[Bugs] [Bug 1219399] NFS interoperability problem: Gluster Striped-Replicated can't read on vmware esxi 5.x NFS client

bugzilla at redhat.com bugzilla at redhat.com
Sun Nov 1 14:45:53 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1219399



--- Comment #7 from Vijay Bellur <vbellur at redhat.com> ---
COMMIT: http://review.gluster.org/12470 committed in release-3.7 by Vijay
Bellur (vbellur at redhat.com) 
------
commit d8060a4cbf8eda08687c165662704d7f27aa8e08
Author: Niels de Vos <ndevos at redhat.com>
Date:   Fri Oct 30 09:50:36 2015 +0100

    stripe: set ENOENT when a READ hits EOF

    The NFS-server sets EOF only in the READ reply when op_errno is set to
    ENOENT.  Xlators are expected to set op_errno to ENOENT when EOF is
    reached, op_ret will contain the number of bytes returned by the READ.

    When an NFS-client (like VMware ESXi) do a READ that exceeds the size of
    the file, errno should be set to EOF and the return value contains the
    number of bytes that are read (from the requested offset, until the end
    of the file). Not setting EOF on a correct short READ, can result in
    errors on the NFS-client.

    This is not an issue with the Linux NFS-client (or VFS). Linux is smart
    enough to not try to read more bytes than the file contains.

    Cherry picked from commit 2bd2ccf0fdd5390c1c07cb228048f93e5e516512:
    > BUG: 1209298
    > Change-Id: Ib15538744908a6001d729288d3e18a432d19050b
    > Signed-off-by: Niels de Vos <ndevos at redhat.com>
    > Reviewed-on: http://review.gluster.org/10142
    > Tested-by: Gluster Build System <jenkins at build.gluster.com>
    > Reviewed-by: Kaleb KEITHLEY <kkeithle at redhat.com>
    > Reviewed-by: jiffin tony Thottan <jthottan at redhat.com>

    BUG: 1219399
    Change-Id: Ib15538744908a6001d729288d3e18a432d19050b
    Signed-off-by: Niels de Vos <ndevos at redhat.com>
    Reviewed-on: http://review.gluster.org/12470
    Reviewed-by: jiffin tony Thottan <jthottan at redhat.com>
    Tested-by: Gluster Build System <jenkins at build.gluster.com>
    Reviewed-by: Vijay Bellur <vbellur at redhat.com>

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=YACBwmJEST&a=cc_unsubscribe


More information about the Bugs mailing list