[Bugs] [Bug 1476870] [EC]: md5sum mismatches every time for a file from the fuse client on EC volume

bugzilla at redhat.com bugzilla at redhat.com
Sat Aug 12 13:39:52 UTC 2017


https://bugzilla.redhat.com/show_bug.cgi?id=1476870



--- Comment #2 from Worker Ant <bugzilla-bot at gluster.org> ---
COMMIT: https://review.gluster.org/17933 committed in release-3.11 by
Shyamsundar Ranganathan (srangana at redhat.com) 
------
commit 49ac61ae11508a16a56534a656d77be47f3fe6b8
Author: Ashish Pandey <aspandey at redhat.com>
Date:   Fri Jul 28 15:18:29 2017 +0530

    ec/cluster: Update failure of fop on a brick properly

    Problem:
    In case of truncate, if writev or open fails on a brick,
    in some cases it does not mark the failure onlock->good_mask.
    This causes the update of size and version on all the bricks
    even if it has failed on one of the brick. That ultimately
    causes a data corruption.

    Solution:
    In callback of such writev and open calls, mark fop->good
    for parent too.

    Thanks Pranith Kumar K <pkarampu at redhat.com> for finding the
    root cause.

    >Change-Id: I8a1da2888bff53b91a0d362b8c44fcdf658e7466
    >BUG: 1476205
    >Signed-off-by: Ashish Pandey <aspandey at redhat.com>
    >Reviewed-on: https://review.gluster.org/17906
    >Reviewed-by: Pranith Kumar Karampuri <pkarampu at redhat.com>
    >Smoke: Gluster Build System <jenkins at build.gluster.org>
    >CentOS-regression: Gluster Build System <jenkins at build.gluster.org>
    >Signed-off-by: Ashish Pandey <aspandey at redhat.com>

    Change-Id: I8a1da2888bff53b91a0d362b8c44fcdf658e7466
    BUG: 1476870
    Signed-off-by: Ashish Pandey <aspandey at redhat.com>
    Reviewed-on: https://review.gluster.org/17933
    Smoke: Gluster Build System <jenkins at build.gluster.org>
    Reviewed-by: Pranith Kumar Karampuri <pkarampu at redhat.com>
    CentOS-regression: Gluster Build System <jenkins at build.gluster.org>

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=Bkjbm5MDl3&a=cc_unsubscribe


More information about the Bugs mailing list