Re: [Gluster-devel] Spurious failure report for master branch - 2015-03-03

2015-03-05 Thread Vijay Bellur

On 03/04/2015 10:25 AM, Nithya Balachandran wrote:

Fix for the spurious bug-1117851.t failure at
http://review.gluster.org/#/c/9798/



Thanks, Shyam and Nithya for a quick turnaround on this spurious failure!

-Vijay

___
Gluster-devel mailing list
Gluster-devel@gluster.org
http://www.gluster.org/mailman/listinfo/gluster-devel


[Gluster-devel] glfs-fini issue in upstream master

2015-03-05 Thread Ravishankar N

tests/basic/afr/split-brain-healing.t is failing in upstream master:


ok 52
ok 53
*glfsheal: quick-read.c:1052: qr_inode_table_destroy: Assertion 
`list_empty (priv-table.lru[i])' failed.*

Healing /file1 failed: File not in split-brain.
*n**ot ok 54 Got 0 instead of 1*
FAILED COMMAND: 1 echo 0
*glfsheal: quick-read.c:1052: qr_inode_table_destroy: Assertion 
`list_empty (priv-table.lru[i])' failed.*

Healing /file3 failed: File not in split-brain.
*not ok 55 Got 0 instead of 1*
FAILED COMMAND: 1 echo 0
/root/workspace/glusterfs
ok 56
Failed 2/56 subtests



If I comment the calls to glfs_fini() in glfs-heal.c, the test passes.


ok 52
ok 53
Healing /file1 failed: File not in split-brain.
Volume heal failed.
ok 54
Healing /file3 failed: File not in split-brain.
Volume heal failed.
ok 55
/root/workspace/glusterfs
ok 56



Help!

___
Gluster-devel mailing list
Gluster-devel@gluster.org
http://www.gluster.org/mailman/listinfo/gluster-devel


[Gluster-devel] New Defects reported by Coverity Scan for gluster/glusterfs

2015-03-05 Thread scan-admin

Hi,

Please find the latest report on new defect(s) introduced to gluster/glusterfs 
found with Coverity Scan.

200 new defect(s) introduced to gluster/glusterfs found with Coverity Scan.
164 defect(s), reported by Coverity Scan earlier, were marked fixed in the 
recent build analyzed by Coverity Scan.

New defect(s) Reported-by: Coverity Scan
Showing 20 of 200 defect(s)


** CID 1133995:  Memory - illegal accesses  (BUFFER_SIZE_WARNING)
/xlators/nfs/server/src/mount3.c: 516 in mnt3svc_update_mountlist()



*** CID 1133995:  Memory - illegal accesses  (BUFFER_SIZE_WARNING)
/xlators/nfs/server/src/mount3.c: 516 in mnt3svc_update_mountlist()
510 if (ret) {
511 gf_log (GF_MNT, GF_LOG_WARNING, Failed to open '%s',
512 nfs-rmtab);
513 goto free_err;
514 }
515 
 CID 1133995:  Memory - illegal accesses  (BUFFER_SIZE_WARNING)
 Calling strncpy with a maximum size argument of 1024 bytes on 
 destination array me-exname of size 1024 bytes might leave the 
 destination string unterminated.
516 strncpy (me-exname, expname, MNTPATHLEN);
517 
518 INIT_LIST_HEAD (me-mlist);
519 /* Must get the IP or hostname of the client so we
520  * can map it into the mount entry.
521  */



To view the defects in Coverity Scan visit, 
https://scan.coverity.com/projects/987?tab=overview

To manage Coverity Scan email notifications for gluster-devel@gluster.org, 
click 
https://scan.coverity.com/subscriptions/edit?email=gluster-devel%40gluster.orgtoken=7dffab14bc5a7180e75b0d047539f148
 .

___
Gluster-devel mailing list
Gluster-devel@gluster.org
http://www.gluster.org/mailman/listinfo/gluster-devel


[Gluster-devel] New HTTPS certificate is now installed on Gluster Forge

2015-03-05 Thread Justin Clift
Just a FYI, as the old certificate was getting near the expiry date.

This new and improved one is better though, so git:// protocol
cloning from the forge works now too. :)

Regards and best wishes,

Justin Clift

--
GlusterFS - http://www.gluster.org

An open source, distributed file system scaling to several
petabytes, and handling thousands of clients.

My personal twitter: twitter.com/realjustinclift

___
Gluster-devel mailing list
Gluster-devel@gluster.org
http://www.gluster.org/mailman/listinfo/gluster-devel