set -e
ONLY=${ONLY:-"$*"}
-# bug number for skipped test: 3192 LU-1205 15528/3811 16929 9977 15528/11549 18080
-ALWAYS_EXCEPT=" 14b 18c 19 22 28 29 35 $SANITYN_EXCEPT"
+# bug number for skipped test: 3192 LU-1205 15528/3811 9977 15528/11549 18080
+ALWAYS_EXCEPT=" 14b 18c 19 28 29 35 $SANITYN_EXCEPT"
# UPDATE THE COMMENT ABOVE WITH BUG NUMBERS WHEN CHANGING ALWAYS_EXCEPT!
-# bug number for skipped test: 12652 12652
-grep -q 'Enterprise Server 10' /etc/SuSE-release 2> /dev/null &&
- ALWAYS_EXCEPT="$ALWAYS_EXCEPT 11 14" || true
-
-# It will be ported soon.
-EXCEPT="$EXCEPT 22"
-
-SRCDIR=`dirname $0`
+SRCDIR=$(dirname $0)
PATH=$PWD/$SRCDIR:$SRCDIR:$SRCDIR/../utils:$PATH
SIZE=${SIZE:-40960}
CHECKSTAT=${CHECKSTAT:-"checkstat -v"}
-MCREATE=${MCREATE:-mcreate}
OPENFILE=${OPENFILE:-openfile}
OPENUNLINK=${OPENUNLINK:-openunlink}
export MULTIOP=${MULTIOP:-multiop}
init_logging
if [ $(facet_fstype $SINGLEMDS) = "zfs" ]; then
-# bug number for skipped test: LU-2840 LU-2189 LU-2776
- ALWAYS_EXCEPT="$ALWAYS_EXCEPT 21 36 51a"
+# bug number for skipped test: LU-2189 LU-2776
+ ALWAYS_EXCEPT="$ALWAYS_EXCEPT 36 51a"
# LU-2829 / LU-2887 - make allowances for ZFS slowness
TEST33_NFILES=${TEST33_NFILES:-1000}
fi
}
run_test 2f "check attr/owner updates on DNE with 2 mtpt's"
+test_2g() {
+ dd if=/dev/zero of=$DIR1/$tfile oflag=sync bs=1M count=2
+
+ local block1=$(stat $DIR1/$tfile | awk '/Blocks/ {print $4} ')
+ cancel_lru_locks osc
+ local block2=$(stat $DIR2/$tfile | awk '/Blocks/ {print $4} ')
+ echo "$DIR1/$tfile has $block1 blocks"
+ echo "$DIR2/$tfile has $block2 blocks"
+ [ $block1 -eq $block2 ] || error
+}
+run_test 2g "check blocks update on sync write"
+
test_3() {
local target="this/is/good"
ln -s $target $DIR1/$tfile || error "ln -s $target $DIR1/$tfile failed"
log "checking cached lockless truncate"
$TRUNCATE $DIR1/$tfile 8000000
$CHECKSTAT -s 8000000 $DIR2/$tfile || error "wrong file size"
- [ $(calc_osc_stats lockless_truncate) -eq 0 ] ||
- error "lockless truncate doesn't use cached locks"
+ [ $(calc_osc_stats lockless_truncate) -ne 0 ] ||
+ error "cached truncate isn't lockless"
log "checking not cached lockless truncate"
$TRUNCATE $DIR2/$tfile 5000000
$CHECKSTAT -s 5000000 $DIR1/$tfile || error "wrong file size"
- [ $(calc_osc_stats lockless_truncate) -ne 0 ] ||
- error "not cached trancate isn't lockless"
+ [ $(calc_osc_stats lockless_truncate) -ne 0 ] ||
+ error "not cached truncate isn't lockless"
log "disabled lockless truncate"
enable_lockless_truncate 0
}
test_34() { #16129
+ remote_ost_nodsh && skip "remote OST with nodsh" && return
local OPER
local lock_in
local lock_out
test_35() { # bug 17645
local generation=[]
local count=0
- for imp in /proc/fs/lustre/mdc/$FSNAME-MDT*-mdc-*; do
- g=$(awk '/generation/{print $2}' $imp/import)
+ gen=$(lctl get_param mdc.$FSNAME-MDT*-mdc-*.import | grep generation |
+ awk '/generation/{print $2}')
+ for g in $gen; do
generation[count]=$g
let count=count+1
done
do_facet client "lctl set_param fail_loc=0x0"
df -h $MOUNT1 $MOUNT2
count=0
- for imp in /proc/fs/lustre/mdc/$FSNAME-MDT*-mdc-*; do
- g=$(awk '/generation/{print $2}' $imp/import)
- if ! test "$g" -eq "${generation[count]}"; then
- error "Eviction happened on import $(basename $imp)"
+ gen=$(lctl get_param mdc.$FSNAME-MDT*-mdc-*.import | grep generation |
+ awk '/generation/{print $2}')
+ for g in $gen; do
+ if ! test "$g" -eq "${generation[count]}"; then
+ list=$(lctl list_param mdc.$FSNAME-MDT*-mdc-*.import)
+ local c = 0
+ for imp in $list; do
+ if [ $c = $count ]; then
+ break
+ fi
+ c=c+1
+ done
+ imp=$(echo "$imp" | awk -F"." '{print $2}')
+ error "Eviction happened on import $imp"
fi
let count=count+1
done
# pdirop tests
# test 40: check non-blocking operations
test_40a() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
+ touch $DIR2
mkdir $DIR1/$tfile &
PID1=$!
sleep 1
run_test 40a "pdirops: create vs others =============="
test_40b() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
touch $DIR1/$tfile &
run_test 40b "pdirops: open|create and others =============="
test_40c() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
touch $DIR1/$tfile
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
run_test 40c "pdirops: link and others =============="
test_40d() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
touch $DIR1/$tfile
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
run_test 40d "pdirops: unlink and others =============="
test_40e() {
+ remote_mds_nodsh && skip "remote MDS with nodsh" && return
touch $DIR1/$tfile
#define OBD_FAIL_ONCE|OBD_FAIL_MDS_PDO_LOCK 0x145
do_facet $SINGLEMDS lctl set_param fail_loc=0x80000145
#define OBD_FAIL_MDS_RENAME3 0x155
do_facet mds $LCTL set_param fail_loc=0x155
- mv $DIR/f1 $DIR/d1 &
+ mv $DIR/f1 $DIR/$tdir &
PID1=$!
sleep 2
- # while rename is sleeping, create d2, but as a directory
- mkdir -p $DIR2/d1 || error "(1) mkdir failed"
+ # while rename is sleeping, create $tdir, but as a directory
+ mkdir -p $DIR2/$tdir || error "(1) mkdir failed"
# link in reverse locking order
- ln $DIR2/f1 $DIR2/d1/
+ ln $DIR2/f1 $DIR2/$tdir/
wait $PID1 && error "(2) mv succeeded"
- lctl dk > ../log1
- ls -la $DIR/
- ls -la $DIR/d1
-
- rm -rf $DIR/d1
+ rm -rf $DIR/f1
}
run_test 55d "rename file vs link"
test_60() {
- [[ $(lustre_version_code $SINGLEMDS) -ge $(version_code 2.3.0) ]] ||
- { skip "Need MDS version at least 2.3.0"; return; }
+ local MDSVER=$(lustre_build_version $SINGLEMDS)
+ [ $(version_code $MDSVER) -lt $(version_code 2.3.0) ] &&
+ skip "MDS version $MDSVER must be >= 2.3.0" && return 0
+
# Create a file
test_mkdir -p $DIR1/$tdir
file1=$DIR1/$tdir/file
}
run_test 76 "Verify open file for 2048 files"
+nrs_write_read() {
+ local n=16
+ local dir=$DIR/$tdir
+ local myRUNAS="$1"
+
+ mkdir $dir || error "mkdir $dir failed"
+ $LFS setstripe -c $OSTCOUNT $dir || error "setstripe to $dir failed"
+ chmod 777 $dir
+
+ do_nodes $CLIENTS $myRUNAS dd if=/dev/zero of="$dir/nrs_r_$HOSTNAME"\
+ bs=1M count=$n > /dev/null 2>&1
+
+ for ((i = 0; i < $n; i++)); do
+ do_nodes $CLIENTS $myRUNAS dd if=/dev/zero\
+ of="$dir/nrs_w_$HOSTNAME" bs=1M seek=$i count=1\
+ > /dev/null 2>&1 &
+ local pids_w[$i]=$!
+ done
+ do_nodes $CLIENTS sync;
+ cancel_lru_locks osc
+
+ for ((i = 0; i < $n; i++)); do
+ do_nodes $CLIENTS $myRUNAS dd if="$dir/nrs_w_$HOSTNAME"\
+ of=/dev/zero bs=1M seek=$i count=1 > /dev/null 2>&1 &
+ local pids_r[$i]=$!
+ done
+ cancel_lru_locks osc
+
+ for ((i = 0; i < $n; i++)); do
+ wait ${pids_w[$i]}
+ wait ${pids_r[$i]}
+ done
+ rm -rf $dir || error "rm -rf $dir failed"
+}
+
+test_77a() { #LU-3266
+ do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_policies="fifo"
+ nrs_write_read
+
+ return 0
+}
+run_test 77a "check FIFO NRS policy"
+
+
+test_77b() { #LU-3266
+ do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_policies="crrn"
+ do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_crrn_quantum=1
+
+ echo "policy: crr-n, crrn_quantum 1"
+ nrs_write_read
+
+ do_facet $SINGLEMDS lctl set_param ost.OSS.*.nrs_crrn_quantum=64
+
+ echo "policy: crr-n, crrn_quantum 64"
+ nrs_write_read
+
+ return 0
+}
+run_test 77b "check CRR-N NRS policy"
+
+orr_trr() {
+ local policy=$1
+
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies=$policy
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.*.nrs_"$policy"_quantum=1
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.*.nrs_"$policy"_offset_type="physical"
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.*.nrs_"$policy"_supported="reads"
+ done
+
+ echo "policy: $policy, ${policy}_quantum 1, ${policy}_offset_type \
+ physical, ${policy}_supported reads"
+ nrs_write_read
+
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.*.nrs_${policy}_supported="writes"
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.*.nrs_${policy}_quantum=64
+ done
+ echo "policy: $policy, ${policy}_quantum 64, \
+ ${policy}_offset_type physical, ${policy}_supported writes"
+ nrs_write_read
+
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.*.nrs_${policy}_supported="reads_and_writes"
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.*.nrs_${policy}_offset_type="logical"
+ done
+ echo "policy: $policy, ${policy}_quantum 64, \
+ ${policy}_offset_type logical, ${policy}_supported reads_and_writes"
+ nrs_write_read
+
+ return 0
+}
+
+test_77c() { #LU-3266
+ orr_trr "orr"
+ return 0
+}
+run_test 77c "check ORR NRS policy"
+
+test_77d() { #LU-3266
+ orr_trr "trr"
+ return 0
+}
+run_test 77d "check TRR nrs policy"
+
+tbf_rule_operate()
+{
+ local facet=$1
+ shift 1
+
+ do_facet $facet lctl set_param \
+ ost.OSS.ost_io.nrs_tbf_rule="$@"
+ [ $? -ne 0 ] &&
+ error "failed to operate on TBF rules"
+}
+
+test_77e() {
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ nid"
+ [ $? -ne 0 ] &&
+ error "failed to set TBF policy"
+ done
+
+ # Only operate rules on ost0 since OSTs might run on the same OSS
+ # Add some rules
+ tbf_rule_operate ost0 "start\ localhost\ {0@lo}\ 1000"
+ local address=$(comma_list "$(host_nids_address $CLIENTS $NETTYPE)")
+ local client_nids=$(nids_list $address "\\")
+ tbf_rule_operate ost0 "start\ clients\ {$client_nids}\ 100"
+ tbf_rule_operate ost0 "start\ others\ {*.*.*.*@$NETTYPE}\ 50"
+ nrs_write_read
+
+ # Change the rules
+ tbf_rule_operate ost0 "change\ localhost\ 1001"
+ tbf_rule_operate ost0 "change\ clients\ 101"
+ tbf_rule_operate ost0 "change\ others\ 51"
+ nrs_write_read
+
+ # Stop the rules
+ tbf_rule_operate ost0 "stop\ localhost"
+ tbf_rule_operate ost0 "stop\ clients"
+ tbf_rule_operate ost0 "stop\ others"
+ nrs_write_read
+
+ # Cleanup the TBF policy
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] &&
+ error "failed to set policy back to fifo"
+ done
+ nrs_write_read
+ return 0
+}
+run_test 77e "check TBF NID nrs policy"
+
+test_77f() {
+ # Configure jobid_var
+ local saved_jobid_var=$($LCTL get_param -n jobid_var)
+ if [ $saved_jobid_var != procname_uid ]; then
+ set_conf_param_and_check client \
+ "$LCTL get_param -n jobid_var" \
+ "$FSNAME.sys.jobid_var" procname_uid
+ fi
+
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] &&
+ error "failed to set TBF policy"
+ done
+
+ # Only operate rules on ost0 since OSTs might run on the same OSS
+ # Add some rules
+ tbf_rule_operate ost0 "start\ runas\ {iozone.$RUNAS_ID\ dd.$RUNAS_ID\ tiotest.$RUNAS_ID}\ 1000"
+ tbf_rule_operate ost0 "start\ iozone_runas\ {iozone.$RUNAS_ID}\ 100"
+ tbf_rule_operate ost0 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+ nrs_write_read "$RUNAS"
+
+ # Change the rules
+ tbf_rule_operate ost0 "change\ runas\ 1001"
+ tbf_rule_operate ost0 "change\ iozone_runas\ 101"
+ tbf_rule_operate ost0 "change\ dd_runas\ 51"
+ nrs_write_read "$RUNAS"
+
+ # Stop the rules
+ tbf_rule_operate ost0 "stop\ runas"
+ tbf_rule_operate ost0 "stop\ iozone_runas"
+ tbf_rule_operate ost0 "stop\ dd_runas"
+ nrs_write_read "$RUNAS"
+
+ # Cleanup the TBF policy
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] &&
+ error "failed to set policy back to fifo"
+ done
+ nrs_write_read "$RUNAS"
+
+ local current_jobid_var=$($LCTL get_param -n jobid_var)
+ if [ $saved_jobid_var != $current_jobid_var ]; then
+ set_conf_param_and_check client \
+ "$LCTL get_param -n jobid_var" \
+ "$FSNAME.sys.jobid_var" $saved_jobid_var
+ fi
+ return 0
+}
+run_test 77f "check TBF JobID nrs policy"
+
+test_77g() {
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ nid"
+ [ $? -ne 0 ] &&
+ error "failed to set TBF policy"
+ done
+
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="tbf\ jobid"
+ [ $? -ne 0 ] &&
+ error "failed to set TBF policy"
+ done
+
+ # Add a rule that only valid for Jobid TBF. If direct change between
+ # TBF types is not supported, this operation will fail.
+ tbf_rule_operate ost0 "start\ dd_runas\ {dd.$RUNAS_ID}\ 50"
+
+ # Cleanup the TBF policy
+ for i in $(seq 1 $OSTCOUNT)
+ do
+ do_facet ost"$i" lctl set_param \
+ ost.OSS.ost_io.nrs_policies="fifo"
+ [ $? -ne 0 ] &&
+ error "failed to set policy back to fifo"
+ done
+ return 0
+}
+run_test 77g "Change TBF type directly"
+
test_80() {
[ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
local MDTIDX=1
# give multiop a chance to open
sleep 1
- $LFS mv -M $MDTIDX $DIR1/$tdir &&
+ $LFS migrate -m $MDTIDX $DIR1/$tdir &&
error "migrate open files should failed with open files"
kill -USR1 $pid
- $LFS mv -M $MDTIDX $DIR1/$tdir ||
+ $LFS migrate -m $MDTIDX $DIR1/$tdir ||
error "migrate remote dir error"
echo "Finish migration, then checking.."
}
run_test 81 "rename and stat under striped directory"
+test_82() {
+ [[ $(lustre_version_code $SINGLEMDS) -gt $(version_code 2.6.91) ]] ||
+ { skip "Need MDS version at least 2.6.92"; return 0; }
+
+ # Client 1 creates a file.
+ multiop_bg_pause $DIR1/$tfile O_ac || error "multiop_bg_pause 1"
+ pid1=$!
+ # Client 2 opens the file.
+ multiop_bg_pause $DIR2/$tfile o_Ac || error "multiop_bg_pause 2"
+ pid2=$!
+ # Client 1 makes the file an orphan.
+ rm $DIR1/$tfile || error "rm"
+ # Client 2 sets EA "user.multiop".
+ kill -s USR1 $pid2
+ wait $pid2 || error "multiop 2"
+ # Client 1 gets EA "user.multiop". This used to fail because the EA
+ # cache refill would get "trusted.link" from mdd_xattr_list() but
+ # -ENOENT when trying to get "trusted.link"'s value. See also sanity
+ # 102q.
+ kill -s USR1 $pid1
+ wait $pid1 || error "multiop 1"
+}
+run_test 82 "fsetxattr and fgetxattr on orphan files"
+
+test_83() {
+ [ $MDSCOUNT -lt 2 ] && skip "needs >= 2 MDTs" && return
+ local pid1
+ local pid2
+
+ (
+ cd $DIR1
+ while true; do
+ $LFS mkdir -i1 -c2 $tdir
+ rmdir $tdir
+ done
+ ) &
+ pid1=$!
+ echo "start pid $pid1 to create/unlink striped directory"
+
+ # Access the directory at the same time
+ (
+ cd $DIR2
+ while true; do
+ stat $tdir > /dev/null 2>&1
+ done
+ ) &
+ pid2=$!
+ echo "start pid $pid2 to stat striped directory"
+
+ sleep 120
+ kill $pid1 $pid2
+ wait $pid1 $pid2
+
+ return 0
+}
+run_test 83 "access striped directory while it is being created/unlinked"
+
log "cleanup: ======================================================"
[ "$(mount | grep $MOUNT2)" ] && umount $MOUNT2