dev/null | wc -l)
76 if [ $num -ne 1 ]; then
77 error "failed to start dbench $NPROC"
79 echo "started dbench with $NPROC processes at background"
87 num=$(ps --no-headers -p $DBENCH_PID 2>/dev/null | wc -l)
88 if [ $num -eq 0 ]; then
89 echo "dbench $DBENCH_PID already finished"
90 wait $DBENCH_PID || error "dbench $PID exit with error"
92 elif [ $num -ne 1 ]; then
94 error "found $num instance of pid $DBENCH_PID ???"
103 killall dbench 2>/dev/null
104 local num=$(ps --no-headers -p $DBENCH_PID | wc -l)
105 if [ $num -eq 0 ]; then
106 echo "dbench finished"
109 echo "dbench $DBENCH_PID is still running, waiting 2s..."
113 wait $DBENCH_PID || true
127 # obtain and cache Kerberos ticket-granting ticket
133 if [ -z "$myRUNAS" ]; then
134 error_exit "myRUNAS command must be specified for refresh_krb5_tgt"
137 CLIENTS=${CLIENTS:-$HOSTNAME}
138 do_nodes $CLIENTS "set -x
139 if ! $myRUNAS krb5_login.sh; then
140 echo "Failed to refresh Krb5 TGT for UID/GID $myRUNAS_UID/$myRUNAS_GID."
145 restore_krb5_cred() {
146 local keys=$(keyctl show | awk '$6 ~ "^lgssc:" {print $1}')
152 $RUNAS krb5_login.sh || exit 1
155 check_multiple_gss_daemons() {
158 local gssd_name=$(basename $gssd)
160 for ((i = 0; i < 10; i++)); do
161 do_facet $facet "$gssd -vvv"
164 # wait daemons entering "stable" status
167 local num=$(do_facet $facet ps -o cmd -C $gssd_name |
169 echo "$num instance(s) of $gssd_name are running"
171 if [ $num -ne 1 ]; then
172 error "$gssd_name not unique"
182 echo "bring up gss daemons..."
185 echo "check with someone already running..."
186 check_multiple_gss_daemons $my_facet $LSVCGSSD
188 echo "check with someone run & finished..."
189 do_facet $my_facet killall -q -2 lgssd $LSVCGSSD || true
190 sleep 5 # wait fully exit
191 check_multiple_gss_daemons $my_facet $LSVCGSSD
193 echo "check refresh..."
194 do_facet $my_facet killall -q -2 lgssd $LSVCGSSD || true
195 sleep 5 # wait fully exit
196 do_facet $my_facet ipcrm -S 0x3b92d473
197 check_multiple_gss_daemons $my_facet $LSVCGSSD
199 run_test 0 "start multiple gss daemons"
204 local file=$DIR/$tdir/$tfile
206 mkdir $DIR/$tdir || error "mkdir $DIR/$tdir failed"
207 chmod 0777 $DIR/$tdir || error "chmod $DIR/$tdir failed"
208 $RUNAS ls -ld $DIR/$tdir
211 $RUNAS $LFS flushctx -k -r $MOUNT || error "can't flush context"
212 $RUNAS touch $file && error "unexpected success"
216 $RUNAS touch $file || error "should not fail"
217 [ -f $file ] || error "$file not found"
219 run_test 1a "access with or without krb5 credential"
222 local file=$DIR/$tdir/$tfile
223 local lgssconf=/etc/request-key.d/lgssc.conf
224 local clients=$CLIENTS
227 [ -z $clients ] && clients=$HOSTNAME
228 zconf_umount_clients $clients $MOUNT || error "umount clients failed"
230 echo "stop gss daemons..."
233 # get local realm from krb5.conf, assume the same for all nodes
234 realm=$(grep default_realm /etc/krb5.conf | awk '{print $3}')
236 # add -R option to lgss_keyring on local client
237 cp $lgssconf $TMP/lgssc.conf
238 stack_trap "yes | cp $TMP/lgssc.conf $lgssconf" EXIT
239 sed -i s+lgss_keyring+\&\ \-R\ $realm+ $lgssconf
241 # add -R option to lsvcgssd
242 echo "bring up gss daemons..."
243 start_gss_daemons '' '' "-R $realm"
244 stack_trap "stop_gss_daemons ; start_gss_daemons" EXIT
246 zconf_mount_clients $clients $MOUNT || error "mount clients failed"
248 mkdir $DIR/$tdir || error "mkdir $DIR/$tdir failed"
249 chmod 0777 $DIR/$tdir || error "chmod $DIR/$tdir failed"
250 $RUNAS touch $file || error "touch $file failed"
251 [ -f $file ] || error "$file not found"
253 run_test 1b "Use specified realm"
256 local file1=$DIR/$tdir/$tfile-1
257 local file2=$DIR/$tdir/$tfile-2
259 mkdir $DIR/$tdir || error "mkdir $DIR/$tdir failed"
260 chmod 0777 $DIR/$tdir || error "chmod $DIR/$tdir failed"
262 # current access should be ok
263 $RUNAS touch $file1 || error "can't touch $file1"
264 [ -f $file1 ] || error "$file1 not found"
266 # cleanup all cred/ctx and touch
267 $RUNAS $LFS flushctx -k -r $MOUNT || error "can't flush context"
268 $RUNAS touch $file2 && error "unexpected success"
272 $RUNAS touch $file2 || error "should not fail"
273 [ -f $file2 ] || error "$file2 not found"
275 run_test 2 "lfs flushctx"
278 local file=$DIR/$tdir/$tfile
280 mkdir $DIR/$tdir || error "mkdir $DIR/$tdir failed"
281 chmod 0777 $DIR/$tdir || error "chmod $DIR/$tdir failed"
284 echo "aaaaaaaaaaaaaaaaa" > $file
286 $CHECKSTAT -p 0666 $file || error "$UID checkstat error"
287 $RUNAS $CHECKSTAT -p 0666 $file || error "$RUNAS_ID checkstat error"
288 $RUNAS cat $file > /dev/null || error "$RUNAS_ID cat error"
291 $RUNAS $MULTIOP $file o_r &
293 # wait multiop finish its open()
296 # cleanup all cred/ctx and check
297 # metadata check should fail, but file data check should succeed
298 # because we always use root credential to OSTs
299 $RUNAS $LFS flushctx -k -r $MOUNT || error "can't flush context"
300 echo "destroyed credentials/contexs for $RUNAS_ID"
301 $RUNAS $CHECKSTAT -p 0666 $file && error "checkstat succeed"
302 kill -s 10 $(pgrep -u $USER0 $MULTIOP)
303 wait $OPPID || error "read file data failed"
304 echo "read file data OK"
306 # restore and check again
308 echo "restored credentials for $RUNAS_ID"
309 $RUNAS $CHECKSTAT -p 0666 $file || error "$RUNAS_ID checkstat (2) error"
310 echo "$RUNAS_ID checkstat OK"
311 $CHECKSTAT -p 0666 $file || error "$UID checkstat (2) error"
312 echo "$UID checkstat OK"
313 $RUNAS cat $file > /dev/null || error "$RUNAS_ID cat (2) error"
314 echo "$RUNAS_ID read file data OK"
316 run_test 3 "local cache under DLM lock"
319 local file1=$DIR/$tdir/$tfile-1
320 local file2=$DIR/$tdir/$tfile-2
321 local wait_time=$((TIMEOUT + TIMEOUT / 2))
323 mkdir $DIR/$tdir || error "mkdir $DIR/$tdir failed"
324 chmod 0777 $DIR/$tdir || error "chmod $DIR/$tdir failed"
326 # current access should be ok
327 $RUNAS touch $file1 || error "can't touch $file1"
328 [ -f $file1 ] || error "$file1 not found"
331 $RUNAS $LFS flushctx $MOUNT || error "can't flush context"
334 send_sigint $(comma_list $(mdts_nodes)) $LSVCGSSD
336 check_gss_daemon_nodes $(comma_list $(mdts_nodes)) $LSVCGSSD &&
337 error "$LSVCGSSD still running"
339 $RUNAS touch $file2 && error "should fail without $LSVCGSSD"
341 # restart lsvcgssd, expect touch succeed
342 echo "restart $LSVCGSSD and recovering"
343 start_gss_daemons $(comma_list $(mdts_nodes)) $LSVCGSSD "-vvv"
345 check_gss_daemon_nodes $(comma_list $(mdts_nodes)) $LSVCGSSD
346 $RUNAS touch $file2 || error "should not fail now"
347 [ -f $file2 ] || error "$file2 not found"
349 run_test 5 "lsvcgssd dead, operations fail"
354 mkdir $DIR/$tdir || error "mkdir $DIR/$tdir failed"
355 for ((i=0; i<$nfile; i++)); do
356 dd if=/dev/zero of=$DIR/$tdir/$tfile-$i bs=8k count=1 ||
357 error "dd $tfile-$i failed"
359 ls -l $DIR/$tdir/* > /dev/null || error "ls failed"
360 rm -rf $DIR2/$tdir/* || error "rm failed"
361 rmdir $DIR2/$tdir || error "rmdir failed"
363 run_test 6 "test basic DLM callback works"
368 # for open(), client only reserve space for default stripe count lovea,
369 # and server may return larger lovea in reply (because of larger stripe
370 # count), client need call enlarge_reqbuf() and save the replied lovea
371 # in request for future possible replay.
373 # Note: current script does NOT guarantee enlarge_reqbuf() will be in
374 # the path, however it does work in local test which has 2 OSTs and
375 # default stripe count is 1.
376 [[ $OSTCOUNT -ge 2 ]] || skip_env "needs >= 2 OSTs"
378 mkdir $DIR/$tdir || error "mkdir $DIR/$tdir failed"
379 $LFS setstripe -c $OSTCOUNT $DIR/$tdir || error "setstripe -c $OSTCOUNT"
382 for ((i = 0; i < 20; i++)); do
383 dd if=/dev/zero of=$DIR/$tdir/f$i bs=4k count=16 2>/dev/null
386 for ((i = 0; i < 20; i++)); do
387 dd if=$DIR/$tdir/f$i of=/dev/null bs=4k count=16 2>/dev/null
390 run_test 7 "exercise enlarge_reqbuf()"
394 local atoldbase=$(do_facet $SINGLEMDS "$LCTL get_param -n at_history")
397 do_facet $SINGLEMDS "$LCTL set_param at_history=8" || true
399 "do_facet $SINGLEMDS $LCTL set_param at_history=$atoldbase" EXIT
405 $RUNAS keyctl show @u
406 echo Flushing gss ctxs
407 $RUNAS $LFS flushctx $MOUNT || error "can't flush context on $MOUNT"
408 $RUNAS keyctl show @u
412 stack_trap debugrestore EXIT
413 $LCTL set_param debug=+other
415 # wait for the at estimation come down, this is faster
417 req_delay=$($LCTL get_param -n \
418 mdc.${FSNAME}-MDT0000-mdc-*.timeouts |
419 awk '/portal 12/ {print $5}' | tail -1)
420 [ $req_delay -le 5 ] && break
421 echo "current AT estimation is $req_delay, wait a little bit"
424 req_delay=$((${req_delay} + ${req_delay} / 4 + 5))
426 # sleep sometime in ctx handle
427 do_facet $SINGLEMDS $LCTL set_param fail_val=$req_delay
428 #define OBD_FAIL_SEC_CTX_HDL_PAUSE 0x00001204
429 #define CFS_FAIL_ONCE 0x80000000
430 do_facet $SINGLEMDS $LCTL set_param fail_loc=0x80001204
432 $RUNAS touch $DIR/$tdir/$tfile &
434 echo "waiting for touch (pid $TOUCHPID) to finish..."
435 wait $TOUCHPID || error "touch should have succeeded"
436 $RUNAS keyctl show @u
438 $LCTL dk | grep -i "Early reply #" || error "No early reply"
440 run_test 8 "Early reply sent for slow gss context negotiation"
443 # following tests will manipulate flavors and may end with any flavor set,
444 # so each test should not assume any start flavor.
448 if [ "$SLOW" = "no" ]; then
456 restore_to_default_flavor
461 for ((n = 1; n <= $total; n++)); do
464 echo "flush ctx ($n/$total) ..."
465 $LFS flushctx -k -r $MOUNT ||
466 error "can't flush context on $MOUNT"
469 #sleep to let ctxs be re-established
473 run_test 90 "recoverable from losing contexts under load"
483 nrule_old=$(do_facet mgs lctl get_param -n mgs.MGS.live.$FSNAME \
484 2>/dev/null | grep -c "$FSNAME.srpc.flavor.")
485 echo "original general rules: $nrule_old"
487 for ((i = $nrule_old; i < $max; i++)); do
488 set_rule $FSNAME ${NETTYPE}$i cli2mdt krb5n ||
489 error "set rule $i (1)"
490 set_rule $FSNAME ${NETTYPE}$i cli2ost krb5n ||
491 error "set rule $i (2)"
492 set_rule $FSNAME ${NETTYPE}$i mdt2ost null ||
493 error "set rule $i (3)"
494 set_rule $FSNAME ${NETTYPE}$i mdt2mdt null ||
495 error "set rule $i (4)"
497 for ((i = $nrule_old; i < $max; i++)); do
498 set_rule $FSNAME ${NETTYPE}$i cli2mdt ||
499 error "remove rule $i (1)"
500 set_rule $FSNAME ${NETTYPE}$i cli2ost ||
501 error "remove rule $i (2)"
502 set_rule $FSNAME ${NETTYPE}$i mdt2ost ||
503 error "remove rule $i (3)"
504 set_rule $FSNAME ${NETTYPE}$i mdt2mdt ||
505 error "remove rule $i (4)"
509 nrule_new=$(do_facet mgs lctl get_param -n mgs.MGS.live.$FSNAME \
510 2>/dev/null | grep -c "$FSNAME.srpc.flavor.")
511 if [ $nrule_new != $nrule_old ]; then
512 error "general rule: $nrule_new != $nrule_old"
516 # target-specific rules
518 nrule_old=$(do_facet mgs lctl get_param -n mgs.MGS.live.$FSNAME \
519 2>/dev/null | grep -c "$FSNAME-MDT0000.srpc.flavor.")
520 echo "original target rules: $nrule_old"
522 for ((i = $nrule_old; i < $max; i++)); do
523 set_rule $FSNAME-MDT0000 ${NETTYPE}$i cli2mdt krb5i ||
524 error "set new rule $i (1)"
525 set_rule $FSNAME-MDT0000 ${NETTYPE}$i mdt2ost null ||
526 error "set new rule $i (2)"
527 set_rule $FSNAME-MDT0000 ${NETTYPE}$i mdt2mdt null ||
528 error "set new rule $i (3)"
530 for ((i = $nrule_old; i < $max; i++)); do
531 set_rule $FSNAME-MDT0000 ${NETTYPE}$i cli2mdt ||
532 error "remove new rule $i (1)"
533 set_rule $FSNAME-MDT0000 ${NETTYPE}$i mdt2ost ||
534 error "remove new rule $i (2)"
535 set_rule $FSNAME-MDT0000 ${NETTYPE}$i mdt2mdt ||
536 error "remove new rule $i (3)"
539 nrule_new=$(do_facet mgs lctl get_param -n mgs.MGS.live.$FSNAME \
540 2>/dev/null \ | grep -c "$FSNAME-MDT0000.srpc.flavor.")
541 if [ $nrule_new != $nrule_old ]; then
542 error "general rule: $nrule_new != $nrule_old"
545 run_test 99 "set large number of sptlrpc rules"
548 # started from default flavors
549 restore_to_default_flavor
553 # running dbench in background
557 # all: null -> krb5n -> krb5a -> krb5i -> krb5p
575 # nothing should be changed because they are overridden by above rules
577 set_rule $FSNAME-MDT0000 any cli2mdt krb5a
578 set_rule $FSNAME-OST0000 any cli2ost krb5i
579 wait_flavor cli2mdt krb5p || error_dbench "1"
581 wait_flavor cli2ost krb5p || error_dbench "2"
588 set_rule $FSNAME-MDT0000 any cli2mdt
589 set_rule $FSNAME-OST0000 any cli2ost
595 set_rule $FSNAME any mdt2mdt
596 set_rule $FSNAME any cli2mdt
597 set_rule $FSNAME any mdt2ost
598 set_rule $FSNAME any cli2ost
599 restore_to_default_flavor
604 run_test 100 "change security flavor on the fly under load"
610 local filename=$DIR/$tfile
615 # after setting flavor0, start multiop which uses flavor0 rpc, and let
616 # server drop the reply; then switch to flavor1, the resend should be
617 # completed using flavor1. To exercise the code of switching ctx/sec
618 # for a resend request.
620 log ">>>>>>>>>>>>>>> Testing $flavor0 -> $flavor1 <<<<<<<<<<<<<<<<<<<"
622 set_rule $FSNAME any cli2mdt $flavor0
623 wait_flavor cli2mdt $flavor0
624 rm -f $filename || error "remove old $filename failed"
627 #define OBD_FAIL_PTLRPC_DROP_REQ_OPC 0x513
628 do_facet $SINGLEMDS lctl set_param fail_val=36
629 do_facet $SINGLEMDS lctl set_param fail_loc=0x513
630 log "starting multiop"
631 $MULTIOP $filename m &
633 echo "multiop pid=$multiop_pid"
636 set_rule $FSNAME any cli2mdt $flavor1
637 wait_flavor cli2mdt $flavor1
639 num=$(ps --no-headers -p $multiop_pid 2>/dev/null | wc -l)
640 [ $num -eq 1 ] || error "multiop($multiop_pid) already ended ($num)"
641 echo "process $multiop_pid is still hanging there... OK"
643 do_facet $SINGLEMDS lctl set_param fail_loc=0
644 log "waiting for multiop ($multiop_pid) to finish"
645 wait $multiop_pid || error "multiop returned error"
650 # started from default flavors
651 restore_to_default_flavor
653 switch_sec_test null krb5n
654 switch_sec_test krb5n krb5a
655 switch_sec_test krb5a krb5i
656 switch_sec_test krb5i krb5p
657 switch_sec_test krb5p null
659 run_test 101 "switch ctx/sec for resending request"
672 # started from default flavors
673 restore_to_default_flavor
677 # run dbench background
680 echo "Testing null->krb5n->krb5a->krb5i->krb5p->null"
689 echo "waiting for 15s and check again"
693 echo "Testing null->krb5i->null->krb5i->null..."
694 for ((idx = 0; idx < 5; idx++)); do
702 echo "waiting for 15s and check again"
708 run_test 102 "survive from fast flavor switch"
713 local clients=$CLIENTS
715 [ -z $clients ] && clients=$HOSTNAME
717 # started from default flavors
718 restore_to_default_flavor
720 # at this time no rules has been set on mgs; mgc use null
721 # flavor to connect to mgs
722 count=$(flvr_cnt_mgc2mgs null)
723 [ $count -eq 1 ] || error "$count mgc connections use null flavor"
725 zconf_umount_clients $clients $MOUNT || error "umount failed (1)"
727 # mount client with conflict flavor - should fail
728 mount_opts="${MOUNT_OPTS:+$MOUNT_OPTS,}mgssec=krb5p"
729 zconf_mount_clients $clients $MOUNT $mount_opts &&
730 error "mount with conflict flavor should have failed"
732 # mount client with same flavor - should succeed
733 mount_opts="${MOUNT_OPTS:+$MOUNT_OPTS,}mgssec=null"
734 zconf_mount_clients $clients $MOUNT $mount_opts ||
735 error "mount with same flavor should have succeeded"
736 zconf_umount_clients $clients $MOUNT || error "umount failed (2)"
738 # mount client with default flavor - should succeed
739 zconf_mount_clients $clients $MOUNT ||
740 error "mount with default flavor should have succeeded"
742 run_test 150 "secure mgs connection: client flavor setting"
746 set_rule _mgs any any
748 # umount everything, then remount
756 stack_trap exit_151 EXIT
758 # set mgs rule to only accept krb5p
759 set_rule _mgs any any krb5p
761 # umount everything, modules still loaded
764 # start gss daemon on mgs node
765 combined_mgs_mds || start_gss_daemons $mgs_HOST $LSVCGSSD "-vvv"
768 start mgs $(mgsdevname 1) $MDS_MOUNT_OPTS
770 # mount with default flavor, expected to fail
771 start ost1 "$(ostdevname 1)" $OST_MOUNT_OPTS
772 wait_mgc_import_state ost1 FULL 0 &&
773 error "mount with default flavor should have failed"
776 # mount with unauthorized flavor should fail
777 if [ -z "$OST_MOUNT_OPTS" ]; then
778 new_opts="-o mgssec=null"
780 new_opts="$OST_MOUNT_OPTS,mgssec=null"
782 start ost1 "$(ostdevname 1)" $new_opts
783 wait_mgc_import_state ost1 FULL 0 &&
784 error "mount with unauthorized flavor should have failed"
787 # mount with designated flavor should succeed
788 if [ -z "$OST_MOUNT_OPTS" ]; then
789 new_opts="-o mgssec=krb5p"
791 new_opts="$OST_MOUNT_OPTS,mgssec=krb5p"
793 start ost1 "$(ostdevname 1)" $new_opts
794 wait_mgc_import_state ost1 FULL 0 ||
795 error "mount with designated flavor should have succeeded"
799 run_test 151 "secure mgs connection: server flavor control"
801 complete_test $SECONDS
804 check_and_cleanup_lustre