Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp152790pxb; Mon, 7 Feb 2022 08:17:56 -0800 (PST) X-Google-Smtp-Source: ABdhPJwRRRgR5kWxuoiHNH42WW5hHD/3+voZTweE18ia4suV8Lhk6c2+DvXYAjwGNivBLSufFv6f X-Received: by 2002:a17:90a:5998:: with SMTP id l24mr329215pji.57.1644250676006; Mon, 07 Feb 2022 08:17:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644250675; cv=none; d=google.com; s=arc-20160816; b=nFvzjmD2Vtlsq+l3zgEuKoncE6eiRjYW4edTU/vXnJkxuV48Gr61s7HNaQAJzKqSvm tHYCRdnzIS3cQYBP1zntUAdDYn7s1jc3gqzt+tlOHEdRHWLhe8y1E0NUfxwgDZEBEoEx uaoimk/5aphug99jgMoGwifuX7MAO+mVLDvskK8deVdTIyYKJl/+8tfF9rI/8/iK2NPB qVRZQY6hUC4O1qz+s0GmbiJxZ8yT/smUxVbwUzO1rM1GXzLjh8QEtMuRjHGzyIXoehqq 8o3o8nFfQ6xgxUWWG7T612l1r8r2j6GZG3wuDcZQOfibVvHZnKyJ5l2C1vc1iS2VZm+9 3JQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:message-id:date:cc:to:from:subject; bh=y+1RVdIRmYreH3JxeNUyMwKWtcox2QILU9xXewxZUHg=; b=qHtXFwf7QcFBWf+cHiMpI9S06GS0RgnEi+UoYoQfEKCute8BkYkPxJPDhqm7ebK9o5 bcp4iJW7VvoZJSC8j8BnPuqP/4y9LWCvaMuFZyHokIKd+scMghsUAEm2h/sJ3kwl18fK dbxW9Y1RWGEi+LnrunqR+vXkU+EahkdRTpywUGN0P8BrFS7Nt12Q2eRyt7/l9xlQF/hx btjpXtjTYhvZi7VNt5VmU1H63gFVXJjCd44/5oFtCSBCOPXVX2OyDg9UJ5tMIKwXmZQk l5h3J3kG9VIuNJoekrW8csl9T7Xa22//nAvZJNqUSSJfZKNuX6gA/gixkFIo2yuyx25a /M6w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v63si10326982pgd.878.2022.02.07.08.17.18; Mon, 07 Feb 2022 08:17:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231808AbiBDTm2 (ORCPT + 99 others); Fri, 4 Feb 2022 14:42:28 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:42294 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232169AbiBDTm1 (ORCPT ); Fri, 4 Feb 2022 14:42:27 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A445461D00 for ; Fri, 4 Feb 2022 19:42:26 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E65E1C004E1; Fri, 4 Feb 2022 19:42:25 +0000 (UTC) Subject: [PATCH] Permit COMMIT operations to return NFS4_OK From: Chuck Lever To: bfields@fieldses.org Cc: linux-nfs@vger.kernel.org Date: Fri, 04 Feb 2022 14:42:24 -0500 Message-ID: <164400374422.1026143.17746475126462213720.stgit@morisot.1015granger.net> User-Agent: StGit/1.5 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org RFC 7530 permits COMMIT to return NFS4ERR_INVAL, but RFC 5661 and later do not. Allow INVAL as a legacy behavior, but test for OK also. Signed-off-by: Chuck Lever --- nfs4.0/servertests/st_commit.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/nfs4.0/servertests/st_commit.py b/nfs4.0/servertests/st_commit.py index 12a0dffa061f..4ef87e69c5d7 100644 --- a/nfs4.0/servertests/st_commit.py +++ b/nfs4.0/servertests/st_commit.py @@ -160,4 +160,4 @@ def testCommitOverflow(t, env): res = c.write_file(fh, _text, 0, stateid, how=UNSTABLE4) check(res, msg="WRITE with how=UNSTABLE4") res = c.commit_file(fh, 0xfffffffffffffff0, 64) - check(res, NFS4ERR_INVAL, "COMMIT with offset + count overflow") + check(res, [NFS4_OK, NFS4ERR_INVAL], "COMMIT with offset + count overflow")