Bug 17324 - curlftpfs i/o error when transferring a file.
Summary: curlftpfs i/o error when transferring a file.
Status: RESOLVED OLD
Alias: None
Product: Mageia
Classification: Unclassified
Component: RPM Packages (show other bugs)
Version: 6
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Shlomi Fish
QA Contact:
URL:
Whiteboard:
Keywords: UPSTREAM
Depends on:
Blocks:
 
Reported: 2015-12-11 13:46 CET by Alejandro Vargas
Modified: 2020-08-16 17:05 CEST (History)
2 users (show)

See Also:
Source RPM: curlftpfs-0.9.2-10.mga6
CVE:
Status comment:


Attachments

Description Alejandro Vargas 2015-12-11 13:46:06 CET
Curlftpfs always fails when transferring a file. Tested with servers proftpd and microsoft ftp server.


To reproduce:

In a terminal run curlftpfs -d  ftp://user:pass@server.com /mnt/ftp
In another terminal copy a file to /mnt/ftp

I found the problem in mageia 4 but it fails also in mageia 5


The debug output is this:


unique: 5034, opcode: WRITE (16), nodeid: 2, insize: 4176, pid: 50244
write[140544885921152] 4096 bytes to 20586496 flags: 0x8001
   write[140544885921152] 4096 bytes to 20586496
   unique: 5034, success, outsize: 24
unique: 5035, opcode: WRITE (16), nodeid: 2, insize: 4031, pid: 50244
write[140544885921152] 3951 bytes to 20590592 flags: 0x8001
   write[140544885921152] 3951 bytes to 20590592
   unique: 5035, success, outsize: 24
unique: 5036, opcode: FLUSH (25), nodeid: 2, insize: 64, pid: 50244
flush[140544885921152]
ftpfs: operation ftpfs_flush failed because Input/output error
   unique: 5036, error: -5 (Input/output error), outsize: 16
unique: 5037, opcode: RELEASE (18), nodeid: 2, insize: 64, pid: 0
release[140544885921152] flags: 0x8001
   unique: 5037, success, outsize: 16


No te de Input/output error.

I tried compiling the original version from sourceforge site and it also fails.

Then I downloaded the sources from SuSe, created the rpm, tested and it worked!

This is the source I used: http://download.opensuse.org/update/13.2/src/curlftpfs-0.9.2-61.3.1.src.rpm

It includes some patches I think solves this problem.

Reproducible: 

Steps to Reproduce:
Comment 1 Marja Van Waes 2015-12-18 20:40:43 CET
assigning to maintainer

Assignee: bugsquad => shlomif
CC: (none) => marja11

Comment 2 Shlomi Fish 2015-12-19 11:37:27 CET
I'll try to take a look, but it's not a high priority for me, and this should really be reported and fixed in the upstream source distribution.
Shlomi Fish 2015-12-19 12:31:04 CET

Status: NEW => ASSIGNED

Comment 3 Marja Van Waes 2018-04-18 11:45:56 CEST
Hi Alejandro,

Thank you for having taken the needed time to report this issue!

Did this bug get fixed? If so, please change its status to RESOLVED - FIXED

If it didn't, then we regret that we weren't able to fix it in Mageia 5. Mageia 5 has officially reached its End of Life on December 31st, 2017 https://blog.mageia.org/en/2017/11/07/mageia-5-eol-postponed/
It only continued to get important security updates since then, because we are waiting for a big Plasma5 update in Mageia 6, that'll fix many of the Mageia 5 => 6 upgrade issues.

If you haven't seen that this bug got fixed, then please check whether this bug still exists in Mageia 6. If it does, then please change the Version (near the top, at the left) to "6". If you know it exists in Cauldron, then change Version to Cauldron. If you see it in both Cauldron and Mageia 6, then please set Version to Cauldron and add MGA6TOO on the Whiteboard.

Thanks,
Marja
Comment 4 Alejandro Vargas 2018-04-18 15:51:15 CEST
Just tried in Mageia 6 and the problem is the same.

The copy operation reports input/output error.

And the debug output of curlftpfs is this:


unique: 36, opcode: GETATTR (3), nodeid: 1, insize: 56, pid: 2400
getattr /
   unique: 36, success, outsize: 120
unique: 37, opcode: LOOKUP (1), nodeid: 1, insize: 47, pid: 2400
LOOKUP /prueba
getattr /prueba
   NODEID: 22
   unique: 37, success, outsize: 144
unique: 38, opcode: LOOKUP (1), nodeid: 1, insize: 47, pid: 2400
LOOKUP /prueba
getattr /prueba
   NODEID: 22
   unique: 38, success, outsize: 144
unique: 39, opcode: OPEN (14), nodeid: 22, insize: 48, pid: 2400
open flags: 0x8001 /prueba
   open[140656756395488] flags: 0x8001 /prueba
   unique: 39, success, outsize: 32
unique: 40, opcode: SETATTR (4), nodeid: 22, insize: 128, pid: 2400
truncate /prueba 0
getattr /prueba
   unique: 40, success, outsize: 120
unique: 41, opcode: WRITE (16), nodeid: 22, insize: 89, pid: 2400
write[140656756395488] 9 bytes to 0 flags: 0x8001
   write[140656756395488] 9 bytes to 0
   unique: 41, success, outsize: 24
unique: 42, opcode: FLUSH (25), nodeid: 22, insize: 64, pid: 2400
flush[140656756395488]
ftpfs: operation ftpfs_flush failed because Input/output error
   unique: 42, error: -5 (Input/output error), outsize: 16
unique: 43, opcode: RELEASE (18), nodeid: 22, insize: 64, pid: 0
release[140656756395488] flags: 0x8001
   unique: 43, success, outsize: 16

Version: 5 => 6

Alejandro Vargas 2018-04-18 15:51:42 CEST

Source RPM: curlftpfs-0.9.2-9.mga5.src.rpm => curlftpfs-0.9.2-10.mga6

Comment 5 Marja Van Waes 2018-04-18 21:43:11 CEST
Thanks Alejandro.

Your upstream bug report is still open :-(
https://sourceforge.net/p/curlftpfs/bugs/70/

@ LpSolit

I don't understand why I don't manage to add that link to the "See Also:" field. 
"A bug on sourceforge.net." is in the list of accepted bugs for that field

CC: (none) => LpSolit
URL: (none) => https://sourceforge.net/p/curlftpfs/bugs/70/
Keywords: (none) => UPSTREAM

Comment 6 Alejandro Vargas 2018-04-19 12:57:12 CEST
As I sed, the SuSe packet works. You could check what patches are they using or just use it:

http://download.opensuse.org/update/13.2/src/curlftpfs-0.9.2-61.3.1.src.rpm
Comment 7 Frédéric "LpSolit" Buclin 2018-04-19 20:27:10 CEST
(In reply to Marja Van Waes from comment #5)
> I don't understand why I don't manage to add that link to the "See Also:"
> field. 

Because the upstream Bugzilla team doesn't care about Bugzilla 5.0. I backported the patch from Bugzilla 6.0.

URL: https://sourceforge.net/p/curlftpfs/bugs/70/ => (none)
See Also: (none) => https://sourceforge.net/p/curlftpfs/bugs/70/
CC: LpSolit => (none)

Comment 8 Aurelien Oudelet 2020-08-16 17:05:20 CEST
Mageia 6 changed to end-of-life (EOL) status on 2019-09-30. It is no longer 
maintained, which means that it will not receive any further security or bug 
fix updates.

Package Maintainer: If you wish for this bug to remain open because you plan 
to fix it in a currently maintained version, simply change the 'version' to 
a later Mageia version.

Bug Reporter: Thank you for reporting this issue and we are sorry that we 
weren't able to fix it before Mageia 6's end of life. If you are able to 
reproduce it against a later version of Mageia, you are encouraged to click 
on "Version" and change it against that version of Mageia.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a more recent
Mageia release includes newer upstream software that fixes bugs or makes them
obsolete.

If you would like to help fixing bugs in the future, don't hesitate to join the
packager team via our mentoring program [1] or join the teams that fit you 
most [2].

[1] https://wiki.mageia.org/en/Becoming_a_Mageia_Packager
[2] http://www.mageia.org/contribute/

Best regards,
Aurélien
Bugsquad Team

Resolution: (none) => OLD
Status: ASSIGNED => RESOLVED
CC: (none) => ouaurelien


Note You need to log in before you can comment on or make changes to this bug.