6.1 HP IBRIX X9000 Network Storage System File System User Guide (TA768-96061, June 2012)

CIFS users cannot view directory tree quotas.
Differences in locking behavior
When CIFS clients access a share from different servers, as in the X9000 Software environment,
the behavior of byte-range locks differs from the standard Windows behavior, where clients access
a share from the same server. You should be aware of the following:
Zero-length byte-range locks acquired on one file serving node are not observed on other file
serving nodes.
Byte-range locks acquired on one file serving node are not enforced as mandatory on other
file serving nodes.
If a shared byte-range lock is acquired on a file opened with write-only access on one file
serving node, that byte-range lock will not be observed on other file serving nodes. ("Write-only
access" means the file was opened with GENERIC_WRITE but not GENERIC_READ access.)
If an exclusive byte-range lock is acquired on a file opened with read-only access on one file
serving node, that byte-range lock will not be observed on other file serving nodes. ("Read-only
access" means the file was opened with GENERIC_READ but not GENERIC_WRITE access.)
CIFS shadow copy
Users who have accidently lost or changed a file can use the CIFS shadow copy feature to retrieve
or copy the previous version of the file from a file system snapshot. X9000 software supports CIFS
shadow copy operations as follows.
Access Control Lists (ACLs)
X9000 CIFS shadow copy behaves in the same manner as Windows shadow copy with respect
to ACL restoration. When a user restores a deleted file or folder using CIFS shadow copy, the
ACLs applied on the individual files or folders are not restored. Instead, the files and folders inherit
the permissions from the root of the share or from the parent directory where they were restored.
When a user restores on an existing file or folder by restoring it with CIFS shadow copy, the ACLs
applied on the individual file or folder are not restored. The ACLS applied on the individual file
or folder remain as they were before the restore.
88 Using CIFS