Bug 2180124
Summary: | backport courteous server code for nfsd | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Jeff Layton <jlayton> |
Component: | kernel | Assignee: | Jeff Layton <jlayton> |
kernel sub component: | NFS | QA Contact: | JianHong Yin <jiyin> |
Status: | CLOSED ERRATA | Docs Contact: | Michal Stubna <mstubna> |
Severity: | medium | ||
Priority: | unspecified | CC: | gfialova, jiyin, mstubna, nfs-team, xzhou, yieli, yoyang |
Version: | 9.2 | Keywords: | FutureFeature, Triaged |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | kernel-5.14.0-306.el9 | Doc Type: | Enhancement |
Doc Text: |
.NFS server now implements courteous server code for `nfsd`
This update introduces the implementation of courteous server code for `nfsd` in the RHEL kernel NFS server. With this new feature, the NFS server avoids revoking leases for clients that have lost contact with the server for an extended period, provided that there is no conflicting access while the client is out of contact.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-11-07 08:42:54 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jeff Layton
2023-03-20 18:46:47 UTC
Testing this feature can be somewhat difficult, but there are some tests in pynfs that were recently added for this (most of the tests that were added in st_courtesy.py). Draft release note / doc text: "The RHEL kernel NFS server has gained the ability to be more "courteous" and will now avoid revoking leases for clients that have lost contact with the server for an extended period, as long as there is no conflicting access while the client is out of contact." Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:6583 |