# LU-2829 / LU-2887 - make allowances for ZFS slowness
TEST33_NFILES=${TEST33_NFILES:-1000}
fi
-
+# 23 (min)"
[ "$SLOW" = "no" ] && EXCEPT_SLOW="33a"
FAIL_ON_ERROR=false
check_and_setup_lustre
-LOVNAME=$($LCTL get_param -n llite.*.lov.common_name | tail -n 1)
-OSTCOUNT=$($LCTL get_param -n lov.$LOVNAME.numobd)
-
assert_DIR
rm -rf $DIR1/[df][0-9]* $DIR1/lnk $DIR/[df].${TESTSUITE}*
}
run_test 13 "test directory page revocation ===================="
-test_14() {
+test_14aa() {
test_mkdir -p $DIR1/$tdir
cp -p /bin/ls $DIR1/$tdir/$tfile
multiop_bg_pause $DIR1/$tdir/$tfile Ow_c || return 1
kill -USR1 $MULTIPID
wait $MULTIPID || return 2
}
-run_test 14 "execution of file open for write returns -ETXTBSY ="
+run_test 14aa "execution of file open for write returns -ETXTBSY"
-test_14a() {
+test_14ab() {
test_mkdir -p $DIR1/d14
cp -p `which multiop` $DIR1/d14/multiop || error "cp failed"
MULTIOP_PROG=$DIR1/d14/multiop multiop_bg_pause $TMP/test14.junk O_c || return 1
wait $MULTIOP_PID || return 3
rm $TMP/test14.junk $DIR1/d14/multiop || error "removing multiop"
}
-run_test 14a "open(RDWR) of executing file returns -ETXTBSY ===="
+run_test 14ab "open(RDWR) of executing file returns -ETXTBSY"
test_14b() { # bug 3192, 7040
test_mkdir -p $DIR1/d14
avgjbd=0
avgtime=0
for i in 1 2 3; do
- do_node $CLIENT1 "$LFS mkdir -i $MDTIDX -p \
+ do_node $CLIENT1 "$LFS mkdir -i $MDTIDX \
$DIR1/$tdir-\\\$(hostname)-$i"
jbdold=$(print_jbd_stat)
}
run_test 33b "COS: cross create/delete, 2 clients, benchmark under remote dir"
+test_33c() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ [ $(lustre_version_code $SINGLEMDS) -lt $(version_code 2.7.63) ] &&
+ skip "DNE CoS not supported" && return
+
+ sync
+
+ mkdir $DIR/$tdir
+ # remote mkdir is done on MDT2, which enqueued lock of $tdir on MDT1
+ $LFS mkdir -i 1 $DIR/$tdir/d1
+ do_facet mds1 "lctl set_param -n mdt.*.sync_count=0"
+ mkdir $DIR/$tdir/d2
+ local sync_count=$(do_facet mds1 \
+ "lctl get_param -n mdt.*MDT0000.sync_count")
+ [ $sync_count -eq 1 ] || error "Sync-Lock-Cancel not triggered"
+
+ $LFS mkdir -i 1 $DIR/$tdir/d3
+ do_facet mds1 "lctl set_param -n mdt.*.sync_count=0"
+ # during sleep remote mkdir should have been committed and canceled
+ # remote lock spontaneously, which shouldn't trigger sync
+ sleep 6
+ mkdir $DIR/$tdir/d4
+ local sync_count=$(do_facet mds1 \
+ "lctl get_param -n mdt.*MDT0000.sync_count")
+ [ $sync_count -eq 0 ] || error "Sync-Lock-Cancel triggered"
+}
+run_test 33c "Cancel cross-MDT lock should trigger Sync-Lock-Cancel"
+
+ops_do_cos() {
+ local nodes=$(comma_list $(mdts_nodes))
+ do_nodes $nodes "lctl set_param -n mdt.*.async_commit_count=0"
+ sh -c "$@"
+ local async_commit_count=$(do_nodes $nodes \
+ "lctl get_param -n mdt.*.async_commit_count" | calc_sum)
+ [ $async_commit_count -gt 0 ] || error "CoS not triggerred"
+
+ rm -rf $DIR/$tdir
+ sync
+}
+
+test_33d() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ [ $(lustre_version_code $SINGLEMDS) -lt $(version_code 2.7.63) ] &&
+ skip "DNE CoS not supported" && return
+
+ sync
+ # remote directory create
+ mkdir $DIR/$tdir
+ ops_do_cos "$LFS mkdir -i 1 $DIR/$tdir/subdir"
+ # remote directory unlink
+ $LFS mkdir -i 1 $DIR/$tdir
+ ops_do_cos "rmdir $DIR/$tdir"
+ # striped directory create
+ mkdir $DIR/$tdir
+ ops_do_cos "$LFS mkdir -c 2 $DIR/$tdir/subdir"
+ # striped directory setattr
+ $LFS mkdir -c 2 $DIR/$tdir
+ touch $DIR/$tdir
+ ops_do_cos "chmod 713 $DIR/$tdir"
+ # striped directory unlink
+ $LFS mkdir -c 2 $DIR/$tdir
+ touch $DIR/$tdir
+ ops_do_cos "rmdir $DIR/$tdir"
+ # cross-MDT link
+ $LFS mkdir -c 2 $DIR/$tdir
+ $LFS mkdir -i 0 $DIR/$tdir/d1
+ $LFS mkdir -i 1 $DIR/$tdir/d2
+ touch $DIR/$tdir/d1/tgt
+ ops_do_cos "ln $DIR/$tdir/d1/tgt $DIR/$tdir/d2/src"
+ # cross-MDT rename
+ $LFS mkdir -c 2 $DIR/$tdir
+ $LFS mkdir -i 0 $DIR/$tdir/d1
+ $LFS mkdir -i 1 $DIR/$tdir/d2
+ touch $DIR/$tdir/d1/src
+ ops_do_cos "mv $DIR/$tdir/d1/src $DIR/$tdir/d2/tgt"
+ # migrate
+ $LFS mkdir -i 0 $DIR/$tdir
+ ops_do_cos "$LFS migrate -m 1 $DIR/$tdir"
+ return 0
+}
+run_test 33d "DNE distributed operation should trigger COS"
+
+test_33e() {
+ [ -n "$CLIENTS" ] || { skip "Need two or more clients" && return 0; }
+ [ $CLIENTCOUNT -ge 2 ] ||
+ { skip "Need two or more clients, have $CLIENTCOUNT" &&
+ return 0; }
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ [ $(lustre_version_code $SINGLEMDS) -lt $(version_code 2.7.63) ] &&
+ skip "DNE CoS not supported" && return
+
+ local client2=${CLIENT2:-$(hostname)}
+
+ sync
+
+ local nodes=$(comma_list $(mdts_nodes))
+ do_nodes $nodes "lctl set_param -n mdt.*.async_commit_count=0"
+
+ $LFS mkdir -c 2 $DIR/$tdir
+ mkdir $DIR/$tdir/subdir
+ echo abc > $DIR/$tdir/$tfile
+ do_node $client2 echo dfg >> $DIR/$tdir/$tfile
+ do_node $client2 touch $DIR/$tdir/subdir
+
+ local async_commit_count=$(do_nodes $nodes \
+ "lctl get_param -n mdt.*.async_commit_count" | calc_sum)
+ [ $async_commit_count -gt 0 ] && error "CoS triggerred"
+
+ return 0
+}
+run_test 33e "DNE local operation shouldn't trigger COS"
+
# End commit on sharing tests
get_ost_lock_timeouts() {
rmdir $DIR2/$tfile-3
check_pdo_conflict $PID1 || error "unlink is blocked"
- # all operations above shouldn't wait the first one
+ # all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40a "pdirops: create vs others =============="
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40b "pdirops: open|create and others =============="
# all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40c "pdirops: link and others =============="
# all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40e "pdirops: rename and others =============="
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; echo "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41a "pdirops: create vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41b "pdirops: create vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41c "pdirops: create vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41d "pdirops: create vs unlink =============="
sleep 1
mv $DIR2/$tfile-2 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41e "pdirops: create and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41f "pdirops: create and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41g "pdirops: create vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41h "pdirops: create vs readdir =============="
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42a "pdirops: mkdir vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42b "pdirops: mkdir vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42c "pdirops: mkdir vs link =============="
sleep 1
rmdir $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42d "pdirops: mkdir vs unlink =============="
sleep 1
mv -T $DIR2/$tfile-2 $DIR2/$tfile && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42e "pdirops: mkdir and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42f "pdirops: mkdir and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42g "pdirops: mkdir vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42h "pdirops: mkdir vs readdir =============="
sleep 1
mkdir $DIR2/$tfile || error "mkdir must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43a "pdirops: unlink vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c || error "create must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43b "pdirops: unlink vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile || error "link must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43c "pdirops: unlink vs link =============="
sleep 1
rm $DIR2/$tfile && error "unlink must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43d "pdirops: unlink vs unlink =============="
sleep 1
mv -u $DIR2/$tfile-2 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43e "pdirops: unlink and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43f "pdirops: unlink and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null && error "stat must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43g "pdirops: unlink vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43h "pdirops: unlink vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile || error "remote mkdir must succeed"
check_pdo_conflict $PID1 &&
{ wait $PID1; error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43i "pdirops: unlink vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44a "pdirops: rename tgt vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44b "pdirops: rename tgt vs create =============="
sleep 1
link $DIR2/$tfile-3 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44c "pdirops: rename tgt vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44d "pdirops: rename tgt vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44e "pdirops: rename tgt and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44f "pdirops: rename tgt and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44g "pdirops: rename tgt vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44h "pdirops: rename tgt vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile && error "remote mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44i "pdirops: rename tgt vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile || error "mkdir must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45a "pdirops: rename src vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c || error "create must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45b "pdirops: rename src vs create =============="
sleep 1
link $DIR2/$tfile-3 $DIR2/$tfile || error "link must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45c "pdirops: rename src vs link =============="
sleep 1
rm $DIR2/$tfile && error "unlink must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45d "pdirops: rename src vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45e "pdirops: rename src and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45f "pdirops: rename src and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null && error "stat must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45g "pdirops: rename src vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45h "pdirops: unlink vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile || error "create remote dir must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "create remote dir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45i "pdirops: rename src vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46a "pdirops: link vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46b "pdirops: link vs create =============="
sleep 1
link $DIR2/$tfile $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46c "pdirops: link vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46d "pdirops: link vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46e "pdirops: link and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46f "pdirops: link and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46g "pdirops: link vs getattr =============="
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1;
error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46h "pdirops: link vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile && error "remote mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46i "pdirops: link vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47a "pdirops: remote mkdir vs mkdir"
multiop $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47b "pdirops: remote mkdir vs create"
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47c "pdirops: remote mkdir vs link"
rmdir $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47d "pdirops: remote mkdir vs unlink"
mv -T $DIR2/$tfile-2 $DIR2/$tfile && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47e "pdirops: remote mkdir and rename (tgt)"
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47f "pdirops: remote mkdir and rename (src)"
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47g "pdirops: remote mkdir vs getattr"
chmod 777 $dir
do_nodes $CLIENTS $myRUNAS dd if=/dev/zero of="$dir/nrs_r_$HOSTNAME"\
- bs=1M count=$n > /dev/null 2>&1
+ bs=1M count=$n > /dev/null 2>&1 || error "dd on client failed"
for ((i = 0; i < $n; i++)); do
do_nodes $CLIENTS $myRUNAS dd if=/dev/zero\
of="$dir/nrs_w_$HOSTNAME" bs=1M seek=$i count=1\
- > /dev/null 2>&1 &
+ > /dev/null 2>&1 || error "dd on client failed" &
local pids_w[$i]=$!
done
do_nodes $CLIENTS sync;
for ((i = 0; i < $n; i++)); do
do_nodes $CLIENTS $myRUNAS dd if="$dir/nrs_w_$HOSTNAME"\
- of=/dev/zero bs=1M seek=$i count=1 > /dev/null 2>&1 &
+ of=/dev/zero bs=1M seek=$i count=1 > /dev/null 2>&1 ||
+ error "dd on client failed"
local pids_r[$i]=$!
done
cancel_lru_locks osc
}
test_77a() { #LU-3266
- do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_policies="fifo"
+ oss=$(comma_list $(osts_nodes))
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_policies="fifo"
nrs_write_read
return 0
}
run_test 77a "check FIFO NRS policy"
-
test_77b() { #LU-3266
- do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_policies="crrn"
- do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_crrn_quantum=1
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_policies="crrn" \
+ ost.OSS.*.nrs_crrn_quantum=1
echo "policy: crr-n, crrn_quantum 1"
nrs_write_read
- do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_crrn_quantum=64
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_crrn_quantum=64
echo "policy: crr-n, crrn_quantum 64"
nrs_write_read
+ # cleanup
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
return 0
}
run_test 77b "check CRR-N NRS policy"
orr_trr() {
local policy=$1
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies=$policy
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_"$policy"_quantum=1
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_"$policy"_offset_type="physical"
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_"$policy"_supported="reads"
- done
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies=$policy \
+ ost.OSS.*.nrs_"$policy"_quantum=1 \
+ ost.OSS.*.nrs_"$policy"_offset_type="physical" \
+ ost.OSS.*.nrs_"$policy"_supported="reads"
- echo "policy: $policy, ${policy}_quantum 1, ${policy}_offset_type \
- physical, ${policy}_supported reads"
+ echo "policy: $policy, ${policy}_quantum 1, ${policy}_offset_type physical, ${policy}_supported reads"
nrs_write_read
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_${policy}_supported="writes"
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_${policy}_quantum=64
- done
- echo "policy: $policy, ${policy}_quantum 64, \
- ${policy}_offset_type physical, ${policy}_supported writes"
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_${policy}_supported="writes" \
+ ost.OSS.*.nrs_${policy}_quantum=64
+
+ echo "policy: $policy, ${policy}_quantum 64, ${policy}_offset_type physical, ${policy}_supported writes"
nrs_write_read
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_${policy}_supported="reads_and_writes"
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_${policy}_offset_type="logical"
- done
- echo "policy: $policy, ${policy}_quantum 64, \
- ${policy}_offset_type logical, ${policy}_supported reads_and_writes"
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_${policy}_supported="reads_and_writes" \
+ ost.OSS.*.nrs_${policy}_offset_type="logical"
+ echo "policy: $policy, ${policy}_quantum 64, ${policy}_offset_type logical, ${policy}_supported reads_and_writes"
nrs_write_read
+ # cleanup
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
return 0
}
shift 1
do_facet $facet lctl set_param \
- ost.OSS.ost_io.nrs_tbf_rule="$@"
+ ost.OSS.ost_io.nrs_tbf_rule="$*"
[ $? -ne 0 ] &&
- error "failed to operate on TBF rules"
+ error "failed to run operate '$*' on TBF rules"
}
test_77e() {
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="tbf\ nid"
- [ $? -ne 0 ] &&
- error "failed to set TBF policy"
- done
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
- # Only operate rules on ost0 since OSTs might run on the same OSS
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ nid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="nid="
+ rateis="rate="
+ fi
+
+ # Only operate rules on ost1 since OSTs might run on the same OSS
# Add some rules
- tbf_rule_operate ost0 "start\ localhost\ {0@lo}\ 1000"
+ tbf_rule_operate ost1 "start\ localhost\ ${idis}{0@lo}\ ${rateis}1000"
local address=$(comma_list "$(host_nids_address $CLIENTS $NETTYPE)")
local client_nids=$(nids_list $address "\\")
- tbf_rule_operate ost0 "start\ clients\ {$client_nids}\ 100"
- tbf_rule_operate ost0 "start\ others\ {*.*.*.*@$NETTYPE}\ 50"
+ tbf_rule_operate ost1 "start\ clients\ ${idis}{$client_nids}\ ${rateis}100"
+ tbf_rule_operate ost1 "start\ others\ ${idis}{*.*.*.*@$NETTYPE}\ ${rateis}50"
nrs_write_read
# Change the rules
- tbf_rule_operate ost0 "change\ localhost\ 1001"
- tbf_rule_operate ost0 "change\ clients\ 101"
- tbf_rule_operate ost0 "change\ others\ 51"
+ tbf_rule_operate ost1 "change\ localhost\ ${rateis}1001"
+ tbf_rule_operate ost1 "change\ clients\ ${rateis}101"
+ tbf_rule_operate ost1 "change\ others\ ${rateis}51"
nrs_write_read
# Stop the rules
- tbf_rule_operate ost0 "stop\ localhost"
- tbf_rule_operate ost0 "stop\ clients"
- tbf_rule_operate ost0 "stop\ others"
+ tbf_rule_operate ost1 "stop\ localhost"
+ tbf_rule_operate ost1 "stop\ clients"
+ tbf_rule_operate ost1 "stop\ others"
nrs_write_read
# Cleanup the TBF policy
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="fifo"
- [ $? -ne 0 ] &&
- error "failed to set policy back to fifo"
- done
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
nrs_write_read
return 0
}
run_test 77e "check TBF NID nrs policy"
test_77f() {
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ oss=$(comma_list $(osts_nodes))
+
# Configure jobid_var
local saved_jobid_var=$($LCTL get_param -n jobid_var)
if [ $saved_jobid_var != procname_uid ]; then
"$FSNAME.sys.jobid_var" procname_uid
fi
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="tbf\ jobid"
- [ $? -ne 0 ] &&
- error "failed to set TBF policy"
- done
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
- # Only operate rules on ost0 since OSTs might run on the same OSS
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="jobid="
+ rateis="rate="
+ fi
+
+ # Only operate rules on ost1 since OSTs might run on the same OSS
# Add some rules
- tbf_rule_operate ost0 "start\ runas\ {iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ 1000"
- tbf_rule_operate ost0 "start\ iozone_runas\ {iozone.$RUNAS_ID}\ 100"
- tbf_rule_operate ost0 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+ tbf_rule_operate ost1 "start\ runas\ ${idis}{iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ ${rateis}1000"
+ tbf_rule_operate ost1 "start\ iozone_runas\ ${idis}{iozone.$RUNAS_ID}\ ${rateis}100"
+ tbf_rule_operate ost1 "start\ dd_runas\ ${idis}{dd.$RUNAS_ID}\ ${rateis}50"
nrs_write_read "$RUNAS"
# Change the rules
- tbf_rule_operate ost0 "change\ runas\ 1001"
- tbf_rule_operate ost0 "change\ iozone_runas\ 101"
- tbf_rule_operate ost0 "change\ dd_runas\ 51"
+ tbf_rule_operate ost1 "change\ runas\ ${rateis}1001"
+ tbf_rule_operate ost1 "change\ iozone_runas\ ${rateis}101"
+ tbf_rule_operate ost1 "change\ dd_runas\ ${rateis}51"
nrs_write_read "$RUNAS"
# Stop the rules
- tbf_rule_operate ost0 "stop\ runas"
- tbf_rule_operate ost0 "stop\ iozone_runas"
- tbf_rule_operate ost0 "stop\ dd_runas"
+ tbf_rule_operate ost1 "stop\ runas"
+ tbf_rule_operate ost1 "stop\ iozone_runas"
+ tbf_rule_operate ost1 "stop\ dd_runas"
nrs_write_read "$RUNAS"
# Cleanup the TBF policy
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="fifo"
- [ $? -ne 0 ] &&
- error "failed to set policy back to fifo"
- done
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
nrs_write_read "$RUNAS"
local current_jobid_var=$($LCTL get_param -n jobid_var)
run_test 77f "check TBF JobID nrs policy"
test_77g() {
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="tbf\ nid"
- [ $? -ne 0 ] &&
- error "failed to set TBF policy"
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ nid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="jobid="
+ rateis="rate="
+ fi
+
+ # Add a rule that only valid for Jobid TBF. If direct change between
+ # TBF types is not supported, this operation will fail.
+ tbf_rule_operate ost1 "start\ dd_runas\ ${idis}{dd.$RUNAS_ID}\ ${rateis}50"
+
+ # Cleanup the TBF policy
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
+ return 0
+}
+run_test 77g "Change TBF type directly"
+
+test_77h() {
+ [ $(lustre_version_code ost1) -ge $(version_code 2.8.55) ] ||
+ { skip "Need OST version at least 2.8.55"; return 0; }
+
+ local old_policy=$(do_facet ost1 \
+ lctl get_param ost.OSS.ost_io.nrs_policies)
+ local new_policy
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ reg"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ reg\ abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ abc\ efg"
+ [ $? -eq 0 ] && error "should return error"
+
+ new_policy=$(do_facet ost1 lctl get_param ost.OSS.ost_io.nrs_policies)
+ [ $? -eq 0 ] || error "shouldn't LBUG"
+
+ [ "$old_policy" = "$new_policy" ] || error "NRS policy should be same"
+
+ return 0
+}
+run_test 77h "Wrong policy name should report error, not LBUG"
+
+tbf_rule_check()
+{
+ local facet=$1
+ local expected=$2
+ local error_message=$3
+ local rule_number=0
+ for rule in $expected; do
+ rule_number=$((rule_number + 1))
done
+ local stop_line=$(($rule_number + 3))
+ local awk_command="awk 'NR >= 4 && NR <= $stop_line {print \$1}'"
+
+ local output=$(do_facet $facet lctl get_param \
+ ost.OSS.ost_io.nrs_tbf_rule |
+ eval $awk_command |
+ tr "\n" " " |
+ sed 's/[ ]*$//')
+ if [ "$output" != "$expected" ]; then
+ error "$error_message, expected '$expected', got '$output'"
+ fi
+}
+
+test_77i() {
+ [ $(lustre_version_code ost1) -ge $(version_code 2.8.55) ] ||
+ { skip "Need OST version at least 2.8.55"; return 0; }
for i in $(seq 1 $OSTCOUNT)
do
error "failed to set TBF policy"
done
- # Add a rule that only valid for Jobid TBF. If direct change between
- # TBF types is not supported, this operation will fail.
- tbf_rule_operate ost0 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+ tbf_rule_check ost1 "default" "error before inserting any rule"
+
+ tbf_rule_operate ost1 "start\ before\ jobid={jobid}\ rate=1000"
+ tbf_rule_check ost1 "before default" \
+ "error when inserting rule 'before'"
+
+ tbf_rule_operate ost1 "start\ after\ jobid={jobid}\ rate=1000\ rank=default"
+ tbf_rule_check ost1 "before after default" \
+ "error when inserting rule 'after'"
+
+ tbf_rule_operate ost1 "start\ target\ jobid={jobid}\ rate=1000\ rank=after"
+ tbf_rule_check ost1 "before target after default" \
+ "error when inserting rule 'target'"
+
+ echo "Move before itself"
+ tbf_rule_operate ost1 "change\ target\ rank=target"
+ tbf_rule_check ost1 "before target after default" \
+ "error when moving before itself"
+
+ echo "Move to higher rank"
+ tbf_rule_operate ost1 "change\ target\ rank=before"
+ tbf_rule_check ost1 "target before after default" \
+ "error when moving to higher rank"
+
+ echo "Move to lower rank"
+ tbf_rule_operate ost1 "change\ target\ rank=after"
+ tbf_rule_check ost1 "before target after default" \
+ "error when moving to lower rank"
+
+ echo "Move before default"
+ tbf_rule_operate ost1 "change\ target\ rank=default"
+ tbf_rule_check ost1 "before after target default" \
+ error "error when moving before default"
# Cleanup the TBF policy
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="fifo"
- [ $? -ne 0 ] &&
- error "failed to set policy back to fifo"
- done
+ do_nodes $(comma_list $(osts_nodes)) \
+ $LCTL set_param ost.OSS.ost_io.nrs_policies=fifo
return 0
}
-run_test 77g "Change TBF type directly"
+run_test 77i "Change rank of TBF rule"
test_78() { #LU-6673
local rc
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="orr" &
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_orr_quantum=1
- rc=$?
- # Valid return codes are:
- # 0: Tuning succeeded
- # ENODEV: Policy is still stopped
- # EAGAIN: Policy is being initialized
- [ $rc -eq 0 -o $rc -eq 19 -o $rc -eq 11 ] ||
- error "Expected set_param to return 0|ENODEV|EAGAIN"
- done
+ oss=$(comma_list $(osts_nodes))
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="orr" &
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_orr_quantum=1
+ rc=$?
+ # Valid return codes are:
+ # 0: Tuning succeeded
+ # ENODEV: Policy is still stopped
+ # EAGAIN: Policy is being initialized
+ [ $rc -eq 0 -o $rc -eq 19 -o $rc -eq 11 ] ||
+ error "Expected set_param to return 0|ENODEV|EAGAIN"
# Cleanup the ORR policy
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="fifo"
- [ $? -ne 0 ] &&
- error "failed to set policy back to fifo"
- done
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
return 0
}
run_test 78 "Enable policy and specify tunings right away"
touch d0/0 || error "create 0 failed"
mv d0/0 d1/0 || error "rename d0/0 d1/0 failed"
stat d0/0 && error "stat mv filed succeed"
- mv $DIR2/$tdir/d1/0 $DIR2/$tdir/d0/0 || "rename d1/0 d0/0 failed"
+ mv $DIR2/$tdir/d1/0 $DIR2/$tdir/d0/0 || error "rename d1/0 d0/0 failed"
stat d0/0 || error "stat failed"
local t=$(ls -ai $DIR1/$tdir/d0 | sort -u | wc -l)
}
run_test 91 "chmod and unlink striped directory"
+test_92() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+
+ local fd=$(free_fd)
+ local cmd="exec $fd<$DIR1/$tdir"
+ $LFS setdirstripe -c$MDSCOUNT $DIR1/$tdir || error "mkdir $tdir fails"
+ eval $cmd
+ cmd="exec $fd<&-"
+ trap "eval $cmd" EXIT
+ cd $DIR1/$tdir || error "cd $DIR1/$tdir fails"
+ rmdir ../$tdir || error "rmdir ../$tdir fails"
+
+ #define OBD_FAIL_LLITE_NO_CHECK_DEAD 0x1408
+ $LCTL set_param fail_loc=0x1408
+ mkdir $DIR2/$tdir/dir && error "create dir succeeds"
+ $LFS setdirstripe -i1 $DIR2/$tdir/remote_dir &&
+ error "create remote dir succeeds"
+ $LCTL set_param fail_loc=0
+ eval $cmd
+ return 0
+}
+run_test 92 "create remote directory under orphan directory"
+
log "cleanup: ======================================================"
+# kill and wait in each test only guarentee script finish, but command in script
+# like 'rm' 'chmod' may still be running, wait for all commands to finish
+# otherwise umount below will fail
+wait_update $HOSTNAME "fuser -m $MOUNT2" "" || true
+
[ "$(mount | grep $MOUNT2)" ] && umount $MOUNT2
complete $SECONDS