Project

General

Profile

Actions

Bug #9877

closed

In some cases it's possible for rgw to segfault on http COPY

Added by Anonymous over 9 years ago. Updated about 9 years ago.

Status:
Resolved
Priority:
High
Assignee:
Target version:
-
% Done:

0%

Source:
Community (user)
Tags:
Backport:
giant
Regression:
Severity:
2 - major
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

on 0.80.4

81> 2014-10-23 22:22:05.586898 7f83547f8700  1 ====== starting new request req=0x7f8368013400 =====
-80> 2014-10-23 22:22:05.586923 7f83547f8700 2 req 178:0.000026::COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0::initializing
-79> 2014-10-23 22:22:05.586933 7f83547f8700 10 host=node-11:6780 rgw_dns_name=*.gao.intel.com
-78> 2014-10-23 22:22:05.586991 7f83547f8700 10 ver=v1 first=test req=output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0
-77> 2014-10-23 22:22:05.586999 7f83547f8700 10 s
>object=output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 s->bucket=test
76> 2014-10-23 22:22:05.587010 7f83547f8700 2 req 178:0.000112:swift:COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0::getting op
-75> 2014-10-23 22:22:05.587019 7f83547f8700 2 req 178:0.000122:swift:COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0:copy_obj:authorizing
-74> 2014-10-23 22:22:05.587028 7f83547f8700 20 token_id=b113ce96df414154b90293d0602d35de
-73> 2014-10-23 22:22:05.587053 7f83547f8700 20 sending request to 10.54.6.21:5000/v2.0/tokens/b113ce96df414154b90293d0602d35de
-72> 2014-10-23 22:22:05.600938 7f83547f8700 20 received response: {"access": {"token": {"issued_at": "2014-10-23T21:48:25.792693", "expires": "2014-10-23T22:48:25Z", "id": "b113ce96df414154b90293d0602d35de", "tenant": {"id": "6b55efcd5ab145df8cca012d1f853e43", "enabled": true, "description": "admin tenant", "name": "admin"}}, "serviceCatalog": [{"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:8774/v2/6b55efcd5ab145df8cca012d1f853e43", "region": "RegionOne", "publicURL": "http://10.54.6.21:8774/v2/6b55efcd5ab145df8cca012d1f853e43", "id": "0cf8025b7f08471a9a491007c2e49e9a", "internalURL": "http://10.0.16.2:8774/v2/6b55efcd5ab145df8cca012d1f853e43"}], "type": "compute", "name": "nova"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:9696", "region": "RegionOne", "publicURL": "http://10.54.6.21:9696", "id": "81a15e36a76341d48387a9bdff8ee968", "internalURL": "http://10.0.16.2:9696"}], "type": "network", "name": "neutron"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:8776/v2/6b55efcd5ab145df8cca012d1f853e43", "region": "RegionOne", "publicURL": "http://10.54.6.21:8776/v2/6b55efcd5ab145df8cca012d1f853e43", "id": "0bcfcaa11e874c6dbf7555b77b771ea5", "internalURL": "http://10.0.16.2:8776/v2/6b55efcd5ab145df8cca012d1f853e43"}], "type": "volumev2", "name": "cinderv2"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:9292", "region": "RegionOne", "publicURL": "http://10.54.6.21:9292", "id": "40e8a39e699946f3b5e5bb35d05a8282", "internalURL": "http://10.0.16.2:9292"}], "type": "image", "name": "glance"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:8386/v1.1/6b55efcd5ab145df8cca012d1f853e43", "region": "RegionOne", "publicURL": "http://10.54.6.21:8386/v1.1/6b55efcd5ab145df8cca012d1f853e43", "id": "11364bf3df2943dcac29a734d3f551fd", "internalURL": "http://10.0.16.2:8386/v1.1/6b55efcd5ab145df8cca012d1f853e43"}], "type": "data_processing", "name": "sahara"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:8000/v1/", "region": "RegionOne", "publicURL": "http://10.54.6.21:8000/v1/", "id": "1080301350aa4169a3d6d9f4a98a0899", "internalURL": "http://10.0.16.2:8000/v1/"}], "type": "cloudformation", "name": "heat-cfn"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:8776/v1/6b55efcd5ab145df8cca012d1f853e43", "region": "RegionOne", "publicURL": "http://10.54.6.21:8776/v1/6b55efcd5ab145df8cca012d1f853e43", "id": "08caef13801b45c2aa7a05d007f832ad", "internalURL": "http://10.0.16.2:8776/v1/6b55efcd5ab145df8cca012d1f853e43"}], "type": "volume", "name": "cinder"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:8773/services/Admin", "region": "RegionOne", "publicURL": "http://10.54.6.21:8773/services/Cloud", "id": "22189645d1d9466b8fb4a06967f1a217", "internalURL": "http://10.0.16.2:8773/services/Cloud"}], "type": "ec2", "name": "nova_ec2"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:8004/v1/6b55efcd5ab145df8cca012d1f853e43", "region": "RegionOne", "publicURL": "http://10.54.6.21:8004/v1/6b55efcd5ab145df8cca012d1f853e43", "id": "213107b4ab70413897dfb32a01601bf0", "internalURL": "http://10.0.16.2:8004/v1/6b55efcd5ab145df8cca012d1f853e43"}], "type": "orchestration", "name": "heat"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:8080/swift/v1", "region": "RegionOne", "publicURL": "http://10.54.6.21:8080/swift/v1", "id": "3015385e403048dda22c1ece13102a71", "internalURL": "http://10.0.16.2:8080/swift/v1"}], "type": "object-store", "name": "swift"}, {"endpoints_links": [], "endpoints": [{"adminURL": "http://10.0.16.2:35357/v2.0", "region": "RegionOne", "publicURL": "http://10.54.6.21:5000/v2.0", "id": "65c025cea79c442c93b98c5ae0fb5965", "internalURL": "http://10.0.16.2:5000/v2.0"}], "type": "identity", "name": "keystone"}], "user": {"username": "admin", "roles_links": [], "id": "483adf5f8f4f40328b615b864045a08d", "roles": [{"name": "admin"}], "name": "admin"}, "metadata": {"is_admin": 0, "roles": ["a90627e9e1d94541b24b651383f77490"]}}}
-71> 2014-10-23 22:22:05.603689 7f83547f8700 0 validated token: admin:admin expires: 1414104505
-70> 2014-10-23 22:22:05.603804 7f83547f8700 20 get_obj_state: rctx=0x7f82d40428e0 obj=.users.uid:6b55efcd5ab145df8cca012d1f853e43 state=0x7f82d400af88 s
>prefetch_data=0
69> 2014-10-23 22:22:05.603827 7f83547f8700 10 cache get: name=.users.uid+6b55efcd5ab145df8cca012d1f853e43 : hit
-68> 2014-10-23 22:22:05.603842 7f83547f8700 20 get_obj_state: s
>obj_tag was set empty
67> 2014-10-23 22:22:05.603854 7f83547f8700 10 cache get: name=.users.uid+6b55efcd5ab145df8cca012d1f853e43 : hit
-66> 2014-10-23 22:22:05.603893 7f83547f8700 2 req 178:0.016995:swift:COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0:copy_obj:reading permissions
-65> 2014-10-23 22:22:05.603945 7f83547f8700 20 get_obj_state: rctx=0x7f83547f7760 obj=.rgw:test state=0x7f82d4002c18 s
>prefetch_data=0
64> 2014-10-23 22:22:05.603959 7f83547f8700 10 cache get: name=.rgw+test : hit
-63> 2014-10-23 22:22:05.603967 7f83547f8700 20 get_obj_state: s
>obj_tag was set empty
62> 2014-10-23 22:22:05.603971 7f83547f8700 20 Read xattr: user.rgw.idtag
-61> 2014-10-23 22:22:05.603973 7f83547f8700 20 Read xattr: user.rgw.manifest
-60> 2014-10-23 22:22:05.603977 7f83547f8700 10 cache get: name=.rgw+test : hit
-59> 2014-10-23 22:22:05.603993 7f83547f8700 20 rgw_get_bucket_info: bucket instance: test({i=.rgw.buckets.index,e=.rgw.buckets.extra}.rgw.buckets[default.5422.1])
-58> 2014-10-23 22:22:05.604003 7f83547f8700 20 reading from .rgw:.bucket.meta.test:default.5422.1
-57> 2014-10-23 22:22:05.604030 7f83547f8700 20 get_obj_state: rctx=0x7f83547f7760 obj=.rgw:.bucket.meta.test:default.5422.1 state=0x7f82d4017918 s->prefetch_data=0
-56> 2014-10-23 22:22:05.604038 7f83547f8700 10 cache get: name=.rgw+.bucket.meta.test:default.5422.1 : hit
-55> 2014-10-23 22:22:05.604049 7f83547f8700 20 get_obj_state: s->obj_tag was set empty
-54> 2014-10-23 22:22:05.604052 7f83547f8700 20 Read xattr: user.rgw.acl
-53> 2014-10-23 22:22:05.604054 7f83547f8700 20 Read xattr: user.rgw.idtag
-52> 2014-10-23 22:22:05.604055 7f83547f8700 20 Read xattr: user.rgw.manifest
-51> 2014-10-23 22:22:05.604056 7f83547f8700 20 Read xattr: user.rgw.x-amz-read
-50> 2014-10-23 22:22:05.604060 7f83547f8700 10 cache get: name=.rgw+.bucket.meta.test:default.5422.1 : hit
-49> 2014-10-23 22:22:05.604097 7f83547f8700 15 Read AccessControlPolicy<AccessControlPolicy xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Owner><ID>6b55efcd5ab145df8cca012d1f853e43</ID><DisplayName>admin</DisplayName></Owner><AccessControlList><Grant><Grantee xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="CanonicalUser"><ID>6b55efcd5ab145df8cca012d1f853e43</ID><DisplayName>admin</DisplayName></Grantee><Permission>FULL_CONTROL</Permission></Grant></AccessControlList></AccessControlPolicy>
-48> 2014-10-23 22:22:05.604111 7f83547f8700 2 req 178:0.017214:swift:COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0:copy_obj:init op
-47> 2014-10-23 22:22:05.604119 7f83547f8700 2 req 178:0.017222:swift:COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0:copy_obj:verifying op mask
-46> 2014-10-23 22:22:05.604123 7f83547f8700 20 required_mask= 2 user.op_mask=7
-45> 2014-10-23 22:22:05.604126 7f83547f8700 2 req 178:0.017229:swift:COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0:copy_obj:verifying op permissions
-44> 2014-10-23 22:22:05.604138 7f83547f8700 20 get_obj_state: rctx=0x7f83547f7760 obj=.rgw:test state=0x7f82d4002c18 s->prefetch_data=0
-43> 2014-10-23 22:22:05.604143 7f83547f8700 20 Read xattr: user.rgw.idtag
-42> 2014-10-23 22:22:05.604144 7f83547f8700 20 Read xattr: user.rgw.manifest
-41> 2014-10-23 22:22:05.604149 7f83547f8700 10 cache get: name=.rgw+test : hit
-40> 2014-10-23 22:22:05.604160 7f83547f8700 20 rgw_get_bucket_info: bucket instance: test(
{i=.rgw.buckets.index,e=.rgw.buckets.extra}.rgw.buckets[default.5422.1])
-39> 2014-10-23 22:22:05.604167 7f83547f8700 20 reading from .rgw:.bucket.meta.test:default.5422.1
-38> 2014-10-23 22:22:05.604173 7f83547f8700 20 get_obj_state: rctx=0x7f83547f7760 obj=.rgw:.bucket.meta.test:default.5422.1 state=0x7f82d4017918 s
>prefetch_data=0
37> 2014-10-23 22:22:05.604179 7f83547f8700 20 Read xattr: user.rgw.acl
-36> 2014-10-23 22:22:05.604180 7f83547f8700 20 Read xattr: user.rgw.idtag
-35> 2014-10-23 22:22:05.604181 7f83547f8700 20 Read xattr: user.rgw.manifest
-34> 2014-10-23 22:22:05.604182 7f83547f8700 20 Read xattr: user.rgw.x-amz-read
-33> 2014-10-23 22:22:05.604186 7f83547f8700 10 cache get: name=.rgw+.bucket.meta.test:default.5422.1 : hit
-32> 2014-10-23 22:22:05.604228 7f83547f8700 0 WARNING: couldn't find acl header for bucket, generating default
-31> 2014-10-23 22:22:05.604253 7f83547f8700 20 get_obj_state: rctx=0x7f82d401cc20 obj=.users.uid:6b55efcd5ab145df8cca012d1f853e43 state=0x7f82d4041fe8 s
>prefetch_data=0
30> 2014-10-23 22:22:05.604260 7f83547f8700 10 cache get: name=.users.uid+6b55efcd5ab145df8cca012d1f853e43 : hit
-29> 2014-10-23 22:22:05.604266 7f83547f8700 20 get_obj_state: s
>obj_tag was set empty
28> 2014-10-23 22:22:05.604274 7f83547f8700 10 cache get: name=.users.uid+6b55efcd5ab145df8cca012d1f853e43 : hit
-27> 2014-10-23 22:22:05.604295 7f83547f8700 5 Searching permissions for uid=6b55efcd5ab145df8cca012d1f853e43 mask=50
-26> 2014-10-23 22:22:05.604298 7f83547f8700 5 Found permission: 15
-25> 2014-10-23 22:22:05.604300 7f83547f8700 5 Searching permissions for group=1 mask=50
-24> 2014-10-23 22:22:05.604302 7f83547f8700 5 Permissions for group not found
-23> 2014-10-23 22:22:05.604304 7f83547f8700 5 Searching permissions for group=2 mask=50
-22> 2014-10-23 22:22:05.604305 7f83547f8700 5 Permissions for group not found
-21> 2014-10-23 22:22:05.604306 7f83547f8700 5 Getting permissions id=6b55efcd5ab145df8cca012d1f853e43 owner=6b55efcd5ab145df8cca012d1f853e43 perm=2
-20> 2014-10-23 22:22:05.604309 7f83547f8700 10 uid=6b55efcd5ab145df8cca012d1f853e43 requested perm (type)=2, policy perm=2, user_perm_mask=15, acl perm=2
-19> 2014-10-23 22:22:05.604317 7f83547f8700 2 req 178:0.017419:swift:COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0:copy_obj:verifying op params
-18> 2014-10-23 22:22:05.604322 7f83547f8700 2 req 178:0.017424:swift:COPY /swift/v1/test/output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0:copy_obj:executing
-17> 2014-10-23 22:22:05.604407 7f83547f8700 5 Copy object test({i=.rgw.buckets.index,e=.rgw.buckets.extra}.rgw.buckets[default.5422.1]):output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 => test({i=.rgw.buckets.index,e=.rgw.buckets.extra}.rgw.buckets[default.5422.1]):output
-16> 2014-10-23 22:22:05.604427 7f83547f8700 20 get_obj_state: rctx=0x7f83547f7760 obj=test:output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 state=0x7f82d4011f18 s
>prefetch_data=0
15> 2014-10-23 22:22:05.604512 7f83547f8700 1 - 10.54.6.21:0/1157812 --> 10.0.16.8:6814/37485 -- osd_op(client.215243.0:547 default.5422.1_output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 [getxattrs,stat] 12.631672cb ack+read e796) v4 -- ?+0 0x7f82d400f420 con 0x23f4d20
14> 2014-10-23 22:22:05.608717 7f83ebfff700 1 - 10.54.6.21:0/1157812 <== osd.92 10.0.16.8:6814/37485 5 ==== osd_op_reply(547 default.5422.1_output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 [getxattrs,stat] v0'0 uv1 ondisk = 0) v6 ==== 292+0+899 (602083941 0 2724235355) 0x7f83b0001150 con 0x23f4d20
13> 2014-10-23 22:22:05.608953 7f83547f8700 10 manifest: total_size = 0
-12> 2014-10-23 22:22:05.608976 7f83547f8700 20 get_obj_state: setting s
>obj_tag to default.215243.116
11> 2014-10-23 22:22:05.608982 7f83547f8700 20 Read xattr: user.rgw.acl
-10> 2014-10-23 22:22:05.608984 7f83547f8700 20 Read xattr: user.rgw.etag
-9> 2014-10-23 22:22:05.608985 7f83547f8700 20 Read xattr: user.rgw.idtag
-8> 2014-10-23 22:22:05.608987 7f83547f8700 20 Read xattr: user.rgw.manifest
-7> 2014-10-23 22:22:05.609037 7f83547f8700 20 get_obj_state: rctx=0x7f83547f7760 obj=test:output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 state=0x7f82d4011f18 s
>prefetch_data=0
6> 2014-10-23 22:22:05.609107 7f83547f8700 20 get_obj_state: rctx=0x7f83547f7760 obj=test:output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 state=0x7f82d4011f18 s>prefetch_data=0
5> 2014-10-23 22:22:05.609115 7f83547f8700 20 get_obj_state: rctx=0x7f83547f7760 obj=test:output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 state=0x7f82d4011f18 s>prefetch_data=0
4> 2014-10-23 22:22:05.609131 7f83547f8700 20 rados>read obj-ofs=0 read_ofs=0 read_len=0
3> 2014-10-23 22:22:05.609197 7f83547f8700 1 - 10.54.6.21:0/1157812 --> 10.0.16.8:6814/37485 -- osd_op(client.215243.0:548 default.5422.1_output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 [cmpxattr user.rgw.idtag (19) op 1 mode 1,read 0~0] 12.631672cb ack+read e796) v4 -- ?+0 0x7f82d4004830 con 0x23f4d20
2> 2014-10-23 22:22:05.612652 7f83ebfff700 1 - 10.54.6.21:0/1157812 <== osd.92 10.0.16.8:6814/37485 6 ==== osd_op_reply(548 default.5422.1_output/_temporary/1/_temporary/attempt_1414095611032_0010_m_000000_0 [cmpxattr (19) op 1 mode 1,read 0~0] v0'0 uv1 ondisk = 1) v6 ==== 292+0+0 (3879112092 0 0) 0x7f83b0001150 con 0x23f4d20
1> 2014-10-23 22:22:05.612768 7f83547f8700 20 rados>read r=1 bl.length=0
0> 2014-10-23 22:22:05.615302 7f83547f8700 -1 ** Caught signal (Segmentation fault) *
in thread 7f83547f8700
ceph version 0.80.4 (7c241cfaa6c8c068bc9da8578ca00b9f4fc7567f)
1: /usr/bin/radosgw() [0x5c700a]
2: (()+0xfcb0) [0x7f83f8843cb0]
3: (()+0x14b180) [0x7f83f7ba9180]
4: (ceph::buffer::ptr::append(char const*, unsigned int)+0x43) [0x7f83f9856153]
5: (ceph::buffer::list::append(char const*, unsigned int)+0x91) [0x7f83f9858891]
6: (RGWRados::copy_obj_data(void*, std::string const&, void**, long, rgw_obj&, rgw_obj&, long*, std::map&lt;std::string, ceph::buffer::list, std::less&lt;std::string&gt;, std::allocator&lt;std::pair&lt;std::string const, ceph::buffer::list&gt; > >&, RGWObjCategory, std::string*, rgw_err*)+0x5c6) [0x524a36]
7: (RGWRados::copy_obj(void*, std::string const&, std::string const&, std::string const&, req_info*, std::string const&, rgw_obj&, rgw_obj&, RGWBucketInfo&, RGWBucketInfo&, long*, long const*, long const*, char const*, char const*, bool, std::map&lt;std::string, ceph::buffer::list, std::less&lt;std::string&gt;, std::allocator&lt;std::pair&lt;std::string const, ceph::buffer::list&gt; > >&, RGWObjCategory, std::string*, rgw_err*, void ()(long, void), void*)+0x1da2) [0x533062]
8: (RGWCopyObj::execute()+0x2bc) [0x5568ac]
9: /usr/bin/radosgw() [0x4c79cc]
10: (RGWFCGXProcess::handle_request(RGWRequest*)+0x9c) [0x4c86ac]
11: (RGWProcess::RGWWQ::_process(RGWRequest*)+0x37) [0x4c9797]
12: (ThreadPool::worker(ThreadPool::WorkThread*)+0x4e6) [0x7f83f983df96]
13: (ThreadPool::WorkThread::entry()+0x10) [0x7f83f983fda0]
14: (()+0x7e9a) [0x7f83f883be9a]
15: (clone()+0x6d) [0x7f83f7b523fd]
NOTE: a copy of the executable, or `objdump -rdS &lt;executable&gt;` is needed to interpret this.

--- logging levels ---
0/ 5 none
0/ 1 lockdep
0/ 1 context
1/ 1 crush
1/ 5 mds
1/ 5 mds_balancer
1/ 5 mds_locker
1/ 5 mds_log
1/ 5 mds_log_expire
1/ 5 mds_migrator
0/ 1 buffer
0/ 1 timer
0/ 1 filer
0/ 1 striper
0/ 1 objecter
0/ 5 rados
0/ 5 rbd
0/ 5 journaler
0/ 5 objectcacher
0/ 5 client
0/ 5 osd
0/ 5 optracker
0/ 5 objclass
1/ 3 filestore
1/ 3 keyvaluestore
1/ 3 journal
0/ 5 ms
1/ 5 mon
0/10 monc
1/ 5 paxos
0/ 5 tp
1/ 5 auth
1/ 5 crypto
1/ 1 finisher
1/ 5 heartbeatmap
1/ 5 perfcounter
20/20 rgw
1/ 5 javaclient
1/ 5 asok
1/ 1 throttle
2/-2 (syslog threshold)
-1/-1 (stderr threshold)
max_recent 10000
max_new 1000
log_file /var/log/ceph/radosgw.log
--
end dump of recent events ---


Files

logs.tar (3.74 MB) logs.tar full rgw log, and PCAP of request around request Anonymous, 10/23/2014 04:58 PM
Actions #1

Updated by Ian Colle over 9 years ago

  • Assignee set to Yehuda Sadeh
Actions #2

Updated by Yehuda Sadeh over 9 years ago

looks like #9266.

Actions #3

Updated by Anonymous over 9 years ago

You mean #9226 ?

Actions #4

Updated by Anonymous over 9 years ago

reproduces on ceph version 0.80.7 (6c0127fcb58008793d3c8b62d925bc91963672a3)

#!/bin/bash

base=test
source=${base}/source
dest=${base}/dest

endpoint=$(keystone catalog --service object-store | awk '/public/{print $4}')
OS_TOKEN=$(keystone token-get | awk '/ id /{print $4}')

#create 10Mb data file
dd if=/dev/zero of=./data bs=1024 count=10240

swift upload $source data

#will return 201
curl -H "X-Auth-Token: ${OS_TOKEN}" -X COPY -i ${endpoint}/$source/data -H "Destination: ${dest}"

#will return 500
curl -H "X-Auth-Token: ${OS_TOKEN}" -X COPY -i ${endpoint}/$source -H "Destination: ${dest}"


Actions #5

Updated by Yehuda Sadeh over 9 years ago

  • Priority changed from Normal to High
Actions #6

Updated by Yehuda Sadeh over 9 years ago

Ok, I was able to reproduce it using this script. It seem that there are a few things that don't work as required. The issue doesn't happen in giant anymore, but I'll try to make sure all the issues are fixed.

Actions #7

Updated by Yehuda Sadeh over 9 years ago

Ah, moreover, the issue is fixed already in the firefly branch but didn't make it to a dot release (will be in the next one). The change that fixed the issue was the fix for #9089. A secondary issue still exists (RGWRados::get_obj() returns wrong len if len == 0), but it's not going to show up, at least not with the fix for #9089 applied on top and on this scenario. I'll prepare a fix for the second issue.

Actions #8

Updated by Yehuda Sadeh over 9 years ago

  • Status changed from New to Fix Under Review
  • Assignee changed from Yehuda Sadeh to Josh Durgin
Actions #9

Updated by Josh Durgin over 9 years ago

  • Status changed from Fix Under Review to Pending Backport
  • Assignee changed from Josh Durgin to Yehuda Sadeh

commit:fe7bf06366adaf787816d1e68f5e3f68e8c91134

Actions #10

Updated by Loïc Dachary about 9 years ago

  • Backport set to giant
Actions #11

Updated by Loïc Dachary about 9 years ago

  • Status changed from Pending Backport to Resolved
Actions

Also available in: Atom PDF