+run_test 70a "cd directory && rm directory"
+
+test_70b() { # LU-2781
+ local i
+ mkdir -p $DIR1/$tdir
+
+ touch $DIR1/$tdir/file
+ for ((i = 0; i < 32; i++)); do
+ $LFS rm_entry $DIR1/$tdir/non_existent_dir &>/dev/null
+ done
+ rm $DIR1/$tdir/file || error "cannot remove file after rm_entry"
+
+ touch $DIR1/$tdir/file
+ $LFS mkdir -i0 $DIR1/$tdir/test_dir
+ $LFS rm_entry $DIR1/$tdir/test_dir &>/dev/null
+ rm -rf $DIR1/$tdir/test_dir ||
+ error "cannot remove directory after rm_entry"
+ rm $DIR1/$tdir/file || error "cannot remove file after rm_entry"
+}
+run_test 70b "remove files after calling rm_entry"
+
+test_71a() {
+ local server_version=$(lustre_version_code $SINGLEMDS)
+
+ [[ $server_version -lt $(version_code 2.1.6) ]] &&
+ skip "Need MDS version at least 2.1.6" && return
+
+ # Patch not applied to 2.2 and 2.3 branches
+ [[ $server_version -ge $(version_code 2.2.0) ]] &&
+ [[ $server_version -lt $(version_code 2.4.0) ]] &&
+ skip "Need MDS version earlier than 2.2.0 or at least 2.4.0" &&
+ return
+
+ checkfiemap --test ||
+ { skip "checkfiemap not runnable: $?" && return; }
+ # write data this way: hole - data - hole - data
+ dd if=/dev/urandom of=$DIR1/$tfile bs=40K seek=1 count=1
+ [ "$(facet_fstype ost$(($($GETSTRIPE -i $DIR1/$tfile) + 1)))" = \
+ "zfs" ] &&
+ skip "ORI-366/LU-1941: FIEMAP unimplemented on ZFS" && return 0
+ dd if=/dev/urandom of=$DIR1/$tfile bs=40K seek=3 count=1
+ GET_STAT="lctl get_param -n ldlm.services.ldlm_cbd.stats"
+ stat $DIR2/$tfile
+ local can1=$($GET_STAT | awk '/ldlm_bl_callback/ {print $2}')
+ echo $can1
+ checkfiemap $DIR2/$tfile 81920 ||
+ error "data is not flushed from client"
+ local can2=$($GET_STAT | awk '/ldlm_bl_callback/ {print $2}')
+ echo $can2
+
+ # common case of "create file, copy file" on a single node
+ # should not flush data from ost
+ dd if=/dev/urandom of=$DIR1/$tfile bs=40K seek=1 count=1
+ dd if=/dev/urandom of=$DIR1/$tfile bs=40K seek=3 count=1
+ stat $DIR1/$tfile
+ local can3=$($GET_STAT | awk '/ldlm_bl_callback/ {print $2}')
+ echo $can3
+ checkfiemap $DIR1/$tfile 81920 ||
+ error 4
+ local can4=$($GET_STAT | awk '/ldlm_bl_callback/ {print $2}')
+ echo $can2
+ [ $can3 -eq $can4 ] || error $((can2-can1)) "cancel RPC occured."
+}
+run_test 71a "correct file map just after write operation is finished"
+
+test_71b() {
+ local server_version=$(lustre_version_code $SINGLEMDS)
+
+ [[ $server_version -lt $(version_code 2.1.6) ]] &&
+ skip "Need MDS version at least 2.1.6" && return
+
+ # Patch not applied to 2.2 and 2.3 branches
+ [[ $server_version -ge $(version_code 2.2.0) ]] &&
+ [[ $server_version -lt $(version_code 2.4.0) ]] &&
+ skip "Need MDS version earlier than 2.2.0 or at least 2.4.0" &&
+ return
+ [[ $OSTCOUNT -ge 2 ]] || { skip "need at least 2 osts"; return; }
+
+ checkfiemap --test ||
+ { skip "error $?: checkfiemap failed" && return; }
+
+ mkdir -p $DIR1/$tdir
+
+ $LFS setstripe -c -1 $DIR1/$tdir || error "setstripe failed"
+ dd if=/dev/urandom of=$DIR1/$tdir/$tfile bs=40K count=1
+ [ "$(facet_fstype ost$(($($GETSTRIPE -i $DIR1/$tdir/$tfile) + 1)))" = \
+ "zfs" ] &&
+ skip "ORI-366/LU-1941: FIEMAP unimplemented on ZFS" && return 0
+ checkfiemap $DIR1/$tdir/$tfile 40960 || error "checkfiemap failed"
+}
+run_test 71b "check fiemap support for stripecount > 1"
+
+test_72() {
+ local p="$TMP/sanityN-$TESTNAME.parameters"
+ local tlink1
+ local tlink2
+ save_lustre_params client "llite.*.xattr_cache" > $p
+ lctl set_param llite.*.xattr_cache 1 ||
+ { skip "xattr cache is not supported"; return 0; }
+
+ touch $DIR1/$tfile
+ setfattr -n user.attr1 -v value1 $DIR1/$tfile ||
+ error "setfattr1 failed"
+ getfattr -n user.attr1 $DIR2/$tfile | grep value1 ||
+ error "getfattr1 failed"
+ setfattr -n user.attr1 -v value2 $DIR2/$tfile ||
+ error "setfattr2 failed"
+ getfattr -n user.attr1 $DIR1/$tfile | grep value2 ||
+ error "getfattr2 failed"
+
+ # check that trusted.link is consistent
+ tlink1=$(getfattr -n trusted.link $DIR1/$tfile | md5sum)
+ ln $DIR2/$tfile $DIR2/$tfile-2 || error "failed to link"
+ tlink2=$(getfattr -n trusted.link $DIR1/$tfile | md5sum)
+ echo "$tlink1 $tlink2"
+ [ "$tlink1" = "$tlink2" ] && error "trusted.link should have changed!"
+
+ rm -f $DIR2/$tfile
+
+ restore_lustre_params < $p
+ rm -f $p
+}
+run_test 72 "getxattr/setxattr cache should be consistent between nodes"
+
+test_73() {
+ local p="$TMP/sanityN-$TESTNAME.parameters"
+ save_lustre_params client "llite.*.xattr_cache" > $p
+ lctl set_param llite.*.xattr_cache 1 ||
+ { skip "xattr cache is not supported"; return 0; }
+
+ touch $DIR1/$tfile
+ setfattr -n user.attr1 -v value1 $DIR1/$tfile ||
+ error "setfattr1 failed"
+ getfattr -n user.attr1 $DIR2/$tfile || error "getfattr1 failed"
+ getfattr -n user.attr1 $DIR1/$tfile || error "getfattr2 failed"
+ clear_stats llite.*.stats
+ # PR lock should be cached by now on both clients
+ getfattr -n user.attr1 $DIR1/$tfile || error "getfattr3 failed"
+ # 2 hits for getfattr(0)+getfattr(size)
+ [ $(calc_stats llite.*.stats getxattr_hits) -eq 2 ] ||
+ error "not cached in $DIR1"
+ getfattr -n user.attr1 $DIR2/$tfile || error "getfattr4 failed"
+ # 4 hits for more getfattr(0)+getfattr(size)
+ [ $(calc_stats llite.*.stats getxattr_hits) -eq 4 ] ||
+ error "not cached in $DIR2"
+ rm -f $DIR2/$tfile
+
+ restore_lustre_params < $p
+ rm -f $p
+}
+run_test 73 "getxattr should not cause xattr lock cancellation"
+
+test_74() {
+ [ $(lustre_version_code $SINGLEMDS) -lt $(version_code 2.4.93) ] &&
+ skip "Need MDS version at least 2.4.93" && return
+
+ dd if=/dev/zero of=$DIR1/$tfile-1 bs=1K count=1
+ dd if=/dev/zero of=$DIR1/$tfile-2 bs=1K count=1
+ flocks_test 4 $DIR1/$tfile-1 $DIR2/$tfile-2
+}
+run_test 74 "flock deadlock: different mounts =============="
+
+# LU-3889
+test_75() {
+ $LFS setstripe -c 2 -S 1m -i 0 $DIR1/$tfile
+ dd if=/dev/zero of=$DIR1/$tfile bs=1M count=2
+ cancel_lru_locks osc
+
+ dd of=$DIR1/$tfile if=/dev/zero bs=1M count=1 seek=1 conv=notrunc
+ sync
+
+ # define OBD_FAIL_LDLM_ENQUEUE_HANG 0x31d
+ $LCTL set_param fail_loc=0x31d
+ stat -c %s $DIR1/$tfile &
+ local pid=$!
+ sleep 1
+ kill -9 $pid
+
+ # For bad lock error handler we should ASSERT and got kernel panic here
+ sleep 4
+ $LCTL set_param fail_loc=0
+}
+run_test 75 "osc: upcall after unuse lock==================="
+
+test_76() { #LU-946
+ [[ $(lustre_version_code $SINGLEMDS) -lt $(version_code 2.5.53) ]] &&
+ skip "Need MDS version at least 2.5.53" && return
+
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
+ local fcount=$((MDSCOUNT * 256))
+ declare -a fd_list
+ declare -a fid_list
+
+ if remote_mds; then
+ nid=$($LCTL list_nids | sed "s/\./\\\./g")
+ else
+ nid="0@lo"
+ fi
+
+ rm -rf $DIR/$tdir
+ test_mkdir -p $DIR/$tdir
+
+ # drop all open locks and close any cached "open" files on the client
+ cancel_lru_locks mdc
+
+ local open_fids_cmd="$LCTL get_param -n mdt.*.exports.'$nid'.open_files"
+ local fid_list=($(do_nodes $(comma_list $(mdts_nodes)) $open_fids_cmd))
+ local already=${#fid_list[@]}
+ for (( i = 0; i < $already; i++ )) ; do
+ log "already open[$i]: $($LFS fid2path $DIR2 ${fid_list[i]})"
+ done
+
+ echo -n "opening files: "
+ ulimit -n $((fcount + 50))
+ for ((i = 0; i < $fcount; i++)); do
+ touch $DIR/$tdir/f_$i
+ local fd=$(free_fd ${fd_list[i]})
+ local open_cmd="exec $fd<$DIR/$tdir/f_$i"
+ eval $open_cmd
+
+ fd_list[i]=$fd
+
+ (( $i % 32 == 0 )) && echo -n "."
+ done
+ echo
+
+ fid_list=($(do_nodes $(comma_list $(mdts_nodes)) $open_fids_cmd))
+
+ # Possible errors in openfiles FID list.
+ # 1. Missing FIDs. Check 1
+ # 2. Extra FIDs. Check 1
+ # 3. Duplicated FID. Check 2
+ # 4. Invalid FIDs. Check 2
+ # 5. Valid FID, points to some other file. Check 3
+
+ # Check 1
+ [ ${#fid_list[@]} -ne $((fcount + already)) ] &&
+ error "${#fid_list[@]} != $fcount (+$already old) open files"
+
+ echo -n "closing files: "
+ for (( fd = 0, fid = 0; fd < $fcount; fd++, fid++ )) ; do
+ local close_cmd="exec ${fd_list[fd]}<&-"
+ eval $close_cmd
+ filename=$($LFS fid2path $DIR2 ${fid_list[fid]})
+
+ while [[ ! "$filename" =~ "$DIR2/$tdir/f_" ]]; do
+ echo "skip old open file $filename"
+ ((fid++))
+ filename=$($LFS fid2path $DIR2 ${fid_list[fid]})
+ done
+
+ # Check 2
+ rm --interactive=no $filename
+ [ $? -ne 0 ] &&
+ error "Nonexisting fid ${fid_list[fid]} listed."
+ (( $fd % 32 == 0 )) && echo -n "."
+ done
+ echo
+
+ # Check 3
+ ls_op=$(ls $DIR2/$tdir | wc -l)
+ [ $ls_op -ne 0 ] &&
+ error "Some openfiles are missing in lproc output"
+
+ rm -rf $DIR/$tdir
+}
+run_test 76 "Verify MDT open_files listing"
+
+nrs_write_read() {
+ local n=16
+ local dir=$DIR/$tdir
+ local myRUNAS="$1"
+
+ mkdir $dir || error "mkdir $dir failed"
+ $LFS setstripe -c $OSTCOUNT $dir || error "setstripe to $dir failed"
+ chmod 777 $dir
+
+ do_nodes $CLIENTS $myRUNAS \
+ dd if=/dev/zero of="$dir/nrs_r_$HOSTNAME" bs=1M count=$n ||
+ error "dd at 0 on client failed (1)"
+
+ for ((i = 0; i < $n; i++)); do
+ do_nodes $CLIENTS $myRUNAS dd if=/dev/zero \
+ of="$dir/nrs_w_$HOSTNAME" bs=1M seek=$i count=1 ||
+ error "dd at ${i}MB on client failed (2)" &
+ local pids_w[$i]=$!
+ done
+ do_nodes $CLIENTS sync;
+ cancel_lru_locks osc
+
+ for ((i = 0; i < $n; i++)); do
+ do_nodes $CLIENTS $myRUNAS dd if="$dir/nrs_w_$HOSTNAME" \
+ of=/dev/zero bs=1M seek=$i count=1 > /dev/null ||
+ error "dd at ${i}MB on client failed (3)" &
+ local pids_r[$i]=$!
+ done
+ cancel_lru_locks osc
+
+ for ((i = 0; i < $n; i++)); do
+ wait ${pids_w[$i]}
+ wait ${pids_r[$i]}
+ done
+ rm -rf $dir || error "rm -rf $dir failed"
+}
+
+test_77a() { #LU-3266
+ oss=$(comma_list $(osts_nodes))
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_policies="fifo"
+ nrs_write_read
+
+ return 0
+}
+run_test 77a "check FIFO NRS policy"
+
+test_77b() { #LU-3266
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_policies="crrn" \
+ ost.OSS.*.nrs_crrn_quantum=1
+
+ echo "policy: crr-n, crrn_quantum 1"
+ nrs_write_read
+
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_crrn_quantum=64
+
+ echo "policy: crr-n, crrn_quantum 64"
+ nrs_write_read
+
+ # cleanup
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ return 0
+}
+run_test 77b "check CRR-N NRS policy"
+
+orr_trr() {
+ local policy=$1
+
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies=$policy \
+ ost.OSS.*.nrs_"$policy"_quantum=1 \
+ ost.OSS.*.nrs_"$policy"_offset_type="physical" \
+ ost.OSS.*.nrs_"$policy"_supported="reads"
+
+ echo "policy: $policy, ${policy}_quantum 1, ${policy}_offset_type physical, ${policy}_supported reads"
+ nrs_write_read
+
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_${policy}_supported="writes" \
+ ost.OSS.*.nrs_${policy}_quantum=64
+
+ echo "policy: $policy, ${policy}_quantum 64, ${policy}_offset_type physical, ${policy}_supported writes"
+ nrs_write_read
+
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_${policy}_supported="reads_and_writes" \
+ ost.OSS.*.nrs_${policy}_offset_type="logical"
+ echo "policy: $policy, ${policy}_quantum 64, ${policy}_offset_type logical, ${policy}_supported reads_and_writes"
+ nrs_write_read
+
+ # cleanup
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ return 0
+}
+
+test_77c() { #LU-3266
+ orr_trr "orr"
+ return 0
+}
+run_test 77c "check ORR NRS policy"
+
+test_77d() { #LU-3266
+ orr_trr "trr"
+ return 0
+}
+run_test 77d "check TRR nrs policy"
+
+tbf_rule_operate()
+{
+ local facet=$1
+ shift 1
+
+ do_facet $facet lctl set_param \
+ ost.OSS.ost_io.nrs_tbf_rule="$*"
+ [ $? -ne 0 ] &&
+ error "failed to run operate '$*' on TBF rules"
+}
+
+tbf_verify() {
+ local dir=$DIR/$tdir
+ local client1=${CLIENT1:-$(hostname)}
+ local myRUNAS="$3"
+
+ mkdir $dir || error "mkdir $dir failed"
+ $LFS setstripe -c 1 $dir || error "setstripe to $dir failed"
+ chmod 777 $dir
+
+ echo "Limited write rate: $1, read rate: $2"
+ echo "Verify the write rate is under TBF control"
+ local rate=$(do_node $client1 $myRUNAS dd if=/dev/zero of=$dir/tbf \
+ bs=1M count=100 oflag=direct 2>&1 | awk '/bytes/ {print $8}')
+ echo "Write speed is $rate"
+
+ # verify the write rate does not exceed 110% of TBF limited rate
+ [ $(bc <<< "$rate < 1.1 * $1") -eq 1 ] ||
+ error_ignore LU-9140 "The write rate ($rate) exceeds 110% of preset rate ($1)"
+
+ cancel_lru_locks osc
+
+ echo "Verify the read rate is under TBF control"
+ rate=$(do_node $client1 $myRUNAS dd if=$dir/tbf of=/dev/null \
+ bs=1M count=100 iflag=direct 2>&1 | awk '/bytes/ {print $8}')
+ echo "Read speed is $rate"
+
+ # verify the read rate does not exceed 110% of TBF limited rate
+ [ $(bc <<< "$rate < 1.1 * $2") -eq 1 ] ||
+ error_ignore LU-9140 "The read rate ($rate) exceeds 110% of preset rate ($2)"
+
+ cancel_lru_locks osc
+ rm -rf $dir || error "rm -rf $dir failed"
+}
+
+test_77e() {
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ nid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="nid="
+ rateis="rate="
+ fi
+
+ # Only operate rules on ost1 since OSTs might run on the same OSS
+ # Add some rules
+ tbf_rule_operate ost1 "start\ localhost\ ${idis}{0@lo}\ ${rateis}1000"
+ local address=$(comma_list "$(host_nids_address $CLIENTS $NETTYPE)")
+ local client_nids=$(nids_list $address "\\")
+ tbf_rule_operate ost1 "start\ clients\ ${idis}{$client_nids}\ ${rateis}100"
+ tbf_rule_operate ost1 "start\ others\ ${idis}{*.*.*.*@$NETTYPE}\ ${rateis}50"
+ nrs_write_read
+
+ # Change the rules
+ tbf_rule_operate ost1 "change\ localhost\ ${rateis}1001"
+ tbf_rule_operate ost1 "change\ clients\ ${rateis}101"
+ tbf_rule_operate ost1 "change\ others\ ${rateis}51"
+ nrs_write_read
+
+ # Stop the rules
+ tbf_rule_operate ost1 "stop\ localhost"
+ tbf_rule_operate ost1 "stop\ clients"
+ tbf_rule_operate ost1 "stop\ others"
+ nrs_write_read
+
+ # Cleanup the TBF policy
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
+ nrs_write_read
+ return 0
+}
+run_test 77e "check TBF NID nrs policy"
+
+test_77f() {
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ oss=$(comma_list $(osts_nodes))
+
+ # Configure jobid_var
+ local saved_jobid_var=$($LCTL get_param -n jobid_var)
+ if [ $saved_jobid_var != procname_uid ]; then
+ set_conf_param_and_check client \
+ "$LCTL get_param -n jobid_var" \
+ "$FSNAME.sys.jobid_var" procname_uid
+ fi
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="jobid="
+ rateis="rate="
+ fi
+
+ # Only operate rules on ost1 since OSTs might run on the same OSS
+ # Add some rules
+ tbf_rule_operate ost1 "start\ runas\ ${idis}{iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ ${rateis}1000"
+ tbf_rule_operate ost1 "start\ iozone_runas\ ${idis}{iozone.$RUNAS_ID}\ ${rateis}100"
+ tbf_rule_operate ost1 "start\ dd_runas\ ${idis}{dd.$RUNAS_ID}\ ${rateis}50"
+ nrs_write_read "$RUNAS"
+
+ # Change the rules
+ tbf_rule_operate ost1 "change\ runas\ ${rateis}1001"
+ tbf_rule_operate ost1 "change\ iozone_runas\ ${rateis}101"
+ tbf_rule_operate ost1 "change\ dd_runas\ ${rateis}51"
+ nrs_write_read "$RUNAS"
+
+ # Stop the rules
+ tbf_rule_operate ost1 "stop\ runas"
+ tbf_rule_operate ost1 "stop\ iozone_runas"
+ tbf_rule_operate ost1 "stop\ dd_runas"
+ nrs_write_read "$RUNAS"
+
+ # Cleanup the TBF policy
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
+ nrs_write_read "$RUNAS"
+
+ local current_jobid_var=$($LCTL get_param -n jobid_var)
+ if [ $saved_jobid_var != $current_jobid_var ]; then
+ set_conf_param_and_check client \
+ "$LCTL get_param -n jobid_var" \
+ "$FSNAME.sys.jobid_var" $saved_jobid_var
+ fi
+ return 0
+}
+run_test 77f "check TBF JobID nrs policy"
+
+test_77g() {
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ nid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="jobid="
+ rateis="rate="
+ fi
+
+ # Add a rule that only valid for Jobid TBF. If direct change between
+ # TBF types is not supported, this operation will fail.
+ tbf_rule_operate ost1 "start\ dd_runas\ ${idis}{dd.$RUNAS_ID}\ ${rateis}50"
+
+ # Cleanup the TBF policy
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
+ return 0
+}
+run_test 77g "Change TBF type directly"
+
+test_77h() {
+ [ $(lustre_version_code ost1) -ge $(version_code 2.8.55) ] ||
+ { skip "Need OST version at least 2.8.55"; return 0; }
+
+ local old_policy=$(do_facet ost1 \
+ lctl get_param ost.OSS.ost_io.nrs_policies)
+ local new_policy
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ reg\ abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ abc\ efg"
+ [ $? -eq 0 ] && error "should return error"
+
+ new_policy=$(do_facet ost1 lctl get_param ost.OSS.ost_io.nrs_policies)
+ [ $? -eq 0 ] || error "shouldn't LBUG"
+
+ [ "$old_policy" = "$new_policy" ] || error "NRS policy should be same"
+
+ return 0
+}
+run_test 77h "Wrong policy name should report error, not LBUG"
+
+tbf_rule_check()
+{
+ local facet=$1
+ local expected=$2
+ local error_message=$3
+ local rule_number=0
+ for rule in $expected; do
+ rule_number=$((rule_number + 1))
+ done
+ local stop_line=$(($rule_number + 3))
+ local awk_command="awk 'NR >= 4 && NR <= $stop_line {print \$1}'"
+
+ local output=$(do_facet $facet lctl get_param \
+ ost.OSS.ost_io.nrs_tbf_rule |
+ eval $awk_command |
+ tr "\n" " " |
+ sed 's/[ ]*$//')
+ if [ "$output" != "$expected" ]; then
+ error "$error_message, expected '$expected', got '$output'"
+ fi
+}
+
+test_77i() {
+ [ $(lustre_version_code ost1) -ge $(version_code 2.8.55) ] ||
+ { skip "Need OST version at least 2.8.55"; return 0; }
+
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] &&
+ error "failed to set TBF policy"
+ done
+
+ tbf_rule_check ost1 "default" "error before inserting any rule"
+
+ tbf_rule_operate ost1 "start\ before\ jobid={jobid}\ rate=1000"
+ tbf_rule_check ost1 "before default" \
+ "error when inserting rule 'before'"
+
+ tbf_rule_operate ost1 "start\ after\ jobid={jobid}\ rate=1000\ rank=default"
+ tbf_rule_check ost1 "before after default" \
+ "error when inserting rule 'after'"
+
+ tbf_rule_operate ost1 "start\ target\ jobid={jobid}\ rate=1000\ rank=after"
+ tbf_rule_check ost1 "before target after default" \
+ "error when inserting rule 'target'"
+
+ echo "Move before itself"
+ tbf_rule_operate ost1 "change\ target\ rank=target"
+ tbf_rule_check ost1 "before target after default" \
+ "error when moving before itself"
+
+ echo "Move to higher rank"
+ tbf_rule_operate ost1 "change\ target\ rank=before"
+ tbf_rule_check ost1 "target before after default" \
+ "error when moving to higher rank"
+
+ echo "Move to lower rank"
+ tbf_rule_operate ost1 "change\ target\ rank=after"
+ tbf_rule_check ost1 "before target after default" \
+ "error when moving to lower rank"
+
+ echo "Move before default"
+ tbf_rule_operate ost1 "change\ target\ rank=default"
+ tbf_rule_check ost1 "before after target default" \
+ error "error when moving before default"
+
+ # Cleanup the TBF policy
+ do_nodes $(comma_list $(osts_nodes)) \
+ $LCTL set_param ost.OSS.ost_io.nrs_policies=fifo
+ return 0
+}
+run_test 77i "Change rank of TBF rule"
+
+test_77j() {
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.60) ]; then
+ idis="opcode="
+ rateis="rate="
+ fi
+
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param jobid_var=procname_uid \
+ ost.OSS.ost_io.nrs_policies="tbf\ opcode" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ost_r\ ${idis}{ost_read}\ ${rateis}5" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ost_w\ ${idis}{ost_write}\ ${rateis}20"
+ [ $? -ne 0 ] && error "failed to set TBF OPCode policy"
+
+ nrs_write_read
+ tbf_verify 20 5
+
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param ost.OSS.ost_io.nrs_tbf_rule="stop\ ost_r" \
+ ost.OSS.ost_io.nrs_tbf_rule="stop\ ost_w" \
+ ost.OSS.ost_io.nrs_policies="fifo"
+
+ # sleep 3 seconds to wait the tbf policy stop completely,
+ # or the next test case is possible get -EAGAIN when
+ # setting the tbf policy
+ sleep 3
+}
+run_test 77j "check TBF-OPCode NRS policy"
+
+test_77k() {
+ [[ $(lustre_version_code ost1) -ge $(version_code 2.9.53) ]] ||
+ { skip "Need OST version at least 2.9.53"; return 0; }
+
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param ost.OSS.ost_io.nrs_policies="tbf" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ext_w\ jobid={dd.$RUNAS_ID}\&opcode={ost_write}\ rate=20" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ext_r\ jobid={dd.$RUNAS_ID}\&opcode={ost_read}\ rate=10"
+
+ nrs_write_read "$RUNAS"
+ tbf_verify 20 10 "$RUNAS"
+
+ local address=$(comma_list "$(host_nids_address $CLIENTS $NETTYPE)")
+ local client_nids=$(nids_list $address "\\")
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param ost.OSS.ost_io.nrs_tbf_rule="stop\ ext_w" \
+ ost.OSS.ost_io.nrs_tbf_rule="stop\ ext_r" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ext_w\ nid={0@lo\ $client_nids}\&opcode={ost_write}\ rate=20" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ext_r\ nid={0@lo\ $client_nids}\&opcode={ost_read}\ rate=10"
+
+ nrs_write_read
+ tbf_verify 20 10
+
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param ost.OSS.ost_io.nrs_tbf_rule="stop\ ext_w" \
+ ost.OSS.ost_io.nrs_tbf_rule="stop\ ext_r" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ext\ nid={0@lo\ $client_nids}\&jobid={dd.$RUNAS_ID}\ rate=20"
+
+ nrs_write_read "$RUNAS"
+ tbf_verify 20 20 "$RUNAS"
+
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param ost.OSS.ost_io.nrs_tbf_rule="stop\ ext" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ext_a\ jobid={dd.$RUNAS_ID},opcode={ost_write}\ rate=20" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ext_b\ jobid={dd.$RUNAS_ID},opcode={ost_read}\ rate=10"
+
+ nrs_write_read "$RUNAS"
+ # with parameter "RUNAS", it will match the latest rule
+ # "ext_b" first, so the limited write rate is 10.
+ tbf_verify 10 10 "$RUNAS"
+ tbf_verify 20 10
+
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param ost.OSS.ost_io.nrs_tbf_rule="stop\ ext_a" \
+ ost.OSS.ost_io.nrs_tbf_rule="stop\ ext_b" \
+ ost.OSS.ost_io.nrs_policies="fifo"
+
+ sleep 3
+}
+run_test 77k "check the extended TBF policy with NID/JobID/OPCode expression"
+
+test_77l() {
+ if [ $(lustre_version_code ost1) -lt $(version_code 2.9.54) ]; then
+ skip "Need OST version at least 2.9.54"
+ return 0
+ fi
+
+ local dir=$DIR/$tdir
+
+ mkdir $dir || error "mkdir $dir failed"
+ $LFS setstripe -c $OSTCOUNT $dir || error "setstripe to $dir failed"
+ chmod 777 $dir
+
+ local nodes=$(comma_list $(osts_nodes))
+ do_nodes $nodes lctl set_param ost.OSS.ost_io.nrs_policies=delay \
+ ost.OSS.ost_io.nrs_delay_min=4 \
+ ost.OSS.ost_io.nrs_delay_max=4 \
+ ost.OSS.ost_io.nrs_delay_pct=100
+ [ $? -ne 0 ] && error "Failed to set delay policy"
+
+ local start=$SECONDS
+ do_nodes "${SINGLECLIENT:-$HOSTNAME}" "$RUNAS" \
+ dd if=/dev/zero of="$dir/nrs_delay_$HOSTNAME" bs=1M count=1 \
+ oflag=direct conv=fdatasync ||
+ { do_nodes $nodes lctl set_param ost.OSS.ost_io.nrs_policies="fifo";
+ error "dd on client failed (1)"; }
+ local elapsed=$((SECONDS - start))
+
+ # NRS delay doesn't do sub-second timing, so a request enqueued at
+ # 0.9 seconds can be dequeued at 4.0
+ [ $elapsed -lt 3 ] &&
+ { do_nodes $nodes lctl set_param ost.OSS.ost_io.nrs_policies="fifo";
+ error "Single 1M write should take at least 3 seconds"; }
+
+ start=$SECONDS
+ do_nodes "${SINGLECLIENT:-$HOSTNAME}" "$RUNAS" \
+ dd if=/dev/zero of="$dir/nrs_delay_$HOSTNAME" bs=1M count=10 \
+ oflag=direct conv=fdatasync ||
+ { do_nodes $nodes lctl set_param ost.OSS.ost_io.nrs_policies="fifo";
+ error "dd on client failed (2)"; }
+ elapsed=$((SECONDS - start))
+
+ [ $elapsed -lt 30 ] &&
+ { do_nodes $nodes lctl set_param ost.OSS.ost_io.nrs_policies="fifo";
+ error "Ten 1M writes should take at least 30 seconds"; }
+
+ do_nodes $nodes lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
+
+ return 0
+}
+run_test 77l "check NRS Delay slows write RPC processing"
+
+test_78() { #LU-6673
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ local rc
+
+ oss=$(comma_list $(osts_nodes))
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="orr" &
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_orr_quantum=1
+ rc=$?
+ # Valid return codes are:
+ # 0: Tuning succeeded
+ # ENODEV: Policy is still stopped
+ # EAGAIN: Policy is being initialized
+ [ $rc -eq 0 -o $rc -eq 19 -o $rc -eq 11 ] ||
+ error "Expected set_param to return 0|ENODEV|EAGAIN"
+
+ # Cleanup the ORR policy
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
+ return 0
+}
+run_test 78 "Enable policy and specify tunings right away"
+
+test_79() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
+ test_mkdir -p $DIR/$tdir
+
+ # Prevent interference from layout intent RPCs due to
+ # asynchronous writeback. These will be tested in 130c below.
+ do_nodes ${CLIENTS:-$HOSTNAME} sync
+
+ setfattr -n trusted.name1 -v value1 $DIR/$tdir ||
+ error "setfattr -n trusted.name1=value1 $DIR/$tdir failed"
+
+#define OBD_FAIL_MDS_INTENT_DELAY 0x160
+ local mdtidx=$($LFS getstripe -M $DIR/$tdir)
+ local facet=mds$((mdtidx + 1))
+ stat $DIR/$tdir
+ set_nodes_failloc $(facet_active_host $facet) 0x80000160
+ getfattr -n trusted.name1 $DIR/$tdir 2> /dev/null &
+ local pid=$!
+ sleep 2
+
+#define OBD_FAIL_MDS_GETXATTR_PACK 0x131
+ set_nodes_failloc $(facet_active_host $facet) 0x80000131
+
+ wait $pid
+ return 0
+}
+run_test 79 "xattr: intent error"
+
+test_80a() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local MDTIDX=1
+ local mdt_index
+ local i
+ local file
+ local pid
+
+ mkdir -p $DIR1/$tdir/dir
+ createmany -o $DIR1/$tdir/dir/f 10 ||
+ error "create files under remote dir failed $i"
+
+ cp /etc/passwd $DIR1/$tdir/$tfile
+
+ #migrate open file should fails
+ multiop_bg_pause $DIR2/$tdir/$tfile O_c || error "open $file failed"
+ pid=$!
+ # give multiop a chance to open
+ sleep 1
+
+ $LFS migrate -m $MDTIDX $DIR1/$tdir &&
+ error "migrate open files should failed with open files"
+
+ kill -USR1 $pid
+
+ $LFS migrate -m $MDTIDX $DIR1/$tdir ||
+ error "migrate remote dir error"
+
+ echo "Finish migration, then checking.."
+ for file in $(find $DIR1/$tdir); do
+ mdt_index=$($LFS getstripe -M $file)
+ [ $mdt_index == $MDTIDX ] ||
+ error "$file is not on MDT${MDTIDX}"
+ done
+
+ diff /etc/passwd $DIR1/$tdir/$tfile ||
+ error "file different after migration"
+
+ rm -rf $DIR1/$tdir || error "rm dir failed after migration"
+}
+run_test 80a "migrate directory when some children is being opened"
+
+cleanup_80b() {
+ trap 0
+ kill -9 $migrate_pid
+}
+
+test_80b() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local migrate_dir1=$DIR1/$tdir/migrate_dir
+ local migrate_dir2=$DIR2/$tdir/migrate_dir
+ local migrate_run=$LUSTRE/tests/migrate.sh
+ local start_time
+ local end_time
+ local show_time=1
+ local mdt_idx
+ local rc=0
+ local rc1=0
+
+ trap cleanup_80b EXIT
+ #prepare migrate directory
+ mkdir -p $migrate_dir1
+ for F in {1,2,3,4,5}; do
+ echo "$F$F$F$F$F" > $migrate_dir1/file$F
+ echo "$F$F$F$F$F" > $DIR/$tdir/file$F
+ done
+
+ #migrate the directories among MDTs
+ (
+ while true; do
+ mdt_idx=$((RANDOM % MDSCOUNT))
+ $LFS migrate -m $mdt_idx $migrate_dir1 2&>/dev/null ||
+ rc=$?
+ [ $rc -ne 0 -o $rc -ne 16 ] || break
+ done
+ ) &
+ migrate_pid=$!
+
+ echo "start migration thread $migrate_pid"
+ #Access the files at the same time
+ start_time=$(date +%s)
+ echo "accessing the migrating directory for 5 minutes..."
+ while true; do
+ ls $migrate_dir2 > /dev/null || {
+ echo "read dir fails"
+ break
+ }
+ diff -u $DIR2/$tdir/file1 $migrate_dir2/file1 || {
+ echo "access file1 fails"
+ break
+ }
+
+ cat $migrate_dir2/file2 > $migrate_dir2/file3 || {
+ echo "access file2/3 fails"
+ break
+ }
+
+ echo "aaaaa" > $migrate_dir2/file4 > /dev/null || {
+ echo "access file4 fails"
+ break
+ }
+
+ stat $migrate_dir2/file5 > /dev/null || {
+ echo "stat file5 fails"
+ break
+ }
+
+ touch $migrate_dir2/source_file > /dev/null || rc1=$?
+ [ $rc1 -ne 0 -o $rc1 -ne 1 ] || {
+ echo "touch file failed with $rc1"
+ break;
+ }
+
+ if [ -e $migrate_dir2/source_file ]; then
+ ln $migrate_dir2/source_file $migrate_dir2/link_file \
+ 2&>/dev/null || rc1=$?
+ if [ -e $migrate_dir2/link_file ]; then
+ rm -rf $migrate_dir2/link_file
+ fi
+
+ mrename $migrate_dir2/source_file \
+ $migrate_dir2/target_file 2&>/dev/null || rc1=$?
+ [ $rc1 -ne 0 -o $rc1 -ne 1 ] || {
+ echo "rename failed with $rc1"
+ break
+ }
+
+ if [ -e $migrate_dir2/target_file ]; then
+ rm -rf $migrate_dir2/target_file 2&>/dev/null ||
+ rc1=$?
+ else
+ rm -rf $migrate_dir2/source_file 2&>/dev/null ||
+ rc1=$?
+ fi
+ [ $rc1 -ne 0 -o $rc1 -ne 1 ] || {
+ echo "unlink failed with $rc1"
+ break
+ }
+ fi
+
+ end_time=$(date +%s)
+ duration=$((end_time - start_time))
+ if [ $((duration % 10)) -eq 0 ]; then
+ if [ $show_time -eq 1 ]; then
+ echo "...$duration seconds"
+ show_time=0
+ fi
+ else
+ show_time=1
+ fi
+
+ kill -0 $migrate_pid || {
+ echo "migration stopped 1"
+ break
+ }
+
+ [ $duration -ge 300 ] && break
+ done
+
+ #check migration are still there
+ kill -0 $migrate_pid || error "migration stopped 2"
+ cleanup_80b
+}
+run_test 80b "Accessing directory during migration"
+
+test_81() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+
+ rm -rf $DIR1/$tdir
+
+ mkdir -p $DIR1/$tdir
+
+ $LFS setdirstripe -i0 -c$MDSCOUNT $DIR1/$tdir/d0
+ $LFS setdirstripe -i0 -c$MDSCOUNT $DIR1/$tdir/d1
+
+ cd $DIR1/$tdir
+ touch d0/0 || error "create 0 failed"
+ mv d0/0 d1/0 || error "rename d0/0 d1/0 failed"
+ stat d0/0 && error "stat mv filed succeed"
+ mv $DIR2/$tdir/d1/0 $DIR2/$tdir/d0/0 || error "rename d1/0 d0/0 failed"
+ stat d0/0 || error "stat failed"
+
+ local t=$(ls -ai $DIR1/$tdir/d0 | sort -u | wc -l)
+
+ if [ $t -ne 3 ]; then
+ ls -ai $DIR1/$tdir/d0
+ error "expect 3 get $t"
+ fi
+
+ return 0
+}
+run_test 81 "rename and stat under striped directory"
+
+test_82() {
+ [[ $(lustre_version_code $SINGLEMDS) -gt $(version_code 2.6.91) ]] ||
+ { skip "Need MDS version at least 2.6.92"; return 0; }
+
+ # Client 1 creates a file.
+ multiop_bg_pause $DIR1/$tfile O_ac || error "multiop_bg_pause 1"
+ pid1=$!
+ # Client 2 opens the file.
+ multiop_bg_pause $DIR2/$tfile o_Ac || error "multiop_bg_pause 2"
+ pid2=$!
+ # Client 1 makes the file an orphan.
+ rm $DIR1/$tfile || error "rm"
+ # Client 2 sets EA "user.multiop".
+ kill -s USR1 $pid2
+ wait $pid2 || error "multiop 2"
+ # Client 1 gets EA "user.multiop". This used to fail because the EA
+ # cache refill would get "trusted.link" from mdd_xattr_list() but
+ # -ENOENT when trying to get "trusted.link"'s value. See also sanity
+ # 102q.
+ kill -s USR1 $pid1
+ wait $pid1 || error "multiop 1"
+}
+run_test 82 "fsetxattr and fgetxattr on orphan files"
+
+test_83() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local pid1
+ local pid2
+
+ (
+ cd $DIR1
+ while true; do
+ $LFS mkdir -i1 -c2 $tdir
+ rmdir $tdir
+ done
+ ) &
+ pid1=$!
+ echo "start pid $pid1 to create/unlink striped directory"
+
+ # Access the directory at the same time
+ (
+ cd $DIR2
+ while true; do
+ stat $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid2=$!
+ echo "start pid $pid2 to stat striped directory"
+
+ sleep 120
+ kill $pid1 $pid2
+ wait $pid1 $pid2
+
+ return 0
+}
+run_test 83 "access striped directory while it is being created/unlinked"
+
+test_90() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local pid1
+ local pid2
+ local duration=180
+
+ [ "$SLOW" = "yes" ] && duration=600
+ # Open/Create under striped directory
+ (
+ cd $DIR1
+ while true; do
+ $LFS mkdir -c$MDSCOUNT $tdir > /dev/null 2>&1
+ touch $tdir/f{0..3} > /dev/null 2>&1
+ done
+ ) &
+ pid1=$!
+ echo "start pid $pid1 to open/create under striped directory"
+
+ # unlink the striped directory at the same time
+ (
+ cd $DIR2
+ while true; do
+ rm -rf $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid2=$!
+ echo "start pid $pid2 to unlink striped directory"
+
+ sleep $duration
+
+ kill $pid1 $pid2
+ wait $pid1 $pid2
+
+ return 0
+}
+run_test 90 "open/create and unlink striped directory"
+
+test_91() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local pid1
+ local pid2
+ local duration=180
+
+ [ "$SLOW" = "yes" ] && duration=600
+ # chmod striped directory
+ (
+ cd $DIR1
+ while true; do
+ $LFS mkdir -c$MDSCOUNT $tdir > /dev/null 2>&1
+ chmod go+w $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid1=$!
+ echo "start pid $pid1 to chmod striped directory"
+
+ # unlink the striped directory at the same time
+ (
+ cd $DIR2
+ while true; do
+ rm -rf $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid2=$!
+ echo "start pid $pid2 to unlink striped directory"
+
+ sleep $duration
+
+ kill $pid1 $pid2
+ wait $pid1 $pid2
+
+ return 0
+}
+run_test 91 "chmod and unlink striped directory"
+
+test_92() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+
+ local fd=$(free_fd)
+ local cmd="exec $fd<$DIR1/$tdir"
+ $LFS setdirstripe -c$MDSCOUNT $DIR1/$tdir || error "mkdir $tdir fails"
+ eval $cmd
+ cmd="exec $fd<&-"
+ trap "eval $cmd" EXIT
+ cd $DIR1/$tdir || error "cd $DIR1/$tdir fails"
+ rmdir ../$tdir || error "rmdir ../$tdir fails"
+
+ #define OBD_FAIL_LLITE_NO_CHECK_DEAD 0x1408
+ $LCTL set_param fail_loc=0x1408
+ mkdir $DIR2/$tdir/dir && error "create dir succeeds"
+ $LFS setdirstripe -i1 $DIR2/$tdir/remote_dir &&
+ error "create remote dir succeeds"
+ $LCTL set_param fail_loc=0
+ eval $cmd
+ return 0
+}
+run_test 92 "create remote directory under orphan directory"
+
+test_93() {
+ local rc1=0
+ local rc2=0
+ local old_rr
+
+ mkdir -p $DIR1/$tfile-1/
+ mkdir -p $DIR2/$tfile-2/
+ local old_rr=$(do_facet $SINGLEMDS lctl get_param -n \
+ 'lod.lustre-MDT*/qos_threshold_rr' | sed -e 's/%//')
+ do_facet $SINGLEMDS lctl set_param -n \
+ 'lod.lustre-MDT*/qos_threshold_rr' 100
+ #define OBD_FAIL_MDS_LOV_CREATE_RACE 0x163
+ do_facet $SINGLEMDS "lctl set_param fail_loc=0x00000163"
+
+ $SETSTRIPE -c -1 $DIR1/$tfile-1/file1 &
+ local PID1=$!
+ sleep 1
+ $SETSTRIPE -c -1 $DIR2/$tfile-2/file2 &
+ local PID2=$!
+ wait $PID2
+ wait $PID1
+ do_facet $SINGLEMDS "lctl set_param fail_loc=0x0"
+ do_facet $SINGLEMDS "lctl set_param -n \
+ 'lod.lustre-MDT*/qos_threshold_rr' $old_rr"
+
+ $GETSTRIPE $DIR1/$tfile-1/file1
+ rc1=$($GETSTRIPE -q $DIR1/$tfile-1/file1 |
+ awk '{if (/[0-9]/) print $1 }' | sort | uniq -d | wc -l)
+ $GETSTRIPE $DIR2/$tfile-2/file2
+ rc2=$($GETSTRIPE -q $DIR2/$tfile-2/file2 |
+ awk '{if (/[0-9]/) print $1 }' | sort | uniq -d | wc -l)
+ echo "rc1=$rc1 and rc2=$rc2 "
+ [ $rc1 -eq 0 ] && [ $rc2 -eq 0 ] ||
+ error "object allocate on same ost detected"
+}
+run_test 93 "alloc_rr should not allocate on same ost"