Activity
From 07/23/2012 to 08/21/2012
08/21/2012
- 10:49 PM CephFS Bug #1947: mds: SIGBUS during _mark_dirty
- logs: ubuntu@teuthology:/a/teuthology-2012-08-21_02:00:04-regression-testing-testing-basic/5691
- 10:57 AM CephFS Bug #1947: mds: SIGBUS during _mark_dirty
- added debugging to kernel ffsb task
- 10:47 PM Revision 59dbf599 (ceph): Merge remote-tracking branch 'gh/wip-crypto'
- 10:39 PM Revision ec90d3f5 (ceph): cls_rgw: add gc commands handling
- add the various functionality required for the gc: set entry,
defer entry, list
Signed-off-by: Yehuda Sadeh <yehuda@... - 10:33 PM Revision 7dd5d06d (ceph): cls_lock: specify librados namespace explicitly
- librados namespace was not specified, hence required including
source files to add using namespace. This fixes it.
S... - 10:33 PM Revision e4a78d2a (ceph): config_opts: add gc configurables
- rgw_gc_max_objs: num of objects to used for gc shards
rgw_gc_obj_min_wait: min time for an object to become visible t... - 10:33 PM Revision eda5a76f (ceph): cls_rgw: cleanups
- move stuff to cls/rgw, create needed helpers.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 09:22 PM Revision e7c492b1 (ceph): mon: implement 'ceph report <tag ...>' command
- Generate a simple "signed" report of the current cluster status. Include
a simple crc so that the report is vaguely ... - 08:24 PM Revision 8f95c1fa (ceph): config: remove dead osd options
- The read balancing/shedding stuff is old. Same goes for class timeouts and
the raid options.
Signed-off-by: Sage We... - 08:01 PM Revision 14ce35a1 (ceph): move kclient + blogbench to marginal
- Periodically fails #1945
- 06:57 PM Revision bfb24a70 (ceph): Fix compilation warnings on squeeze; can't printf() snapid_t directly
- 06:34 PM Bug #2947 (In Progress): osd: out of order reply
- ooof, the saga continues: ubuntu@teuthology:/a/sage-gfoo2/5974
- 10:50 AM Bug #2947 (Resolved): osd: out of order reply
- commit:4a0704e64a733b7bb14fb4103cd1cd54e4e7da8a
- 06:03 PM Bug #2954: osd: scrub stat mismatch, got 18/19 objects, 14/15 clones, 22478527/25385282 bytes.
- another one. ms failure injection may have contributed.
ubuntu@teuthology:/a/sage-gfoo2/5925 - 06:01 PM Revision bb1e65eb (ceph): rgw: use sizeof() for snprintf
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:58 PM Revision b6fb3e37 (ceph): rgw: dump content_range using 64 bit formatters
- Fixes: #2961
Also make sure that size is 64 bit.
backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 05:58 PM Revision 08d97514 (ceph): Revert "rgw: dump content_range using 64 bit formatters"
- This reverts commit faf9fa5744b459abc2eda829a48a4e07b9c97a08.
- 05:57 PM Revision 035f49a0 (ceph): include mds debugging on ffsb
- hopefully we can track down #1947
- 05:51 PM Revision 9883da69 (ceph): Merge branch 'next'
- 05:48 PM Revision ddbef475 (ceph): Revert "rgw: dump content_range using 64 bit formatters"
- This reverts commit cc435e99802f77b3d4b21abe022665ac9df259cf.
Wrong fix; fcgi doesn't do %lld - 05:48 PM Revision 1a09423e (ceph): rgw: dump content_range using 64 bit formatters
- Fixes: #2961
Also make sure that size is 64 bit.
backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 05:48 PM Revision 4a0704e6 (ceph): osd: fix requeue order for waiting_for_ondisk
- We are calling requeue_ops() on each individual op, which means we need
to requeue in reverse order (newest first, ol... - 05:43 PM Bug #3026 (Resolved): ref counting error argonaut
- (11:36:55 AM) Sage Weil: -1> 2012-08-21 07:00:24.285153 7ff5abba6700 1 -- 10.214.131.24:6806/20124 --> 10.214.13...
- 05:42 PM Bug #3025 (Resolved): WaitActingChange
- We should not transition to WaitActingChange from Acting due to recovery complete.
- 05:32 PM rbd Feature #2720: rbd: add children command
- First implementation from Josh has edges sanded off, sorta running. Needs better testing and manpage updates.
- 05:11 PM Feature #1515 (Duplicate): osd: pg split
- 04:17 PM rbd Feature #2560: rbd: safe parent deletion
- I *think* this is more or less implemented. The commands are "snap protect" and
"snap unprotect", but they behave a... - 04:03 PM Revision 2e8689a4 (ceph): mon: fix monitor cluster contraction race
- If we contract to 1 monitor, we win_standalone_election() without bumping
the election epoch. Racing paxos updates c... - 03:46 PM RADOS Feature #3011 (Fix Under Review): Remove "pool" terminology from CRUSH
- 09:38 AM RADOS Feature #3011: Remove "pool" terminology from CRUSH
- agreed.
i'll stick this in the backlog! - 09:32 AM RADOS Feature #3011: Remove "pool" terminology from CRUSH
- Since it's a hierarchy of nodes, I'd vote for "root." Also, the term "bucket" is confusing, because we use that term ...
- 08:15 AM RADOS Feature #3011: Remove "pool" terminology from CRUSH
- You're talking about 'pool=default', right? I agree. What term should be use instead for the root of the tree?
'... - 02:38 PM devops Feature #3023 (Closed): juju: automated QA of OpenStack RBD integration
- 02:38 PM devops Feature #3022 (Closed): juju: automated QA of Ceph
- 02:36 PM devops Feature #3021 (Closed): juju: change glance to use rbd
- 02:36 PM devops Feature #3020 (Closed): juju: change nova to use rbd
- 02:36 PM devops Feature #3019 (Closed): juju: modernize ceph charm, mon & osd bootstrap
- 02:35 PM devops Feature #3018 (Closed): juju: test deploy of openstack
- 02:35 PM devops Feature #3017 (Closed): juju: dev env setup
- 02:13 PM CephFS Bug #2863: client: does not tolerate traceless replies from mds
- 02:13 PM CephFS Bug #2863 (Resolved): client: does not tolerate traceless replies from mds
- 02:10 PM Feature #2829 (Fix Under Review): report on cluster size/status (for service billing purposes)
- 01:46 PM Feature #2829: report on cluster size/status (for service billing purposes)
- see wip-mon-report
- 01:31 PM Cleanup #3016 (Resolved): make ceph osd crush set ${id} osd.${id} not require the ID twice
- That is lame and confusing.
- 01:01 PM CephFS Bug #1945: blogbench hang on caps
- ubuntu@teuthology:/var/lib/teuthworker/archive/teuthology-2012-08-21_02:00:04-regression-testing-testing-basic/5675
- 12:45 PM devops Cleanup #3015 (Resolved): order of arguments should not matter for init-ceph
- -c ceph.conf start works
start -c ceph.conf does not.
Boo! - 12:45 PM Bug #3014 (Resolved): ceph mds set_data_pool pool doesn't fail
- If you specify a name instead of a pool ID, it just adds pool id 0!
- 12:27 PM Bug #2762: mon crash ceph::__ceph_assert_fail (assertion=0x63d150 "begin->last_committed == last_...
- May be clearly reproduced with >500 active clients, e.g. booting vms, and one monitor.
- 11:21 AM RADOS Bug #3013 (New): doc: Document ceph-osd --mkfs --osd-uuid, --get-osd-uuid, and friends
- ceph-osd --mkfs --osd-uuid <uuid> -i 123 ...
--get-osd-fsid and --get-cluster-fsid
Go through the source and lo... - 11:02 AM rgw Bug #2961 (Resolved): rgw: bad content range
- 08:04 AM rgw Bug #2961: rgw: bad content range
- it only with >4G objects. A test like that would just take too long. Maybe it's possible to put it as an optional tes...
- 10:14 AM Feature #2668 (Resolved): Build linux-tools-common package for perf
- 09:55 AM RADOS Feature #3012 (New): come up with some way to do gossip among daemons on a host
- In discussion, it occurred to me that really OSDs on a host ought to gossip about certain kinds of information (altho...
- 09:07 AM Feature #3010 (In Progress): Make it easy to find a list of data locations from a cephfs file
- is this what they're after?...
- 08:50 AM Bug #3005 (Resolved): bootstrapped mon crashes after win_standalone_election
- logs on #3006
also reproduced w/ vstart by doing 'ceph log foo &' every .01 seconds in a loop, and then removing m... - 08:50 AM Bug #3006 (Duplicate): mon: removing a running monitor can crash ceph
- see #3005
- 01:14 AM Revision 81694c39 (ceph): Add manpage sections for flatten, snap {un}protect
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
Reviewed-by: John Wilkins <john.wilkins@inktank.com> - 12:16 AM Revision 6a9bcc09 (ceph): mkcephfs, init-ceph: Warn if hostname "localhost" is seen in ceph.conf.
- Given a ceph.conf that looks like
[osd.42]
host = localhost
mkcephfs used to exit with an obscure error message...
08/20/2012
- 11:53 PM Revision 5ad013b5 (ceph): "Removed 274 from xfstests"
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
- 11:27 PM Revision 5642a5ee (ceph): test_rbd.py: remove clone before image it depends on
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 10:37 PM Revision faf9fa57 (ceph): rgw: dump content_range using 64 bit formatters
- Fixes: #2961
Also make sure that size is 64 bit.
backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>... - 10:37 PM Revision cc435e99 (ceph): rgw: dump content_range using 64 bit formatters
- Fixes: #2961
Also make sure that size is 64 bit.
backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>... - 10:04 PM Revision 9cb60d1d (ceph): Merge branch 'next'
- 10:04 PM Revision dd4c1dc9 (ceph): osd: fix requeue order of dup ops
- The waiting_for_ondisk (and ack) maps get dups of ops that are in progress.
If we have a peering change in which the ... - 09:42 PM rbd Bug #2937: btrfs filesystem on rbd device kernel BUG writing large file
- This reproduces on plana. Details: two machine cluster, one monitor, two OSDs:
roles:
- [mon.0, osd.0]
- [osd.1... - 09:28 PM RADOS Feature #3011 (Resolved): Remove "pool" terminology from CRUSH
- Users get confused and conflate RADOS pools and CRUSH pools. I don't think we actually use that term in many places i...
- 08:58 PM Feature #3010 (Resolved): Make it easy to find a list of data locations from a cephfs file
- Large cluster designers would like to be able to get as much information about a CephFS file's location as possible. ...
- 08:54 PM Revision aa4ea5fa (ceph): marginal: remove verify collection (unused)
- 08:30 PM Revision 6ae216e5 (ceph): osd: fix warning
- signed/unsigned comp
Signed-off-by: Sage Weil <sage@inktank.com> - 08:29 PM Revision 60fdb6fd (ceph): init-ceph: use SSH in "service ceph status -a" to get version
- When running "service ceph status -a", a version number was never
returned for remote hosts, only for the local. Thi... - 08:26 PM Revision 5c703927 (ceph): doc: mkcephfs man page, -c ceph.conf is not optional
- [ The following text is in the "ISO-8859-1" character set. ]
[ Your display is set for the "ANSI_X3.4-1968" chara... - 08:23 PM Revision 7e417bd8 (ceph): osd: make notify debug output less noisy
- Signed-off-by: Sage Weil <sage@inktank.com>
- 07:47 PM Revision 5e761b4e (ceph): mds: do not return null dentry lease on getattr
- Specifically, /foo may exist and client may try to mount /foo/bar. That
GETATTR request is on #1/foo/bar, but we can... - 07:12 PM Bug #3009 (Resolved): if you mkfs an OSD with --filestore-xattr-use-omap and then don't start the...
- Apparently we auto-detect filestore-xattr-use-omap, but we don't store it anywhere in the OSD's data directory. Which...
- 06:57 PM RADOS Cleanup #3008 (New): Consider making MLog messages not require MON_CAP_X
- Right now, the permissions for an incoming MLog are checked against PAXOS_LOG, MON_CAP_X. This means that the MDS and...
- 06:07 PM Revision 19ea3126 (ceph): mon: add MonitorStore::sync()
- Signed-off-by: Sage Weil <sage@inktank.com>
- 06:01 PM Bug #3006 (Duplicate): mon: removing a running monitor can crash ceph
- While rewriting the ceph add/remove monitor documentation (http://ceph.com/docs/master/ops/manage/grow/mon/), I added...
- 05:49 PM Revision bfd046e0 (ceph): Merge remote-tracking branch 'gh/wip-rbd-layer'
- 05:19 PM Revision 223d6fa8 (ceph): crypto: cache CryptoHandler in CryptoKey
- This avoids a call into cct and a switch to get the handler every time.
Signed-off-by: Sage Weil <sage@inktank.com> - 05:18 PM Bug #3005 (Resolved): bootstrapped mon crashes after win_standalone_election
- I created the mon from #3004 and got it running correctly. It crashed since it won without being rank 0....
- 05:17 PM Bug #3001 (Resolved): mkcephfs: -a fails if only "host=localhost" sections seen in ceph.conf
- ...
- 04:22 PM Bug #3001: mkcephfs: -a fails if only "host=localhost" sections seen in ceph.conf
- And for the record, for now I'm recommending this: don't use "host=localhost", put in the actual host name.
- 04:21 PM Bug #3001 (Resolved): mkcephfs: -a fails if only "host=localhost" sections seen in ceph.conf
- This was reported earlier on the list as http://thread.gmane.org/gmane.comp.file-systems.ceph.devel/8051/focus=8092 a...
- 05:13 PM Bug #3004 (Resolved): bootstrapped initial monitor can't find its own keyring with relative paths
- I ran the following sequence of commands, which I sourced from vstart (while extracting the ceph.conf):...
- 05:05 PM rbd Documentation #2992 (In Progress): doc: RBD parent/child snapshot
- 11:31 AM rbd Documentation #2992 (Need More Info): doc: RBD parent/child snapshot
- 04:54 PM Bug #3002 (Resolved): ceph-authtool: --print does not work
- this already got fixed in master, it looks like (--print-key instead of --print). don't think it's worth backporting...
- 04:42 PM Bug #3002 (Resolved): ceph-authtool: --print does not work
- ...
- 04:53 PM Bug #3003 (Resolved): mon: race/crash after removing monitors
- commit:d521dde9b565098765a20dd001d8650ad02c2bef
- 04:47 PM Bug #3003 (Resolved): mon: race/crash after removing monitors
- ...
- 04:15 PM Revision cfe211af (ceph): doc: fix key export syntax
- 'ceph auth export mon.' no longer works as a side-effect of switching
around the mon. key handling. 'get' works, tho... - 03:51 PM Bug #2691 (In Progress): osd/ReplicatedPG.cc: 5888: FAILED assert(latest->is_update())
- Recent log: ubuntu@teuthology:/a/teuthology-2012-08-20_00:00:04-regression-next-testing-basic/4822...
- 03:36 PM Feature #3000 (Resolved): osd: balance recovery vs client io
- 03:35 PM Linux kernel client Bug #1347 (Can't reproduce): forced unmount kernel bug
- 03:34 PM Bug #2451 (Can't reproduce): qa: networking doesn't always start after reboot
- i havne't seen this in a long time.
- 03:26 PM rgw Bug #2961 (In Progress): rgw: bad content range
- Can we add an s3tests for this?
- 03:26 PM rgw Bug #2961 (Resolved): rgw: bad content range
- 03:16 PM Feature #2668 (In Progress): Build linux-tools-common package for perf
- 03:06 PM Bug #2999 (Resolved): osd: msgr crash in OSD::complete_notify
- Logs: ubuntu@teuthology:/a/teuthology-2012-08-17_19:00:07-regression-master-testing-gcov/3549...
- 03:05 PM Bug #2956 (Resolved): osd:FAILED assert(waiting_for_ondisk.begin()->first == repop->v)
- commit:dd4c1dc9f9dae43e4761caca049bfe7361d9ebfb
- 12:35 PM Bug #2956: osd:FAILED assert(waiting_for_ondisk.begin()->first == repop->v)
- 11:17 AM Bug #2956: osd:FAILED assert(waiting_for_ondisk.begin()->first == repop->v)
- ...
- 02:28 PM Documentation #2998 (Can't reproduce): doc: validate install docs on ubuntu server
- 02:00 PM RADOS Bug #2874: apparent CRUSH mapping failure
- I'd like to report that I was seeing what I believe to be the same issue (at least the symptoms were the same: a 3-OS...
- 01:58 PM Bug #2761: osd: failed to recover before timeout expired
- just reproduced this one with osd and msgr logs:...
- 12:56 PM Bug #2761: osd: failed to recover before timeout expired
- Logs: ubuntu@teuthology:/a/teuthology-2012-08-20_04:00:05-regression-stable-master-basic/5044
- 01:31 PM Feature #2911 (Duplicate): osd: Restrict recovery when the OSD full list is nonempty
- 01:31 PM Feature #1637 (Duplicate): OSDs running full take down other OSDs
- 01:09 PM Bug #2924 (Resolved): doc: Adjust for mon. key being in external keyring
- ceph auth get mon. > /tmp/monkey
- 01:04 PM Bug #2947: osd: out of order reply
- More Logs: ubuntu@teuthology:/a/teuthology-2012-08-19_02:00:05-regression-testing-testing-basic/4288
- 11:38 AM Bug #2947: osd: out of order reply
- ...
- 12:35 PM rbd Bug #2967 (Resolved): librbd: cls_rbd.parents unit test failure
- 11:36 AM rbd Bug #2967: librbd: cls_rbd.parents unit test failure
- 10:59 AM rbd Bug #2967: librbd: cls_rbd.parents unit test failure
- I think this is resolved by the about-to-be-merged layering code; testing is in progress
- 11:53 AM Bug #2997 (Resolved): ceph-mon --mkfs allows you to create one without an id which then crashes o...
- And that sucks, especially when it crashes in a demo and you don't know why.
- 11:41 AM rgw Documentation #2483 (Fix Under Review): doc: radosgw api diffs to swift
- 11:40 AM rgw Documentation #2483: doc: radosgw api diffs to swift
- Can you check the latest master build of docs and see if this has been updated to your satisfaction? Thanks!
- 11:30 AM Documentation #2978 (Need More Info): doc: write RADOS restore from backup procedure
- 11:30 AM Documentation #2977 (Need More Info): doc: write RADOS backup procedure
- 11:30 AM Documentation #2979 (Need More Info): doc: write doc on how to use / rollback to RADOS snapshots
- 11:30 AM devops Documentation #2975 (Need More Info): doc: update docs to match new ceph-disk-prepare syntax
- 11:29 AM Documentation #2995 (In Progress): doc: restructure documentation (its getting messy!)
- 11:23 AM Documentation #2981 (In Progress): doc: write add/remove a monitor
- 11:22 AM Documentation #2970 (In Progress): doc: expand/complete osd settings reference
- 11:22 AM Documentation #2971 (In Progress): doc: expand/complete mon settings reference
- 11:22 AM Documentation #2973 (In Progress): doc: expand/complete ceph general settings
- 10:56 AM Feature #2840: mon: $mon_data/cluster_fsid file
- wip-mon-mkfs
- 10:55 AM Feature #2840 (Fix Under Review): mon: $mon_data/cluster_fsid file
- 09:22 AM Bug #2803 (Can't reproduce): filer: probe crash
- 09:21 AM CephFS Bug #2959 (Resolved): mds: returns null dentry on getattr
- 09:20 AM Linux kernel client Bug #2936 (Resolved): Remounting cephfs with non-existing path causes kernel panic
- 03:16 AM Revision b800496b (ceph): ceph: fix cpu_profile default
08/19/2012
- 04:10 PM Documentation #2996 (Resolved): doc: write install Ceph with RPMs doc
- 04:09 PM Documentation #2995 (Resolved): doc: restructure documentation (its getting messy!)
- 04:07 PM Documentation #2994 (Resolved): doc: expand/complete librados API doc
- 04:04 PM rgw Documentation #2993 (Resolved): doc: write quick RGW guide (if feasible)
- 04:03 PM rbd Documentation #2992 (Resolved): doc: RBD parent/child snapshot
- 03:59 PM rgw Documentation #2991 (Resolved): doc: expand/complete RGW Swift API reference
- The reference for the [client.radosgw.gateway] sections of ceph.conf need to be completed by John Wilkins and reviewe...
- 03:58 PM rgw Documentation #2990 (Resolved): doc: expand/complete RGW S3 API reference
- 03:57 PM rgw Documentation #2989 (Resolved): doc: write RGW troubleshooting
- 03:57 PM CephFS Documentation #2988 (Resolved): doc: write MDS troubleshooting
- 03:57 PM Documentation #2987 (Rejected): doc: write MON troubleshooting
- 03:57 PM Documentation #2986 (Rejected): doc: write OSD troubleshooting
- 03:56 PM Documentation #2985 (Rejected): doc: write install troubleshooting
- 03:56 PM Documentation #2984 (Rejected): doc: write performance tuning
- 03:56 PM Documentation #2983 (Rejected): doc: write performance monitoring
- 03:56 PM CephFS Documentation #2982 (Resolved): doc: write add/remove a metadata server
- 03:52 PM Documentation #2981 (Resolved): doc: write add/remove a monitor
- 03:52 PM Documentation #2980 (Resolved): doc: write upgrading Ceph version
- 03:52 PM Documentation #2979 (Closed): doc: write doc on how to use / rollback to RADOS snapshots
- 03:51 PM Documentation #2978 (Closed): doc: write RADOS restore from backup procedure
- 03:51 PM Documentation #2977 (Closed): doc: write RADOS backup procedure
- 03:51 PM devops Documentation #2976 (Closed): doc: update chef doc to git clone with http, not ssh
- 03:50 PM devops Documentation #2975 (Rejected): doc: update docs to match new ceph-disk-prepare syntax
- 03:50 PM devops Documentation #2974 (Resolved): doc: update chef docs for mon key distribution
- 03:50 PM Documentation #2973 (Resolved): doc: expand/complete ceph general settings
- 03:49 PM rgw Documentation #2972 (Resolved): doc: expand/complete rgw settings reference
- 03:49 PM Documentation #2971 (Resolved): doc: expand/complete mon settings reference
- 03:48 PM Documentation #2970 (Resolved): doc: expand/complete osd settings reference
- 03:47 PM CephFS Documentation #2969 (Resolved): doc: expand/complete mds settings reference
- 03:46 PM Documentation #2968 (Resolved): doc: complete architecture section
- 02:23 PM rbd Feature #2850 (Duplicate): libceph: support multi-operation transactions
- 01:07 PM Bug #2784 (Can't reproduce): osd hit suicide timeout
- 12:49 PM Bug #2856 (Resolved): osd: bound size of transactions trimming old osdmaps
- 09:13 AM Linux kernel client Bug #2936: Remounting cephfs with non-existing path causes kernel panic
- There are patches to do that pending, but i haven't pushed them to the tree yet because a regression in 3.6-rc1 break...
- 09:10 AM Linux kernel client Bug #2936: Remounting cephfs with non-existing path causes kernel panic
- I see the change for #2959 is in the mds.
However, the kernel still shouldn't hang on bad data from the mds, so I ... - 08:32 AM Linux kernel client Bug #2936: Remounting cephfs with non-existing path causes kernel panic
- this is the same issue Yan hit, #2959.
- 09:09 AM rbd Bug #2532 (Resolved): rbd command allows passing in -K </path/to/secret>, but long version of (--...
- 09:05 AM rbd Bug #2967 (Resolved): librbd: cls_rbd.parents unit test failure
- ...
- 03:10 AM Revision 7d50411c (ceph): rbd.xfstests: default to 1gb (not 250mb) image
08/18/2012
- 03:29 PM Feature #2428 (Resolved): auth: revise auth config params
- 02:29 AM Revision ecd279f4 (ceph): Merge branch 'wip-rbd-layering'
- Conflicts:
src/librbd/internal.cc - 01:56 AM Revision f9653589 (ceph): Roll up loose ends from a marathon merge/rebase session
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 01:48 AM Revision 380b0476 (ceph): Review:
- standardize on "*_id" form of variable names
log errors in parameter decode in rbd_children methods
whitespace, asser... - 01:48 AM Revision 5a295c85 (ceph): librbd: snap_protect: verify layering is supported
- 01:48 AM Revision 2b6863ec (ceph): librbd: review: don't call to the OSD to get current protection status
- 01:48 AM Revision f38dd488 (ceph): test_rbd.py: actually make unprotect_with_children work, and clean up
- 01:47 AM Revision 491bd8d8 (ceph): librbd: change EINVAL to EBUSY on "can't unprotect because children exist"
- Add pool, number of children in this pool that caused failure to log
- 01:47 AM Revision ff60940a (ceph): review: librbd, test_librbd: make "protect protected snap" fail
- 01:47 AM Revision e21bac98 (ceph): Update protection methods to use parent_spec, parent_types.h, etc.
- 01:47 AM Revision bd2e7513 (ceph): test_rbd: add test for denying removal of protected parent
- 01:47 AM Revision bef9180a (ceph): get_features requires md_lock and snap_lock to be held
- 01:47 AM Revision c729e15a (ceph): librbd: clone return codes: ENOSYS for no layering, EINVAL for no prot
- 01:47 AM Revision 27a4dea5 (ceph): librbd, test_librbd: snap_unprotect: refuse if children still exist
- 01:42 AM Revision 5ffbeaa3 (ceph): Merge branch 'wip-rbd-protect' into more-rebasing
- Conflicts:
src/librbd/ImageCtx.cc
src/librbd/SnapInfo.h
src/librbd/internal.cc
src/test/rbd/test_cls_rbd.cc - 01:31 AM Revision fd60416f (ceph): librbd: snap_set and open_image need to refresh parent info
- 01:31 AM Revision a09052f9 (ceph): run-rbd-tests: prefer local binaries over $PATH
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 01:31 AM Revision 80d4d38e (ceph): poolid should be signed
- 01:31 AM Revision d09e0e2c (ceph): Add struct parent_spec
- Holds poolid,imageid,snapid triple identifying parent
Allows for equality comparison of parents - 01:31 AM Revision f1fc2b42 (ceph): get_parent on non-layered image no longer fails; remove test case
- 01:31 AM Revision dc1e26f0 (ceph): Enhance add/remove child tests
- 01:31 AM Revision 2382425b (ceph): Review: change to look for parent across base and all snapshots,
- and remove only if not present in any of them.
- 01:31 AM Revision c0c29f88 (ceph): librbd: remove: keep ictx open until snapshots are scanned
- 01:31 AM Revision 9a45ffb7 (ceph): librbd: memcpy object_prefix must copy terminating NUL
- 01:31 AM Revision 31824b68 (ceph): librbd, cls_rbd: move parent_info and parent_spec to parent_types.h
- parent_type.h is a new librbd-scope header containing info
related to parents and children (clones)
Signed-off-by: D... - 01:31 AM Revision 2ca8fb21 (ceph): librbd: review: change get_snapinfo to get_parent_spec
- 01:31 AM Revision 53868a96 (ceph): librbd: review: add helper for 'scanning snapshots for this parent'
- 01:31 AM Revision 1b32d78a (ceph): librbd: cause add_child/remove_child to treat duplicate ops as errors
- 01:31 AM Revision 460242d3 (ceph): test_cls_rbd: get_parent with no parent: should fail and return null-pspec
- 01:31 AM Revision 767fdf1c (ceph): rados: allow listomapvals to dump keys with nonprintable characters
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 01:31 AM Revision cb742331 (ceph): Fix some trailing spaces on lines
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 01:31 AM Revision 397285a4 (ceph): librbd: make get_parent_info look at snapshot-specific info when needed
- 01:31 AM Revision 2dc751e7 (ceph): librbd: Manipulate rbd_children in flatten, clone, remove, snap remove
- 01:30 AM Revision 93fed220 (ceph): cls_rbd, cls_rbd_client: add/remove/get children
- Manipulate the new rbd_children object, which holds mappings between
parent snapshots and their children clone images...
08/17/2012
- 11:51 PM Revision 9b1df33a (ceph): Merge remote-tracking branch 'gh/master' into wip-auth
- Reviewed-by: Josh Durgin <josh.durgin@inktank.com> (rbd bits)
Reviewed-by: Greg Farnum <greg@inktank.com> - 11:51 PM Revision b403db19 (ceph): rbd: update man page to avoid deprecated --secret, --user
- Signed-off-by: Sage Weil <sage@inktank.com>
- 11:51 PM Revision 4ce0a516 (ceph): doc: properly document 'rbd map' without touching sysfs
- Fixes: #2670
Signed-off-by: Sage Weil <sage@inktank.com> - 11:51 PM Revision fefdf284 (ceph): rbd: warn on 0-length secret
- Signed-off-by: Sage Weil <sage@inktank.com>
- 11:51 PM Revision 7b57931b (ceph): config: make --user a synonym for --id
- This grandfathers in rbd usage.
Signed-off-by: Sage Weil <sage@inktank.com> - 11:51 PM Revision e0b094b9 (ceph): keyring: make --key, --keyfile override loaded keyring
- This way --key, --keyfile still work when a keyring is in the default
search path.
Signed-off-by: Sage Weil <sage@in... - 11:51 PM Revision 2a36873d (ceph): rbd: use generic options, keyring for 'rbd map'
- Switch usage over to the normal options, and use the normal EntityName
and keyring inputs for 'rbd map'.
Signed-off-... - 11:21 PM Revision ae57db03 (ceph): Merge remote-tracking branch 'gh/bug-2958'
- Reviewed-by: Josh Durgin <josh.durgin@inktank.com>
- 11:04 PM Revision b2d6ea7f (ceph): librbd: add test for discard of nonexistent objects
- This verifies librbd properly handles ENOENT during discard.
Signed-off-by: Sage Weil <sage@inktank.com> - 08:47 PM Revision 5b7ec43e (ceph): task: run osd/mds/mon with Google CPU profiler via cpu_profile option
- Signed-off-by: Mike Ryan <mike.ryan@inktank.com>
- 07:10 PM Revision a3ad98a3 (ceph): librbd: hide ENOENT on discard
- AioZero, Truncate, and Remove are only used by discard and resize
operations where ENOENT can be safely ignored. If ... - 06:46 PM Revision 7141a6ce (ceph): msg/Pipe: log port number
- This helps correlate log output with specific tcp sessions as reported by
e.g. netstat or tcpdump or whatever.
Signe... - 05:58 PM Revision 1daeb2dd (ceph): cpu_profiler: drop start, stop commands
- These don't appear to work. Setting CPUPROFILE=path on startup does.
Signed-off-by: Sage Weil <sage@inktank.com> - 05:49 PM Revision d01c1261 (ceph): crypto: remove old crypto globals
- We now use the CephContext instances.
Signed-off-by: Sage Weil <sage@inktank.com> - 05:41 PM Revision 2bca7562 (ceph): doc: small RST syntax fixes for eu.ceph.com mirror
- Signed-off-by: Ross Turk <ross@inktank.com>
- 05:21 PM Revision 35004bb5 (ceph): docs: Add EU mirror for getting Ceph source and packages
- Signed-off-by: Wido den Hollander <wido@widodh.nl>
- 04:18 PM Bug #2954: osd: scrub stat mismatch, got 18/19 objects, 14/15 clones, 22478527/25385282 bytes.
- logs: ubuntu@teuthology:/a/teuthology-2012-08-17_00:00:25-regression-next-testing-basic/2877
- 04:09 PM rbd Bug #2958 (Resolved): librbd: discard can return -ENOENT
- 04:08 PM rbd Bug #2958 (Fix Under Review): librbd: discard can return -ENOENT
- 03:35 PM Bug #2960 (Resolved): ceph osd create claims you can specify '<osd-id>'; really means UUID. Could...
- just merged a fix for this
- 11:38 AM Bug #2960 (Resolved): ceph osd create claims you can specify '<osd-id>'; really means UUID. Could...
- I think we should consider a global pass making "id" clearer in context, but the
ceph osd create usage message, name... - 03:08 PM rgw Bug #2961 (Resolved): rgw: bad content range
- Partial download of large file (> 4G), the content range is bad:...
- 11:59 AM Bug #2947 (In Progress): osd: out of order reply
- 11:28 AM Bug #2761: osd: failed to recover before timeout expired
- logs: ubuntu@teuthology:/a/teuthology-2012-08-17_02:00:04-regression-testing-testing-basic/3038
- 11:27 AM Bug #2955: monitors failed to open new election
- logs: ubuntu@teuthology:/a/teuthology-2012-08-17_02:00:04-regression-testing-testing-basic/2973
- 08:50 AM CephFS Bug #2959 (Resolved): mds: returns null dentry on getattr
- the kclient open_root_dentry issues a getattr request like #1/some/path, but the mds must not return a dentry in the ...
- 03:28 AM Revision 476e4936 (ceph): ceph-fuse: debug off by default
- Signed-off-by: Sage Weil <sage@inktank.com>
- 12:01 AM Revision 9b7482fc (ceph): auth: move Crypto{None,AES} definitions to header
- CephContext will need this.
Signed-off-by: Sage Weil <sage@inktank.com> - 12:01 AM Revision 107ffc6f (ceph): auth: move Crypto users to use CephContext
- Globals are bad news. Switch all users to get the CryptoHandler from
their cct.
Signed-off-by: Sage Weil <sage@inkt...
08/16/2012
- 11:55 PM Revision becf2062 (ceph): osd: avoid dereferencing pg info without lock
- The gen_prefix() is used for debug prefixes, but traverses data structures
that can be modified when the lock is held... - 11:55 PM Revision 130b559e (ceph): mutex: add is_locked_by_me()
- Arguably this is what current is_locked() callers all want; they should
eventually be moved and is_locked() removed.
... - 11:37 PM Revision da486586 (ceph): run-cli-tests: Check that virtualenv is found.
- Commit 343cc792e847ca8901f6c08e41799a2fbbd2ca92 switched us from pip
-E to virtualenv, to keep up with the Python eco... - 10:50 PM Revision 7f6591b5 (ceph): ceph: support tmpfs_journal option to put journal on tmpfs
- Signed-off-by: Mike Ryan <mike.ryan@inktank.com>
- 10:28 PM Revision 71a8d321 (ceph): Merge remote-tracking branch 'gh/wip-osd'
- Reviewed-by: Samuel Just <sam.just@inktank.com>
- 09:43 PM Revision ef80abed (ceph): msg/SimpleMessenger: fix leak of local_connection
- Signed-off-by: Sage Weil <sage@inktank.com>
- 09:42 PM Revision 34d626d0 (ceph): test_librbd_fsx: fix leak
- Signed-off-by: Sage Weil <sage@inktank.com>
- 09:37 PM Revision 79bdcbe6 (ceph): cpu_profiler: outout to ostream instead of clog
- This let's the 'ceph tell osd.N cpu_profiler ...' command return the result
to the caller.
Signed-off-by: Sage Weil ... - 09:37 PM Revision 17e94147 (ceph): heap_profiler: return result via ostream
- Signed-off-by: Sage Weil <sage@inktank.com>
- 09:37 PM Revision cfd0d4f5 (ceph): librbd: fix warning
- librbd/internal.cc: In function 'int librbd::ictx_refresh(librbd::ImageCtx*)':
librbd/internal.cc:1334:59: warning: e... - 09:37 PM Revision 7f4851c4 (ceph): librbd: fix uninit var new_snap in ictrx_refresh()
- Valgrind picked this up:
==22755== Conditional jump or move depends on uninitialised value(s)
==22755== at 0x4EC2A... - 09:37 PM Revision aaf01236 (ceph): librbd: make aio_discard declaration match definition
- Fixes i386 build:
./.libs/librbd.so: undefined reference to `librbd::aio_discard(librbd::ImageCtx*, unsigned long lo... - 09:37 PM Revision 6e44e9e8 (ceph): SyntheticClient: fix warnings
- client/SyntheticClient.cc: In member function 'int SyntheticClient::play_trace(Trace&, std::string&, bool)':
client/S... - 09:14 PM CephFS Bug #1945: blogbench hang on caps
- ...
- 08:38 PM Revision 35753eb7 (ceph): osd: avoid generate huge osdmap deletion transactions
- Cap the number of maps we delete on each pass through handle_osd_map. As
long as the target transaction size is larg... - 08:33 PM Revision 8a4d563e (ceph): osd: break potentially large transaction into pieces
- We do a similar trick elsewhere. Control this via a tunable. Eventually
we'll control the others (in a non-stable b... - 08:32 PM Revision e908cb99 (ceph): osd: only commit past intervals at end of parallel build
- We don't check for gaps in the past intervals, so we should only commit
this when we are completely done. Otherwise ... - 08:21 PM Revision 3fee99ef (ceph): Merge branch 'next'
- 08:15 PM Revision da210bee (ceph): osd: explicitly requeue waiting_for_map in on_change()
- Since we are requeuing stuff anyway, do it all in the correct order. This
fixes a bug where take_waiters() comes alon... - 08:15 PM Revision 10454721 (ceph): osd: rename op_waiters -> waiting_for_map
- That's what it is used for; make the name descriptive.
Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Samu... - 08:15 PM Revision fac699cf (ceph): osd: simplify how in-progress ops are requeued
- Requeue them explicity from apply_and_flush_repops() and call it last, so
that the overall ordering is preserved.
Si... - 08:00 PM Revision eba55856 (ceph): Merge branch 'wip-rbd-protect-merge'
- 07:57 PM Revision 18054ba4 (ceph): Merge branch 'wip-rbd-protect' into master
- Conflicts:
src/librbd.cc
src/librbd/cls_rbd_client.h - 07:53 PM Revision 9fd7d4d6 (ceph): mds: fix some gcc 4.7 warnings
- mds/Server.cc: In member function 'CDir* Server::validate_dentry_dir(MDRequest*, CInode*, const string&)':
mds/Server... - 06:39 PM Revision 407c350a (ceph): crypto: remove unused label
- auth/Crypto.cc:210:2: warning: label 'err_ctx' defined but not used [-Wunused-label]
Signed-off-by: Sage Weil <sage@... - 06:39 PM Revision 5bbd5dce (ceph): do_autogen.sh: -n for nss
- Cryptopp (at least my installed version) doesn't build on gcc 4.7.
Signed-off-by: Sage Weil <sage@inktank.com> - 06:38 PM Revision 19063aae (ceph): byteorder: fix gcc 4.7 warnings
- ./include/encoding.h: In function 'void encode(int64_t, ceph::bufferlist&, uint64_t)':
./include/encoding.h:101:1: wa... - 06:27 PM Revision 47b24c05 (ceph): obsync: add missing package specifier to format_exc
- Fixes: #2873
Signed-off-by: Matthew Wodrich <matthew.wodrich@dreamhost.com>
Reviewed-by: Dan Mick <dan.mick@inktank.com> - 06:07 PM Revision 85558759 (ceph): do_autogen.sh: apply 'profiler' options to CXXFLAGS, too
- -P now leaves in frame pointers and makes sure debugging is turned down.
Signed-off-by: Sage Weil <sage@inktank.com> - 06:05 PM Revision 3e50a09d (ceph): do_autogen.sh: -p to pass --with-profiler to configure (google cpu prof...
- The -P profiling stuff seems somewhat nonsensical.. that should be cleaned
up too.
Signed-off-by: Sage Weil <sage@in... - 06:01 PM Revision 5962a9dd (ceph): obsync: add missing package specifier to format_exc
- Fixes: #2873
Signed-off-by: Matthew Wodrich <matthew.wodrich@dreamhost.com>
Reviewed-by: Dan Mick <dan.mick@inktank.com> - 05:57 PM Revision a14214dc (ceph): fix keyring generation for mds and osd
- [ The following text is in the "UTF-8" character set. ]
[ Your display is set for the "ANSI_X3.4-1968" character ... - 05:57 PM Revision d1a31ce1 (ceph): fix ceph osd create help
- [ The following text is in the "UTF-8" character set. ]
[ Your display is set for the "ANSI_X3.4-1968" character ... - 05:10 PM rbd Documentation #2670 (Resolved): Docs shouldn't direct users to echo to /sys/bus/rbd for normal use
- 05:01 PM rbd Bug #2958 (Resolved): librbd: discard can return -ENOENT
- Sometimes discard tries to remove nonexistent objects, and does not translate the -ENOENT to 0 for its callers. This ...
- 04:55 PM Bug #2957 (Resolved): osd: crash in PG::gen_prefix()
- 03:30 PM Bug #2957 (Resolved): osd: crash in PG::gen_prefix()
- ...
- 04:45 PM rbd Feature #2719 (In Progress): librbd: provide functions for listing parents and their children
- 04:43 PM rbd Feature #2723 (Resolved): librbd: protect/unprotect as appropiate during cloning
- 04:43 PM rbd Subtask #2606 (Resolved): librbd layering: copyup on missing child object
- 04:43 PM rbd Feature #2722 (Resolved): cls_rbd: add class methods to get/set protected status
- 04:43 PM rbd Subtask #2605 (Resolved): librbd layering: guard writes
- 04:43 PM rbd Subtask #2604 (Resolved): librbd layering: read path
- 04:43 PM rbd Subtask #2603 (Resolved): librbd layering: open parent on open
- 04:43 PM rbd Feature #2562 (Resolved): librbd: open parent images, read path, write path
- 04:43 PM rbd Feature #2607 (Resolved): librbd: copyup helper
- 04:43 PM rbd Feature #2561 (Resolved): rbd: copyup command
- 04:42 PM rbd Feature #2559 (Resolved): cls_rbd: copyup method
- 04:40 PM Revision dc76a6cb (ceph): ceph-fuse: add --fuse-debug option to enable libfuse debugging
- We consume -d (which fuse uses), so it can't be silently passed through
like we used to be able to do.
Signed-off-by... - 04:26 PM Revision 36e7b077 (ceph): fix ceph osd create help
- [ The following text is in the "UTF-8" character set. ]
[ Your display is set for the "ANSI_X3.4-1968" character ... - 04:26 PM Revision a15fde49 (ceph): fix keyring generation for mds and osd
- [ The following text is in the "UTF-8" character set. ]
[ Your display is set for the "ANSI_X3.4-1968" character ... - 02:15 PM Bug #2954: osd: scrub stat mismatch, got 18/19 objects, 14/15 clones, 22478527/25385282 bytes.
- several more failures in /a/sage-a3 to look at.
- 10:11 AM Bug #2954 (Resolved): osd: scrub stat mismatch, got 18/19 objects, 14/15 clones, 22478527/2538528...
- ...
- 01:46 PM rbd Bug #2948: rbd: fails to close image on error
- This affects operations that fail partway through. One example is:
rbd export <image> <existing-file>
export err... - 10:41 AM rbd Bug #2948: rbd: fails to close image on error
- 01:30 PM Bug #2946 (Resolved): osd: build fails on g++ 4.7
- 01:29 PM Bug #2823 (Duplicate): osd: out of order ACKs
- 01:21 PM Bug #2947: osd: out of order reply
- 12:04 PM Bug #2761: osd: failed to recover before timeout expired
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-08-16_02:00:06-regression-testing-testing-basic/2211
- 11:32 AM Bug #2956 (Resolved): osd:FAILED assert(waiting_for_ondisk.begin()->first == repop->v)
- Logs: ubuntu@teuthology:/a/teuthology-2012-08-15_19:00:16-regression-master-testing-gcov/1878...
- 11:29 AM Bug #2873 (Resolved): Stack trace thrown when using obsync
- commit:47b24c0562bcb44964a0b8f6c4847bb0f05924e0 in stable-next
commit:5962a9dde051c95b7f39e60dcd16b339392685b8 in ne... - 11:18 AM Bug #2955 (Can't reproduce): monitors failed to open new election
- logs: ubuntu@teuthology:/a/teuthology-2012-08-16_00:00:15-regression-next-testing-basic/2077
- 01:46 AM Revision c6ae5e29 (ceph): objectcacher: fix bh leak on discard
- Fixes: #2950
Signed-off-by: Sage Weil <sage@inktank.com> - 12:56 AM Revision b97931f4 (ceph): Merge branch 'testing' into next
- 12:56 AM Revision 77745f94 (ceph): mkcephfs: fix mon data empty check
- 'read' needs an arg on dash.
Fixes #2922, again.
Signed-off-by: Sage Weil <sage@inktank.com>
08/15/2012
- 10:21 PM Revision 08b8bba4 (ceph): Merge branch 'next'
- 10:19 PM Revision 74dd5603 (ceph): Merge branch 'testing' into next
- 09:40 PM Revision 3e7df78e (ceph): PG,Message: move intrusive_ptr_* into top namespace
- gcc 4.7 requires that the intrusive_ptr_* functions be in
the same namespace as the templated class.
Signed-off-by: ... - 06:33 PM rbd Bug #2950 (Resolved): ObjectCacher: leaks memory
- commit:825f7334eef7cc69c6f439c21dd0bbb215dbf09d
it wasn't the buffers, it was some BufferHeads that had references... - 11:41 AM rbd Bug #2950 (Resolved): ObjectCacher: leaks memory
- As reported in http://permalink.gmane.org/gmane.comp.file-systems.ceph.devel/7746
- 06:14 PM Revision 614417ef (ceph): mon: make 'clocks too skewed' message for accurate
- It could be that the mons are laggy, not skewed.
Signed-off-by: Sage Weil <sage@inktank.com> - 06:06 PM Bug #2922: mkcephfs fails with error "read: arg count"
- Hmm, my testing of the modifications has a little buggy itself sorry. But after more careful analysis I can confirm t...
- 05:55 PM Bug #2922 (Resolved): mkcephfs fails with error "read: arg count"
- ah, it's just a stupid bash vs dash thing with the 'read' command. i tested on debian (bash), breaks on ubuntu. pus...
- 05:41 PM Bug #2922: mkcephfs fails with error "read: arg count"
- just fyi you can enclose things in pre tags to make redmine skip its own formatting:...
- 05:39 PM Bug #2922 (In Progress): mkcephfs fails with error "read: arg count"
- building right now to test this out... i could have sworn i tested the directory exists situation, but i guess not!
... - 05:36 PM Bug #2922: mkcephfs fails with error "read: arg count"
- Sorry that last one does *not* work properly either.
- 05:29 PM Bug #2922: mkcephfs fails with error "read: arg count"
- This might be cleaner (I'll avoid a diff as they seem to get mangled):
Replacing:
if test -d $mon_data && ! f... - 03:19 PM Bug #2922: mkcephfs fails with error "read: arg count"
- Hmm - I don't think so:
The amended code works ok if the directory does not exist, but fails if it exists and is e... - 02:13 PM Feature #2953 (Resolved): append() in librados is not exposed to python API
- the append to an object is not available at the pyton API level and needs to be implemented.
- 11:51 AM rbd Feature #2952 (Resolved): librbd: use generic rados locking class
- Replace calls to cls_rbd's locking methods with calls to the generic lock class.
- 11:49 AM rbd Feature #2951 (Resolved): cls_rbd: remove locking methods
- Remove the unused cls_rbd locking methods, and merge the tests with the cls_lock tests.
- 10:27 AM rbd Bug #2948 (Resolved): rbd: fails to close image on error
- calling exit() doesn't run the Image destructor, which leads to the watch on the header sticking around. After that, ...
- 10:10 AM rbd Feature #2723 (Fix Under Review): librbd: protect/unprotect as appropiate during cloning
- 10:09 AM rbd Feature #2722 (Fix Under Review): cls_rbd: add class methods to get/set protected status
- 10:09 AM rbd Feature #2718 (Fix Under Review): librbd: map parent -> child in a per-pool rbd_children object w...
- 10:09 AM rbd Feature #2717 (Fix Under Review): cls_rbd: add methods for maintaining mapping from parent to chi...
- 10:09 AM rbd Feature #2562 (Fix Under Review): librbd: open parent images, read path, write path
- 10:09 AM rbd Feature #2562 (Need More Info): librbd: open parent images, read path, write path
- 10:08 AM rbd Subtask #2605 (Fix Under Review): librbd layering: guard writes
- 10:08 AM rbd Subtask #2604 (Fix Under Review): librbd layering: read path
08/14/2012
- 11:54 PM Revision 36d6c4f4 (ceph): Merge branch 'next'
- 11:53 PM Revision 119880ca (ceph): Merge branch 'testing' into next
- 11:53 PM Revision 24a26c62 (ceph): mkcephfs: fix mon_data check
- * check the right path <facepalm>
* behave if the directory doesn't exist at all yet
Fixes: #2922
Signed-off-by: Sag... - 11:17 PM Revision bcd00c65 (ceph): Merge branch 'wip-2918'
- Reviewed-by: Dan Mick <dan.mick@inktank.com>
- 11:06 PM Revision 3d3d91df (ceph): osdmap: apply mon_max_osd when generating osdmap from conf
- This prevents users from having an [osd.1234567] section and blowing up
their memory usage.
Signed-off-by: Sage Weil... - 11:06 PM Revision 1a5e12ec (ceph): osdmap: fix pg_num calculation when generating osdmap from conf
- Base num_pg calculation on the number of osds, not the max osd id.
Fixes: #2918
Signed-off-by: Sage Weil <sage@inkta... - 10:08 PM Revision 6dbbcf03 (ceph): queue: fix logging of child return code
- 10:07 PM Revision 615f85d0 (ceph): mon: throttle daemon messages independently from client messages
- This lets us set a higher limit on messages from daemons (osd, mds) than
from clients, and throttle them independentl... - 09:59 PM Revision cca85af5 (ceph): global: only print banner if type is daemon
- Signed-off-by: Sage Weil <sage@inktank.com>
- 09:45 PM Revision 2f3e03f6 (ceph): perfcounters: add u64 average type
- Signed-off-by: Sage Weil <sage@inktank.com>
- 09:45 PM Revision 9fc79584 (ceph): filejournal: instrument journal write counts, sizes
- This rounds out the low-hanging fruit that are coming to mind. Moving on.
Fixes: #2619
Signed-off-by: Sage Weil <sa... - 09:06 PM Revision 1eea43db (ceph): global: fix version banner in log on startup
- Log banner from global_init(). This puts it at the very top of the log,
right when the daemon starts.
Fixes: #2940
... - 08:13 PM Revision efe913b8 (ceph): Merge branch 'wip-crush-tunables'
- Reviewed-by: Greg Farnum <greg@inktank.com>
- 08:11 PM Revision 32671276 (ceph): doc: document use of CRUSH tunables
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:42 PM Revision 73218a7a (ceph): msgr: make set_policy() and set_default_policy() safe to re-use
- Introduce a policy_lock in SimpleMessenger to make this safe even after
the messenger has been started up. The user ... - 05:42 PM Revision da35b4c2 (ceph): msgr: make set_policy_throttler safe, act on default
- Add locking in set_policy_throttler.
Also, make it act on the default policy when the specified type does not
have a... - 05:42 PM Revision 43f7d374 (ceph): osd: put throttler on default policy
- Before we were associating the throttler with a CLIENT specific policy
that didn't cover MDS. That's silly. Instead... - 05:42 PM Revision 3dd5ebdc (ceph): osd: require CRUSH_TUNABLES feature of peers, clients when used
- If the current crush map has non-default tunables, set our messengers to
require the tunables feature bit. If it doe... - 05:42 PM Revision b254ba78 (ceph): mon: require CRUSH_TUNABLES when latest osdmap has tunables set
- This is an imperfect check in that tunables may be set in past osdmaps,
and the OSDs may need that in order to peer c... - 05:41 PM Bug #2947 (Resolved): osd: out of order reply
- triggered by thrashing by this job:...
- 05:06 PM Revision 5ab4939c (ceph): doc: v0.48.1argonaut release notes, changelog
- Signed-off-by: Sage Weil <sage@inktank.com>
- 04:45 PM Bug #2922 (Resolved): mkcephfs fails with error "read: arg count"
- commit:24a26c627400d191bbb07cdd3ecfa644c9e313eb
- 04:28 PM Bug #2946 (Resolved): osd: build fails on g++ 4.7
- ...
- 04:22 PM Revision dc2a232b (ceph): mon: simplify logmonitor check_subs; less noise
- * simple helper to translate name to id
* verify sub type is valid in caller
* assert sub type is valid in method
... - 04:06 PM Feature #2918 (Resolved): OSD ID numbers determine OSD count and thus default pg_cnt
- 02:14 PM Feature #2918 (Fix Under Review): OSD ID numbers determine OSD count and thus default pg_cnt
- 02:58 PM Feature #2942 (Resolved): mon: throttle client, server connections
- 02:34 PM Feature #2619 (Resolved): filejournal: instrument with perfcounters
- commit:9fc79584728f87938d13757d5176c5d19d3ca2cb
- 02:07 PM Feature #2940 (Resolved): daemons do not print out version to log on startup
- 12:18 PM Feature #2940: daemons do not print out version to log on startup
- 01:58 PM rbd Bug #2777 (Resolved): qemu: report discard support
- 01:18 PM Bug #2945 (Won't Fix): package upgrade from v0.46 to v0.48argonaut fails
- I saw this once but assumed I had broken dependencies with my version mangling, but then it came up during a third pa...
- 01:13 PM RADOS Subtask #2793 (Resolved): osd: require tunable feature if current osdmap uses non-default tunables
- 01:13 PM RADOS Subtask #2792 (Resolved): mon: require tunable feature bit if current osdmap uses non-default tun...
- 01:13 PM RADOS Feature #2705 (Resolved): crush: graceful transition to new default tunables
- 12:18 PM RADOS Feature #2705 (In Progress): crush: graceful transition to new default tunables
- 12:19 PM Feature #2320 (Duplicate): mon: detect and throttle osd flapping
- 12:18 PM Feature #2742 (In Progress): qa: ms socket inject failures in regression suite
- 12:14 PM Feature #1754 (Resolved): qa: run other suites nightly as well
- 12:13 PM Feature #1514 (Duplicate): filestore: api to repartition a collection
- 12:12 PM Feature #2440: osd: understand btrfs performance
- 12:12 PM Feature #2440 (Won't Fix): osd: understand btrfs performance
- 12:12 PM Feature #2564 (Resolved): teuthology: install kernels from local dir
- 11:45 AM Feature #2944 (Duplicate): mon: dynamically adjust heartbeat grace
- Basically:
1) Keep track of when an OSD boots if it reports itself as fresh or as
wrongly-marked-down. Maintain the... - 11:44 AM Feature #2943 (Resolved): mon: norecovery and/or nobackfill
- 11:42 AM Cleanup #2763 (Resolved): move rbd locking infrastructure to a separate objclass
- 11:42 AM Feature #2768 (Resolved): teuthology: make workunit task work on different branch/sha1 etc
- 11:41 AM Feature #2857 (Resolved): compile non-production builds with -fno-omit-frame-pointer
- 09:37 AM Bug #2761: osd: failed to recover before timeout expired
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-08-13_19:00:07-regression-master-testing-gcov/108
08/13/2012
- 11:18 PM Revision 99ac6b0b (ceph): Disable asynchronous DNS lookups.
- Especially on older hosts, we keep triggering errors::
ServerNotFoundError: Unable to find the server at
teuthol... - 09:58 PM Revision a7ad701b (ceph): v0.48.1argonaut
- 09:48 PM Bug #2922: mkcephfs fails with error "read: arg count"
- FWIW - this seems to happen even if the mon directory does not exist - there should probably be a check of the form:
... - 08:34 PM Revision 4e7d49e0 (ceph): Merge branch 'wip-msgr'
- 08:28 PM Revision 75172c70 (ceph): msg/Accepter: fix nonce initialization
- This needs to be provided to the Accepter at bind time, not by start().
Otherwise the nonce is effectively always 0, ... - 07:54 PM Bug #2938 (Resolved): ceph-osd --mkfs failure to create journal is logged with dout(0), probably ...
- commit:294c25bb37aa39caacee51cc405a1f2deebb6331
- 06:46 PM Revision 294c25bb (ceph): ceph-osd: log journal-creation failure with derr
- Fixes: #2938
Reviewed-by: Josh Durgin <josh.durgin@inktank.com>
Signed-off-by: Dan Mick <dan.mick@inktank.com> - 06:03 PM Revision 1740bd0c (ceph): crush: add helper has_nondefault_tunables()
- Signed-off-by: Sage Weil <sage@inktank.com>
- 06:03 PM Revision 8af2cf3c (ceph): msgr: expose get_policy() through generic Messenger API
- Return a copy instead of a const reference, too...
Signed-off-by: Sage Weil <sage@inktank.com> - 04:58 PM Revision 95ecab27 (ceph): Merge branch 'wip-msgr'
- 04:58 PM Revision c8af0faf (ceph): cephtool: make command wait for osdmap explicit
- If we are waiting for an osdmap for a command, track that explicitly so
that we know when to retry send_command().
S... - 04:49 PM Revision a4428bd0 (ceph): v0.50
- 04:48 PM Revision c75c0d81 (ceph): Merge tag 'v0.50'
- v0.50
- 03:46 PM Revision ac02b34e (ceph): msg/Pipe: discard_queue() -> discard_out_queue()
- We only discard outgoing messages; incoming messages are handled by the
IncomingQueue.. but this method doesn't touch... - 03:46 PM Revision 8c1632ba (ceph): cephtool: send keepalive to tell target
- If we 'ceph tell <foo> ...' to a non-monitor, we need to send keepalives to
ensure we detect a tcp drop. (Not so for... - 03:46 PM Revision b97f6e35 (ceph): msgr: some SimpleMessenger docs
- Document basic modules and the lock ordering.
Signed-off-by: Sage Weil <sage@inktank.com> - 03:46 PM Revision 608c776b (ceph): msgr: remove useless SimpleMessenger::msgr
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:46 PM Revision c84b7289 (ceph): msg/Accepter: make members private
- Nobody uses these.
Signed-off-by: Sage Weil <sage@inktank.com> - 03:46 PM Revision a0017fcc (ceph): msgr: protect set_myaddr()
- This is used by Messenger implementation (and their constituent
components).
Signed-off-by: Sage Weil <sage@inktank.... - 03:46 PM Revision 8453a819 (ceph): msg/Accepter: pass nonce on start
- This lets us drop the otherwise awkward SimpleMessenger::get_nonce()
accessor.
Signed-off-by: Sage Weil <sage@inktan... - 03:46 PM Revision 1b8f2e05 (ceph): msg/SimpleMessenger: push need_addr check into learned_addr()
- This puts all of the do/do not lock logic in one place, and documents
it.
Signed-off-by: Sage Weil <sage@inktank.com> - 03:46 PM Revision 5d5045d3 (ceph): msg/Accepter: use learned_addr() from Accepter::bind()
- Normally we never go from need_addr == false to need_addr == true.
It always starts out as true, so this else is usel... - 03:46 PM Revision 76954c13 (ceph): msg/Pipe: document tcp_*()
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:46 PM Revision d58df35f (ceph): msg/Pipe: simplify Pipe::tcp_read() return value
- 0 for success; no reason to return length (always == len).
Signed-off-by: Sage Weil <sage@inktank.com> - 03:45 PM Revision b30ad9a1 (ceph): cephtool: fix deadlock on fault when waiting for osdmap
- send_command() was blocking for the osdmap, and also called from the
connect callback. Instead, re-call it from the ... - 03:45 PM Revision ee206a52 (ceph): cephtool: set messenger policy
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:45 PM Revision 90e0ef90 (ceph): cephtool: retry 'ceph tell <who> ...' command if connection fails
- It was easy to reproduce a hang with 'ceph osd tell osd.0 foo' and
messenger failure injection.
Signed-off-by: Sage ... - 11:09 AM Feature #2942 (Resolved): mon: throttle client, server connections
- 10:57 AM rgw Feature #2941 (Resolved): rgw: improve streaming read performance
- 10:51 AM Bug #2823: osd: out of order ACKs
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-08-11_00:00:08-regression-next-testing-basic/6401
- 10:46 AM Feature #2940 (Resolved): daemons do not print out version to log on startup
- I imagine this applies to the other daemons too, but maybe not. Make it print out the version so we can be sure it's ...
- 09:28 AM devops Feature #2939 (Rejected): chef: Write up how cluster shrinking should work
- Expanding the cluster is pretty trivial, and practically identical with initial install, but shrinking needs a little...
08/12/2012
- 11:42 PM Revision ce0bc11a (ceph): rbd: show snap protection status
- If you do rbd info image@snap, include whether that snapshot is protected.
Signed-off-by: Josh Durgin <josh.durgin@i... - 10:30 AM CephFS Bug #2444: null pointer deference in ceph_d_prune inside kvm
- problem doesent seem to be reproductible after upgrading to 3.5.0-9-generic (Ubuntu Quantal)
- 03:38 AM rbd Bug #2937: btrfs filesystem on rbd device kernel BUG writing large file
- I activated some extra debugging.
This appears just before the BUG:...
08/11/2012
- 06:33 PM Bug #2887: pjd open/08.t failed test 2
- this is an upstream fuse regression in the 3.6-rc1 kernel. reported to miklos and the fuse list.
- 06:28 PM Linux kernel client Bug #2868 (Resolved): kclient: crash in __kick_osd_requests -> __reset_osd -> __remove_osd
08/10/2012
- 08:31 PM Bug #2919 (Fix Under Review): ceph kernel module looks for :/ in path, but / stripped by precise ...
- 08:29 PM Bug #2938: ceph-osd --mkfs failure to create journal is logged with dout(0), probably should be derr
- yeah, just change it to derr
- 06:34 PM Bug #2938 (Resolved): ceph-osd --mkfs failure to create journal is logged with dout(0), probably ...
- A customer mistakenly named a directory as his osd journal location; the failure printed to his terminal with no hint...
- 08:25 PM Linux kernel client Bug #2801 (Resolved): msgr crash in ceph_msg_new
- 08:24 PM Linux kernel client Bug #2392 (Resolved): First read of symlink after ceph filesystem mounted gives error
- 05:39 PM Revision d4849f2f (ceph): rgw: fix usage trim call encoding
- Fixes: #2841.
Usage trim operation was encoding the wrong op structure (usage read).
Since the structures somewhat ov... - 05:39 PM Revision 515952d0 (ceph): cls_rgw: fix rgw_cls_usage_log_trim_op encode/decode
- It was not encoding user, adding that and reset version
compatibility.
This changes affects command interface, makes ... - 05:39 PM Revision 2e77130d (ceph): rgw: expand date format support
- Relaxing the date format parsing function to allow UTC
instead of GMT.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 05:39 PM Revision 14fa77d9 (ceph): rgw: complete multipart upload can handle chunked encoding
- Fixes: #2878
We now allow complete multipart upload to use chunked encoding
when sending request data. With chunked e... - 05:39 PM Revision a06f7783 (ceph): rgw_xml: xml_handle_data() appends data string
- Fixes: #2879.
xml_handle_data() appends data to the object instead of just
replacing it. Parsed data can arrive in pi... - 05:39 PM Revision a8b224b9 (ceph): rgw: ETag is unquoted in multipart upload complete
- Fixes #2877.
Removing quotes from ETag before comparing it to what we
have when completing a multipart upload.
Backp... - 04:26 PM Bug #2887: pjd open/08.t failed test 2
- ubuntu@teuthology:/a/teuthology-2012-08-09_00:00:04-regression-next-testing-basic/5752
- 03:59 PM Bug #2887: pjd open/08.t failed test 2
- ubuntu@teuthology:/a/teuthology-2012-08-09_02:00:13-regression-testing-testing-basic/5857
- 03:59 PM Revision 98286b49 (ceph): MonMap: return error on failure in build_initial
- If mon_host fails to parse, return an error instead of success.
This avoids failing later on an assert monmap.size() ... - 03:59 PM Revision 5c116bf8 (ceph): addr_parsing: report correct error message
- getaddrinfo uses its return code to report failures.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 03:58 PM Revision 22259c6e (ceph): MonMap: return error on failure in build_initial
- If mon_host fails to parse, return an error instead of success.
This avoids failing later on an assert monmap.size() ... - 03:58 PM Revision 49b2c7b5 (ceph): addr_parsing: report correct error message
- getaddrinfo uses its return code to report failures.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 01:59 PM rbd Bug #2937 (Duplicate): btrfs filesystem on rbd device kernel BUG writing large file
- Writing a large file with dd on btrfs filesystem mounted from rbd device causes kernel bug
Stock kernel 3.5.1, con... - 01:48 PM Linux kernel client Bug #2936 (Resolved): Remounting cephfs with non-existing path causes kernel panic
- Steps to reproduce:
First mount the root somewhere... - 10:38 AM Bug #2913 (Resolved): monclient: asserts when no monitor addresses found due to dns failure
- Fortunately I was wrong about the string splitting - that was just a confusing message from the parsing stage.
The... - 10:09 AM rgw Feature #771: rgw: POST
- Support the S3 POST object operation referenced in
http://docs.amazonwebservices.com/AmazonS3/latest/API/RESTObje... - 09:40 AM rgw Bug #2935 (Resolved): rgw: radosgw-admin bucket link clobbers index
- radosgw-admin bucket unlink, then radosgw-admin bucket link overrides the bucket index, so objects cannot be listed a...
08/09/2012
- 11:41 PM Revision 1fd7acd8 (ceph): rbd: fix test compilation on 32-bit
- 32-bit can't implicitly convert size_t or unsigned to uint64_t
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 10:12 PM Revision be6b5e1b (ceph): test_librbd_fsx: fix warning
- fstat was included implicitly before.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 09:53 PM Revision 4d71ca63 (ceph): rbd: fix cli tests
- add flatten, snap protect, and snap unprotect
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 08:54 PM Revision 677934b1 (ceph): rgw: modify some error messages
- Make them more correct, clearer.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 08:39 PM Revision 86be6fe7 (ceph): Merge remote-tracking branch 'origin/wip-rgw-admin'
- 08:33 PM Revision b28db08e (ceph): rgw: use multiple notification objects
- Issue #2504. This makes us listen and notify on more than
a single object, which reduces the contention of cache
noti... - 08:27 PM Revision b15d6392 (ceph): radosgw-admin.rst: Misc doccumentation update.
- Signed-off-by: caleb miles <caleb.miles@inktank.com>
- 08:27 PM Revision 45f7f060 (ceph): rgw_admin.cc: Allow removal of a user's buckets during user removal.
- Allow the buckets, and any child objects, of a user to be deleted when the
user is deleted through radosgw-admin. In ... - 06:14 PM Revision c77f0fb7 (ceph): rbd: add snap [un]protect commands
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 06:14 PM Revision cd5d7241 (ceph): librbd: fix memory leak on error in clone
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 06:14 PM Revision 53d77502 (ceph): librados: add method to get the fsid of a cluster
- This will be used by OpenStack to check whether two components
have access to the same backend cluster.
Signed-off-b... - 06:14 PM Revision 8d5f1e93 (ceph): librbd: add methods for protecting/unprotecting snapshots
- Unprotect will be more useful once integrated with the rbd_children object.
Right now we just check that a snapshot i... - 04:55 PM Revision cc8eac24 (ceph): rgw_admin.cc: Allow for deletion of objects through radosgw-admin.
- Allow objects to be deleted through radosgw-admin with an optional flag
to delete the tail of that object during the ... - 04:42 PM Revision 273a43ed (ceph): Flush data to temp file before reading it in another process.
- 04:42 PM Revision 8aaf21d5 (ceph): Oops tempfile now gives us file objects not fds.
- 04:21 PM Revision f9359f0c (ceph): doc: New example usage.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:06 PM Feature #2934: crush: create a visualizer for crush maps
- 'ceph osd tree' provides a good start on the command line, but it'd be nice to have that in the crushtool as well if ...
- 04:04 PM Feature #2934 (New): crush: create a visualizer for crush maps
- The language used in crush maps is very well defined and
hierarchical. I don't know how to do this sort of thing,
... - 03:55 PM rbd Bug #2933 (Resolved): rbd: bio_pair leak in bio_chain_clone()
- Guangliang Zhao <gzhao@suse.com> pointed out this problem on the
mailing list. Here's the latest edition of his pro... - 02:18 PM devops Feature #2932 (Rejected): chef: logstash integration
- 02:18 PM devops Feature #2931 (Rejected): chef: StatsD integration
- 01:54 PM rgw Feature #2499 (Resolved): rgw: ability to delete users without first emptying and deleting all bu...
- done, commit:45f7f0602c90073af27041f92166724ca9472197.
- 01:53 PM rgw Feature #2786 (Resolved): radosgw-admin: ability to remove objects/buckets
- object removal done, commit:cc8eac2427c745e154ad40eeb84ef28dbed99d36
bucket removal done, commit:45f7f0602c90073af27... - 01:32 PM rgw Bug #2504 (Resolved): rgw: use multiple notifications objects
- Done, commit:b28db08ea8b84ec9f1d2df88ac4edd6aea0ba7d4
- 12:29 PM Bug #2924 (Resolved): doc: Adjust for mon. key being in external keyring
- This doc is outdated
http://ceph.com/docs/master/ops/manage/grow/mon/#adding-a-monitor
as per
http://thread.gmane.... - 11:13 AM CephFS Bug #2444: null pointer deference in ceph_d_prune inside kvm
- same bug here with Ceph 0.49 on Ubuntu 12.04 LTS (GNU/Linux 3.2.0-27-generic x86_64)
- 10:58 AM rgw Feature #2923 (Resolved): rgw: non hard-coded pool names
- Don't have pool names hard coded, make them configurable.
- 10:44 AM rgw Bug #2665 (Resolved): rest-bench hangs periodically
- This was fixed a while ago.
08/08/2012
- 11:09 PM Revision 6bc1067f (ceph): rgw: fix usage trim call encoding
- Fixes: #2841.
Usage trim operation was encoding the wrong op structure (usage read).
Since the structures somewhat ov... - 11:05 PM Revision 04a0eacd (ceph): cls_rgw: fix rgw_cls_usage_log_trim_op encode/decode
- It was not encoding user, adding that and reset version
compatibility.
This changes affects command interface, makes ... - 10:44 PM Revision 3499c0e5 (ceph): cls_rbd: add methods for getting/setting protection status
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 10:37 PM Revision 074c3c0f (ceph): rgw: expand date format support
- Relaxing the date format parsing function to allow UTC
instead of GMT.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:34 PM Revision d39ea1d4 (ceph): rgw: complete multipart upload can handle chunked encoding
- Fixes: #2878
We now allow complete multipart upload to use chunked encoding
when sending request data. With chunked e... - 10:34 PM Revision 03b787e0 (ceph): rgw_xml: xml_handle_data() appends data string
- Fixes: #2879.
xml_handle_data() appends data to the object instead of just
replacing it. Parsed data can arrive in pi... - 10:34 PM Revision 3809e344 (ceph): rgw: ETag is unquoted in multipart upload complete
- Fixes #2877.
Removing quotes from ETag before comparing it to what we
have when completing a multipart upload.
Backp... - 10:06 PM Revision 52f03dcc (ceph): doc: Added debug and logging reference.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:48 PM Revision 99e99758 (ceph): In teuthology-worker, shuffle the child stdout/stderr into our log.
- Otherwise, child can suffer a failure that does not get logged by
it's own exception handling machinery, and we have ... - 09:45 PM Revision 05007f7e (ceph): Minimize scope of try-except.
- os.write and list.append won't raise CalledProcessError, and now
we don't need to try to contain them for temp file c... - 09:44 PM Revision 4b9e1762 (ceph): Use tempfile.NamedTemporaryFile instead of mkstemp.
- Simpler code, no manual cleanup needed. We see a littering of
zero-length temp files from teuthology-worker, and this... - 09:07 PM Revision d78dfe5d (ceph): mkcephfs: use default osd_data, _journal values
- Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Greg Farnum <greg@inktank.com> - 09:07 PM Revision 3c90ff4e (ceph): mkcephfs: use new default keyring locations
- The ceph-conf command only parses the conf; it does not apply default
config values. This breaks mkcephfs if values ... - 09:01 PM Revision 7084f295 (ceph): mkcephfs: use default osd_data, _journal values
- Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Greg Farnum <greg@inktank.com> - 09:01 PM Revision 96b1a496 (ceph): mkcephfs: use new default keyring locations
- The ceph-conf command only parses the conf; it does not apply default
config values. This breaks mkcephfs if values ... - 08:05 PM Revision 18391059 (ceph): Merge remote-tracking branch 'gh/next'
- 04:58 PM Bug #2922 (Resolved): mkcephfs fails with error "read: arg count"
- Branch: wip-auth
ceph version 0.49-306-gfc3681f (commit:fc3681f59c4f49298f5a7a5172c30be63068c330)
tamil@tamil-Vir... - 04:08 PM rgw Bug #2841 (Resolved): rgw: fix usage trim
- Fixed, commit:6bc1067fc878cbfb6761146cb154c2985c9d9bd7 and commit:04a0eacd92b0c923cb9d1efc7d751a05d544dc85
- 03:35 PM rgw Feature #2869 (Resolved): rgw: expand date format support
- Fixed, commit:074c3c0fe0c005e54f4776c60463a16305dbab10
- 03:34 PM rgw Bug #2879 (Resolved): rgw: xml parser doesn't work correctly with escape sequences
- Fixed, commit:03b787e0ee1d94e054cfb17059e5e108a7162d7b
- 03:34 PM rgw Bug #2878 (Resolved): rgw: chunked encoding for POST requests (e.g., complete multipart uploads)
- Fixed, commit:d39ea1d4b51afdbbd51254ff41c8285e8f5697df.
- 03:33 PM rgw Bug #2877 (Resolved): rgw: ETag parsing in complete multipart upload should xml decode ETag
- Fixed, commit:3809e34448e47d7baa02d7a0f9240494aba0e337.
- 03:15 PM Revision e4e4882d (ceph): mon: differentiate cluster and client auth requirements
- - require 'cluster required' of osds, mdss, and other mons
- require 'service required' of clients
Signed-off-by: Sa... - 03:15 PM Revision e5368891 (ceph): monclient: differentiate clients vs daemons
- If we are a daemon, require 'auth cluster required'. Otherwise, use the
client requirement.
As always, fall back to... - 03:15 PM Revision 5e13fd67 (ceph): keyring: check client requirement list too when loading keyring
- Check client requirements when loading a keyring from the cct. This is
only used to succeed when no keyring is found... - 03:15 PM Revision ac9d429d (ceph): keyring: simplify from_ceph_context() arguments
- Allocate the KeyRing in the caller, and just pass a pointer.
Signed-off-by: Sage Weil <sage@inktank.com> - 03:15 PM Revision 35e79f23 (ceph): keyring: simplify from_ceph_context()
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:15 PM Revision 69130d7c (ceph): monclient: move keyring requirement where it belongs
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:15 PM Revision ece78c86 (ceph): doc: some basic cephx documentation
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:15 PM Revision c03f744e (ceph): keyring: make from_ceph_context() a member
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:09 PM Revision d5704bd7 (ceph): buffer: make release() private
- This should only be called by ~ptr or when we are replacing the current
target with something new. It is not suitabl... - 02:06 PM Bug #2845 (Resolved): mkcephfs hasn't learned about new default keyring locations in argonaut
- fixed, commit:96b1a496cdfda34a5efdb6686becf0d2e7e3a1c0
- 12:48 PM Bug #2875 (Resolved): osd: pg stuck in GetLog
- 12:48 PM Bug #2834 (Resolved): osd/ReplicatedPG.cc: 3577: FAILED assert(waiting_for_ack.begin()->first == ...
- hasn't come up recently
- 11:11 AM Bug #2887: pjd open/08.t failed test 2
- Logs: ubuntu@teuthology:/a/teuthology-2012-08-06_00:00:02-regression-next-testing-basic/5012
- 10:03 AM Bug #2887: pjd open/08.t failed test 2
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-08-08_00:00:07-regression-next-testing-basic/5542
- 10:48 AM Bug #2761: osd: failed to recover before timeout expired
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-08-08_00:00:07-regression-next-testing-basic/5616...
- 10:33 AM rgw Bug #2915: rgw: copy of large object times out
- workaround: bump up fastcgi timeout
- 10:11 AM Feature #2921 (Rejected): doc: Provide epub docs
- Sphinx supports it. Current output seems to only include the top-level file and indexes, skipping most of the content...
- 10:04 AM Feature #2920 (Rejected): doc: Provide PDF docs
- Sphinx supports it, but we'd need to fix other parts of our toolchain.
To see where we are:
1. add this patch:
... - 02:33 AM Revision bf4c5e7e (ceph): mds, osd: require auth_service_required, if defined
- Signed-off-by: Sage Weil <sage@inktank.com>
08/07/2012
- 05:56 PM Bug #2919 (Resolved): ceph kernel module looks for :/ in path, but / stripped by precise mountall
- I think this is really a bug in mountall (see https://bugs.launchpad.net/ubuntu/+source/mountall/+bug/809221), but it...
- 05:42 PM Feature #2918 (Resolved): OSD ID numbers determine OSD count and thus default pg_cnt
- An IRC user (maelfius) had a problem with a 1-monitor, 3-OSD cluster; the monitor chewed up all memory before it star...
- 12:50 PM rgw Bug #2916: radosgw does not check command line options for correctness
- that's a generic ceph command lines parsing issue
- 11:52 AM rgw Bug #2916 (Resolved): radosgw does not check command line options for correctness
- It is possible to pass any command line option to radosgw without error. For example
./radosgw -c /home/caleb/cep... - 12:49 PM rgw Bug #2915: rgw: copy of large object times out
- The problem is that apache is timing out. We should return an early 200 and encode any error in the response code, as...
- 10:34 AM rgw Bug #2915 (Resolved): rgw: copy of large object times out
- 09:26 AM devops Feature #2808 (Rejected): crowbar: upgrade to fred3 (get bind bug fix)
- Looks like upstream Crowbar is still buggy with regard to DNS.
- 06:37 AM Bug #2913: monclient: asserts when no monitor addresses found due to dns failure
- I am using 0.48argonaut-1precise.
08/06/2012
- 04:22 PM Bug #2914 (Resolved): librados set_complete_callback, set_safe_callback clobber each other's argu...
- 02:46 PM Bug #2913: monclient: asserts when no monitor addresses found due to dns failure
- hmm, looking closer that's a second bug - it's not splitting 'thinkmate3:6789;thinkmate4:6789' into separate addresse...
- 02:28 PM Bug #2913: monclient: asserts when no monitor addresses found due to dns failure
- I'm not so sure this is a DNS issue. Here is how name service is set up on my ceph/kvm test cluster.
On each node,... - 01:58 PM Bug #2913 (Resolved): monclient: asserts when no monitor addresses found due to dns failure
- This should be an error returned up to the user, not an assert.
From https://www.redhat.com/archives/libvirt-users... - 02:16 PM Bug #2887: pjd open/08.t failed test 2
- recent logs: ubuntu@teuthology:/a/teuthology-2012-08-06_02:00:02-regression-testing-testing-basic/5117
- 09:53 AM Feature #2911 (Duplicate): osd: Restrict recovery when the OSD full list is nonempty
- See the conversation at http://www.spinics.net/lists/ceph-devel/msg08010.html
It would be nice if we could somehow...
08/04/2012
- 01:49 AM Revision 4fd393f3 (ceph): librbd: fix bounds of memcpy in info()
- Caught by valgrind.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 01:49 AM Revision d48d1ffb (ceph): test_librbd_fsx: add cloning
- 5% of the time a clone op is chosen, create a snapshot, save the
current contents to a file, and continue operating o... - 01:48 AM Revision 90dc5650 (ceph): librbd: implement read/write from parent images
- Put the completion handling logic into new subclases of
librbd::AioRequest, so the caching/non-caching paths can shar... - 01:48 AM Revision beccac93 (ceph): librbd: don't open parent again during get_parent_info
- The parent was already opened when the original ImageCtx
was initialized. We just need to lookup the pool and image
n... - 01:48 AM Revision 12c9a7d5 (ceph): test_rbd.py: refactor cloning tests
- Move into a separate class that requires layering to be enabled,
so the common step of creating and deleting a clone ... - 01:48 AM Revision 965271db (ceph): test_librbd: add a simple io to clone test
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 01:48 AM Revision 53947ed8 (ceph): librbd: check new snapc for validity, not the old one
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 01:48 AM Revision 9bf3d486 (ceph): librbd: move flush on new snap outside of snap_lock
- snap_lock needs to be taken during writeback.
This is still protected by md_lock. The altered snapc doesn't
affect in... - 01:48 AM Revision 12e20709 (ceph): librbd: close parent after shutting down cache
- Requests that haven't been flushed yet might need the parent still.
Signed-off-by: Josh Durgin <josh.durgin@inktank.... - 01:48 AM Revision 745783c1 (ceph): librbd: expose feature bits through librbd.h
- Move them to a separate header so we don't expose
rbd_types.h to the librbd user.
Signed-off-by: Josh Durgin <josh.d... - 12:59 AM Revision 43291951 (ceph): rados.py: add binding for rados_trunc
- Fixes: #2909
Signed-off-by: Evan Felix <evan.felix@pnnl.gov>
Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
08/03/2012
- 06:31 PM Bug #2909 (Resolved): the rados_trunc function did not get implemented in rados.py Python
- Thanks! Added in commit:43291951fad241a6d3f8b8daa37d3665c9d842d6, with a simple test and spacing normalized to the re...
- 03:58 PM Bug #2909: the rados_trunc function did not get implemented in rados.py Python
- Yes you may.
- 03:35 PM Bug #2909: the rados_trunc function did not get implemented in rados.py Python
- That looks good to me. Can I add your signed-off-by to the patch?
- 01:53 PM Bug #2909 (Resolved): the rados_trunc function did not get implemented in rados.py Python
- This code seems to work in the Ioctx class:
def trunc(self,key,size):
self.require_ioctx_open()
... - 02:23 PM devops Feature #2910: crowbar: Use JBOD mode for ceph-osd
- There's a map in the deployer object from role name to BIOS and RAID configuration to set on the node. We can add cep...
- 02:22 PM devops Feature #2910 (Closed): crowbar: Use JBOD mode for ceph-osd
- 11:38 AM Bug #2908 (Resolved): ceph osd crush remove <name>
- (11:34:50 AM) Kyle Bader: so it looks like ceph -h is missing crush rm
(11:34:54 AM) Kyle Bader: could we add
(11:... - 07:56 AM Subtask #2738 (Rejected): mon: Single-Paxos: Sync: Add snapshot support to the monitor store
- This task was superseded by task #2756, which provides a much more broad implementation using directly the available ...
- 07:45 AM Subtask #2737: mon: Single-Paxos: Sync: Force trimming to be proposed through Paxos
- 07:44 AM Subtask #2805 (Resolved): mon: Single-Paxos: Sync: Create a test unit to verify the correctness o...
- 07:44 AM Subtask #2758 (Resolved): mon: Single-Paxos: Sync: Extend the in-memory mock-up of KeyValueDB to ...
- 07:43 AM Subtask #2756 (Resolved): mon: Single-Paxos: LevelDBStore: Make iterator thread-safe
08/02/2012
- 11:03 PM Revision 3671a37e (ceph): doc: Explicitly state mount.ceph two first arguments are fixed.
- I've hurt myself too many times with this.
Signed-off-by: Tommi Virtanen <tv@inktank.com> - 11:03 PM Revision 17ad4e18 (ceph): doc: mount.ceph is also needed for cephx.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 10:56 PM Revision c961a20e (ceph): doc: Fix toctree structure for man obsync(1).
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 08:31 PM Revision 5db3a9e7 (ceph): rgw_admin.cc: Disallow addition of S3 keys with subuser creation
- Fixes: #1855
It is no longer possible to create a subuser and new S3 key associated
with that user through the radosg... - 08:02 PM Revision 4e40a784 (ceph): ceph-authtool: Fix usage, it's --print-key not --print.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 06:14 PM Revision 8665bdc1 (ceph): task: scrub OSDs periodically
- Signed-off-by: Mike Ryan <mike.ryan@inktank.com>
- 06:14 PM Revision 3b85b231 (ceph): task: verify scrub detects files whose contents changed
- Signed-off-by: Mike Ryan <mike.ryan@inktank.com>
- 06:00 PM Revision 25de5e59 (ceph): Revert "osd: peering: detect when log source osd goes down"
- This reverts commit 0d3d75ec0d17e2f6bc5d42058f51eb2ff19ffb71.
Accidental double push. - 04:51 PM Bug #2907: rados benchmarking tool which does not always do creates
- Why not record the raw data and let other tools produce percentiles and other statistics?
- 04:44 PM Bug #2907 (Resolved): rados benchmarking tool which does not always do creates
- Features:
Pluggable distribution for choosing objects (zipifan?, random?, sequential?)
configurable numbe... - 04:09 PM Bug #2904 (Resolved): ceph-authtool: Adds keys on typos, expected error message
- ...
- 03:50 PM CephFS Feature #2903 (Resolved): ceph-fuse: Support -o noallow_other
- Currently, ceph-fuse hardcodes the -o allow_other option to FUSE_ARGS_INIT.
https://github.com/ceph/ceph/blob/5db3... - 03:35 PM Revision 93cbab73 (ceph): doc: Simplify submodules explanation.
- ``git clone --recursive`` does ``init`` & ``update`` for us. Also
avoids incorrect language; there never were submodu... - 03:35 PM Revision 48de9b5b (ceph): doc: Say what to do if submodules are out of date.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 03:35 PM Revision 203dffad (ceph): doc: cd to repository before running git status.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 03:33 PM Revision 6af560de (ceph): doc: Correct Git URL for clone
- Using git@github.com would mean SSHing in, and your average open
source consumer probably won't have a Github account... - 01:35 PM rgw Bug #2841 (Fix Under Review): rgw: fix usage trim
- 01:31 PM rgw Bug #1855 (Resolved): Creation of a subuser that appears to own an s3 key is possible, and removi...
- Commit 5db3a9e71c6b757660d0702efada40af6be63eb8 pushed. We disallow creating s3 key when subuser is created in order ...
- 01:27 PM devops Feature #2398: chef: external osd journal support
- Shuffling old notes here:
see if "osd journal" was overridden in $cluster.conf; if yes, do not attempt discovery
... - 12:59 PM rgw Feature #2869 (Fix Under Review): rgw: expand date format support
- 12:59 PM rgw Bug #2877 (Fix Under Review): rgw: ETag parsing in complete multipart upload should xml decode ETag
- 12:59 PM rgw Bug #2878 (Fix Under Review): rgw: chunked encoding for POST requests (e.g., complete multipart u...
- 12:59 PM rgw Bug #2879 (Fix Under Review): rgw: xml parser doesn't work correctly with escape sequences
- 11:50 AM Bug #2902 (Resolved): common lib tries to open literal ~/.ceph/ceph.conf
- ...
- 11:48 AM Bug #2901 (Resolved): librados-config should not read ceph.conf
- ...
- 11:38 AM Bug #2900 (Resolved): ceph fuse crashed
- Logs: ubuntu@teuthology: /a/teuthology-2012-07-27_19:00:07-regression-master-testing-gcov/1581
Core file: /a/teuthol... - 11:09 AM Bug #2897 (Resolved): ceph fuse error segfault
- ...
- 11:03 AM devops Feature #2780 (Closed): gitbuilder: move to vercoi, redo deployment if feasible
- 10:52 AM Bug #2823: osd: out of order ACKs
- Log location: ubuntu@teuthology:/a/teuthology-2012-08-01_19:00:04-regression-master-testing-gcov/4196
ubuntu@teuth... - 10:50 AM Bug #2823: osd: out of order ACKs
- (10:46:42 AM) tamil.muthamizhan@newdream.net: 4196: (1138s) collection:rados-thrash clusters:6-osd-3-machine.yaml fs:...
- 10:45 AM Bug #2823 (New): osd: out of order ACKs
- 10:10 AM Bug #2887: pjd open/08.t failed test 2
- recent logs: ubuntu@teuthology:/a/teuthology-2012-08-01_19:00:04-regression-master-testing-gcov/4126
- 10:00 AM Bug #2896 (Won't Fix): ceph pg dump has empty hb_out field
- I was looking at "ceph pg dump" output today on a patched argonaut build and saw that while all the osd stat outputs ...
- 12:17 AM Revision 0d3d75ec (ceph): osd: peering: detect when log source osd goes down
- The Peering state has a generic check based on the prior set osds that
will restart peering if one of them goes down ...
08/01/2012
- 11:34 PM Revision 4bd466d6 (ceph): osd: peering: detect when log source osd goes down
- The Peering state has a generic check based on the prior set osds that
will restart peering if one of them goes down ... - 06:31 PM Bug #2895: cli: non-existent command returns confusing error message
- ...and ceph osd map rbd/rbd_info returns "unknown command map', which is just wrong;
the problem is the argument nee... - 05:33 PM Bug #2895 (Resolved): cli: non-existent command returns confusing error message
- 'ceph osd crush get' returns 'unknown command crush', instead of the full command.
http://www.spinics.net/lists/ce... - 05:28 PM Feature #2894 (Resolved): cli: help command for ceph subsystems
- To make commands and their usage discoverable and easy to look up, each subsystem could provide a help command
that ... - 04:55 PM Revision ca2c3813 (ceph): osd: peering: detect when log source osd goes down
- The Peering state has a generic check based on the prior set osds that
will restart peering if one of them goes down ... - 04:50 PM Bug #2887: pjd open/08.t failed test 2
- Also, ubuntu@teuthology:/a/teuthology-2012-07-31_19:00:04-regression-master-testing-gcov/3654
- 04:47 PM Bug #2887: pjd open/08.t failed test 2
- Also, ubuntu@teuthology:/a/teuthology-2012-08-01_00:01:38-regression-next-testing-basic/3784
- 04:43 PM Bug #2887: pjd open/08.t failed test 2
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-08-01_02:00:04-regression-testing-testing-basic/3909
- 01:51 PM Bug #2887 (Resolved): pjd open/08.t failed test 2
- pjd open/08.t failed test 2 on both ceph-fuse and kclient.
Logs:- ubuntu@teuthology:/a/teuthology-2012-07-31_02:00... - 04:34 PM devops Feature #2893 (Closed): crowbar: Nested virtualization for running OpenStack in vercoi vm
- 04:34 PM devops Feature #2893 (Closed): crowbar: Nested virtualization for running OpenStack in vercoi vm
- 04:30 PM Bug #2892 (Resolved): ceph health detail kills monitor
- Executed the following:
ubuntu@burnupi30:~$ sudo ceph health detail
Wait awhile and ceph will start to output t... - 03:10 PM Bug #2891 (Can't reproduce): heap profiler hangs when trying to start it up on the mon
- We tried to turn heap profiling on the mon (congress), however the last thing we see in the logs is the message that ...
- 02:24 PM Bug #2890 (Resolved): monitor: "recognize" heap commands
- The monitor accepts the standard heap profiler commands, but it tells the user it doesn't due to not setting return c...
- 01:56 PM devops Feature #2889 (Closed): crowbar: script for easily packaging ceph barclamp
- 01:53 PM devops Feature #2888 (Closed): crowbar: Make VM disk IO cache writes for performance
- 01:38 PM devops Documentation #2886 (Rejected): doc: crush location tricks, ceph.conf, automatic host=
- - how it autoupdates on osd startup
- how hosts won't migrate from container to another automatically - 01:37 PM devops Feature #2885 (Resolved): doc: mon initial members requirements, functioning, admin steps to take
- 01:36 PM devops Feature #2884 (Rejected): doc: osd hotplugging
- 01:34 PM devops Feature #2883 (Rejected): chef: union lists and maps in env vs node ceph.conf json
- As an admin, I want to specify in environment
"osd crush location": {
"datacenter": "westcoast",
}
an... - 01:33 PM devops Documentation #2882 (Rejected): doc: chef environment ceph.conf content tricks
- 01:32 PM devops Feature #2881 (Rejected): doc: chef cookbook better README, internal structure, assumptions
- 01:29 PM devops Feature #2704 (Closed): sepia: Use ``names`` as resolver on plana, burnupi, vercoi
- dnscache01 and dnscache02 are happily serving anything that uses DHCP to get its configuration.
There may be stati... - 01:20 PM devops Feature #2880 (Rejected): chef: use get-or-create instead of get-or-create-key
- ceph.git commit 4551808fa00b812fee6e0c196fd333eca0b06de9 adds "ceph auth get-or-create". Switch to using it in ceph-c...
- 01:10 PM rgw Bug #2877: rgw: ETag parsing in complete multipart upload should xml decode ETag
- There are two different issues here. The first one is that we don't remove the quotes when comparing the etags. The s...
- 12:55 PM rgw Bug #2879 (Resolved): rgw: xml parser doesn't work correctly with escape sequences
- e.g., when providing data with """, the entity is getting clobbered.
- 03:37 AM Revision c2ff66eb (ceph): crank up pjd debugging
07/31/2012
- 10:49 PM Revision bb6e0d0e (ceph): wireshark: update patch
- Update to latest source tree (svn 43768).
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 09:44 PM Bug #2873 (Fix Under Review): Stack trace thrown when using obsync
- 06:18 PM Bug #2873: Stack trace thrown when using obsync
- Figured out what the problem is, it appears that on L111, it should go from being...
- 11:27 AM Bug #2873 (Resolved): Stack trace thrown when using obsync
- ...
- 09:26 PM Revision deec81b4 (ceph): ReplicatedPG: clear waiting_for_ack when we send the commit
- Otherwise, we might send the ack anyway later, after a subsequent
commit is sent resulting in an out-of-order op.
Th... - 08:51 PM Revision e0e72d78 (ceph): Merge remote-tracking branch 'upstream/wip-leveldb-iterators'
- 06:55 PM Revision 87defa88 (ceph): rbd: fix off-by-one error in key name
- Fixes: #2846
Signed-off-by: Sylvain Munaut <tnt@246tNt.com> - 06:54 PM Revision 37d5b462 (ceph): secret: return error on empty secret
- Signed-off-by: Sylvain Munaut <tnt@246tNt.com>
- 06:48 PM Revision f22b95da (ceph): rbd: fix off-by-one error in key name
- Fixes: #2846
Signed-off-by: Sylvain Munaut <tnt@246tNt.com> - 06:48 PM Revision e775ce52 (ceph): secret: return error on empty secret
- Signed-off-by: Sylvain Munaut <tnt@246tNt.com>
- 04:55 PM Revision cd0b5278 (ceph): separate regression suite into topical categories rados, rbd, fs
- 03:38 PM RADOS Bug #2874: apparent CRUSH mapping failure
- check if setting the tunables all to 0 makes it go away
- 11:40 AM RADOS Bug #2874 (Resolved): apparent CRUSH mapping failure
- While doing crowbar tests, I created a 3-OSD cluster (on separate VMs) that ended up with 6 degraded PGs....
- 03:36 PM rgw Bug #2504 (In Progress): rgw: use multiple notifications objects
- 03:35 PM rgw Bug #2878 (Resolved): rgw: chunked encoding for POST requests (e.g., complete multipart uploads)
- We shouldn't require length passed for these requests.
- 03:28 PM rgw Bug #2877 (Resolved): rgw: ETag parsing in complete multipart upload should xml decode ETag
- Should be able to accept both:...
- 03:08 PM Bug #2876 (Resolved): mon: pg stuck peering (for example) broken?
- ...
- 02:01 PM Bug #2875 (Resolved): osd: pg stuck in GetLog
- we weren't checking if newest_update_osd went down (it could be outside the prior set)
- 12:43 PM Linux kernel client Bug #2573 (Resolved): libceph: many "socket closed" messages
- I was seeing this too, but with the latest code and all (knock wood) the races closed I'm not anymore. Going to opti...
- 11:49 AM Bug #2846 (Resolved): Malformed keyring file causes kernel null pointer deref on "rbd map"
- userland fixes applied to stable, next.
thanks! - 11:42 AM Bug #2846: Malformed keyring file causes kernel null pointer deref on "rbd map"
- kernel patch is in testing branch.
- 06:23 AM Subtask #2805 (Fix Under Review): mon: Single-Paxos: Sync: Create a test unit to verify the corre...
- 06:22 AM Subtask #2805: mon: Single-Paxos: Sync: Create a test unit to verify the correctness of the whole...
- Currently available tests:
* Removing keys:
> * Using both the whole-space iterator and the whole-space snapshot ...
07/30/2012
- 08:43 PM Revision cda5e8e0 (ceph): PG,ReplicatedPG: clarify scrub state clearing
- scrub_clear_state takes care of clearing the SCRUB and REPAIR
flags. Thus, PG::scrub() needn't clear them again sinc... - 08:39 PM Revision 6d464a21 (ceph): PG::mark_clean(): queue_snap_trim if snap_trimq is not empty
- Currently, we won't queue for snap trim until the next map
update.
Noticed while reviewing another patch, this would... - 08:38 PM Revision 1041b92c (ceph): ReplicatedPG::snap_trimmer: requeue if scrub_block_writes
- Otherwise, we do not continue snap_trimming once scrub is
complete.
Noticed while revewing another patch. This woul... - 06:46 PM Linux kernel client Bug #2868: kclient: crash in __kick_osd_requests -> __reset_osd -> __remove_osd
- hoping this was the messenger locking stuff, let's see if it pops up again
- 06:45 PM rbd Bug #2715 (Resolved): krbd: spinlock wrong CPU
- 06:45 PM Linux kernel client Bug #2867 (Resolved): kclient: crash from ffsb in con_work -> kernel_sendmsg
- 06:45 PM Linux kernel client Bug #2392: First read of symlink after ceph filesystem mounted gives error
- 06:19 PM Revision 9071764a (ceph): qa: remove rbd image when done
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 06:19 PM Revision 4111501a (ceph): qa: add script to run rbd/librbd tests
- Run on old and new style images, with different features. This is
intended to ease development, as opposed to being p... - 06:19 PM Revision 902bbd79 (ceph): cls_rbd: don't duplicate encoding
- Just skip the parts before encoding instead of returning early.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 06:19 PM Revision 72dc665b (ceph): librbd: make ImageCtx methods take snap_id parameters
- This makes it easier to use without racing with snap_set.
Requests in the cache, for example, store their snap_id
and... - 06:19 PM Revision bd119908 (ceph): librbd: add method to get the size of an image
- To go with the other individual properties instead of stat,
add a method that only gets the size.
Signed-off-by: Jos... - 06:19 PM Revision ea75d1ff (ceph): librbd: check for new snapshots in snap_set
- This allows callers to create a snapshot and then read from
it immediately. No one uses this other than the tests,
fo... - 06:19 PM Revision ff2a96c7 (ceph): rbd: fix copy-pasted snap remove error message
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 06:19 PM Revision c6bc3e10 (ceph): librbd: refactor synchronous I/O
- Write in terms of the asynchronous functions, so all the logic
is not duplicated. Now there's only a single point whe... - 06:19 PM Revision d3b5ee75 (ceph): librbd: split into multiple files
- This was long overdue. There's still a bunch of stuff in internal.cc
that should be moved elsewhere, but this is a go... - 06:17 PM Revision bbc2a4e1 (ceph): librbd: round #blocks in image_info() for edge cases
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 06:17 PM Revision 237f2409 (ceph): rbd: flatten command (copyup an entire image)
- Fixes: #2561
Signed-off-by: Dan Mick <dan.mick@inktank.com> - 06:17 PM Revision 26ed3841 (ceph): librbd, rbd.py, test_rbd.py: flatten methods
- librbd:
- copyup_block for individual blocks (for read/write path)
- flatten for iterating across whole image (for rb... - 05:49 PM Revision 48038002 (ceph): Merge branch 'wip-osd'
- Reviewed-by: Samuel Just <sam.just@inktank.com>
- 05:49 PM Revision 9e5d4e61 (ceph): osd: initialize send_notify on pg load
- When the PG is loaded, we need to set send_notify if we are not the
primary. Otherwise, if the PG does not go throug... - 05:49 PM Revision f9ff8dd3 (ceph): osd: replace STRAY bit with bool
- We were setting a bit in pg->state that is private to the non-primary
PG. The other bits get shared with the mon etc... - 05:47 PM Revision fb1d5495 (ceph): os: KeyValueDB: re-implement (prefix) iter in terms of whole-space iter
- In-a-nutshell-version: Create a whole-space iterator interface, and
implement the already existing, prefix-based iter... - 05:47 PM Revision 9dd8a333 (ceph): os: KeyValueDB: implement snapshot iterators
- Create a set of functions, to be implemented by derivative classes of
KeyValueDB, responsible for returning an iterat... - 05:47 PM Revision 8e404772 (ceph): test: test_keyvaluedb_iterators: Test KeyValueDB implementations iterators
- This set of tests focus on testing the expected behavior of LevelDBStore's
and KeyValueDBMemory's iterators.
We test... - 04:52 PM rbd Bug #2872 (Resolved): RBD resize command allows image size -1
- Ceph Version : 0.48
Resize rbd image to size -1 allows rbd image to be resized to 15 Exabytes, which is incorrect.... - 03:52 PM rbd Bug #2871 (Resolved): rbd export command hangs when trying to export an image of size 0 to a loca...
- Ceph Version: 0.48
Steps followed:
1. create a rbd image of size 1000 mb in rbd pool
2. resize the rbd image t... - 10:52 AM Bug #2866 (Resolved): osd: pg stuck with unfound
- commit:9e5d4e61a73343397e67e918e87f1e6dcb8ec72d and commit:7b9d37c662313929b52011ddae47cc8abab99095
- 10:51 AM Bug #2860 (Resolved): osd: stuck waiting for pg acting set to change
- commit:bae837010b6b486011b06dd97664fb54c3f3ff44 and commit:96feca450c5505a06868bc012fe998a03371b77f
- 09:14 AM Bug #2819: krbd: lockup on large writes, msgr fault injection
- i'm unable to reproduce this on a real kernel.. it only happens on uml.
here is a full backtrace:... - 08:01 AM Bug #2638 (Resolved): mon: make pool ops idempotent
- 08:01 AM Bug #2830 (Duplicate): [argonaut] osd/OSD.cc: 3906: FAILED assert(_get_map_bl(epoch, bl))
- 02:27 AM Revision 4a0a7e2f (ceph): auth: (ordered) list of auth methods, not a set
- This lets us express a preference.
Signed-off-by: Sage Weil <sage@newdream.net> - 02:27 AM Revision ec6ecc19 (ceph): auth: AuthSupported -> AuthMethodList
- Signed-off-by: Sage Weil <sage@inktank.com>
- 02:27 AM Revision effdec9e (ceph): auth: introduce cluster, service, and client auth settings
- Signed-off-by: Sage Weil <sage@inktank.com>
07/29/2012
- 09:31 PM Linux kernel client Bug #2688 (Duplicate): lockup on ffsb + thrashing
- 09:31 PM Linux kernel client Bug #2260 (Resolved): libceph: null pointer dereference at try_write+0x638+0xfb0
- this is either #2867, or a similar issue that is since resolved.
- 09:28 PM Linux kernel client Bug #2790 (Duplicate): libceph: crash in read_partial_message_section on ffsb
- 09:24 PM Linux kernel client Bug #2867: kclient: crash from ffsb in con_work -> kernel_sendmsg
- *sigh of relief*
- 08:22 PM Linux kernel client Bug #2867: kclient: crash from ffsb in con_work -> kernel_sendmsg
- This appears to be a regression, so it is effectively blocking sending the pull request to Linus.
- 07:40 PM Revision e4e239e2 (ceph): kernel: push a local .deb instead of using gitbuilder
- This lets you specify a path to an existing kernel deb
to be pushed and installed on the remote node.
Limitations:
... - 07:15 PM Revision 1c93d5ab (ceph): syslog check: fix false-positive BUG matches in random strings
07/28/2012
- 08:53 PM Revision 9d43c8a4 (ceph): test: workloadgen: Don't linearly iterate over a map to obtain a collec...
- We were iterating over the collections map a certain amount of times, in
order to obtain the collection in that posit... - 05:54 PM Revision 85187edd (ceph): add osd-recovery-incomplete
- 05:53 PM Revision a0847694 (ceph): osd_recovery: also test unfound discovery
- This tests for bug #2866.
- 05:52 PM Feature #2280 (Resolved): improve gitbuilder infrastructure
- 05:50 PM RADOS Subtask #2792 (Fix Under Review): mon: require tunable feature bit if current osdmap uses non-def...
- 05:23 PM Revision 731d5209 (ceph): ceph_manager: count 'incomplete' as 'down'
- 05:23 PM Revision a9f2bf62 (ceph): ceph_manager: wait_for_active
- 05:23 PM Revision 8dd09cb2 (ceph): osd_recovery: test incomplete pg recovery
- 4-osd test to reproduce #2860 and confirm the fix.
- 05:05 PM Revision 7b9d37c6 (ceph): osd: set STRAY on pg load when non-primary
- The STRAY bit indicates that we should annouce ourselves to the primary,
but it is only set in start_peering_interval... - 04:04 PM Revision bae83701 (ceph): osd: peering: make Incomplete a Peering substate
- This allows us to still catch changes in the prior set that would affect
our conclusions (that we are incomplete) and... - 04:04 PM Revision d1602ee2 (ceph): osd: peering: move to Incomplete when.. incomplete
- PG::choose_acting() may return false and *not* request an acting set change
if it can't find any suitable peers with ... - 03:49 PM rgw Feature #2869 (Resolved): rgw: expand date format support
- should be able to parse the following:
Sat, 28 Jul 2012 20:35:55 UTC
Which uses UTC instead of GMT. - 03:30 PM Feature #2477 (Fix Under Review): rados bench cleanup
- 03:30 PM Feature #1783 (Fix Under Review): osd: scrub incrementally across hash range using MOSDPGScan
- 02:39 PM Revision d6126940 (ceph): config: send warnings to a ostream* argument
- We shouldn't always send these to stderr. (Among other things, the
warning: prefix breaks the gitbuilder error detec... - 02:21 PM Revision 1fc19df8 (ceph): Merge remote-tracking branch 'gh/wip-msgr-masterbits'
- Reviewed-by: Greg Farnum <greg@inktank.com>
- 07:37 AM Linux kernel client Bug #2868 (Resolved): kclient: crash in __kick_osd_requests -> __reset_osd -> __remove_osd
- ...
07/27/2012
- 11:03 PM Revision 96feca45 (ceph): osd: peering: make Incomplete a Peering substate
- This allows us to still catch changes in the prior set that would affect
our conclusions (that we are incomplete) and... - 10:39 PM Revision a71e442f (ceph): osd: peering: move to Incomplete when.. incomplete
- PG::choose_acting() may return false and *not* request an acting set change
if it can't find any suitable peers with ... - 09:28 PM Revision de4474ac (ceph): vstart.sh: apply extra conf after the defaults
- This let's you do e.g., -o 'debug ms = 100' and it will apply after
the default logging levels.
Signed-off-by: Sage ... - 09:00 PM Revision 623026d9 (ceph): Merge remote-tracking branch 'gh/stable' into stable-next
- 08:42 PM Revision 0b8b58ff (ceph): fix adminsocket test
- 05:52 PM Linux kernel client Bug #2867 (Resolved): kclient: crash from ffsb in con_work -> kernel_sendmsg
- ...
- 05:45 PM Revision bbc49179 (ceph): msg/Pipe: if we send a wait, make sure we follow through
- Mark our outgoing connection attempt if we send a WAIT in accept(). This
ensures we don't go to standby or closed in... - 05:44 PM Revision 6c01d46e (ceph): client: handle fault during session teardown
- We may have a sequence like:
- client does REQUEST_CLOSE
- mds sends reply
- connection faults, client does get r... - 05:44 PM Revision a879425b (ceph): msg/Pipe: make STANDBY behavior optional
- In particular, lossless_peers should use STANDBY, but lossless_clients
should reconnect immediately since they are al... - 05:43 PM Revision f69d025b (ceph): conf: make dup lines override previous value
- If you put
[some section]
foo = 1
...
foo = 2
in a .conf file, make the second key override the first.
Generate... - 05:43 PM Revision 4788567e (ceph): qa: simple test for pool create/delete commands
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:43 PM Revision 6f7837a9 (ceph): mon: make 'osd rm ...' idempotent
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:43 PM Revision 640e5fde (ceph): qa: simple tests for 'ceph osd create|rm' commands
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:43 PM Revision 3715d205 (ceph): mon: check for invalid pool snap creates in preprocess_op, too
- This avoids waiting for a paxos commit just to return an error.
Signed-off-by: Sage Weil <sage@inktank.com> - 05:43 PM Revision 507f99e9 (ceph): librados: make snap create/destroy handle client-side errors
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:43 PM Revision 53aa9593 (ceph): objecter: return ENOENT/EEXIST on pool snap delete/create
- Do these checks on the client to mask monitor idempotency from the user.
Signed-off-by: Sage Weil <sage@inktank.com> - 05:43 PM Revision 5f3ef77d (ceph): mon: make pool snap creation ops idempotent
- Return 0 if the snap already exists, or is already deleted.
Also, avoid updating the pg_pool if we are just waiting ... - 05:43 PM Revision 4dfc14c4 (ceph): mon: remove superfluous "can't delete except on master" comments
- That's what 'return false' means for preprocess_*().
Signed-off-by: Sage Weil <sage@inktank.com> - 05:43 PM Revision 6ec9555b (ceph): cond: reorder asserts
- Make the more specific checks assert before the less specific ones, so we
are more likely to crash with useful inform... - 05:43 PM Revision c2e1c629 (ceph): mutex: assert we are unlocked by the same thread that locked
- This only works for non-recursive locks. (Which is probably all of them?)
Signed-off-by: Sage Weil <sage@inktank.com> - 05:43 PM Revision 46e819ed (ceph): objecter: fix mon command resends
- The monitor session is lossy. Send these when the op is initiated, or
when we reconnect. The timeout/cutoff was pre... - 05:43 PM Revision 358d6b61 (ceph): librados: make pool create/destroy handle client-side errors
- Add tests!
Signed-off-by: Sage Weil <sage@inktank.com> - 05:43 PM Revision 597f14ab (ceph): objecter: make pool create/delete return EEXIST/ENOENT
- Do these checks on the client side to mask monitor idempotency from
the user.
Signed-off-by: Sage Weil <sage@inktank... - 05:43 PM Revision 5503376f (ceph): mon: make pool removal idempotent
- Return success if pool does not exist. Part of #2638.
Signed-off-by: Sage Weil <sage@inktank.com> - 05:43 PM Revision a01e22d2 (ceph): mon: make pool creation idempotent
- Return success if the pool already exists. Part of #2638.
Also, fix this so we wait until a creating pool is create... - 05:18 PM Bug #2866 (Fix Under Review): osd: pg stuck with unfound
- 04:29 PM Bug #2866 (Resolved): osd: pg stuck with unfound
- on congress, observed pg stuck with unfound objects. kicking peering (marking primary down) resolved it.
in testi... - 05:15 PM Bug #2860 (Fix Under Review): osd: stuck waiting for pg acting set to change
- 03:17 PM Bug #2860: osd: stuck waiting for pg acting set to change
- i can reproduce this with:...
- 12:39 PM Bug #2860 (Resolved): osd: stuck waiting for pg acting set to change
- ...
- 03:26 PM rbd Bug #2865 (Resolved): rbd import fails for directory but creates rbd image
- Ceph Version: 0.48
Created a local directory t_dir.
when tried to import directory t_dir to rbd/rbd_image, it rep... - 02:36 PM rgw Bug #2864 (Won't Fix): rados leaves behind references to old buckets
- As this behavior can only be reproduced through deleting objects directly through rados, and not radosgw-admin or API...
- 02:09 PM rgw Bug #2864 (Won't Fix): rados leaves behind references to old buckets
- It is possible to create an inconsistent state by following this procedure:
1. create a bucket through an API call... - 01:58 PM Bug #2824 (Resolved): ceph-fuse; hang mounting with ms failures
- 01:46 PM CephFS Bug #2863 (Resolved): client: does not tolerate traceless replies from mds
- In at least one case (_create's _mknod) we do not tolerate a (write) reply from the mds with no trace. This happens ...
- 01:21 PM rbd Bug #2862 (Resolved): CLI: rbd create command throws inappropriate error messages
- Ceph Version: 0.48
When tried a few negative test cases using "rbd create command", found that the command display... - 12:57 PM rbd Bug #2861 (Won't Fix): CLI: rbd create command requires validation for image-name
- Ceph version: 0.48
When trying to create a rbd image, the image name seems to accept empty string and special char... - 11:45 AM Bug #2462: osd/PG.cc: 402: FAILED assert(log.head >= olog.tail && olog.head >= log.tail)
- just swa this on congress during a huge crush restructure:...
- 11:31 AM rgw Tasks #2859 (New): Make add subuser in radosgw-admin idempotent
- Currently, attempting to create a subuser that already exists returns an error; it has been suggested that this behav...
- 11:25 AM Bug #2858: mon: osd id parsing returns 0 when passed 'osd.1234'
- Not sure exactly what scenario you're looking at here or what the bug is, but there are lots of places in the monitor...
- 11:08 AM Bug #2858 (Resolved): mon: osd id parsing returns 0 when passed 'osd.1234'
- 10:54 AM Bug #2752: Setting large maxosd kills all mons
- Thanks Yehuda!
- 10:51 AM Feature #2857 (Resolved): compile non-production builds with -fno-omit-frame-pointer
- This will let us get much more useful profiling data out of various tools with relatively minimal CPU overhead.
- 08:17 AM Bug #2856 (Resolved): osd: bound size of transactions trimming old osdmaps
- The monitor can arbitrarily advance it's oldest map. The osd should avoid sending down an arbitrarily large transacti...
- 04:55 AM Revision 9553c6ed (ceph): osd: fixing sharing of past_intervals on backfill restart
- We need to share past_intervals whenever we instantiate the PG on a peer.
In the PG activation case, this is based on... - 04:55 AM Revision 29aa1cf4 (ceph): filestore: check for EIO in read path
- Check for EIO in read methods and helpers. Try to do checks in low-level
methods (e.g., lfn_*()) to avoid duplicatio... - 04:29 AM Revision 0891948e (ceph): filestore: add 'filestore fail eio' option, default true
- By default we will assert/fail/crash on EIO from the underlying fs. We
already do this in the write path, but not th...
07/26/2012
- 11:35 PM Revision 9db78090 (ceph): osd: fixing sharing of past_intervals on backfill restart
- We need to share past_intervals whenever we instantiate the PG on a peer.
In the PG activation case, this is based on... - 11:29 PM Revision aef10e72 (ceph): librbd: fix id initialization in new format
- 48bd839b1e25b063c675416a8f6233463f1af115 should have included this.
I misread it due to the use of bid instead of id ... - 10:36 PM Bug #2830 (Need More Info): [argonaut] osd/OSD.cc: 3906: FAILED assert(_get_map_bl(epoch, bl))
- this may duplicate #2843.. sadly didn't take note of the osd id :(
- 10:34 PM Bug #2837 (Resolved): osd: past_interval calculation inefficient
- 10:34 PM Bug #2849 (Resolved): osd: past_intervals not shared on backfill restart
- 04:25 PM Bug #2849 (Resolved): osd: past_intervals not shared on backfill restart
- peer info value is clobbered by backfill block prior to the dne() check in PG::activate()
this explains a lot! - 10:29 PM Revision 17bb78a2 (ceph): librbd: fix id initialization in new format
- 48bd839b1e25b063c675416a8f6233463f1af115 should have included this.
I misread it due to the use of bid instead of id ... - 10:26 PM Revision 5601ae27 (ceph): mon: set a configurable max osd cap
- Don't allow setting a higher osd num through the
ceph control util.
Fixes: #2752
Signed-off-by: Yehuda Sadeh <yehuda... - 10:04 PM Revision 87b6e804 (ceph): Merge remote-tracking branch 'gh/wip-rbd-bid' into stable-next
- 10:04 PM Revision 81d72e5d (ceph): mon: make 'ceph osd rm ...' wipe out all state bits, not just EXISTS
- This ensures that when a new osd reclaims that id it behaves as if it were
really new.
Backport: argonaut
Signed-off... - 10:03 PM Revision ad9c37f2 (ceph): test_stress_watch: just one librados instance
- This was creating a new cluster connection/session per iteration, and
along with it a few service threads and sockets... - 10:03 PM Revision c60afe18 (ceph): Merge commit '35b13266923f8095650f45562d66372e618c8824' into stable-next
- First batch of msgr fixes.
- 10:03 PM Revision d2d40dc3 (ceph): client: fix locking for SafeCond users
- Need to wait on flock, not client_lock.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:03 PM Revision 6ed01df4 (ceph): workqueue: kick -> wake or _wake, depending on locking
- Break kick() into wake() and _wake() methods, depending on whether the
lock is already held. (The rename ensures tha... - 10:03 PM Revision 7fbbe465 (ceph): librados: take lock when signaling notify cond
- When we are signaling the cond to indicate that a notify is complete,
take the appropriate lock. This removes the po... - 10:03 PM Revision 4d7d3e27 (ceph): osd: guard class call decoding
- Backport: argonaut
Signed-off-by: Sage Weil <sage@inktank.com> - 10:03 PM Revision 682609a9 (ceph): objecter: always resend linger registrations
- If a linger op (watch) is sent to the OSD and updates the object, and then
the client loses the reply, it will resend... - 10:03 PM Revision 88330505 (ceph): ReplicatedPG: fix replay op ordering
- After a client reconnect, the client replays outstanding ops. The
OSD then immediately responds with success if the ... - 10:02 PM Revision c963a21a (ceph): filestore: check for EIO in read path
- Check for EIO in read methods and helpers. Try to do checks in low-level
methods (e.g., lfn_*()) to avoid duplicatio... - 10:01 PM Revision 6bd89aeb (ceph): filestore: add 'filestore fail eio' option, default true
- By default we will assert/fail/crash on EIO from the underlying fs. We
already do this in the write path, but not th... - 08:48 PM Revision 0d6ce424 (ceph): Fixed the code to pass 'yes' during mkfs
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
- 06:08 PM rbd Subtask #2855 (Closed): krbd: copy-up on write to clone
- 06:07 PM rbd Subtask #2854 (Closed): krbd: write path
- verify the target object exists in write requests. if we fail with ENOENT, trigger a copy-up.
- 06:07 PM rbd Tasks #2853 (Resolved): krbd: read path
- 06:06 PM rbd Subtask #2852 (Closed): krbd: open parent on open
- 06:05 PM rbd Feature #2851 (Duplicate): krbd: RBD layering support
- Kernel client should support all the layering functionality of the usermode client.
- 06:00 PM rbd Feature #2850 (Duplicate): libceph: support multi-operation transactions
- 03:23 PM Bug #2752 (Resolved): Setting large maxosd kills all mons
- Fixed, commit:5601ae27d6daf167dd83b3fc91b7b9591ca0cea6.
- 12:28 PM Bug #2848 (Won't Fix): OSDMap: pool_id is 64-bit, but pool_max is 32-bit
- A large number of pools will overflow pool_max before using the full range of pool ids.
- 12:26 PM Linux kernel client Cleanup #2847 (Resolved): libceph: osdmap definition is out of date
- In particular, pool_id is an int instead of a 64-bit integer. There are probably other important differences as well.
- 10:53 AM rbd Feature #2562 (In Progress): librbd: open parent images, read path, write path
- 10:46 AM rbd Feature #2726 (In Progress): krbd: clean up bio_pair leak/whatever
- Guangliang Zhao sent a patch to fix that, however, I had some concerns about it, and I'm waiting for him to respond t...
- 08:26 AM Bug #2846: Malformed keyring file causes kernel null pointer deref on "rbd map"
- Ok, I finally know the failing path.
So when you call add_key with an invalid payload, it will be parsed by ceph_k... - 08:07 AM Bug #2846: Malformed keyring file causes kernel null pointer deref on "rbd map"
- Damnit ... first it didn't take the formatting and second I pasted the wrong code :p...
- 08:05 AM Bug #2846: Malformed keyring file causes kernel null pointer deref on "rbd map"
- wrt to kernel crash, here's a minimal test case that will crash any machine that has rbd module loaded (works as user...
- 04:28 AM Bug #2846: Malformed keyring file causes kernel null pointer deref on "rbd map"
- I was pointing to a keyring file directly that happened to start with an empty line. So in rbd.cc, the function read_...
- 03:53 AM Bug #2846 (Resolved): Malformed keyring file causes kernel null pointer deref on "rbd map"
- Reported by Sylvain Munaut ("tnt" on OFTC):
(12:30:27) tnt: Is mounting a RBD on a machine that has an OSD suppose... - 02:32 AM Bug #2845 (Resolved): mkcephfs hasn't learned about new default keyring locations in argonaut
- In 0.48, when running @mkcephfs@ in a @cephx@ authentication enabled cluster, the per-daemon keys for MDSs and OSDs a...
- 01:13 AM Revision e9b5a289 (ceph): config: fix 'config set' admin socket command
- Fixes: #2832
Backport: argonaut
Signed-off-by: Sage Weil <sage@inktank.com>
07/25/2012
- 11:38 PM Revision 2b75ddef (ceph): Added '-y' option for mkfs.ext4
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
- 11:35 PM Revision 1a6cd965 (ceph): osd: break potentially large transaction into pieces
- We do a similar trick elsewhere. Control this via a tunable. Eventually
we'll control the others (in a non-stable b... - 10:57 PM Revision bcb9ab8b (ceph): doc: updates to fix problem with ceph-cookbooks appearing in chef-server.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:54 PM Bug #2843 (Can't reproduce): filestore: replay failure on xfs
- congress osd.328 crashed with...
- 09:53 PM Revision 15e16229 (ceph): osd: only commit past intervals at end of parallel build
- We don't check for gaps in the past intervals, so we should only commit
this when we are completely done. Otherwise ... - 08:28 PM Revision 9767146f (ceph): osd: generate past intervals in parallel on boot
- Even though we aggressively share past_intervals with notifies etc, it is
still possible for an osd to get buried beh... - 08:28 PM Revision d45929f4 (ceph): osd: move calculation of past_interval range into helper
- PG::generate_past_intervals() first calculates the range over which it
needs to generate past intervals. Do this in ... - 08:27 PM Revision 18d5fc41 (ceph): osd: fix map epoch boot condition
- We only want to join the cluster if we can catch up to the latest
osdmap with a small number of maps, in this case a ... - 05:58 PM Revision fca65ff5 (ceph): osd: move calculation of past_interval range into helper
- PG::generate_past_intervals() first calculates the range over which it
needs to generate past intervals. Do this in ... - 05:58 PM Revision 16302ace (ceph): osd: generate past intervals in parallel on boot
- Even though we aggressively share past_intervals with notifies etc, it is
still possible for an osd to get buried beh... - 05:58 PM Revision 5979351e (ceph): osd: fix map epoch boot condition
- We only want to join the cluster if we can catch up to the latest
osdmap with a small number of maps, in this case a ... - 05:55 PM Bug #2842: mon: health detail lists pgs multiple times
- This and #2827 may be related?
- 05:52 PM Bug #2842 (Won't Fix): mon: health detail lists pgs multiple times
- ...
- 05:16 PM rgw Bug #1855: Creation of a subuser that appears to own an s3 key is possible, and removing the subu...
- This bug can be reproduced by using the following options
./radosgw-admin -c {'ceph.conf'} --rgw-socket-path=/tmp... - 05:16 PM rgw Bug #2841 (Resolved): rgw: fix usage trim
- looking at the code, it seems that we don't encode the user in usage-trim (and also encode the wrong structure).
- 04:52 PM CephFS Bug #2187: pjd chown/00.t failed test 97
- 2012-07-23T19:16:10.185 INFO:teuthology.task.workunit.client.0.out:not ok 43
2012-07-23T19:16:10.186 INFO:teuthology... - 04:51 PM CephFS Bug #2187: pjd chown/00.t failed test 97
- Latest log: ubuntu@teuthology:/a/teuthology-2012-07-23_19:00:03-regression-master-testing-gcov/16530
- 04:30 PM Feature #2840 (Resolved): mon: $mon_data/cluster_fsid file
- maybe written/verified by mkfs!
- 04:23 PM rgw Feature #2839 (Resolved): rgw: garbage collection
- Provide a garbage collection mechanism, along the lines of what was described in a post to the mailing list.
- 04:20 PM rgw Bug #2652: Segmentation fault in rest-bench
- is it still happening?
- 04:20 PM rgw Bug #2665: rest-bench hangs periodically
- is that still happening?
- 04:10 PM devops Feature #2574 (Resolved): crowbar: use data disks automatically, journal inside data directory
- There were bugs and the history was wrecked by github pull requests again, so I redid some commits, but this function...
- 03:45 PM rgw Feature #2039 (Rejected): rgw: keep more than one bucket marker object
- That's not the case anymore. We use the unique client id and a running counter instead.
- 02:08 PM Bug #2838 (Resolved): mon: json version of 'osd tree'
- 01:52 PM Bug #2824: ceph-fuse; hang mounting with ms failures
- 01:52 PM Bug #2835 (Resolved): osd: do not send alive/upthru until booted
- 01:52 PM Bug #2836 (Resolved): osd: boot condition check incorrect
- 10:52 AM Bug #2836 (Resolved): osd: boot condition check incorrect
- commit:5979351ef3d3d03bced9286f79cbc22524c4a8de
- 11:04 AM Bug #2837 (Resolved): osd: past_interval calculation inefficient
- It is still possible for osds to get pgs without past intervals and need to recalculate them, and that calculation ca...
- 04:36 AM Revision 61ff894c (ceph): admin-socket: test generic admin socket commands
- 03:54 AM Revision 11b275a0 (ceph): osd: avoid misc work before we're active
- If we're booting, we shouldn't scrub, or send reports to the montior,
or send heartbeats, or any of that.
Signed-off... - 03:51 AM Revision 278b5f58 (ceph): mon: ignore pgtemp messages from down osds
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:51 AM Revision 08e2ecac (ceph): mon: ignore osd_alive messages from down osds
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:18 AM Revision 8c7186d0 (ceph): mon: ignore pgtemp messages from down osds
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:16 AM Revision b17f5467 (ceph): mon: ignore osd_alive messages from down osds
- Signed-off-by: Sage Weil <sage@inktank.com>
- 12:23 AM Revision 404a7f52 (ceph): admin_socket: json output, always
- If the perfcounters stuff were refactored to use the Formatter, we could
put the JSONFormatter in the admin_socket co... - 12:23 AM Revision 0133392b (ceph): admin_socket: dump config in json; add test
- Signed-off-by: Sage Weil <sage@inktank.com>
- 12:22 AM Revision 8c3b4907 (ceph): Merge branch 'next'
07/24/2012
- 10:26 PM Revision 9bc86171 (ceph): admin_socket: make test optional
- If it's not there, we just verify the output is valid json.
- 08:58 PM Bug #2835 (Resolved): osd: do not send alive/upthru until booted
- 08:53 PM Revision 0ef8cd3c (ceph): config: fix 'config set' admin socket command
- Fixes: #2832
Backport: argonaut
Signed-off-by: Sage Weil <sage@inktank.com> - 06:49 PM Revision 186a595c (ceph): Merge branch 'next'
- 06:02 PM Revision f565ace6 (ceph): osd: fix pg log zeroing
- Zero the right number of bytes. Fixes a bug where we clobber legit log
data. Fortunately this is only triggered wit... - 05:10 PM Revision 3e886799 (ceph): Merge branch 'wip-2763'
- 05:09 PM Revision 52f51a24 (ceph): wireshar/ceph/packet-ceph.c: fix eol
- Removing extra char from dos eol format.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 05:09 PM Revision d67ad0db (ceph): Wireshark dissector updated, work with the current development tree of ...
- 04:02 PM Bug #2833: LibRBD.TestClone failure with ms fialure injection
- I'm pretty sure this is due to the op being done twice due to replay. That error (-EBADF) means the id was already ad...
- 03:49 PM Bug #2833 (Resolved): LibRBD.TestClone failure with ms fialure injection
- ...
- 03:54 PM Bug #2834 (Resolved): osd/ReplicatedPG.cc: 3577: FAILED assert(waiting_for_ack.begin()->first == ...
- ...
- 03:10 PM devops Feature #2574: crowbar: use data disks automatically, journal inside data directory
- The most recent pull request for the cookbook has been tested by Tyler and myself. I've setup the following situation...
- 02:57 PM Bug #2832: [argonaut] config set foo bar broken?
- What was the resolution?
- 02:33 PM Bug #2832 (Resolved): [argonaut] config set foo bar broken?
- 01:32 PM Bug #2832 (Resolved): [argonaut] config set foo bar broken?
- ...
- 01:08 PM Bug #2831 (Duplicate): librados: LibRadosWatchNotify.WatchNotifyTest segfault
- nevermind, i cherry-pick a bad version of the linger op fix for #2796
- 12:48 PM Bug #2831 (Duplicate): librados: LibRadosWatchNotify.WatchNotifyTest segfault
- On the stable-next branch, commit:7e9336e7cb36c6640fd5c8509c9c0ffd87b15d7a,
I hit this sometime last week or the w... - 11:59 AM Bug #2824 (In Progress): ceph-fuse; hang mounting with ms failures
- 10:58 AM Bug #2799 (Resolved): osd: pg log trimming zeroing broken
- commit:f565ace62a1235dbe6a4ee9db5c5233cea395446
- 08:44 AM Bug #2799: osd: pg log trimming zeroing broken
- this was a bug in pg log trimming/zeroing. thankfully it was only enabled in master! will backport the fix all over...
- 08:25 AM Bug #2799: osd: pg log trimming zeroing broken
- ...
- 10:14 AM Subtask #2805: mon: Single-Paxos: Sync: Create a test unit to verify the correctness of the whole...
- Current available test units:
* Removing keys:
> * Using the whole-space iterator, both in LevelDBStore and KeyVa... - 09:19 AM Bug #2830 (Duplicate): [argonaut] osd/OSD.cc: 3906: FAILED assert(_get_map_bl(epoch, bl))
- 0> 2012-07-24 14:38:09.918736 7fe53cede700 -1 osd/OSD.cc: In function 'OSDMapRef OSD::get_map(epoch_t)' thread 7...
- 01:30 AM Revision a16d9c64 (ceph): os: KeyValueDB: allow finer-grained control of transaction operations
- This patch introduces the possibility of using single key/value
modification operations into the transaction interfac... - 01:30 AM Revision a3d57a6e (ceph): os: KeyValueDB: Add virtual raw_key() function to return (prefix,key) pair
- If we were to use solely the key() function, whenever we had a key with,
say, prefix 'Foo' and key 'Bar', the key() f... - 12:39 AM Revision 6c0fa509 (ceph): doc: update information about stable vs development releases
- Signed-off-by: Sage Weil <sage@inktank.com>
- 12:16 AM Revision 48bd839b (ceph): librbd: replace assign_bid with client id and random number
- The assign_bid method has issues with replay because it is a write
that also returns data. This means that the replay...
07/23/2012
- 11:51 PM Revision 67832c34 (ceph): osd: fix ACK ordering on resent ops
- The wait_for_ondisk handling fixed COMMIT ordering, but the ACKs need to
go back in the same order too. For example:... - 11:01 PM Revision 96dbc412 (ceph): rados::cls::lock: move api types into namespace
- By popular demand, moved public api into namespace. This
required some changes to ceph_dencoder to get some template
... - 09:09 PM Revision 7dfdf4f8 (ceph): librbd: replace assign_bid with client id and random number
- The assign_bid method has issues with replay because it is a write
that also returns data. This means that the replay... - 07:51 PM Revision dc2d6711 (ceph): librados: add new constructor to form a Rados object from IoCtx
- This creates a separate reference to an existing connection, for
use when a client holding IoCtx needs to consult ano... - 07:43 PM Revision d9bfe954 (ceph): Merge tag 'v0.49'
- v0.49
- 06:28 PM Revision ca6265d0 (ceph): v0.49
- 05:47 PM Revision c8f13119 (ceph): mon: make 'ceph osd rm ...' wipe out all state bits, not just EXISTS
- This ensures that when a new osd reclaims that id it behaves as if it were
really new.
Backport: argonaut
Signed-off... - 05:17 PM Bug #2822 (Resolved): rbd: ASSIGN_BID both mutates object and returns data
- commit:48bd839b1e25b063c675416a8f6233463f1af115 on master
commit:7dfdf4f8de16155edd434534e161e06ba7c79d7d for argonaut - 05:03 PM Feature #2829 (Resolved): report on cluster size/status (for service billing purposes)
- The plan is to base support contract pricing on capacity,
which means we need a quick, easy (and moderately trusted)... - 04:59 PM Bug #2828 (Resolved): osd: assign_bid was allowed to mutate and return data
- The osd shouldn't have allowed this. Figure out why, and then see if there is a graceful way to fix it without break...
- 04:56 PM Revision f42e1875 (ceph): cls_rbd, cls_rbd_client, test_cls_rbd: copyup method
- Fixes: #2559
Signed-off-by: Dan Mick <dan.mick@inktank.com> - 04:55 PM Revision 9b9efe7e (ceph): cls_rbd_client: fix locking function indentation
- Greg's editor was set to spaces only.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 04:55 PM Revision d5e45418 (ceph): cls_rbd: return negative pool id if parent does not exist
- This lets us use get_parent in a multi-op transaction without getting
-ENOENT for the entire transaction.
Signed-off... - 04:55 PM Revision 56bc3699 (ceph): cls_rbd: make get_parent return valid data when layering is disabled
- This means clients can treat an error in their multi-object
transaction as a failure for all of them. This makes the ... - 04:55 PM Revision 02aba7bc (ceph): librbd: rename variables for more consistency
- Rename: poolname -> pool_name
snapname -> snap_name
snapid -> snap_id
Signed-off-by: Josh Durgin <... - 04:55 PM Revision 4af1f981 (ceph): librbd: move watch/unwatch to ImageCtx methods
- This fixes close_image() on a partially initialized ImageCtx, and
paves the way for opening parent images without wat... - 04:55 PM Revision 233d44a1 (ceph): librbd: allow an image to be opened without watching
- Watching the header of a parent image could produce unreasonable
delays. If hundreds of child images watch the same p... - 04:55 PM Revision df71c2d3 (ceph): librbd: store parent info in snapshot metadata
- If an image is open to a snapshot, return the features or overlap from
that snapshot.
Signed-off-by: Josh Durgin <jo... - 04:55 PM Revision 8014d932 (ceph): librbd: allow opening an image by id
- If we have an ImageCtx with an id set, don't bother setting the name.
Just go directly to the header object in ImageC... - 04:55 PM Revision b82f5958 (ceph): librbd: move all side-effects to snap_{un}set()
- All callers need to do this anyway.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 04:55 PM Revision c18c4b86 (ceph): librbd: open parent image when opening a child
- Extract a helper out of get_parent_info. The parent may become unset
while the child is open, so detect changes in it... - 04:55 PM Revision 127ff618 (ceph): librbd: drop unnecessary std:: and struct prefixes
- Most of this file do not use them.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 04:52 PM Bug #2823 (Resolved): osd: out of order ACKs
- commit:67832c34a228c5cff1941eab3225969b5e66e44b
- 08:47 AM Bug #2823: osd: out of order ACKs
- specifically, this is out of order ACKs when ops are resent. trivially reproducible with the thrasher + radosmodel t...
- 04:21 PM Revision 5fcb22f0 (ceph): mkcephfs: add sync between btrfs scan and mount
- This appears to fix problems with mount failing for at least one user.
Reported-by: Paul Pettigrew <Paul.Pettigrew@m... - 02:44 PM Bug #2827 (Rejected): mon: ceph health string doesn't match "ceph -s" output
- I've seen several ceph -s reports lately where the first line on the PGs doesn't match the output of the PG line. My ...
- 11:11 AM devops Feature #2553 (Closed): crowbar: open question: What's the correct way to add RBD support to the ...
- This ticket was an arbitrary reminder to send upstream an email with questions, and we have answers & sort of underst...
- 11:04 AM Feature #2826 (Resolved): osd: backfill target reservations
- When osds are marked out, the recovery ops per primary throttling works fine, because the backfill targets tend to be...
- 10:45 AM CephFS Bug #2187: pjd chown/00.t failed test 97
- also,
ubuntu@teuthology: /a/teuthology-2012-07-23_05:00:03-regression-stable-master-basic/16425
from teuthology... - 10:42 AM CephFS Bug #2187: pjd chown/00.t failed test 97
- Recent logs: ubuntu@teuthology: /a/teuthology-2012-07-23_05:00:03-regression-stable-master-basic/16416
From teutho... - 10:14 AM Bug #2787: RBD test copy fails when thrashing
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-07-23_00:00:08-regression-next-testing-basic/16393
ubuntu@teutholo... - 08:59 AM CephFS Bug #2825: File lock doesn't work properly
- Here is the code included in *pre* ;)...
- 08:56 AM CephFS Bug #2825 (Resolved): File lock doesn't work properly
- Hi,
I've been testing the locking feature on cephfs and seems that the locking doesn't work as expected when locki... - 05:03 AM Revision d0698f9d (ceph): schedule_suite.sh: put coverage option in ceph section
- 03:50 AM Revision deb7a54a (ceph): marginal kclient+ffsb: enable mds logging to catch badess
- See #1947
- 03:47 AM Revision 32353f13 (ceph): move misc, blogbench back into active kernel suite
- these were removed from regression ages ago, and only recently put back in
marginal. they seem fine. - 03:47 AM Revision 000fec3b (ceph): move all kernel tests to kernel suite; symlink collections from regression
- Make regression a union of other topical suites.
Also available in: Atom