<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<p><br>
</p>
<div class="moz-cite-prefix">On 06/01/20 8:12 pm, lejeczek wrote:<br>
</div>
<blockquote type="cite"
cite="mid:d4a3fa5f-d6dd-705f-7e51-ab08d5d42a2e@yahoo.co.uk">
<pre class="moz-quote-pre" wrap="">And when I start this volume, in log on the brick which shows gfids:</pre>
</blockquote>
I assume these messages are from the self-heal daemon's log
(glustershd.log). Correct me if I am mistaken.<br>
<blockquote type="cite"
cite="mid:d4a3fa5f-d6dd-705f-7e51-ab08d5d42a2e@yahoo.co.uk">
<pre class="moz-quote-pre" wrap="">
...
[2020-01-06 14:28:24.119506] E [MSGID: 114031]
[client-rpc-fops_v2.c:150:client4_0_mknod_cbk] 0-QEMU_VMs-client-5:
remote operation failed. Path:
<gfid:3f0239ac-e027-4a0c-b271-431e76ad97b1> [Permission denied]</pre>
</blockquote>
<p>Can you provide the following information:</p>
<p>1. gluster version</p>
<p>2. gluster volume info $volname</p>
<p>3. `getfattr -d -m . -e hex` and `stat` outputs of any one
gfid/file for which you see the EACCES from <i>all the bricks</i>
of the replica? <br>
</p>
<p>4. Do you see errors in the brick log as well? Does
server4_mknod_cbk() also complain of EACCES errors?</p>
<p>5. If yes, can you attach gdb to the brick process, put a break
point in server4_mknod_cbk() and provide the function backtrace
once it is hit?<br>
</p>
Thanks,<br>
Ravi<br>
</body>
</html>