Re: [Gluster-devel] Spurious failure report for master branch - 2015-03-03
On 03/04/2015 10:25 AM, Nithya Balachandran wrote: Fix for the spurious bug-1117851.t failure at http://review.gluster.org/#/c/9798/ Thanks, Shyam and Nithya for a quick turnaround on this spurious failure! -Vijay ___ Gluster-devel mailing list Gluster-devel@gluster.org http://www.gluster.org/mailman/listinfo/gluster-devel
[Gluster-devel] glfs-fini issue in upstream master
tests/basic/afr/split-brain-healing.t is failing in upstream master: ok 52 ok 53 *glfsheal: quick-read.c:1052: qr_inode_table_destroy: Assertion `list_empty (priv-table.lru[i])' failed.* Healing /file1 failed: File not in split-brain. *n**ot ok 54 Got 0 instead of 1* FAILED COMMAND: 1 echo 0 *glfsheal: quick-read.c:1052: qr_inode_table_destroy: Assertion `list_empty (priv-table.lru[i])' failed.* Healing /file3 failed: File not in split-brain. *not ok 55 Got 0 instead of 1* FAILED COMMAND: 1 echo 0 /root/workspace/glusterfs ok 56 Failed 2/56 subtests If I comment the calls to glfs_fini() in glfs-heal.c, the test passes. ok 52 ok 53 Healing /file1 failed: File not in split-brain. Volume heal failed. ok 54 Healing /file3 failed: File not in split-brain. Volume heal failed. ok 55 /root/workspace/glusterfs ok 56 Help! ___ Gluster-devel mailing list Gluster-devel@gluster.org http://www.gluster.org/mailman/listinfo/gluster-devel
[Gluster-devel] New Defects reported by Coverity Scan for gluster/glusterfs
Hi, Please find the latest report on new defect(s) introduced to gluster/glusterfs found with Coverity Scan. 200 new defect(s) introduced to gluster/glusterfs found with Coverity Scan. 164 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 20 of 200 defect(s) ** CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING) /xlators/nfs/server/src/mount3.c: 516 in mnt3svc_update_mountlist() *** CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING) /xlators/nfs/server/src/mount3.c: 516 in mnt3svc_update_mountlist() 510 if (ret) { 511 gf_log (GF_MNT, GF_LOG_WARNING, Failed to open '%s', 512 nfs-rmtab); 513 goto free_err; 514 } 515 CID 1133995: Memory - illegal accesses (BUFFER_SIZE_WARNING) Calling strncpy with a maximum size argument of 1024 bytes on destination array me-exname of size 1024 bytes might leave the destination string unterminated. 516 strncpy (me-exname, expname, MNTPATHLEN); 517 518 INIT_LIST_HEAD (me-mlist); 519 /* Must get the IP or hostname of the client so we 520 * can map it into the mount entry. 521 */ To view the defects in Coverity Scan visit, https://scan.coverity.com/projects/987?tab=overview To manage Coverity Scan email notifications for gluster-devel@gluster.org, click https://scan.coverity.com/subscriptions/edit?email=gluster-devel%40gluster.orgtoken=7dffab14bc5a7180e75b0d047539f148 . ___ Gluster-devel mailing list Gluster-devel@gluster.org http://www.gluster.org/mailman/listinfo/gluster-devel
[Gluster-devel] New HTTPS certificate is now installed on Gluster Forge
Just a FYI, as the old certificate was getting near the expiry date. This new and improved one is better though, so git:// protocol cloning from the forge works now too. :) Regards and best wishes, Justin Clift -- GlusterFS - http://www.gluster.org An open source, distributed file system scaling to several petabytes, and handling thousands of clients. My personal twitter: twitter.com/realjustinclift ___ Gluster-devel mailing list Gluster-devel@gluster.org http://www.gluster.org/mailman/listinfo/gluster-devel