# LU-2829 / LU-2887 - make allowances for ZFS slowness
TEST33_NFILES=${TEST33_NFILES:-1000}
fi
-
+# 23 (min)"
[ "$SLOW" = "no" ] && EXCEPT_SLOW="33a"
FAIL_ON_ERROR=false
check_and_setup_lustre
-LOVNAME=$($LCTL get_param -n llite.*.lov.common_name | tail -n 1)
-OSTCOUNT=$($LCTL get_param -n lov.$LOVNAME.numobd)
-
assert_DIR
rm -rf $DIR1/[df][0-9]* $DIR1/lnk $DIR/[df].${TESTSUITE}*
}
run_test 13 "test directory page revocation ===================="
-test_14() {
+test_14aa() {
test_mkdir -p $DIR1/$tdir
cp -p /bin/ls $DIR1/$tdir/$tfile
multiop_bg_pause $DIR1/$tdir/$tfile Ow_c || return 1
kill -USR1 $MULTIPID
wait $MULTIPID || return 2
}
-run_test 14 "execution of file open for write returns -ETXTBSY ="
+run_test 14aa "execution of file open for write returns -ETXTBSY"
-test_14a() {
+test_14ab() {
test_mkdir -p $DIR1/d14
cp -p `which multiop` $DIR1/d14/multiop || error "cp failed"
MULTIOP_PROG=$DIR1/d14/multiop multiop_bg_pause $TMP/test14.junk O_c || return 1
wait $MULTIOP_PID || return 3
rm $TMP/test14.junk $DIR1/d14/multiop || error "removing multiop"
}
-run_test 14a "open(RDWR) of executing file returns -ETXTBSY ===="
+run_test 14ab "open(RDWR) of executing file returns -ETXTBSY"
test_14b() { # bug 3192, 7040
test_mkdir -p $DIR1/d14
avgjbd=0
avgtime=0
for i in 1 2 3; do
- do_node $CLIENT1 "$LFS mkdir -i $MDTIDX -p \
+ do_node $CLIENT1 "$LFS mkdir -i $MDTIDX \
$DIR1/$tdir-\\\$(hostname)-$i"
jbdold=$(print_jbd_stat)
}
run_test 33b "COS: cross create/delete, 2 clients, benchmark under remote dir"
+test_33c() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ [ $(lustre_version_code $SINGLEMDS) -lt $(version_code 2.7.63) ] &&
+ skip "DNE CoS not supported" && return
+
+ sync
+
+ mkdir $DIR/$tdir
+ # remote mkdir is done on MDT2, which enqueued lock of $tdir on MDT1
+ $LFS mkdir -i 1 $DIR/$tdir/d1
+ do_facet mds1 "lctl set_param -n mdt.*.sync_count=0"
+ mkdir $DIR/$tdir/d2
+ local sync_count=$(do_facet mds1 \
+ "lctl get_param -n mdt.*MDT0000.sync_count")
+ [ $sync_count -eq 1 ] || error "Sync-Lock-Cancel not triggered"
+
+ $LFS mkdir -i 1 $DIR/$tdir/d3
+ do_facet mds1 "lctl set_param -n mdt.*.sync_count=0"
+ # during sleep remote mkdir should have been committed and canceled
+ # remote lock spontaneously, which shouldn't trigger sync
+ sleep 6
+ mkdir $DIR/$tdir/d4
+ local sync_count=$(do_facet mds1 \
+ "lctl get_param -n mdt.*MDT0000.sync_count")
+ [ $sync_count -eq 0 ] || error "Sync-Lock-Cancel triggered"
+}
+run_test 33c "Cancel cross-MDT lock should trigger Sync-Lock-Cancel"
+
+ops_do_cos() {
+ local nodes=$(comma_list $(mdts_nodes))
+ do_nodes $nodes "lctl set_param -n mdt.*.async_commit_count=0"
+ sh -c "$@"
+ local async_commit_count=$(do_nodes $nodes \
+ "lctl get_param -n mdt.*.async_commit_count" | calc_sum)
+ [ $async_commit_count -gt 0 ] || error "CoS not triggerred"
+
+ rm -rf $DIR/$tdir
+ sync
+}
+
+test_33d() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ [ $(lustre_version_code $SINGLEMDS) -lt $(version_code 2.7.63) ] &&
+ skip "DNE CoS not supported" && return
+
+ sync
+ # remote directory create
+ mkdir $DIR/$tdir
+ ops_do_cos "$LFS mkdir -i 1 $DIR/$tdir/subdir"
+ # remote directory unlink
+ $LFS mkdir -i 1 $DIR/$tdir
+ ops_do_cos "rmdir $DIR/$tdir"
+ # striped directory create
+ mkdir $DIR/$tdir
+ ops_do_cos "$LFS mkdir -c 2 $DIR/$tdir/subdir"
+ # striped directory setattr
+ $LFS mkdir -c 2 $DIR/$tdir
+ touch $DIR/$tdir
+ ops_do_cos "chmod 713 $DIR/$tdir"
+ # striped directory unlink
+ $LFS mkdir -c 2 $DIR/$tdir
+ touch $DIR/$tdir
+ ops_do_cos "rmdir $DIR/$tdir"
+ # cross-MDT link
+ $LFS mkdir -c 2 $DIR/$tdir
+ $LFS mkdir -i 0 $DIR/$tdir/d1
+ $LFS mkdir -i 1 $DIR/$tdir/d2
+ touch $DIR/$tdir/d1/tgt
+ ops_do_cos "ln $DIR/$tdir/d1/tgt $DIR/$tdir/d2/src"
+ # cross-MDT rename
+ $LFS mkdir -c 2 $DIR/$tdir
+ $LFS mkdir -i 0 $DIR/$tdir/d1
+ $LFS mkdir -i 1 $DIR/$tdir/d2
+ touch $DIR/$tdir/d1/src
+ ops_do_cos "mv $DIR/$tdir/d1/src $DIR/$tdir/d2/tgt"
+ # migrate
+ $LFS mkdir -i 0 $DIR/$tdir
+ ops_do_cos "$LFS migrate -m 1 $DIR/$tdir"
+ return 0
+}
+run_test 33d "DNE distributed operation should trigger COS"
+
+test_33e() {
+ [ -n "$CLIENTS" ] || { skip "Need two or more clients" && return 0; }
+ [ $CLIENTCOUNT -ge 2 ] ||
+ { skip "Need two or more clients, have $CLIENTCOUNT" &&
+ return 0; }
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ [ $(lustre_version_code $SINGLEMDS) -lt $(version_code 2.7.63) ] &&
+ skip "DNE CoS not supported" && return
+
+ local client2=${CLIENT2:-$(hostname)}
+
+ sync
+
+ local nodes=$(comma_list $(mdts_nodes))
+ do_nodes $nodes "lctl set_param -n mdt.*.async_commit_count=0"
+
+ $LFS mkdir -c 2 $DIR/$tdir
+ mkdir $DIR/$tdir/subdir
+ echo abc > $DIR/$tdir/$tfile
+ do_node $client2 echo dfg >> $DIR/$tdir/$tfile
+ do_node $client2 touch $DIR/$tdir/subdir
+
+ local async_commit_count=$(do_nodes $nodes \
+ "lctl get_param -n mdt.*.async_commit_count" | calc_sum)
+ [ $async_commit_count -gt 0 ] && error "CoS triggerred"
+
+ return 0
+}
+run_test 33e "DNE local operation shouldn't trigger COS"
+
# End commit on sharing tests
get_ost_lock_timeouts() {
}
test_34() { #16129
+ remote_ost_nodsh && skip "remote OST with nodsh" && return
local OPER
local lock_in
local lock_out
# pdirop tests
# test 40: check non-blocking operations
test_40a() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
touch $DIR2
rmdir $DIR2/$tfile-3
check_pdo_conflict $PID1 || error "unlink is blocked"
- # all operations above shouldn't wait the first one
+ # all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40a "pdirops: create vs others =============="
test_40b() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
touch $DIR1/$tfile &
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40b "pdirops: open|create and others =============="
test_40c() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
touch $DIR1/$tfile
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
# all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40c "pdirops: link and others =============="
test_40d() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
touch $DIR1/$tfile
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
run_test 40d "pdirops: unlink and others =============="
test_40e() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
touch $DIR1/$tfile
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
# all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40e "pdirops: rename and others =============="
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; echo "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41a "pdirops: create vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41b "pdirops: create vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41c "pdirops: create vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41d "pdirops: create vs unlink =============="
sleep 1
mv $DIR2/$tfile-2 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41e "pdirops: create and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41f "pdirops: create and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41g "pdirops: create vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41h "pdirops: create vs readdir =============="
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42a "pdirops: mkdir vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42b "pdirops: mkdir vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42c "pdirops: mkdir vs link =============="
sleep 1
rmdir $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42d "pdirops: mkdir vs unlink =============="
sleep 1
mv -T $DIR2/$tfile-2 $DIR2/$tfile && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42e "pdirops: mkdir and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42f "pdirops: mkdir and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42g "pdirops: mkdir vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42h "pdirops: mkdir vs readdir =============="
sleep 1
mkdir $DIR2/$tfile || error "mkdir must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43a "pdirops: unlink vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c || error "create must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43b "pdirops: unlink vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile || error "link must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43c "pdirops: unlink vs link =============="
sleep 1
rm $DIR2/$tfile && error "unlink must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43d "pdirops: unlink vs unlink =============="
sleep 1
mv -u $DIR2/$tfile-2 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43e "pdirops: unlink and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43f "pdirops: unlink and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null && error "stat must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43g "pdirops: unlink vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43h "pdirops: unlink vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile || error "remote mkdir must succeed"
check_pdo_conflict $PID1 &&
{ wait $PID1; error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43i "pdirops: unlink vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44a "pdirops: rename tgt vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44b "pdirops: rename tgt vs create =============="
sleep 1
link $DIR2/$tfile-3 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44c "pdirops: rename tgt vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44d "pdirops: rename tgt vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44e "pdirops: rename tgt and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44f "pdirops: rename tgt and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44g "pdirops: rename tgt vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44h "pdirops: rename tgt vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile && error "remote mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44i "pdirops: rename tgt vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile || error "mkdir must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45a "pdirops: rename src vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c || error "create must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45b "pdirops: rename src vs create =============="
sleep 1
link $DIR2/$tfile-3 $DIR2/$tfile || error "link must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45c "pdirops: rename src vs link =============="
sleep 1
rm $DIR2/$tfile && error "unlink must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45d "pdirops: rename src vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45e "pdirops: rename src and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45f "pdirops: rename src and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null && error "stat must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45g "pdirops: rename src vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45h "pdirops: unlink vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile || error "create remote dir must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "create remote dir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45i "pdirops: rename src vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46a "pdirops: link vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46b "pdirops: link vs create =============="
sleep 1
link $DIR2/$tfile $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46c "pdirops: link vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46d "pdirops: link vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46e "pdirops: link and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46f "pdirops: link and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46g "pdirops: link vs getattr =============="
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1;
error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46h "pdirops: link vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile && error "remote mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46i "pdirops: link vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47a "pdirops: remote mkdir vs mkdir"
multiop $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47b "pdirops: remote mkdir vs create"
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47c "pdirops: remote mkdir vs link"
rmdir $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47d "pdirops: remote mkdir vs unlink"
mv -T $DIR2/$tfile-2 $DIR2/$tfile && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47e "pdirops: remote mkdir and rename (tgt)"
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47f "pdirops: remote mkdir and rename (src)"
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47g "pdirops: remote mkdir vs getattr"
shift 1
do_facet $facet lctl set_param \
- ost.OSS.ost_io.nrs_tbf_rule="$@"
+ ost.OSS.ost_io.nrs_tbf_rule="$*"
[ $? -ne 0 ] &&
error "failed to operate on TBF rules"
}
error "failed to set TBF policy"
done
- # Only operate rules on ost0 since OSTs might run on the same OSS
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="nid="
+ rateis="rate="
+ fi
+
+ # Only operate rules on ost1 since OSTs might run on the same OSS
# Add some rules
- tbf_rule_operate ost0 "start\ localhost\ {0@lo}\ 1000"
+ tbf_rule_operate ost1 "start\ localhost\ ${idis}{0@lo}\ ${rateis}1000"
local address=$(comma_list "$(host_nids_address $CLIENTS $NETTYPE)")
local client_nids=$(nids_list $address "\\")
- tbf_rule_operate ost0 "start\ clients\ {$client_nids}\ 100"
- tbf_rule_operate ost0 "start\ others\ {*.*.*.*@$NETTYPE}\ 50"
+ tbf_rule_operate ost1 "start\ clients\ ${idis}{$client_nids}\ ${rateis}100"
+ tbf_rule_operate ost1 "start\ others\ ${idis}{*.*.*.*@$NETTYPE}\ ${rateis}50"
nrs_write_read
# Change the rules
- tbf_rule_operate ost0 "change\ localhost\ 1001"
- tbf_rule_operate ost0 "change\ clients\ 101"
- tbf_rule_operate ost0 "change\ others\ 51"
+ tbf_rule_operate ost1 "change\ localhost\ ${rateis}1001"
+ tbf_rule_operate ost1 "change\ clients\ ${rateis}101"
+ tbf_rule_operate ost1 "change\ others\ ${rateis}51"
nrs_write_read
# Stop the rules
- tbf_rule_operate ost0 "stop\ localhost"
- tbf_rule_operate ost0 "stop\ clients"
- tbf_rule_operate ost0 "stop\ others"
+ tbf_rule_operate ost1 "stop\ localhost"
+ tbf_rule_operate ost1 "stop\ clients"
+ tbf_rule_operate ost1 "stop\ others"
nrs_write_read
# Cleanup the TBF policy
error "failed to set TBF policy"
done
- # Only operate rules on ost0 since OSTs might run on the same OSS
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="jobid="
+ rateis="rate="
+ fi
+
+ # Only operate rules on ost1 since OSTs might run on the same OSS
# Add some rules
- tbf_rule_operate ost0 "start\ runas\ {iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ 1000"
- tbf_rule_operate ost0 "start\ iozone_runas\ {iozone.$RUNAS_ID}\ 100"
- tbf_rule_operate ost0 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+ tbf_rule_operate ost1 "start\ runas\ ${idis}{iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ ${rateis}1000"
+ tbf_rule_operate ost1 "start\ iozone_runas\ ${idis}{iozone.$RUNAS_ID}\ ${rateis}100"
+ tbf_rule_operate ost1 "start\ dd_runas\ ${idis}{dd.$RUNAS_ID}\ ${rateis}50"
nrs_write_read "$RUNAS"
# Change the rules
- tbf_rule_operate ost0 "change\ runas\ 1001"
- tbf_rule_operate ost0 "change\ iozone_runas\ 101"
- tbf_rule_operate ost0 "change\ dd_runas\ 51"
+ tbf_rule_operate ost1 "change\ runas\ ${rateis}1001"
+ tbf_rule_operate ost1 "change\ iozone_runas\ ${rateis}101"
+ tbf_rule_operate ost1 "change\ dd_runas\ ${rateis}51"
nrs_write_read "$RUNAS"
# Stop the rules
- tbf_rule_operate ost0 "stop\ runas"
- tbf_rule_operate ost0 "stop\ iozone_runas"
- tbf_rule_operate ost0 "stop\ dd_runas"
+ tbf_rule_operate ost1 "stop\ runas"
+ tbf_rule_operate ost1 "stop\ iozone_runas"
+ tbf_rule_operate ost1 "stop\ dd_runas"
nrs_write_read "$RUNAS"
# Cleanup the TBF policy
error "failed to set TBF policy"
done
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="jobid="
+ rateis="rate="
+ fi
+
# Add a rule that only valid for Jobid TBF. If direct change between
# TBF types is not supported, this operation will fail.
- tbf_rule_operate ost0 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+ tbf_rule_operate ost1 "start\ dd_runas\ ${idis}{dd.$RUNAS_ID}\ ${rateis}50"
# Cleanup the TBF policy
for i in $(seq 1 $OSTCOUNT)
}
run_test 77g "Change TBF type directly"
-test_80() {
+test_77h() {
+ [ $(lustre_version_code ost1) -ge $(version_code 2.8.55) ] ||
+ { skip "Need OST version at least 2.8.55"; return 0; }
+
+ local old_policy=$(do_facet ost1 \
+ lctl get_param ost.OSS.ost_io.nrs_policies)
+ local new_policy
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ reg"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ reg\ abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ abc\ efg"
+ [ $? -eq 0 ] && error "should return error"
+
+ new_policy=$(do_facet ost1 lctl get_param ost.OSS.ost_io.nrs_policies)
+ [ $? -eq 0 ] || error "shouldn't LBUG"
+
+ [ "$old_policy" = "$new_policy" ] || error "NRS policy should be same"
+
+ return 0
+}
+run_test 77h "Wrong policy name should report error, not LBUG"
+
+test_78() { #LU-6673
+ local rc
+
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="orr" &
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.*.nrs_orr_quantum=1
+ rc=$?
+ # Valid return codes are:
+ # 0: Tuning succeeded
+ # ENODEV: Policy is still stopped
+ # EAGAIN: Policy is being initialized
+ [ $rc -eq 0 -o $rc -eq 19 -o $rc -eq 11 ] ||
+ error "Expected set_param to return 0|ENODEV|EAGAIN"
+ done
+
+ # Cleanup the ORR policy
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] &&
+ error "failed to set policy back to fifo"
+ done
+ return 0
+}
+run_test 78 "Enable policy and specify tunings right away"
+
+test_80a() {
[ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
local MDTIDX=1
local mdt_index
rm -rf $DIR1/$tdir || error "rm dir failed after migration"
}
-run_test 80 "migrate directory when some children is being opened"
+run_test 80a "migrate directory when some children is being opened"
+
+cleanup_80b() {
+ trap 0
+ kill -9 $migrate_pid
+}
+
+test_80b() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local migrate_dir1=$DIR1/$tdir/migrate_dir
+ local migrate_dir2=$DIR2/$tdir/migrate_dir
+ local migrate_run=$LUSTRE/tests/migrate.sh
+ local start_time
+ local end_time
+ local show_time=1
+ local mdt_idx
+ local rc=0
+ local rc1=0
+
+ trap cleanup_80b EXIT
+ #prepare migrate directory
+ mkdir -p $migrate_dir1
+ for F in {1,2,3,4,5}; do
+ echo "$F$F$F$F$F" > $migrate_dir1/file$F
+ echo "$F$F$F$F$F" > $DIR/$tdir/file$F
+ done
+
+ #migrate the directories among MDTs
+ (
+ while true; do
+ mdt_idx=$((RANDOM % MDSCOUNT))
+ $LFS migrate -m $mdt_idx $migrate_dir1 2&>/dev/null ||
+ rc=$?
+ [ $rc -ne 0 -o $rc -ne 16 ] || break
+ done
+ ) &
+ migrate_pid=$!
+
+ echo "start migration thread $migrate_pid"
+ #Access the files at the same time
+ start_time=$(date +%s)
+ echo "accessing the migrating directory for 5 minutes..."
+ while true; do
+ ls $migrate_dir2 > /dev/null || {
+ echo "read dir fails"
+ break
+ }
+ diff -u $DIR2/$tdir/file1 $migrate_dir2/file1 || {
+ echo "access file1 fails"
+ break
+ }
+
+ cat $migrate_dir2/file2 > $migrate_dir2/file3 || {
+ echo "access file2/3 fails"
+ break
+ }
+
+ echo "aaaaa" > $migrate_dir2/file4 > /dev/null || {
+ echo "access file4 fails"
+ break
+ }
+
+ stat $migrate_dir2/file5 > /dev/null || {
+ echo "stat file5 fails"
+ break
+ }
+
+ touch $migrate_dir2/source_file > /dev/null || rc1=$?
+ [ $rc1 -ne 0 -o $rc1 -ne 1 ] || {
+ echo "touch file failed with $rc1"
+ break;
+ }
+
+ if [ -e $migrate_dir2/source_file ]; then
+ ln $migrate_dir2/source_file $migrate_dir2/link_file \
+ 2&>/dev/null || rc1=$?
+ if [ -e $migrate_dir2/link_file ]; then
+ rm -rf $migrate_dir2/link_file
+ fi
+
+ mrename $migrate_dir2/source_file \
+ $migrate_dir2/target_file 2&>/dev/null || rc1=$?
+ [ $rc1 -ne 0 -o $rc1 -ne 1 ] || {
+ echo "rename failed with $rc1"
+ break
+ }
+
+ if [ -e $migrate_dir2/target_file ]; then
+ rm -rf $migrate_dir2/target_file 2&>/dev/null ||
+ rc1=$?
+ else
+ rm -rf $migrate_dir2/source_file 2&>/dev/null ||
+ rc1=$?
+ fi
+ [ $rc1 -ne 0 -o $rc1 -ne 1 ] || {
+ echo "unlink failed with $rc1"
+ break
+ }
+ fi
+
+ end_time=$(date +%s)
+ duration=$((end_time - start_time))
+ if [ $((duration % 10)) -eq 0 ]; then
+ if [ $show_time -eq 1 ]; then
+ echo "...$duration seconds"
+ show_time=0
+ fi
+ else
+ show_time=1
+ fi
+
+ kill -0 $migrate_pid || {
+ echo "migration stopped 1"
+ break
+ }
+
+ [ $duration -ge 300 ] && break
+ done
+
+ #check migration are still there
+ kill -0 $migrate_pid || error "migration stopped 2"
+ cleanup_80b
+}
+run_test 80b "Accessing directory during migration"
test_81() {
[ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
touch d0/0 || error "create 0 failed"
mv d0/0 d1/0 || error "rename d0/0 d1/0 failed"
stat d0/0 && error "stat mv filed succeed"
- mv $DIR2/$tdir/d1/0 $DIR2/$tdir/d0/0 || "rename d1/0 d0/0 failed"
+ mv $DIR2/$tdir/d1/0 $DIR2/$tdir/d0/0 || error "rename d1/0 d0/0 failed"
stat d0/0 || error "stat failed"
local t=$(ls -ai $DIR1/$tdir/d0 | sort -u | wc -l)
}
run_test 82 "fsetxattr and fgetxattr on orphan files"
+test_83() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local pid1
+ local pid2
+
+ (
+ cd $DIR1
+ while true; do
+ $LFS mkdir -i1 -c2 $tdir
+ rmdir $tdir
+ done
+ ) &
+ pid1=$!
+ echo "start pid $pid1 to create/unlink striped directory"
+
+ # Access the directory at the same time
+ (
+ cd $DIR2
+ while true; do
+ stat $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid2=$!
+ echo "start pid $pid2 to stat striped directory"
+
+ sleep 120
+ kill $pid1 $pid2
+ wait $pid1 $pid2
+
+ return 0
+}
+run_test 83 "access striped directory while it is being created/unlinked"
+
+test_90() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local pid1
+ local pid2
+ local duration=180
+
+ [ "$SLOW" = "yes" ] && duration=600
+ # Open/Create under striped directory
+ (
+ cd $DIR1
+ while true; do
+ $LFS mkdir -c$MDSCOUNT $tdir > /dev/null 2>&1
+ touch $tdir/f{0..3} > /dev/null 2>&1
+ done
+ ) &
+ pid1=$!
+ echo "start pid $pid1 to open/create under striped directory"
+
+ # unlink the striped directory at the same time
+ (
+ cd $DIR2
+ while true; do
+ rm -rf $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid2=$!
+ echo "start pid $pid2 to unlink striped directory"
+
+ sleep $duration
+
+ kill $pid1 $pid2
+ wait $pid1 $pid2
+
+ return 0
+}
+run_test 90 "open/create and unlink striped directory"
+
+test_91() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local pid1
+ local pid2
+ local duration=180
+
+ [ "$SLOW" = "yes" ] && duration=600
+ # chmod striped directory
+ (
+ cd $DIR1
+ while true; do
+ $LFS mkdir -c$MDSCOUNT $tdir > /dev/null 2>&1
+ chmod go+w $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid1=$!
+ echo "start pid $pid1 to chmod striped directory"
+
+ # unlink the striped directory at the same time
+ (
+ cd $DIR2
+ while true; do
+ rm -rf $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid2=$!
+ echo "start pid $pid2 to unlink striped directory"
+
+ sleep $duration
+
+ kill $pid1 $pid2
+ wait $pid1 $pid2
+
+ return 0
+}
+run_test 91 "chmod and unlink striped directory"
+
+test_92() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+
+ local fd=$(free_fd)
+ local cmd="exec $fd<$DIR1/$tdir"
+ $LFS setdirstripe -c$MDSCOUNT $DIR1/$tdir || error "mkdir $tdir fails"
+ eval $cmd
+ cmd="exec $fd<&-"
+ trap "eval $cmd" EXIT
+ cd $DIR1/$tdir || error "cd $DIR1/$tdir fails"
+ rmdir ../$tdir || error "rmdir ../$tdir fails"
+
+ #define OBD_FAIL_LLITE_NO_CHECK_DEAD 0x1408
+ $LCTL set_param fail_loc=0x1408
+ mkdir $DIR2/$tdir/dir && error "create dir succeeds"
+ $LFS setdirstripe -i1 $DIR2/$tdir/remote_dir &&
+ error "create remote dir succeeds"
+ $LCTL set_param fail_loc=0
+ eval $cmd
+ return 0
+}
+run_test 92 "create remote directory under orphan directory"
+
log "cleanup: ======================================================"
+# kill and wait in each test only guarentee script finish, but command in script
+# like 'rm' 'chmod' may still be running, wait for all commands to finish
+# otherwise umount below will fail
+wait_update $HOSTNAME "fuser -m $MOUNT2" "" || true
+
[ "$(mount | grep $MOUNT2)" ] && umount $MOUNT2
complete $SECONDS