Whamcloud - gitweb
LU-6052 utils: change "lfs mv" to "lfs migrate"
[fs/lustre-release.git] / lustre / tests / sanityn.sh
index d66cd0f..1e65fda 100644 (file)
@@ -3,18 +3,11 @@
 set -e
 
 ONLY=${ONLY:-"$*"}
-# bug number for skipped test: 3192 LU-1205 15528/3811 16929 9977 15528/11549 18080
-ALWAYS_EXCEPT="                14b  18c     19         22    28   29          35    $SANITYN_EXCEPT"
+# bug number for skipped test: 3192 LU-1205 15528/3811 9977 15528/11549 18080
+ALWAYS_EXCEPT="                14b  18c     19         28   29          35    $SANITYN_EXCEPT"
 # UPDATE THE COMMENT ABOVE WITH BUG NUMBERS WHEN CHANGING ALWAYS_EXCEPT!
 
-# bug number for skipped test:        12652 12652
-grep -q 'Enterprise Server 10' /etc/SuSE-release 2> /dev/null &&
-       ALWAYS_EXCEPT="$ALWAYS_EXCEPT 11    14" || true
-
-# It will be ported soon.
-EXCEPT="$EXCEPT 22"
-
-SRCDIR=`dirname $0`
+SRCDIR=$(dirname $0)
 PATH=$PWD/$SRCDIR:$SRCDIR:$SRCDIR/../utils:$PATH
 
 SIZE=${SIZE:-40960}
@@ -171,6 +164,18 @@ test_2f() {
 }
 run_test 2f "check attr/owner updates on DNE with 2 mtpt's"
 
+test_2g() {
+       dd if=/dev/zero of=$DIR1/$tfile oflag=sync bs=1M count=2
+
+       local block1=$(stat $DIR1/$tfile | awk '/Blocks/ {print $4} ')
+       cancel_lru_locks osc
+       local block2=$(stat $DIR2/$tfile | awk '/Blocks/ {print $4} ')
+       echo "$DIR1/$tfile has $block1 blocks"
+       echo "$DIR2/$tfile has $block2 blocks"
+       [ $block1 -eq $block2 ] || error
+}
+run_test 2g "check blocks update on sync write"
+
 test_3() {
        local target="this/is/good"
        ln -s $target $DIR1/$tfile || error "ln -s $target $DIR1/$tfile failed"
@@ -1257,6 +1262,7 @@ check_pdo_conflict() {
 test_40a() {
 #define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK    0x145
        do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
+       touch $DIR2
        mkdir $DIR1/$tfile &
        PID1=$!
        sleep 1
@@ -2523,8 +2529,10 @@ test_55d()
 run_test 55d "rename file vs link"
 
 test_60() {
-       [[ $(lustre_version_code $SINGLEMDS) -ge $(version_code 2.3.0) ]] ||
-       { skip "Need MDS version at least 2.3.0"; return; }
+       local MDSVER=$(lustre_build_version $SINGLEMDS)
+       [ $(version_code $MDSVER) -lt $(version_code 2.3.0) ] &&
+               skip "MDS version $MDSVER must be >= 2.3.0" && return 0
+
        # Create a file
        test_mkdir -p $DIR1/$tdir
        file1=$DIR1/$tdir/file
@@ -2808,6 +2816,265 @@ test_76() { #LU-946
 }
 run_test 76 "Verify open file for 2048 files"
 
+nrs_write_read() {
+       local n=16
+       local dir=$DIR/$tdir
+       local myRUNAS="$1"
+
+       mkdir $dir || error "mkdir $dir failed"
+       $LFS setstripe -c $OSTCOUNT $dir || error "setstripe to $dir failed"
+       chmod 777 $dir
+
+       do_nodes $CLIENTS $myRUNAS dd if=/dev/zero of="$dir/nrs_r_$HOSTNAME"\
+               bs=1M count=$n > /dev/null 2>&1
+
+       for ((i = 0; i < $n; i++)); do
+               do_nodes $CLIENTS $myRUNAS dd if=/dev/zero\
+                       of="$dir/nrs_w_$HOSTNAME" bs=1M seek=$i count=1\
+                        > /dev/null 2>&1 &
+               local pids_w[$i]=$!
+       done
+       do_nodes $CLIENTS sync;
+       cancel_lru_locks osc
+
+       for ((i = 0; i < $n; i++)); do
+               do_nodes $CLIENTS $myRUNAS dd if="$dir/nrs_w_$HOSTNAME"\
+                       of=/dev/zero bs=1M seek=$i count=1 > /dev/null 2>&1 &
+               local pids_r[$i]=$!
+       done
+       cancel_lru_locks osc
+
+       for ((i = 0; i < $n; i++)); do
+               wait ${pids_w[$i]}
+               wait ${pids_r[$i]}
+       done
+       rm -rf $dir || error "rm -rf $dir failed"
+}
+
+test_77a() { #LU-3266
+       do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_policies="fifo"
+       nrs_write_read
+
+       return 0
+}
+run_test 77a "check FIFO NRS policy"
+
+
+test_77b() { #LU-3266
+       do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_policies="crrn"
+       do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_crrn_quantum=1
+
+       echo "policy: crr-n, crrn_quantum 1"
+       nrs_write_read
+
+       do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_crrn_quantum=64
+
+       echo "policy: crr-n, crrn_quantum 64"
+       nrs_write_read
+
+       return 0
+}
+run_test 77b "check CRR-N NRS policy"
+
+orr_trr() {
+       local policy=$1
+
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.ost_io.nrs_policies=$policy
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.*.nrs_"$policy"_quantum=1
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.*.nrs_"$policy"_offset_type="physical"
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.*.nrs_"$policy"_supported="reads"
+       done
+
+       echo "policy: $policy, ${policy}_quantum 1, ${policy}_offset_type \
+                               physical, ${policy}_supported reads"
+       nrs_write_read
+
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.*.nrs_${policy}_supported="writes"
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.*.nrs_${policy}_quantum=64
+       done
+       echo "policy: $policy, ${policy}_quantum 64, \
+               ${policy}_offset_type physical, ${policy}_supported writes"
+       nrs_write_read
+
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.*.nrs_${policy}_supported="reads_and_writes"
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.*.nrs_${policy}_offset_type="logical"
+       done
+       echo "policy: $policy, ${policy}_quantum 64, \
+               ${policy}_offset_type logical, ${policy}_supported reads_and_writes"
+       nrs_write_read
+
+       return 0
+}
+
+test_77c() { #LU-3266
+       orr_trr "orr"
+       return 0
+}
+run_test 77c "check ORR NRS policy"
+
+test_77d() { #LU-3266
+       orr_trr "trr"
+       return 0
+}
+run_test 77d "check TRR nrs policy"
+
+tbf_rule_operate()
+{
+       local facet=$1
+       shift 1
+
+       do_facet $facet lctl set_param \
+               ost.OSS.ost_io.nrs_tbf_rule="$@"
+       [ $? -ne 0 ] &&
+               error "failed to operate on TBF rules"
+}
+
+test_77e() {
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.ost_io.nrs_policies="tbf\ nid"
+               [ $? -ne 0 ] &&
+                       error "failed to set TBF policy"
+       done
+
+       # Only operate rules on ost0 since OSTs might run on the same OSS
+       # Add some rules
+       tbf_rule_operate ost0 "start\ localhost\ {0@lo}\ 1000"
+       local address=$(comma_list "$(host_nids_address $CLIENTS $NETTYPE)")
+       local client_nids=$(nids_list $address "\\")
+       tbf_rule_operate ost0 "start\ clients\ {$client_nids}\ 100"
+       tbf_rule_operate ost0 "start\ others\ {*.*.*.*@$NETTYPE}\ 50"
+       nrs_write_read
+
+       # Change the rules
+       tbf_rule_operate ost0 "change\ localhost\ 1001"
+       tbf_rule_operate ost0 "change\ clients\ 101"
+       tbf_rule_operate ost0 "change\ others\ 51"
+       nrs_write_read
+
+       # Stop the rules
+       tbf_rule_operate ost0 "stop\ localhost"
+       tbf_rule_operate ost0 "stop\ clients"
+       tbf_rule_operate ost0 "stop\ others"
+       nrs_write_read
+
+       # Cleanup the TBF policy
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.ost_io.nrs_policies="fifo"
+               [ $? -ne 0 ] &&
+                       error "failed to set policy back to fifo"
+       done
+       nrs_write_read
+       return 0
+}
+run_test 77e "check TBF NID nrs policy"
+
+test_77f() {
+       # Configure jobid_var
+       local saved_jobid_var=$($LCTL get_param -n jobid_var)
+       if [ $saved_jobid_var != procname_uid ]; then
+               set_conf_param_and_check client                 \
+                       "$LCTL get_param -n jobid_var"          \
+                       "$FSNAME.sys.jobid_var" procname_uid
+       fi
+
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+               [ $? -ne 0 ] &&
+                       error "failed to set TBF policy"
+       done
+
+       # Only operate rules on ost0 since OSTs might run on the same OSS
+       # Add some rules
+       tbf_rule_operate ost0 "start\ runas\ {iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ 1000"
+       tbf_rule_operate ost0 "start\ iozone_runas\ {iozone.$RUNAS_ID}\ 100"
+       tbf_rule_operate ost0 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+       nrs_write_read "$RUNAS"
+
+       # Change the rules
+       tbf_rule_operate ost0 "change\ runas\ 1001"
+       tbf_rule_operate ost0 "change\ iozone_runas\ 101"
+       tbf_rule_operate ost0 "change\ dd_runas\ 51"
+       nrs_write_read "$RUNAS"
+
+       # Stop the rules
+       tbf_rule_operate ost0 "stop\ runas"
+       tbf_rule_operate ost0 "stop\ iozone_runas"
+       tbf_rule_operate ost0 "stop\ dd_runas"
+       nrs_write_read "$RUNAS"
+
+       # Cleanup the TBF policy
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.ost_io.nrs_policies="fifo"
+               [ $? -ne 0 ] &&
+                       error "failed to set policy back to fifo"
+       done
+       nrs_write_read "$RUNAS"
+
+       local current_jobid_var=$($LCTL get_param -n jobid_var)
+       if [ $saved_jobid_var != $current_jobid_var ]; then
+               set_conf_param_and_check client                 \
+                       "$LCTL get_param -n jobid_var"          \
+                       "$FSNAME.sys.jobid_var" $saved_jobid_var
+       fi
+       return 0
+}
+run_test 77f "check TBF JobID nrs policy"
+
+test_77g() {
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.ost_io.nrs_policies="tbf\ nid"
+               [ $? -ne 0 ] &&
+                       error "failed to set TBF policy"
+       done
+
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+               [ $? -ne 0 ] &&
+                       error "failed to set TBF policy"
+       done
+
+       # Add a rule that only valid for Jobid TBF. If direct change between
+       # TBF types is not supported, this operation will fail.
+       tbf_rule_operate ost0 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+
+       # Cleanup the TBF policy
+       for i in $(seq 1 $OSTCOUNT)
+       do
+               do_facet ost"$i" lctl set_param \
+                       ost.OSS.ost_io.nrs_policies="fifo"
+               [ $? -ne 0 ] &&
+                       error "failed to set policy back to fifo"
+       done
+       return 0
+}
+run_test 77g "Change TBF type directly"
+
 test_80() {
        [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
        local MDTIDX=1
@@ -2828,12 +3095,12 @@ test_80() {
        # give multiop a chance to open
        sleep 1
 
-       $LFS mv -M $MDTIDX $DIR1/$tdir &&
+       $LFS migrate -m $MDTIDX $DIR1/$tdir &&
                error "migrate open files should failed with open files"
 
        kill -USR1 $pid
 
-       $LFS mv -M $MDTIDX $DIR1/$tdir ||
+       $LFS migrate -m $MDTIDX $DIR1/$tdir ||
                        error "migrate remote dir error"
 
        echo "Finish migration, then checking.."