[Bugs] [Bug 1284823] fops-during-migration.t fails if hot and cold tiers are dist-rep

bugzilla at redhat.com bugzilla at redhat.com
Tue Dec 22 19:13:05 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1284823



--- Comment #9 from Vijay Bellur <vbellur at redhat.com> ---
COMMIT: http://review.gluster.org/12985 committed in master by Dan Lambright
(dlambrig at redhat.com) 
------
commit 430ad405294993ebb16387232281cc5a4f854c75
Author: N Balachandran <nbalacha at redhat.com>
Date:   Wed Dec 16 21:09:22 2015 +0530

    cluster/dht : Ftruncate on migrating file fails with EINVAL

    What:
    If dht_open is called on a migrating file after the inode_ctx is set,
    subsequent FOPs on that fd do not open the fd on the dst subvol.
    This is seen when the open-ftruncate-close sequence is repeatedly
    called on a migrating file.
    A second call to the sequence described above causes dht_truncate_cbk
    to call dht_truncate2 as the dht_inode_ctx was already set by the first
    call. As dht_rebalance_in_progress_check is not called, the fd is not
    opened on the dst subvol.
    On a distributed-replicate volume, this causes AFR to
    open the fd using afr_fix_open, but with the wrong flags, causing
    posix_ftruncate to fail with EINVAL.
    The fix: We require fd specific information to make a decision while
    handling migrating files.
    Set the fd_ctx to indicate the fd has been opened on the dst subvol
    and check if it has been set while processing Phase1/Phase2 checks
    in the FOP callback functions.

    Change-Id: I43cdcd8017b4a11e18afdd210469de7cd9a5ef14
    BUG: 1284823
    Signed-off-by: N Balachandran <nbalacha at redhat.com>
    Reviewed-on: http://review.gluster.org/12985
    Reviewed-by: Raghavendra G <rgowdapp at redhat.com>
    Tested-by: Gluster Build System <jenkins at build.gluster.com>
    Reviewed-by: Dan Lambright <dlambrig at redhat.com>
    Tested-by: Dan Lambright <dlambrig at redhat.com>

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=yM8DJWq59P&a=cc_unsubscribe


More information about the Bugs mailing list