sync; sleep 5; sync # wait for delete thread
while [ $i -le 10 ]; do
- lctl mark "$HOSTNAME start test loop $i"
+ lctl mark "start test"
local before=$(lfs_df $MOUNT1 | awk '/^filesystem/{ print $4; exit }')
dd if=/dev/zero of=$DIR1/$tdir/$tfile bs=1M count=$SIZE ||
error "dd $DIR1/$tdir/$tfile ${SIZE}MB failed"
}
run_test 39c "check truncate mtime update ======================"
+test_39d() { # LU-7310
+ touch $DIR1/$tfile
+ touch -m -d @$TEST_39_MTIME $DIR1/$tfile
+
+ local mtime1=$(stat -c %Y $DIR2/$tfile)
+ [ "$mtime1" = $TEST_39_MTIME ] ||
+ error "mtime: $mtime1, should be $TEST_39_MTIME"
+
+ # force sync write
+ # define OBD_FAIL_OSC_NO_GRANT 0x411
+ $LCTL set_param fail_loc=0x411
+
+ local d1=$(date +%s)
+ echo hello >> $DIR1/$tfile
+ local d2=$(date +%s)
+
+ $LCTL set_param fail_loc=0
+
+ cancel_lru_locks osc
+
+ local mtime2=$(stat -c %Y $DIR2/$tfile)
+ [ "$mtime2" -ge "$d1" ] && [ "$mtime2" -le "$d2" ] ||
+ error "mtime is not updated on write: $d1 <= $mtime2 <= $d2"
+}
+run_test 39d "sync write should update mtime"
+
# check that pid exists hence second operation wasn't blocked by first one
# if it is so then there is no conflict, return 0
# else second operation is conflicting with first one, return 1
rmdir $DIR2/$tfile-3
check_pdo_conflict $PID1 || error "unlink is blocked"
- # all operations above shouldn't wait the first one
+ # all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40a "pdirops: create vs others =============="
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40b "pdirops: open|create and others =============="
# all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40c "pdirops: link and others =============="
# all operations above shouldn't wait the first one
check_pdo_conflict $PID1 || error "parallel operation is blocked"
wait $PID1
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 40e "pdirops: rename and others =============="
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; echo "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41a "pdirops: create vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41b "pdirops: create vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41c "pdirops: create vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41d "pdirops: create vs unlink =============="
sleep 1
mv $DIR2/$tfile-2 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41e "pdirops: create and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41f "pdirops: create and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41g "pdirops: create vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 41h "pdirops: create vs readdir =============="
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42a "pdirops: mkdir vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42b "pdirops: mkdir vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42c "pdirops: mkdir vs link =============="
sleep 1
rmdir $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42d "pdirops: mkdir vs unlink =============="
sleep 1
mv -T $DIR2/$tfile-2 $DIR2/$tfile && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42e "pdirops: mkdir and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42f "pdirops: mkdir and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42g "pdirops: mkdir vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 42h "pdirops: mkdir vs readdir =============="
sleep 1
mkdir $DIR2/$tfile || error "mkdir must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43a "pdirops: unlink vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c || error "create must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43b "pdirops: unlink vs create =============="
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile || error "link must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43c "pdirops: unlink vs link =============="
sleep 1
rm $DIR2/$tfile && error "unlink must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43d "pdirops: unlink vs unlink =============="
sleep 1
mv -u $DIR2/$tfile-2 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43e "pdirops: unlink and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-2 && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43f "pdirops: unlink and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null && error "stat must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43g "pdirops: unlink vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43h "pdirops: unlink vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile || error "remote mkdir must succeed"
check_pdo_conflict $PID1 &&
{ wait $PID1; error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 43i "pdirops: unlink vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44a "pdirops: rename tgt vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44b "pdirops: rename tgt vs create =============="
sleep 1
link $DIR2/$tfile-3 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44c "pdirops: rename tgt vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44d "pdirops: rename tgt vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44e "pdirops: rename tgt and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44f "pdirops: rename tgt and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44g "pdirops: rename tgt vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44h "pdirops: rename tgt vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile && error "remote mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 44i "pdirops: rename tgt vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile || error "mkdir must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45a "pdirops: rename src vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c || error "create must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45b "pdirops: rename src vs create =============="
sleep 1
link $DIR2/$tfile-3 $DIR2/$tfile || error "link must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45c "pdirops: rename src vs link =============="
sleep 1
rm $DIR2/$tfile && error "unlink must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45d "pdirops: rename src vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45e "pdirops: rename src and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45f "pdirops: rename src and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null && error "stat must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45g "pdirops: rename src vs getattr =============="
sleep 1
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1; error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45h "pdirops: unlink vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile || error "create remote dir must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "create remote dir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 45i "pdirops: rename src vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46a "pdirops: link vs mkdir =============="
sleep 1
$MULTIOP $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46b "pdirops: link vs create =============="
sleep 1
link $DIR2/$tfile $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46c "pdirops: link vs link =============="
sleep 1
rm $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46d "pdirops: link vs unlink =============="
sleep 1
mv $DIR2/$tfile-3 $DIR2/$tfile || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46e "pdirops: link and rename (tgt) =============="
sleep 1
mv $DIR2/$tfile $DIR2/$tfile-3 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46f "pdirops: link and rename (src) =============="
sleep 1
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1; error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46g "pdirops: link vs getattr =============="
ls -lia $DIR2/ > /dev/null
check_pdo_conflict $PID1 && { wait $PID1;
error "readdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46h "pdirops: link vs readdir =============="
$LFS mkdir -i 1 $DIR2/$tfile && error "remote mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "remote mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 46i "pdirops: link vs remote mkdir"
sleep 1
mkdir $DIR2/$tfile && error "mkdir must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "mkdir isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47a "pdirops: remote mkdir vs mkdir"
multiop $DIR2/$tfile oO_CREAT:O_EXCL:c && error "create must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "create isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47b "pdirops: remote mkdir vs create"
sleep 1
link $DIR2/$tfile-2 $DIR2/$tfile && error "link must fail"
check_pdo_conflict $PID1 && { wait $PID1; error "link isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47c "pdirops: remote mkdir vs link"
rmdir $DIR2/$tfile || error "unlink must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "unlink isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47d "pdirops: remote mkdir vs unlink"
mv -T $DIR2/$tfile-2 $DIR2/$tfile && error "rename must fail"
check_pdo_conflict $PID1 && { wait $PID1;
error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47e "pdirops: remote mkdir and rename (tgt)"
mv $DIR2/$tfile $DIR2/$tfile-2 || error "rename must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "rename isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47f "pdirops: remote mkdir and rename (src)"
stat $DIR2/$tfile > /dev/null || error "stat must succeed"
check_pdo_conflict $PID1 && { wait $PID1;
error "getattr isn't blocked"; }
- rm -r $DIR1/*
+ rm -rf $DIR/$tfile*
return 0
}
run_test 47g "pdirops: remote mkdir vs getattr"
echo "==> rename vs getattr vs setxattr should not deadlock"
mkdir -p $DIR/d1/d2/d3 || error "(1) mkdir failed"
- do_facet mds $LCTL set_param fail_loc=$1
+ do_facet mds1 $LCTL set_param fail_loc=$1
mv -T $DIR/d1/d2/d3 $DIR/d1/d3 &
PID1=$!
echo "==> rename vs getattr vs open vs getattr should not deadlock"
mkdir -p $DIR/d1/d2/d3 || error "(1) mkdir failed"
- do_facet mds $LCTL set_param fail_loc=$1
+ do_facet mds1 $LCTL set_param fail_loc=$1
mv -T $DIR/d1/d2/d3 $DIR/d1/d3 &
PID1=$!
mkdir -p $DIR/d1/d2 $DIR/d3 || error "(1) mkdir failed"
#define OBD_FAIL_MDS_RENAME4 0x156
- do_facet mds $LCTL set_param fail_loc=0x80000156
+ do_facet mds1 $LCTL set_param fail_loc=0x80000156
mv -T $DIR/d1/d2 $DIR/d3/d2 &
PID1=$!
mkdir -p $DIR/d1/d2 $DIR/d3 || error "(1) mkdir failed"
#define OBD_FAIL_MDS_RENAME4 0x156
- do_facet mds $LCTL set_param fail_loc=0x80000156
+ do_facet mds1 $LCTL set_param fail_loc=0x80000156
mv -T $DIR/d1/d2 $DIR/d3/d2 &
PID1=$!
mkdir -p $DIR/d1/d2 $DIR/d3 || error "(1) mkdir failed"
#define OBD_FAIL_MDS_RENAME4 0x156
- do_facet mds $LCTL set_param fail_loc=0x156
+ do_facet mds1 $LCTL set_param fail_loc=0x156
mv -T $DIR/d1/d2 $DIR/d3/d2 &
PID1=$!
touch $DIR/f1
#define OBD_FAIL_MDS_RENAME3 0x155
- do_facet mds $LCTL set_param fail_loc=0x155
+ do_facet mds1 $LCTL set_param fail_loc=0x155
mv $DIR/f1 $DIR/$tdir &
PID1=$!
sleep 2
$LFS setstripe -c $OSTCOUNT $dir || error "setstripe to $dir failed"
chmod 777 $dir
- do_nodes $CLIENTS $myRUNAS dd if=/dev/zero of="$dir/nrs_r_$HOSTNAME"\
- bs=1M count=$n > /dev/null 2>&1
+ do_nodes $CLIENTS $myRUNAS \
+ dd if=/dev/zero of="$dir/nrs_r_$HOSTNAME" bs=1M count=$n ||
+ error "dd at 0 on client failed (1)"
for ((i = 0; i < $n; i++)); do
- do_nodes $CLIENTS $myRUNAS dd if=/dev/zero\
- of="$dir/nrs_w_$HOSTNAME" bs=1M seek=$i count=1\
- > /dev/null 2>&1 &
+ do_nodes $CLIENTS $myRUNAS dd if=/dev/zero \
+ of="$dir/nrs_w_$HOSTNAME" bs=1M seek=$i count=1 ||
+ error "dd at ${i}MB on client failed (2)" &
local pids_w[$i]=$!
done
do_nodes $CLIENTS sync;
cancel_lru_locks osc
for ((i = 0; i < $n; i++)); do
- do_nodes $CLIENTS $myRUNAS dd if="$dir/nrs_w_$HOSTNAME"\
- of=/dev/zero bs=1M seek=$i count=1 > /dev/null 2>&1 &
+ do_nodes $CLIENTS $myRUNAS dd if="$dir/nrs_w_$HOSTNAME" \
+ of=/dev/zero bs=1M seek=$i count=1 > /dev/null ||
+ error "dd at ${i}MB on client failed (3)"
local pids_r[$i]=$!
done
cancel_lru_locks osc
}
test_77a() { #LU-3266
- do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_policies="fifo"
+ oss=$(comma_list $(osts_nodes))
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_policies="fifo"
nrs_write_read
return 0
}
run_test 77a "check FIFO NRS policy"
-
test_77b() { #LU-3266
- do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_policies="crrn"
- do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_crrn_quantum=1
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_policies="crrn" \
+ ost.OSS.*.nrs_crrn_quantum=1
echo "policy: crr-n, crrn_quantum 1"
nrs_write_read
- do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_crrn_quantum=64
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_crrn_quantum=64
echo "policy: crr-n, crrn_quantum 64"
nrs_write_read
+ # cleanup
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
return 0
}
run_test 77b "check CRR-N NRS policy"
orr_trr() {
local policy=$1
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies=$policy
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_"$policy"_quantum=1
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_"$policy"_offset_type="physical"
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_"$policy"_supported="reads"
- done
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies=$policy \
+ ost.OSS.*.nrs_"$policy"_quantum=1 \
+ ost.OSS.*.nrs_"$policy"_offset_type="physical" \
+ ost.OSS.*.nrs_"$policy"_supported="reads"
- echo "policy: $policy, ${policy}_quantum 1, ${policy}_offset_type \
- physical, ${policy}_supported reads"
+ echo "policy: $policy, ${policy}_quantum 1, ${policy}_offset_type physical, ${policy}_supported reads"
nrs_write_read
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_${policy}_supported="writes"
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_${policy}_quantum=64
- done
- echo "policy: $policy, ${policy}_quantum 64, \
- ${policy}_offset_type physical, ${policy}_supported writes"
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_${policy}_supported="writes" \
+ ost.OSS.*.nrs_${policy}_quantum=64
+
+ echo "policy: $policy, ${policy}_quantum 64, ${policy}_offset_type physical, ${policy}_supported writes"
nrs_write_read
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_${policy}_supported="reads_and_writes"
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_${policy}_offset_type="logical"
- done
- echo "policy: $policy, ${policy}_quantum 64, \
- ${policy}_offset_type logical, ${policy}_supported reads_and_writes"
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_${policy}_supported="reads_and_writes" \
+ ost.OSS.*.nrs_${policy}_offset_type="logical"
+ echo "policy: $policy, ${policy}_quantum 64, ${policy}_offset_type logical, ${policy}_supported reads_and_writes"
nrs_write_read
+ # cleanup
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
return 0
}
shift 1
do_facet $facet lctl set_param \
- ost.OSS.ost_io.nrs_tbf_rule="$@"
+ ost.OSS.ost_io.nrs_tbf_rule="$*"
[ $? -ne 0 ] &&
- error "failed to operate on TBF rules"
+ error "failed to run operate '$*' on TBF rules"
+}
+
+tbf_verify() {
+ local dir=$DIR/$tdir
+ local client1=${CLIENT1:-`hostname`}
+ local myRUNAS="$3"
+
+ mkdir $dir || error "mkdir $dir failed"
+ $LFS setstripe -c 1 $dir || error "setstripe to $dir failed"
+ chmod 777 $dir
+
+ echo "Limited write rate: $1, read rate: $2"
+ echo "Verify the write rate is under TBF control"
+ local rate=$(do_node $client1 $myRUNAS dd if=/dev/zero of=$dir/tbf \
+ bs=1M count=100 oflag=direct 2>&1 | awk '/bytes/ {print $8}')
+ echo "Write speed is $rate"
+
+ # verify the write rate does not exceed 110% of TBF limited rate
+ [ $(bc <<< "$rate < 1.1 * $1") -eq 1 ] ||
+ error "The write rate ($rate) exceeds 110% of preset rate ($1)"
+
+ cancel_lru_locks osc
+
+ echo "Verify the read rate is under TBF control"
+ rate=$(do_node $client1 $myRUNAS dd if=$dir/tbf of=/dev/null \
+ bs=1M count=100 iflag=direct 2>&1 | awk '/bytes/ {print $8}')
+ echo "Read speed is $rate"
+
+ # verify the read rate does not exceed 110% of TBF limited rate
+ [ $(bc <<< "$rate < 1.1 * $2") -eq 1 ] ||
+ error "The read rate ($rate) exceeds 110% of preset rate ($2)"
+
+ rm -rf $dir || error "rm -rf $dir failed"
}
test_77e() {
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="tbf\ nid"
- [ $? -ne 0 ] &&
- error "failed to set TBF policy"
- done
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ nid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="nid="
+ rateis="rate="
+ fi
# Only operate rules on ost1 since OSTs might run on the same OSS
# Add some rules
- tbf_rule_operate ost1 "start\ localhost\ {0@lo}\ 1000"
+ tbf_rule_operate ost1 "start\ localhost\ ${idis}{0@lo}\ ${rateis}1000"
local address=$(comma_list "$(host_nids_address $CLIENTS $NETTYPE)")
local client_nids=$(nids_list $address "\\")
- tbf_rule_operate ost1 "start\ clients\ {$client_nids}\ 100"
- tbf_rule_operate ost1 "start\ others\ {*.*.*.*@$NETTYPE}\ 50"
+ tbf_rule_operate ost1 "start\ clients\ ${idis}{$client_nids}\ ${rateis}100"
+ tbf_rule_operate ost1 "start\ others\ ${idis}{*.*.*.*@$NETTYPE}\ ${rateis}50"
nrs_write_read
# Change the rules
- tbf_rule_operate ost1 "change\ localhost\ 1001"
- tbf_rule_operate ost1 "change\ clients\ 101"
- tbf_rule_operate ost1 "change\ others\ 51"
+ tbf_rule_operate ost1 "change\ localhost\ ${rateis}1001"
+ tbf_rule_operate ost1 "change\ clients\ ${rateis}101"
+ tbf_rule_operate ost1 "change\ others\ ${rateis}51"
nrs_write_read
# Stop the rules
nrs_write_read
# Cleanup the TBF policy
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="fifo"
- [ $? -ne 0 ] &&
- error "failed to set policy back to fifo"
- done
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
nrs_write_read
return 0
}
run_test 77e "check TBF NID nrs policy"
test_77f() {
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ oss=$(comma_list $(osts_nodes))
+
# Configure jobid_var
local saved_jobid_var=$($LCTL get_param -n jobid_var)
if [ $saved_jobid_var != procname_uid ]; then
"$FSNAME.sys.jobid_var" procname_uid
fi
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="tbf\ jobid"
- [ $? -ne 0 ] &&
- error "failed to set TBF policy"
- done
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="jobid="
+ rateis="rate="
+ fi
# Only operate rules on ost1 since OSTs might run on the same OSS
# Add some rules
- tbf_rule_operate ost1 "start\ runas\ {iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ 1000"
- tbf_rule_operate ost1 "start\ iozone_runas\ {iozone.$RUNAS_ID}\ 100"
- tbf_rule_operate ost1 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+ tbf_rule_operate ost1 "start\ runas\ ${idis}{iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ ${rateis}1000"
+ tbf_rule_operate ost1 "start\ iozone_runas\ ${idis}{iozone.$RUNAS_ID}\ ${rateis}100"
+ tbf_rule_operate ost1 "start\ dd_runas\ ${idis}{dd.$RUNAS_ID}\ ${rateis}50"
nrs_write_read "$RUNAS"
# Change the rules
- tbf_rule_operate ost1 "change\ runas\ 1001"
- tbf_rule_operate ost1 "change\ iozone_runas\ 101"
- tbf_rule_operate ost1 "change\ dd_runas\ 51"
+ tbf_rule_operate ost1 "change\ runas\ ${rateis}1001"
+ tbf_rule_operate ost1 "change\ iozone_runas\ ${rateis}101"
+ tbf_rule_operate ost1 "change\ dd_runas\ ${rateis}51"
nrs_write_read "$RUNAS"
# Stop the rules
nrs_write_read "$RUNAS"
# Cleanup the TBF policy
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="fifo"
- [ $? -ne 0 ] &&
- error "failed to set policy back to fifo"
- done
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
nrs_write_read "$RUNAS"
local current_jobid_var=$($LCTL get_param -n jobid_var)
run_test 77f "check TBF JobID nrs policy"
test_77g() {
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="tbf\ nid"
- [ $? -ne 0 ] &&
- error "failed to set TBF policy"
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
+ oss=$(comma_list $(osts_nodes))
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ nid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] && error "failed to set TBF policy"
+
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.54) ]; then
+ idis="jobid="
+ rateis="rate="
+ fi
+
+ # Add a rule that only valid for Jobid TBF. If direct change between
+ # TBF types is not supported, this operation will fail.
+ tbf_rule_operate ost1 "start\ dd_runas\ ${idis}{dd.$RUNAS_ID}\ ${rateis}50"
+
+ # Cleanup the TBF policy
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
+ return 0
+}
+run_test 77g "Change TBF type directly"
+
+test_77h() {
+ [ $(lustre_version_code ost1) -ge $(version_code 2.8.55) ] ||
+ { skip "Need OST version at least 2.8.55"; return 0; }
+
+ local old_policy=$(do_facet ost1 \
+ lctl get_param ost.OSS.ost_io.nrs_policies)
+ local new_policy
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ reg"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ reg\ abc"
+ [ $? -eq 0 ] && error "should return error"
+
+ do_facet ost1 lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ abc\ efg"
+ [ $? -eq 0 ] && error "should return error"
+
+ new_policy=$(do_facet ost1 lctl get_param ost.OSS.ost_io.nrs_policies)
+ [ $? -eq 0 ] || error "shouldn't LBUG"
+
+ [ "$old_policy" = "$new_policy" ] || error "NRS policy should be same"
+
+ return 0
+}
+run_test 77h "Wrong policy name should report error, not LBUG"
+
+tbf_rule_check()
+{
+ local facet=$1
+ local expected=$2
+ local error_message=$3
+ local rule_number=0
+ for rule in $expected; do
+ rule_number=$((rule_number + 1))
done
+ local stop_line=$(($rule_number + 3))
+ local awk_command="awk 'NR >= 4 && NR <= $stop_line {print \$1}'"
+
+ local output=$(do_facet $facet lctl get_param \
+ ost.OSS.ost_io.nrs_tbf_rule |
+ eval $awk_command |
+ tr "\n" " " |
+ sed 's/[ ]*$//')
+ if [ "$output" != "$expected" ]; then
+ error "$error_message, expected '$expected', got '$output'"
+ fi
+}
+
+test_77i() {
+ [ $(lustre_version_code ost1) -ge $(version_code 2.8.55) ] ||
+ { skip "Need OST version at least 2.8.55"; return 0; }
for i in $(seq 1 $OSTCOUNT)
do
error "failed to set TBF policy"
done
- # Add a rule that only valid for Jobid TBF. If direct change between
- # TBF types is not supported, this operation will fail.
- tbf_rule_operate ost1 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+ tbf_rule_check ost1 "default" "error before inserting any rule"
+
+ tbf_rule_operate ost1 "start\ before\ jobid={jobid}\ rate=1000"
+ tbf_rule_check ost1 "before default" \
+ "error when inserting rule 'before'"
+
+ tbf_rule_operate ost1 "start\ after\ jobid={jobid}\ rate=1000\ rank=default"
+ tbf_rule_check ost1 "before after default" \
+ "error when inserting rule 'after'"
+
+ tbf_rule_operate ost1 "start\ target\ jobid={jobid}\ rate=1000\ rank=after"
+ tbf_rule_check ost1 "before target after default" \
+ "error when inserting rule 'target'"
+
+ echo "Move before itself"
+ tbf_rule_operate ost1 "change\ target\ rank=target"
+ tbf_rule_check ost1 "before target after default" \
+ "error when moving before itself"
+
+ echo "Move to higher rank"
+ tbf_rule_operate ost1 "change\ target\ rank=before"
+ tbf_rule_check ost1 "target before after default" \
+ "error when moving to higher rank"
+
+ echo "Move to lower rank"
+ tbf_rule_operate ost1 "change\ target\ rank=after"
+ tbf_rule_check ost1 "before target after default" \
+ "error when moving to lower rank"
+
+ echo "Move before default"
+ tbf_rule_operate ost1 "change\ target\ rank=default"
+ tbf_rule_check ost1 "before after target default" \
+ error "error when moving before default"
# Cleanup the TBF policy
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="fifo"
- [ $? -ne 0 ] &&
- error "failed to set policy back to fifo"
- done
+ do_nodes $(comma_list $(osts_nodes)) \
+ $LCTL set_param ost.OSS.ost_io.nrs_policies=fifo
return 0
}
-run_test 77g "Change TBF type directly"
+run_test 77i "Change rank of TBF rule"
+
+test_77j() {
+ local idis
+ local rateis
+ if [ $(lustre_version_code ost1) -ge $(version_code 2.8.60) ]; then
+ idis="opcode="
+ rateis="rate="
+ fi
+
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param jobid_var=procname_uid \
+ ost.OSS.ost_io.nrs_policies="tbf\ opcode" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ost_r\ ${idis}{ost_read}\ ${rateis}5" \
+ ost.OSS.ost_io.nrs_tbf_rule="start\ ost_w\ ${idis}{ost_write}\ ${rateis}20"
+
+ nrs_write_read
+ tbf_verify 20 5
+
+ do_nodes $(comma_list $(osts_nodes)) \
+ lctl set_param ost.OSS.ost_io.nrs_tbf_rule="stop\ ost_r" \
+ ost.OSS.ost_io.nrs_tbf_rule="stop\ ost_w" \
+ ost.OSS.ost_io.nrs_policies="fifo"
+
+ # sleep 3 seconds to wait the tbf policy stop completely,
+ # or the next test case is possible get -EAGAIN when
+ # setting the tbf policy
+ sleep 3
+}
+run_test 77j "check TBF-OPCode NRS policy"
test_78() { #LU-6673
+ local server_version=$(lustre_version_code ost1)
+ [[ $server_version -ge $(version_code 2.7.58) ]] ||
+ { skip "Need server version newer than 2.7.57"; return 0; }
+
local rc
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="orr" &
- do_facet ost"$i" lctl set_param \
- ost.OSS.*.nrs_orr_quantum=1
- rc=$?
- # Valid return codes are:
- # 0: Tuning succeeded
- # ENODEV: Policy is still stopped
- # EAGAIN: Policy is being initialized
- [ $rc -eq 0 -o $rc -eq 19 -o $rc -eq 11 ] ||
- error "Expected set_param to return 0|ENODEV|EAGAIN"
- done
+ oss=$(comma_list $(osts_nodes))
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="orr" &
+ do_nodes $oss lctl set_param ost.OSS.*.nrs_orr_quantum=1
+ rc=$?
+ # Valid return codes are:
+ # 0: Tuning succeeded
+ # ENODEV: Policy is still stopped
+ # EAGAIN: Policy is being initialized
+ [ $rc -eq 0 -o $rc -eq 19 -o $rc -eq 11 ] ||
+ error "Expected set_param to return 0|ENODEV|EAGAIN"
# Cleanup the ORR policy
- for i in $(seq 1 $OSTCOUNT)
- do
- do_facet ost"$i" lctl set_param \
- ost.OSS.ost_io.nrs_policies="fifo"
- [ $? -ne 0 ] &&
- error "failed to set policy back to fifo"
- done
+ do_nodes $oss lctl set_param ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] && error "failed to set policy back to fifo"
return 0
}
run_test 78 "Enable policy and specify tunings right away"
+test_79() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
+ test_mkdir -p $DIR/$tdir
+
+ # Prevent interference from layout intent RPCs due to
+ # asynchronous writeback. These will be tested in 130c below.
+ do_nodes ${CLIENTS:-$HOSTNAME} sync
+
+ setfattr -n trusted.name1 -v value1 $DIR/$tdir ||
+ error "setfattr -n trusted.name1=value1 $DIR/$tdir failed"
+
+#define OBD_FAIL_MDS_INTENT_DELAY 0x160
+ local mdtidx=$($LFS getstripe -M $DIR/$tdir)
+ local facet=mds$((mdtidx + 1))
+ stat $DIR/$tdir
+ set_nodes_failloc $(facet_active_host $facet) 0x80000160
+ getfattr -n trusted.name1 $DIR/$tdir 2> /dev/null &
+ local pid=$!
+ sleep 2
+
+#define OBD_FAIL_MDS_GETXATTR_PACK 0x131
+ set_nodes_failloc $(facet_active_host $facet) 0x80000131
+
+ wait $pid
+ return 0
+}
+run_test 79 "xattr: intent error"
+
test_80a() {
[ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
local MDTIDX=1
touch d0/0 || error "create 0 failed"
mv d0/0 d1/0 || error "rename d0/0 d1/0 failed"
stat d0/0 && error "stat mv filed succeed"
- mv $DIR2/$tdir/d1/0 $DIR2/$tdir/d0/0 || "rename d1/0 d0/0 failed"
+ mv $DIR2/$tdir/d1/0 $DIR2/$tdir/d0/0 || error "rename d1/0 d0/0 failed"
stat d0/0 || error "stat failed"
local t=$(ls -ai $DIR1/$tdir/d0 | sort -u | wc -l)
}
run_test 92 "create remote directory under orphan directory"
+test_93() {
+ local rc1=0
+ local rc2=0
+ local old_rr
+
+ mkdir -p $DIR1/$tfile-1/
+ mkdir -p $DIR2/$tfile-2/
+ local old_rr=$(do_facet $SINGLEMDS lctl get_param -n \
+ 'lod.lustre-MDT*/qos_threshold_rr' | sed -e 's/%//')
+ do_facet $SINGLEMDS lctl set_param -n \
+ 'lod.lustre-MDT*/qos_threshold_rr' 100
+ #define OBD_FAIL_MDS_LOV_CREATE_RACE 0x163
+ do_facet $SINGLEMDS "lctl set_param fail_loc=0x00000163"
+
+ $SETSTRIPE -c -1 $DIR1/$tfile-1/file1 &
+ local PID1=$!
+ sleep 1
+ $SETSTRIPE -c -1 $DIR2/$tfile-2/file2 &
+ local PID2=$!
+ wait $PID2
+ wait $PID1
+ do_facet $SINGLEMDS "lctl set_param fail_loc=0x0"
+ do_facet $SINGLEMDS "lctl set_param -n \
+ 'lod.lustre-MDT*/qos_threshold_rr' $old_rr"
+
+ $GETSTRIPE $DIR1/$tfile-1/file1
+ rc1=$($GETSTRIPE -q $DIR1/$tfile-1/file1 |
+ awk '{if (/[0-9]/) print $1 }' | sort | uniq -d | wc -l)
+ $GETSTRIPE $DIR2/$tfile-2/file2
+ rc2=$($GETSTRIPE -q $DIR2/$tfile-2/file2 |
+ awk '{if (/[0-9]/) print $1 }' | sort | uniq -d | wc -l)
+ echo "rc1=$rc1 and rc2=$rc2 "
+ [ $rc1 -eq 0 ] && [ $rc2 -eq 0 ] ||
+ error "object allocate on same ost detected"
+}
+run_test 93 "alloc_rr should not allocate on same ost"
+
log "cleanup: ======================================================"
# kill and wait in each test only guarentee script finish, but command in script