Activity
From 09/24/2012 to 10/23/2012
10/23/2012
- 09:21 PM Revision e5106770 (ceph): vstart.sh: Use ./init-ceph instead of CEPH_BIN
- This effectively reverts faddb80c4230acad2b4a17aa6cbf0c30ae8d24a9
which prevented vstart.sh from being used in an env... - 08:11 PM Revision 1921a06f (ceph): Script that generates perl wrapper for teuthology tests
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
- 08:00 PM rbd Bug #2933: rbd: bio_pair leak in bio_chain_clone()
- I have posted a patch for review that adjusts rbd_rq_fn() so it
uses a new function, bio_chain_clone_range(). The n... - 07:56 PM Linux kernel client Bug #3385 (Resolved): krbd: running simple fsstress produces corrupt XFS file system
- The failure this was opened for was due to a bug in the
implementation of bio_chain_clone_range(), which was written... - 03:58 PM Linux kernel client Bug #3385: krbd: running simple fsstress produces corrupt XFS file system
- I think that the bio_pair leak won't be reproduced in
the current environment. The reason is that bio_split()
and ... - 12:38 PM Linux kernel client Bug #3385: krbd: running simple fsstress produces corrupt XFS file system
- This whole episode started after multiple attempts to
fix bio_chain_clone() so it wouldn't leak bio_pair
structures... - 11:21 AM Linux kernel client Bug #3385: krbd: running simple fsstress produces corrupt XFS file system
- I updated my code to reflect that bio's in a chain might
not be contiguous. It wasn't quite working, though, and
I... - 06:25 PM Revision 18731b4b (ceph): rgw_admin: do not throw error when start-date and end-date are not
- passed to usage::trim()
Signed-off-by: caleb miles <caleb.miles@inktank.com> - 05:44 PM Revision 30d11f42 (ceph): rgw: POST fixes, policy range, policy expiration
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:44 PM Revision bfc49049 (ceph): rgw: better error responses, logging for specific error cases
- Also, adjusting return values
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 05:44 PM Revision 7bb3504d (ceph): rgw: handle expiration and content length policy conditions.
- Signed-off-by: caleb miles <caleb.miles@inktank.com>
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 05:43 PM Revision 9f9bc77f (ceph): rgw: helper functions to parse multipart form
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision d6d3bf06 (ceph): rgw: handle content_type, meta
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision c2b702fa (ceph): rgw: adjustments for 100-continue
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision 81f257d5 (ceph): rgw: add a test tool for json parser
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision 5b90d10b (ceph): rgw: basic policy functionality
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision ccd757f0 (ceph): rgw: add policy decoding code
- merge in changes from commit 57668c14 by caleb
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 05:43 PM Revision 86b06f12 (ceph): json_spirit: update grammar
- Support a more relaxed grammar, where last entity in an array
or an object can have a comma trailing.
Signed-off-by:... - 05:43 PM Revision 52b78d51 (ceph): rgw: verify that request variables are in policy
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision fc05b634 (ceph): rgw: handle x-ignore- in POST request
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision 391775b7 (ceph): rgw: handle missing content length in POST
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision 846bb343 (ceph): rgw: handle policy as case insensitive where required
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision 3faf6ab5 (ceph): rgw: handle success_action_redirect
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision d7b59429 (ceph): rgw: return correct responses with POST
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:43 PM Revision ca1e1776 (ceph): rgw: implement POST key can use ${filename}
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 05:42 PM Revision 1bafe7cd (ceph): rgw: Create JSON parser
- Create JSON object and parser classes similar to the XMLObj and
RGWXMLParser based on JSON Spirit.
Signed-off-by: ca... - 05:42 PM Revision 256bd62d (ceph): rgw: Implement POST object to publicly writeable buckets.
- The S3 API supports object upload using POST requests, for browser based
uploads, the specification is described at:
... - 05:20 PM Documentation #3391: doc: add instructions on snapshot reversion
- Is this a duplicate of #2979?
- 03:43 PM Documentation #3391: doc: add instructions on snapshot reversion
- Also note that pool-wide snapshots can't be used at the same time as object-based (such as rbd) snapshots in a given ...
- 03:40 PM Documentation #3391 (Closed): doc: add instructions on snapshot reversion
- There is documentation around how to make a snapshot of a pool and remove one, but nothing on how to revert to a snap...
- 05:18 PM Documentation #3394 (Resolved): doc: create documentation for ceph-deploy
- 03:46 PM Documentation #3393 (Resolved): doc: clarify process for setting replicas
- Under Set Pool Values, it suggests that you can use "ceph osd set {pool-name} size {value}". Under Set the Number of...
- 03:43 PM Documentation #3392 (Resolved): doc: set/get pool values seems incomplete?
- The list of pool values you can get is different from the list of pool values you can set. Shouldn't they match?
... - 03:33 PM Documentation #3390 (Resolved): doc: add detail on different bucket algorithms
- There are three bucket algorithms (uniform, list, tree, straw), but they aren't explained
http://ceph.com/docs/mas... - 03:32 PM Documentation #3389 (Resolved): doc: crush docs could use a full example crushmap
- Wido suggests that this page could use a full crush map as an example:
http://ceph.com/docs/master/cluster-ops/crush... - 02:34 PM Documentation #3388 (Resolved): doc: create documentation for juju installation
- 12:42 PM rgw Bug #3381 (Resolved): rgw: processing continued after client shut down
- Fixed, commit:3cc39f558d88c87122d011cea243637c6dc10cb4.
- 12:37 PM Revision 63cbb2bd (ceph): Merge branch 'wip-assert-exists-2'
- Reviewed-by: Josh Durgin <josh.durgin@inktank.com>
- 11:23 AM devops Feature #3158 (Closed): downburst: add --wait based on cd-rom eject detection kludge
- Implemented in https://github.com/ceph/downburst/commit/481af791d02dabeb3c615e329d359bbed2deef2b
- 10:18 AM rbd Subtask #3387 (Rejected): librbd: expose changed objects since a given snapshot
- This could be used by #3272 and/or an rbd 'diff' command to show the changes between two snapshots or since a particu...
- 10:17 AM Linux kernel client Bug #3342: con_work crash on bad con pointer or mutex (kclient ffsb + thrashing)
- ooh, captured libceph logging leading up to this!
- 05:39 AM rbd Feature #3262 (Resolved): librbd: use 'assert exists' operation to guard cloned writes
- 04:04 AM Revision e609c8ac (ceph): librados: add assert_exists guard operation
- Add a guard operation for writes that asserts that the object already
exists. To avoid requiring new functionality o... - 04:04 AM Revision 4240846f (ceph): librbd: use assert_exists() to simplify copyup check
- Previously we would explicitly STAT the object to see if it exists before
sending the write to the OSD. Instead, sen... - 04:04 AM Revision 7c672309 (ceph): osd/osd_types: make stat osd_op print nicely
- No 0~0 crap.
Signed-off-by: Sage Weil <sage@inktank.com> - 03:32 AM Revision 59839a8f (ceph): librbd: validate copy size against proper snapshot id
- Fixes: #3383
Signed-off-by: Dan Mick <dan.mick@inktank.com> - 12:39 AM Revision eed28daa (ceph): osd: return EOPNOTSUPP on bad class or method name
- Currently we return EIO, which isn't particularly informative.
Signed-off-by: Sage Weil <sage@inktank.com> - 12:25 AM Revision 31260a35 (ceph): leveldb: fix accidental revert
- In b85cde576e3444b10c275526ecf43b73bd21afe5
Signed-off-by: Sage Weil <sage@inktank.com> - 12:07 AM Revision b85cde57 (ceph): rgw: dump an error message if FCGX_Accept fails
- Adding missing debug info.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
10/22/2012
- 11:52 PM Revision fc2b3ced (ceph): rgw: dump an error message if FCGX_Accept fails
- Adding missing debug info.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 11:51 PM Revision b4bf14ed (ceph): add exec task
- 10:50 PM Revision d4f0a889 (ceph): workqueue: make debug output include active threads
- Include active thread count in threadpool debug output.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:38 PM Revision d9b51b3b (ceph): workqueue: make debug output include active threads
- Include active thread count in threadpool debug output.
Signed-off-by: Sage Weil <sage@inktank.com> - 09:47 PM Revision 74ef52bc (ceph): Merge branch 'wip-msgr'
- 09:47 PM Revision 4d20b609 (ceph): msg/Pipe: fix tight reconnect loop on connect failure
- The fault() call in connect should not set onread=true since connect is
effectively a write path. This was forcing t... - 09:41 PM Revision 54cab4de (ceph): throttle: less default log noise
- This tends to drown out anything interesting in the log buffer.
Signed-off-by: Sage Weil <sage@inktank.com> - 08:37 PM Revision 852e27d3 (ceph): rgw: don't continue processing of GET request on error
- Fixes #3381
We continued processing requests long after the client
has died. This fix appliese to both s3 and swift.
... - 08:34 PM Revision 3dffa6dd (ceph): rbd: document defaults for rbd bench-write
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 08:34 PM Linux kernel client Bug #3385: krbd: running simple fsstress produces corrupt XFS file system
- > That's surprising to me that a bio might represent a discontiguous IO...
> is there someone we can bounce that the... - 08:28 PM Linux kernel client Bug #3385: krbd: running simple fsstress produces corrupt XFS file system
- I wanted to add this detail but forgot... These are the
debug statements that I thought told the story.
[10758.8... - 05:55 PM Linux kernel client Bug #3385: krbd: running simple fsstress produces corrupt XFS file system
- That's surprising to me that a bio might represent a discontiguous IO... is there someone we can bounce that theory o...
- 05:44 PM Linux kernel client Bug #3385: krbd: running simple fsstress produces corrupt XFS file system
- I think I may know what's going on, at least with my particular
fix for the bio_chain_clone(). If I'm right the pro... - 04:49 PM Linux kernel client Bug #3385: krbd: running simple fsstress produces corrupt XFS file system
- OK, I've simplified it further. The dependence on name sizes
makes me think it has to do with log blocks. We'll se... - 03:49 PM Linux kernel client Bug #3385 (Resolved): krbd: running simple fsstress produces corrupt XFS file system
- This does not occur with the current ceph-client/master branch:
35152979 rbd: activate v2 image support
Howe... - 08:33 PM rbd Bug #3383 (Resolved): rbd copy fails in the nightlies
- 08:30 PM rbd Bug #3383: rbd copy fails in the nightlies
- Ah, I was just assuming copy was old; it was changed in 62420599006691d70a1634223bd0d1a3dc10e9ee, and the new size c...
- 08:26 PM rbd Bug #3383: rbd copy fails in the nightlies
- So I understand the problem; the check for 'size is the same' was checking
the size of the source image at the reque... - 01:55 PM rbd Bug #3383: rbd copy fails in the nightlies
- More logs:
ubuntu@teuthology:/a/teuthology-2012-10-21_19:00:07-regression-master-testing-gcov/5324
ubuntu@teutholog... - 01:53 PM rbd Bug #3383 (Resolved): rbd copy fails in the nightlies
- Logs: ubuntu@teuthology:/a/teuthology-2012-10-21_19:00:07-regression-master-testing-gcov/5323...
- 08:27 PM Revision ac07afa2 (ceph): test: Dont check initial permissions
- We can't check the initial permissions of the
file because the umask may be set to something
other than 0022. The ch... - 07:51 PM Revision 84a35f80 (ceph): Makefile: include java in dist tarball
- Include all the java goodness in the dist tarball. Fixes package builds.
Signed-off-by: Sage Weil <sage@inktank.com> - 07:41 PM Revision 3cc39f55 (ceph): rgw: check client write status on swift get_obj
- Fixes: #3381
We check the return code of the cio->write() operation
when doing get_obj(). This makes sure that we don... - 07:04 PM Revision abc1fedb (ceph): Merge pull request #2 from ceph/wip-buck
- Wip buck
- 07:01 PM Revision a8f4f885 (ceph): fixing the tense of my README change
- 07:01 PM Revision 41d1257c (ceph): Edit to README.bst to note that the ssh keys needed in the targets entr...
- 06:01 PM Revision a7556747 (ceph): rgw: don't continue processing of GET request on error
- Fixes #3381
We continued processing requests long after the client has died.
backport: argonaut
Signed-off-by: Yehud... - 05:46 PM Revision f3b52542 (ceph): Merge remote-tracking branch 'gh/next'
- 05:45 PM Revision 2248822b (ceph): osd: drop conditional check in populate_obc_watchers
- Turn these into asserts. The only two callers are create_object_context()
and get_object_context(), and they only ge... - 05:45 PM Revision 4156b984 (ceph): osd: populate obc watchers even when degraded
- Bug #3142 appears to be caused by the following sequence:
- object X missing on primary and replica
- [assert-ver,... - 05:41 PM Revision a1353522 (ceph): run-cli-tests: Include rationale for cram patch and pointer to issue.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 05:15 PM Revision a7a6850d (ceph): doc: Changed rack, row text to row, rack. Fixed some syntax. Added note.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:33 PM Bug #3386 (Resolved): #7 ReplicatedPG::add_object_context_to_pg_stat (this=0x8654000, obc=0xe34...
- segfault in #7 ReplicatedPG::add_object_context_to_pg_stat (this=0x8654000, obc=0xe342000, pgstat=0x7f9a8bf97c10) a...
- 03:32 PM Revision 3d0a5224 (ceph): vstart.sh: cephx on by default, -X to disable
- Signed-off-by: Joe Buck <jbbuck@gmail.com>
- 03:24 PM Documentation #3099 (Resolved): doc: write install ceph+openstack with crowbar
- Documented and reviewed.
- 03:23 PM Bug #2947 (In Progress): osd: out of order reply
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-10-20_19:00:11-regression-master-testing-gcov/4810...
- 02:28 PM CephFS Bug #1947: mds: SIGBUS during _mark_dirty
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-10-22_00:00:20-regression-next-testing-basic/5426...
- 01:39 PM Bug #3270 (Duplicate): osd crash during rbd test run
- dup #3142
- 12:36 PM Documentation #3382: doc: create page for OS requirements, detailing compatibility for the packag...
- I was able to install Ceph .52 and mount a cfuse directory. iogen test worked fine. That's as far as I have gotten w...
- 12:14 PM Documentation #3382: doc: create page for OS requirements, detailing compatibility for the packag...
- Gary says: "We currently build centos6 and fedora17. The fedora18 build is working, but we've not pushed packages ...
- 11:59 AM Documentation #3382 (Resolved): doc: create page for OS requirements, detailing compatibility for...
- 11:29 AM rgw Bug #3365: Broken metadata (duplicated as CSV)
- Not sure exactly where the csv is coming from, may be the client library doing something. I'll need to see radosgw lo...
- 11:10 AM rgw Bug #3365: Broken metadata (duplicated as CSV)
- According to https://bugs.launchpad.net/swift/+bug/939982 , clients should not rely on casing. I guess MediaWiki can ...
- 10:55 AM rgw Bug #3365: Broken metadata (duplicated as CSV)
- I made a small logging change to our tests (https://gerrit.wikimedia.org/r/#/c/29346/1) which causes a large number o...
- 10:57 AM rgw Bug #3381 (Resolved): rgw: processing continued after client shut down
- We continue processing requests long after the client has closed the connection.
- 10:51 AM Linux kernel client Bug #3342: con_work crash on bad con pointer or mutex (kclient ffsb + thrashing)
- wip-msgr didn't help
this appears to be triggered by osd reset, which isn't exercised by the socket errors. going... - 09:42 AM Linux kernel client Bug #3342: con_work crash on bad con pointer or mutex (kclient ffsb + thrashing)
- crossing my fingers that
rbd: reset BACKOFF if unable to re-queue
will fix it
- 10:45 AM Bug #3142: osd: crash induced by fsx workload
- fix for the watcher thing merged to next branch, yay! hopefully that was the root cause for the mysterious nightly f...
- 10:25 AM Documentation #3173 (Resolved): Cephx Overview
- 10:04 AM Bug #3271 (Resolved): kernel BUG() on unmount after export/unexport of ceph using kclient
- pushed to testing branch
- 04:58 AM rbd Feature #3380 (Resolved): rbd: export and import functions should support stdout
- Currently these functions do not allow import/export.
It would be very useful if these functions were supported fo... - 04:07 AM Revision 2d20f3a8 (ceph): objecter: move map checks to helper
- This makes coverity happier because we check_op_pool_dne() may free
the Op (or Lingerop) structure(s), but the caller... - 03:58 AM Revision aae72c25 (ceph): Merge remote-tracking branch 'gh/wip-mds-coverity'
- 03:57 AM Revision da5b2447 (ceph): mds: avoid copy in SessionMap::get_or_add_session()
- CID 717032 (#1 of 1): Big parameter passed by value (PASS_BY_VALUE)
Passing parameter i of type entity_inst_t (size 1... - 03:56 AM Revision 7a3ccef8 (ceph): librbd: init layout in ImageCtx ctor
- At (6): Non-static class member field "layout.fl_stripe_unit" is not initialized in this constructor nor in any funct...
- 03:55 AM Revision 2c45d1cb (ceph): librbd: init vars in AioRequest ctor
- At (2): Non-static class member "m_object_no" is not initialized in this constructor nor in any functions that it cal...
10/21/2012
- 10:32 PM Revision d2f07cc4 (ceph): mon: pass by ref
- CID 717044: Big parameter passed by value (PASS_BY_VALUE)
Passing parameter to of type entity_inst_t (size 152 bytes)... - 10:29 PM Revision 0fedc28d (ceph): monmap: pass by ref
- CID 717039 (#1 of 1): Big parameter passed by value (PASS_BY_VALUE)
Passing parameter my_addr of type entity_addr_t (... - 07:05 PM Bug #3379 (Won't Fix): rbd map + rbd mv: couldn't remove old source object
- ceph @7477a081, linux-3.4.12
Using 'rbd mv' on a mapped object creates a "ghost" object that prevents
further use... - 06:14 PM Bug #3378 (Can't reproduce): common/HeartbeatMap.cc: 78: FAILED assert(0 == "hit suicide timeout")
- This is a cluster of 2 OSDs that is generally unhappy with life. After deleting the cephfs pools the new pool creatio...
- 04:26 PM Revision 7d9ee17e (ceph): client: release import caps we don't have
- If we don't have the inode, release the caps. There is no point in adding
it to our cache, and that is problematic a... - 04:05 PM Revision 66bda162 (ceph): auth: change default: require 'cephx' for daemons
- Daemons will require cephx.
Clients will require nothing (i.e., will be able to connect to a cluster
with auth disab... - 04:01 PM Revision ddde1c8f (ceph): Merge branch 'wip-testrados'
- Lightly-reviewed-by: Josh Durgin <josh.durgin@inktank.com>
- 03:52 PM Revision 91a2492a (ceph): mds: fix typo, build
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:35 PM Feature #3324 (Resolved): mon: coverity clean
- 02:53 PM CephFS Bug #3301 (Resolved): cfuse: chmod not getting respected
- 02:27 PM Linux kernel client Bug #3342: con_work crash on bad con pointer or mutex (kclient ffsb + thrashing)
- also reproduced on testing after 10 iterations.
- 08:45 AM Linux kernel client Bug #3342: con_work crash on bad con pointer or mutex (kclient ffsb + thrashing)
- was able to reproduce on kernel master after 7 iterations of hammer.sh.
- 02:25 PM CephFS Bug #1527 (Fix Under Review): mds: assert in handle_cache_expire
- reproduced this with a log. the problem is the preceding conditional not including the EXPORTING stage; testing the ...
- 09:25 AM CephFS Bug #3371: java: ldout after ceph_shutdown causes segfault
- 09:25 AM CephFS Feature #3368: java: add O_WRONLY open flag
- 09:24 AM CephFS Feature #3374: java: add unit tests for CephMount use after shutdown
- 09:24 AM CephFS Bug #3375: java: shutdown() doesn't clean-up if unmounted
- 09:21 AM CephFS Feature #3372: java: add finalize() for users that don't do explicit clean-up
- 09:19 AM CephFS Bug #3373: java: after shutdown() access ceph_* in JNI is not prevented
- 09:07 AM Feature #3377 (Resolved): cephx: sign messages
- 09:03 AM Feature #3215 (Resolved): qa: fix up system tests and add them to regression suite
- 08:52 AM rbd Bug #2937 (Duplicate): btrfs filesystem on rbd device kernel BUG writing large file
- 08:50 AM rbd Bug #2937: btrfs filesystem on rbd device kernel BUG writing large file
- this was a btrfs bug; Josef has a fix pending.
- 08:47 AM Feature #3376 (Duplicate): use external leveldb package for default builds
- 01:46 AM Revision 5fb8a22c (ceph): mds: make dup session close an error; make case consistent
- Signed-off-by: Sage Weil <sage@inktank.com>
10/20/2012
- 10:58 PM Revision e6cbcb24 (ceph): mds: deal with the case where you have a Session close event without a ...
- This case shouldn't ever happen, but we've seen it, so there's a bug
somewhere. Handling a Session close when the Ses... - 06:48 PM Linux kernel client Bug #3342: con_work crash on bad con pointer or mutex (kclient ffsb + thrashing)
- again on master branch, ubuntu@teuthology:/var/lib/teuthworker/archive/teuthology-2012-10-19_02:00:08-regression-test...
- 05:38 PM CephFS Bug #3375 (Won't Fix): java: shutdown() doesn't clean-up if unmounted
- shutdown() throws CephNotMountedException if CephMount is not mounted. This means that the native memory allocated by...
- 01:32 PM Bug #3142: osd: crash induced by fsx workload
- i got a log for...
- 08:14 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- 2) e.g. if `ctx->read` needs an empty list, it should throw from `ctx->read`, where the application can catch excepti...
- 08:01 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- 1) yes, some documentation in librados.hpp would be nice
2) that `ctx->read (id, bl, size, 0)` might append into `bl...
10/19/2012
- 10:40 PM Revision 5e221a40 (ceph): doc: Added clarification from Peter's feedback.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 10:40 PM Revision 3870ce2f (ceph): doc: Added backward compatibility text. Additional cleanup.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 05:42 PM Revision 50bb6596 (ceph): man: update ceph-debugpack, ceph man pages
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:41 PM Revision c18e17d2 (ceph): rbd: update man page build
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:40 PM Revision 69a96bb5 (ceph): doc: clean up doc build directions
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:33 PM Revision ebcad66e (ceph): Stopped logging keys in session authentication code.
- Signed-off-by: Peter Reiher <reiher@inktank.com>
- 05:32 PM Revision e3431b6b (ceph): Merge remote-tracking branch 'noah/wip-java-cephfs'
- 05:22 PM Revision b3cc40a3 (ceph): java: update deb bits from ceph-devel feedback
- Signed-off-by: Noah Watkins <noahwatkins@gmail.com>
- 05:09 PM CephFS Feature #3374 (Rejected): java: add unit tests for CephMount use after shutdown
- There is one unit test per function in CephMount. Pre-test setup is a new CephMount object followed by shutdown(). Ca...
- 04:59 PM Revision d2f0f895 (ceph): libcephfs: return error when not mounted
- Return an error rather than a segfault if a client uses the interface
when unmounted.
Signed-off-by: Noah Watkins <n... - 04:59 PM Revision 35043353 (ceph): java: add Java and C++ source files
- This adds all of the Java and C++ source files that make up the
libcephfs Java wrappers package.
Signed-off-by: Noah... - 04:59 PM Revision 68e01649 (ceph): automake: setup autotools to build cephfs-java
- Adds --enable-cephfs-java and --with-jdk to build
the libcephfs Java bindings and specify the default
JDK directory, ... - 04:59 PM Revision 9feb4afd (ceph): debian: add libcephfs-java package
- Creates libceph1-java package that contains
the libcephfs Java wrappers .jar file and the
JNI library.
Signed-off-by... - 04:59 PM Revision 4a0398d0 (ceph): do_autogen.sh: add -j flag to enable java stuff
- Signed-off-by: Sage Weil <sage@newdream.net>
Signed-off-by: Noah Watkins <noahwatkins@gmail.com> - 04:59 PM Revision 941ac2f9 (ceph): Makefile: add src/include to #include path for libcephfs_jni_la
- Signed-off-by: Sage Weil <sage@newdream.net>
Signed-off-by: Noah Watkins <noahwatkins@gmail.com> - 04:59 PM Revision ad3482b2 (ceph): java: add test for mount with bad root
- This adds a unit test that verifies that mounting Ceph with a
non-existent root directory throws FileNotFoundExceptio... - 04:56 PM rbd Documentation #3171 (Resolved): doc: how to setup OpenStack (Glance and Cinder|Nova) to use rbd c...
- 04:56 PM CephFS Bug #3373: java: after shutdown() access ceph_* in JNI is not prevented
- An alternative semantics which is more natural is to return CephMount to its initial state by performing a shutdown o...
- 04:28 PM CephFS Bug #3373 (Won't Fix): java: after shutdown() access ceph_* in JNI is not prevented
- When CephMount is created, a mount context is created to back it. Checks in libcephfs return errors for calls when us...
- 04:22 PM Revision 233b0bdf (ceph): test/libcephfs: Fix telldir/seekdir test
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 04:11 PM Revision cc8b9e2b (ceph): mds: use const ref instead of large pass-by-value
- CID 717033 (#1 of 1): Big parameter passed by value (PASS_BY_VALUE)
Passing parameter inst of type entity_inst_t (siz... - 04:10 PM Revision ae8aaa45 (ceph): mds: annotate switch case fall-thru
- CID 716960 (#1 of 1): Missing break in switch (MISSING_BREAK)
This case (value 1) is not terminated by a 'break' stat... - 04:09 PM Revision 667fb725 (ceph): mds: fix coverity warnings on NULL deref
- Add asserts...
At (5): Function "MDCache::get_dirfrag(dirfrag_t)" returns null (checked 33 out of 39 times). [show d... - 04:07 PM Revision 1e987eaf (ceph): mds: fix possible inode_t::get_layout_size_increment() overflow
- CID 717015 (#1 of 1): Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)
Potentially overflowing expression "this... - 04:06 PM Revision 96ff10ab (ceph): mds: init cap_reconnect_t::flock_len
- CID 717256 (#1 of 1): Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member field "capinfo.flock_l... - 04:06 PM Revision 091d16ab (ceph): mds: init in cap_reconnect_t ctor
- At (2): Non-static class member field "capinfo.cap_id" is not initialized in this constructor nor in any functions th...
- 04:04 PM Revision 46054ce6 (ceph): mds: init inode_t::dir_layout
- At (2): Non-static class member field "dir_layout.dl_dir_hash" is not initialized in this constructor nor in any func...
- 03:53 PM CephFS Feature #3372 (Closed): java: add finalize() for users that don't do explicit clean-up
- The JVM will run finalize() before GC, but is not guaranteed to ever do so. Still, it is good to do this in case user...
- 03:46 PM Revision 5f2b9b45 (ceph): osd: be quiet about watches
- Useless log noise.
Signed-off-by: Sage Weil <sage@inktank.com> - 03:37 PM CephFS Bug #3371 (Won't Fix): java: ldout after ceph_shutdown causes segfault
- #define dout_subsys ceph_subsys_javaclient
...
ceph_shutdown
ldout(cct, 10) <- blows up - 03:28 PM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- So I think there are two things here:
1) your return code check for getxattr will never pass - getxattr() returns... - 11:17 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- Modifying the "extracting" part not to reuse the bufferlist seems to workaround the problem:...
- 09:33 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- Attached is the log (with "log file = /tmp/librados.log\n debug ms = 1\n debug rados = 20" in ceph.conf).
- 09:24 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- I was thinking a log of the client side. I'm not sure if the log from an osd will be necessary. You can set the debug...
- 09:22 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- E.g. both ceph and librados are from:...
- 09:21 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- Version is the already mentioned "librados-dev 0.53-1~bpo70+1".
There are four OSD servers, all track the same Debia... - 09:17 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- Also curious what version of librados is running vs what version of ceph-osd it is talking to.
- 09:12 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- Here's the code that's causing this:...
- 09:06 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- What are you doing with librados that's causing this? A log with 'debug ms = 1' and 'debug rados = 20' would help, as...
- 05:09 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- GDB stack trace:...
- 04:14 AM Bug #3300: ceph::buffer::end_of_buffer isn't caught
- Same problem with @librados-dev 0.53-1~bpo70+1@.
- 03:25 PM CephFS Bug #3370 (Resolved): All nfsd hung trying to lock page(s) on export of kclient ceph
- Workunit bonnie hung over NFS client with retransmitted NFS read:
ubuntu 2667 2572 0 Oct18 ? 00:00:00 ... - 03:13 PM CephFS Bug #3369: journaled two client session close events
- 3369-mds-session-workaround for a bypass. Not sure if we want to merge this or not since it's just a bandaid!
It's ba... - 02:05 PM CephFS Bug #3369: journaled two client session close events
- Dur, forgot the file.
- 02:05 PM CephFS Bug #3369 (Resolved): journaled two client session close events
- Unfortunately there are no logs of the event occurring, but an MDS crash on startup was reported on the mailing list....
- 01:54 PM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- I just tested a btrfs patch provided by Josef Bacik and
I no longer am hitting this problem. I will attach the
pat... - 01:50 PM CephFS Bug #3346 (Resolved): client: we broken open permissions
- 12:16 PM CephFS Feature #3368 (Closed): java: add O_WRONLY open flag
- 10:25 AM CephFS Bug #3348 (Resolved): java: use libcephfs naming rather than generic ceph
- 10:24 AM CephFS Bug #3348: java: use libcephfs naming rather than generic ceph
- Now builds packages:
* libcephfs-java
* libcephfs-jni - 10:04 AM rgw Bug #3365: Broken metadata (duplicated as CSV)
- Is that reproducible? If so, a gateway log could help (with debug ms = 1, debug rgw = 20)
- 09:36 AM CephFS Bug #3367 (Resolved): client: hardlink without original file breaks on unmount
- I'm not able to reproduce this on fuse, but with the libcephfs client, the following:
mkdir dir1
cd dir1
create ... - 09:13 AM rgw Feature #3201 (Resolved): rgw: coverity clean
- 03:14 AM Revision 0166bd06 (ceph): Merge branch 'wip-3346'
10/18/2012
- 11:43 PM Revision 86b43179 (ceph): rbd: implement bench-write command
- We may want to change the command line args around later to make this
more friendly.
Signed-off-by: Sage Weil <sage@... - 11:42 PM Revision e5e076df (ceph): Merge branch 'wip-rbd-stripe' (early part)
- Reviewed-by: Josh Durgin <josh.durgin@inktank.com>
- 11:41 PM Revision 04d32e7e (ceph): rbd: print useful error message if striping is specified for format 1
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:16 PM Revision 58e920be (ceph): client: Fix permissions checking for O_WRONLY
- O_RDONLY is 0 in glibc, so we have to assume the
flags bits are mutually exclusive, otherwise we always
request read ... - 10:15 PM Revision b19ac61a (ceph): client: Fix permissions error on open with O_CREAT
- Posix allows creating/opening a file with
open() with a mode that doesn't allow write (or read)
access but flags that... - 10:15 PM Revision 352a7e26 (ceph): test: Make the test filename unique to test
- This fixes up the chmod test to use a unique
filename to test with, and avoid clobbering of
other tests and commonly ... - 09:52 PM Revision 0571cb79 (ceph): S3 test scripts
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com
- 09:47 PM Revision f6b7b5cb (ceph): doc: minor fix on user name for GW script.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:33 PM rgw Feature #3366 (Resolved): rgw: dr: define management api
- 09:26 PM rgw Feature #1717 (Fix Under Review): rgw: support json input
- 09:13 PM Revision 43e8f760 (ceph): Cleaned up
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
- 08:25 PM Feature #3355: make Ceph build faster, take less RAM to compile
- These are good links. The low hanging fruit here seems to be precompiled headers (its hard to justify restructuring ...
- 01:14 PM Feature #3355 (New): make Ceph build faster, take less RAM to compile
- Linkdump:
http://stackoverflow.com/questions/373142/what-techniques-can-be-used-to-speed-up-c-compilation-times
htt... - 05:35 PM rgw Bug #3365 (Can't reproduce): Broken metadata (duplicated as CSV)
- I am having a problem running MediaWiki with rados+rgw. The code has worked fine with Swift for months (and in produc...
- 05:28 PM Bug #3361: don't log secrets
- I will take care of this in the morning, and will make sure nothing else of value is leaked onto the logs.
- 03:22 PM Bug #3361: don't log secrets
- there's a larger audit that needs to be done here. soon!
- 02:15 PM Bug #3361 (Resolved): don't log secrets
- ...
- 05:14 PM Bug #3270: osd crash during rbd test run
- Latest logs: ubuntu@teuthology:/a/teuthology-2012-10-17_19:00:10-regression-master-testing-gcov/3136...
- 04:44 PM rbd Feature #3239 (Resolved): librbd: make striping fancier
- 04:10 PM rgw Feature #3364 (New): rgw: cache objects
- We can cache objects, using their tags for validation.
- 03:21 PM RADOS Feature #3362 (Resolved): Warn users before allowing pools to be created with more than N*<num_os...
- 02:56 PM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- ...
- 02:52 PM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- ...
- 09:10 AM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- ...
- 08:16 AM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- Whoops, should have previewed that. Here's the same thing,
formatted as I intended.... - 08:13 AM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- I can easily reproduce this problem by doing this in my UML
environment:
rbd create image1 --size=1024
r... - 01:53 PM RADOS Feature #3360 (New): osd: Prevent primary from choosing a pg_temp that violates the crush rule sp...
- Not sure how to actually do this. There is currently no guarrantee that the primary while trolling the prior_set for...
- 01:51 PM RADOS Feature #3359 (New): Add perf counter tracking for major memory affecting structures
- We want to count:
1) number of pgs
2) total number of past_intervals
3) total number of log_entries
4) total numb... - 01:50 PM Feature #3358 (Resolved): Add pool option for min size to prevent a pg from going active with exc...
- Otherwise, the fate of a pg might end up resting on a single osd.
- 01:31 PM devops Feature #3357 (Rejected): How to revoke OSD for good?
- Use case: As an admin, a machine I had running 8 OSDs was compromised. The attacker got hold of all the secrets the O...
- 01:07 PM devops Feature #3354 (New): good default answer for how you should do monitoring, log analysis, metrics
- 01:05 PM devops Feature #3353 (Rejected): commands for moving journals
- As an admin, I want to move an OSD data disk from one physical host (chassis) to another (e.g. for maintenance of non...
- 12:58 PM devops Feature #3351: ceph-deploy: Support upgrades
- Note: beware indirectly installed packages. E.g. "ceph-deploy install" does "apt-get install ceph", that perhaps upgr...
- 12:55 PM devops Feature #3351 (Resolved): ceph-deploy: Support upgrades
- "ceph-deploy install HOST" should also do upgrade/downgrades, if that's what's needed to satisfy the --dev= etc optio...
- 12:51 PM devops Feature #3350 (Rejected): ceph-deploy: add "ceph-deploy refresh" that just pushed out changes to ...
- 10:03 AM CephFS Bug #3348 (Resolved): java: use libcephfs naming rather than generic ceph
- 09:21 AM devops Feature #3255: ceph-disk: allow prepare without activate (for spares)
- For a while I thought that a ceph.conf entry like osd_activate_on_hotplug=false would help, but that conflicts with t...
- 09:16 AM devops Feature #3347 (Resolved): ceph-deploy: allow setting ssh user
- 08:09 AM CephFS Bug #3346: client: we broken open permissions
- I didn't fully understand the (subtle) semantics of open() with O_CREAT and the mode. It expects the file to first b...
- 01:13 AM CephFS Bug #3346: client: we broken open permissions
- first two:...
- 12:50 AM CephFS Bug #3346 (Resolved): client: we broken open permissions
- ...
- 06:04 AM Revision ea42eb1f (ceph): addr_parsing: make , and ; and ' ' all delimiters
- Instead of just ,. Currently "foo.com, bar.com" will fail because of the
space after the comma. This patches fixes ... - 06:00 AM Revision b5ce39fa (ceph): Merge branch 'next'
- 06:00 AM Revision 1c382869 (ceph): addr_parsing: make , and ; and ' ' all delimiters
- Instead of just ,. Currently "foo.com, bar.com" will fail because of the
space after the comma. This patches fixes ... - 05:57 AM Revision e0b32132 (ceph): vstart.sh: log client to out/$name.log
- Signed-off-by: Sage Weil <sage@inktank.com>
10/17/2012
- 11:06 PM Bug #3135: mon_host without ports leads to failure
- 11:04 PM Bug #3145 (Resolved): ceph-mon: mon_host insists on commas, does not understand spaces
- commit:1c382869ba6aff0c159103a8267045c6eb600114
- 10:42 PM Revision 03887e04 (ceph): client: fix signed/unsigned comparison warning
- Signed-off-by: Sage Weil <sage@inktank.com>
- 08:22 PM Revision 1fc18c46 (ceph): mon: MonitorStore: fix error checks for mkdir operations
- We introduced a bug on the monitor store a couple of commits back that
would trigger a EEXIST error message when the ... - 07:00 PM Revision e8df212b (ceph): leveldb: revert accidental rewind
- In 51858b78640061cecb82ac7bab4ef99da5a92169.
Signed-off-by: Sage Weil <sage@inktank.com> - 06:59 PM Revision 85a26ad2 (ceph): client: initialize tid in MetaRequest ctor
- CID 717207 (#1 of 1): Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "tid" is not initializ... - 06:10 PM CephFS Bug #3339 (Resolved): libcephfs: failure on Dir_ls test
- test was broken.
- 10:34 AM CephFS Bug #3339 (Resolved): libcephfs: failure on Dir_ls test
- ...
- 05:50 PM Revision 9b0c88bf (ceph): client: Implement stat and correct lstat
- lstat is meant to not follow symbolic links in
the given path, whereas stat does. This adds a
stat function to Clien... - 05:50 PM Revision 39fcd7e2 (ceph): test: Add libcephfs tests for stat, lstat, chmod
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 05:50 PM Revision 809587c9 (ceph): client: Implement lchown in Client and libcephfs
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 05:50 PM Revision b4bfade1 (ceph): doc: Fix wrong wording for symlink xattrs calls
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 05:50 PM Revision c68c516f (ceph): client: Fix stat of relative symlinks
- Stat of symlinks that are relative to their location
would return -ENOENT because the symlink target is
being appende... - 05:50 PM Revision 51858b78 (ceph): test: Add libcephfs tests for stat, lstat, chmod
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 05:50 PM Revision 676db60c (ceph): test/libcephfs: Fix telldir/seekdir test
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 05:50 PM Revision 14ef1655 (ceph): client: Support for fchmod
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 05:48 PM Feature #3345 (Resolved): support multiple clusters with sysvinit
- e.g., 'service ceph start --cluster foo'.
- 04:59 PM Revision e6cecabb (ceph): Merge remote-tracking branch 'gh/mon-coverity-fixes'
- Reviewed-by: Sage Weil <sage@inktank.com>
- 04:47 PM Revision 2549bb86 (ceph): mon: MonitorStore: check return value for errors on 'open'
- CID 728083: Argument cannot be negative (NEGATIVE_RETURNS)
At (22): "dirfd" is passed to a parameter that cannot be n... - 04:47 PM Revision e41caa19 (ceph): mon: MonitorStore: check mkdir return value for errors
- CID 728081: Unchecked return value (CHECKED_RETURN)
At (5): Calling function "mkdir(dfn, 493U)" without checking retu... - 04:47 PM Revision a0f65a16 (ceph): mon: MonitorStore: check return value of 'rename' for errors
- CID 716854: Unchecked return value (CHECKED_RETURN)
At (10): Calling function "rename(tfn, fn)" without checking retu... - 04:47 PM Revision 6d7dea35 (ceph): mon: AuthMonitor: check return values
- CID 716850: Unchecked return value (CHECKED_RETURN)
At (14): Calling function "KeyServer::get_auth(EntityName const &... - 03:29 PM devops Feature #3344 (Resolved): ceph-disk-prepare?: provide some sort of tool to clear out a disk, with...
- "sgdisk --zap-all --clear" just doesn't clear out all the possible funky states a disk may be in.
A simple "dd if=... - 03:16 PM rgw Feature #3343 (Resolved): rgw: stripe objects
- By default, objects that are uploaded in a plain upload (not multipart) span over a max of two objects. That means th...
- 03:13 PM Linux kernel client Bug #3342 (Resolved): con_work crash on bad con pointer or mutex (kclient ffsb + thrashing)
- ...
- 02:41 PM Revision 0292349d (ceph): mon: LogMonitor: check return value when writing to file
- CID 716851: Unchecked return value (CHECKED_RETURN)
At (51): Calling function "ceph::buffer::list::write_fd(int) cons... - 02:31 PM Revision 47a4a7c6 (ceph): mon: Monitor: unlock before returning
- CID 716947 (#1 of 2): Missing unlock (LOCK)
CID 716947 (#2 of 2): Missing unlock (LOCK)
At (25): Returning without un... - 02:23 PM Revision 52dedc89 (ceph): mon: Monitor: fix potential null-pointer dereference
- CID 717443: Dereference after null check (FORWARD_NULL)
At (14): Passing null pointer "detailbl" to function
"ceph::b... - 01:20 PM devops Feature #3341 (Rejected): ceph-disk-activate: Make --mount the default
- Cautious route: introduce --no-mount, make --mount default, etc.
Probably good enough: remove the --mount from src... - 12:04 PM Bug #3233 (Resolved): osd: caps in master are incompatible with argonaut caps
- This was merged a couple weeks ago.
- 11:26 AM Feature #3340 (Rejected): refuse to accept "cluster=foo" in ceph.conf
- I've seen some confusion with people trying to have /etc/ceph/ceph.conf with cluster=foo inside it (as opposed to how...
- 09:20 AM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- The way things are supposed to work for bio_split() is that
any bio that will be subject to a split will have alread... - 08:55 AM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- I'm think I might know what's happening here.
Although rbd_merge_bvec() is a little odd in how it works, I
believ... - 08:21 AM Bug #2828: osd: assign_bid was allowed to mutate and return data
- this block in ReplicatedPG.cc should *also* blow away the outdata on the osd_ops:...
- 04:29 AM Revision 64bf7f9b (ceph): leveldb: update .gitignore
- Signed-off-by: Sage Weil <sage@inktank.com>
- 04:13 AM Revision bcd6aea3 (ceph): monclient: drop now-unused MonClient::is_latest_map()
- Any sensible caller probably wants to use get_version() directly.
Signed-off-by: Sage Weil <sage@inktank.com> - 04:06 AM Revision ad6840ce (ceph): Merge branch 'wip-3301'
- Reviewed-by: Sage Weil <sage@inktank.com>
- 01:26 AM Revision 328bf482 (ceph): client: Add permissions checking to open
- Users of the libcephfs api (fuse in particular)
don't check the mode against the open flags. This
commit does the pr... - 01:26 AM Revision 8ed86eea (ceph): test: Add func. test for chmod in libcephfs
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 01:25 AM Revision ee20cd02 (ceph): rbd: reject negative size (can make image that is hard to delete)
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 01:15 AM Revision b0164d99 (ceph): ceph-disk-prepare, debian/control: Support external journals.
- Previously, ceph-disk-* would only let you use a journal that was a
file inside the OSD data directory. With this, yo... - 12:52 AM Revision 935d579d (ceph): testrados_watch_notify: fix most tests, disable one
- The last test is disabled until #2339 is resolved.
Signed-off-by: Sage Weil <sage@inktank.com> - 12:52 AM Revision 8791db74 (ceph): qa: run multiprocess rados tests
- These now pass, except for the watch/notify one.
Signed-off-by: Sage Weil <sage@inktank.com> - 12:52 AM Revision ed46a85b (ceph): version: drop 'commit:' prefix on sha1
- This was only added so that crash dumps pasted into redmine would link
properly, but those links don't work in redmin... - 12:52 AM Revision dc2ec378 (ceph): objecter: fix handling for pool DNE on pgls
- Fix check for whther the pool exists for pgls. This was broken ages ago by
e0ec2865014b5ac32c7e4e4427c7d6f8681f3736.... - 12:52 AM Revision cce58a31 (ceph): objecter: refactor pool dne checks
- We need to verify that a pool really doesn't exist before erroring out. In
particular, we need to make sure it doesn'... - 12:52 AM Revision c9de24f9 (ceph): testrados_list_parallel: fix
- - don't delete the pool during the run
- ignore create error codes (may succeed for return EEXIST)
- use a unique poo... - 12:27 AM Revision 6f74e6b3 (ceph): radosgw: fix compile warning
- Signed-off-by: Sage Weil <sage@inktank.com>
10/16/2012
- 11:27 PM Revision d78ba6af (ceph): Merge branch 'next'
- 10:24 PM Revision ab4d8b75 (ceph): doc: Updated the cephx section of the toc for cluster ops.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 10:23 PM Revision 256c665e (ceph): doc: Did a little clean-up work in the cephx guide.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 10:22 PM Revision 0818e1e9 (ceph): doc: Added a new intro for cephx authentication.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:28 PM Bug #3213: PG: we do not persist missing set elements not in the log
- this is fixed now, right?
- 09:28 PM Bug #3252 (Resolved): mon: mixed mon cluster of argonaut + master eats cpu on new code
- 09:28 PM rbd Bug #3237 (Resolved): rbd_header_race failes to reproduce a race
- 09:13 PM Revision d2afddd4 (ceph): rgw: multiple coverity fixes
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 08:17 PM Revision 58020d44 (ceph): test: Add a workunit for chmod
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 08:04 PM Revision db976663 (ceph): mds: explicitly queue messages for unconnected clients
- Previously, the messenger would queue messages for a destination that
didn't exist when you were a server; that chang... - 07:25 PM Revision 5a3076fd (ceph): rgw: don't add port to url if already has one
- Fixes: #3296
Specifically, is host name string already has ':', then
don't try to append theport (swift auth).
backp... - 06:47 PM Revision 2542dd53 (ceph): client: fix implemented caps update on release/flush
- When we release caps, clear them out of implemented as well, unless we
still hold references. Otherwise implemented ... - 06:11 PM Revision b290dc3a (ceph): MClientRequest: fix mode formatting
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:42 PM Revision 2528b5ee (ceph): v0.43
- 05:02 PM Feature #3324 (In Progress): mon: coverity clean
- 01:54 PM Feature #3324 (Resolved): mon: coverity clean
- 04:57 PM Bug #2339: osd: EBUSY on object delete when watchers present
- when this is fixed, testrados_watch_notify needs to get its last test reenabled! it is currently disabled due to thi...
- 04:57 PM Feature #3215 (Fix Under Review): qa: fix up system tests and add them to regression suite
- wip-testrados
- 04:35 PM Revision 0d3a53d4 (ceph): msg/Pipe: correctly read from peers without MSG_AUTH
- Read the old footer format if the feature isn't present on the
connection.
Signed-off-by: Sage Weil <sage@inktank.com> - 04:20 PM CephFS Feature #3338 (Resolved): java: add unit tests for link/unlink/readlink/symlink
- 04:14 PM CephFS Bug #3337 (Rejected): java: unit tests don't remove container directory after a failure
- Java unit tests construct a container directory in which lots of temporary files are created and destroyed. The conta...
- 04:05 PM Revision 318bd192 (ceph): Merge remote-tracking branch 'gh/wip-fedora18' into next
- 03:55 PM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- Just adding a little debug notes for my own reference.
Here is a dump of the bio involved in a crash using the bas... - 01:45 PM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- After poking around with kdb this afternoon I have narrowed it down to
bio_split() being called with something other... - 10:37 AM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- Reproduced it using stock kernel v3.6.1 (which was what was
reported used by tziOm). - 09:44 AM Linux kernel client Bug #3291 (In Progress): rbd: BUG in bio from rbd_rq_fn
- Additional notes on the configuration that reproduced this:
- 4 OSD's, 3 monitors, (1 MDS)
- 1 GB RBD image
- 03:54 PM Documentation #3173: Cephx Overview
- Added a new section with help from Peter Reiher. There is some additional compatibility information that may be added...
- 03:45 PM Feature #3336 (Closed): java: create teuthology task for running unit test suite
- We'd like to integrate the Java unit tests into the normal set of automated tests.
- 02:56 PM CephFS Documentation #3335 (Rejected): doc: Explain kernel dynamic printk debugging
- Under doc/dev/
http://thread.gmane.org/gmane.comp.file-systems.ceph.devel/1809/focus=1810 - 02:55 PM Documentation #3334 (Duplicate): doc: Explain how to choose journal size, when does the journal g...
- http://thread.gmane.org/gmane.comp.file-systems.ceph.devel/5210/focus=5269
- 02:51 PM Documentation #3333 (Resolved): doc: Explain "degraded" more
- Especially how an OSD can be "active" for a PG but still not have all the objects, and how that can be monitored.
... - 02:48 PM rbd Documentation #3332 (Resolved): doc: Explain how qemu rbd caching defaults come from qemu config
- http://thread.gmane.org/gmane.comp.file-systems.ceph.devel/7227/focus=7228
- 02:45 PM Documentation #3331 (Resolved): doc: Where is my data placed?
- ..this is often useful for learning the system, and ultimately troubleshooting; caution reader that placement is not ...
- 02:42 PM Documentation #3330 (Closed): doc: How to troubleshoot unbalanced CRUSH
- http://thread.gmane.org/gmane.comp.file-systems.ceph.devel/8904
Also note little gem of "Note that the ideal situa... - 02:40 PM Documentation #3329 (Resolved): doc: What metrics should be used to set node weight
- Note: this is more about adjusting the weights dynamically than setting them once in the beginning.
http://thread.... - 02:38 PM Documentation #3328 (Closed): doc: "Designing a cluster guide" feedback, extra material
- Make sure the content from this thread is folded into the current docs:
http://thread.gmane.org/gmane.comp.file-sys... - 02:36 PM Documentation #3327 (Resolved): doc: replica size=1 can leave pg stale forever
- http://thread.gmane.org/gmane.comp.file-systems.ceph.devel/8287/focus=8292
- 02:29 PM Documentation #3326 (Closed): doc: Workaround needed to put journal on tmpfs
- tmpfs doesn't to direct_io, hence journal creation will fail, workaround is journal_dio=false.
http://thread.gmane... - 02:25 PM rbd Documentation #3325 (Closed): doc: Show qemu example with space->semicolon workaround
- http://thread.gmane.org/gmane.comp.file-systems.ceph.devel/6381/focus=6400
Also document the general convention th... - 02:10 PM rgw Bug #3297: Rados Gateway does not handle Transfer-Encoding: chunked
- Try using the following deb:
[[http://gitbuilder.ceph.com/libapache-mod-fastcgi-deb-precise-x86_64-basic/ref/maste... - 01:38 PM rgw Bug #3297: Rados Gateway does not handle Transfer-Encoding: chunked
- Some version info:
apache2 (2.2.22-1ubuntu1) precise; urgency=low
libapache-mod-fastcgi (2.4.7~0910052141-1) unstab... - 01:31 PM Feature #3323 (Resolved): When is it safe to reboot a node?
- "Something like:
- make sure losing any local mon won't break quorum
- make sure all PGs touching local osd(s) ... - 01:26 PM Documentation #3322 (Resolved): doc: Explain multi-tenant CephFS
- We end up explaining this over and over, let's write it up once.
http://thread.gmane.org/gmane.comp.file-systems.c... - 01:25 PM Documentation #3321 (Resolved): doc: Explain monitor HA better
- http://thread.gmane.org/gmane.comp.file-systems.ceph.devel/5730/focus=5789
- 01:22 PM Documentation #3320 (Resolved): doc: What persistency does Ceph guarantee
- (I'm cleaning out my notes, stumbled on this, it's a good topic we don't explain well enough.)
The explanations fr... - 01:03 PM CephFS Bug #2681 (Resolved): client: got push without mds session
- commit:db976663a50ce7ab2448c42cb0c6bfd4f58d25a5
- 12:24 PM rgw Bug #3296 (Resolved): Ceph RADOS gateway does not handle apache listening on ports other than 80
- Pushed a fix, commit:8d7c8e3b860f448426ba0220fe98f70e9b91622f.
- 10:48 AM CephFS Bug #3301: cfuse: chmod not getting respected
This time the logs are from doing the following:
root@scout:/tmp/cmnt# echo foo > foo
root@scout:/tmp/cmnt# chm...- 10:19 AM CephFS Bug #3301: cfuse: chmod not getting respected
- This log is of the client with only the following operations performed:
echo baz > baz
chmod 400 baz
chmod 644 b... - 09:56 AM CephFS Bug #3301: cfuse: chmod not getting respected
- Another issue:
chmod 400 a11
echo "foo" >> a11
< now fails correctly >
chmod 644 a11
ls -la a11
-r-------- 1 ... - 07:44 AM Feature #3319 (Resolved): java: add unit test target with check:jni,nabounds options
- Run unit tests with check:jni and check:nabounds options that perform various JNI-related sanity checks. Hopefully th...
- 07:37 AM CephFS Bug #3318 (Rejected): java: lock access to CephStat, CephStatVFS from native
- Native code needs to synchronize updates to Java structures with the runtime.
- 07:24 AM Feature #3317 (Rejected): java: add multi-threaded unit tests
- Remove @synchronized@ bkl business. Java should be using pthreads, so Ceph locking should be fine.
- 07:09 AM Feature #3316 (Rejected): java: add generated JavaDoc pages to ceph.jar
- 06:19 AM CephFS Feature #3315 (Resolved): client: Add acl support
Add acl support to the client. This will probably require a library to parse the acl extended attributes, and mods...- 06:15 AM CephFS Feature #3314 (Resolved): client: client interfaces should take a set of group ids
Right now each of the client interfaces takes only uid and gid parameters. Extend the interface to take a set of g...- 03:57 AM Revision fcf6273d (ceph): Merge remote-tracking branch 'gh/wip-msgauth4'
- 01:18 AM Revision 96e365be (ceph): radosgw-admin manpage: Fix broken quotes
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
10/15/2012
- 11:37 PM Revision d76b71ca (ceph): admin_socket: fix '0' protocol version
- Broken by 895e24d198ced83ab7fed3725f12f75e3bc97b0b.
Signed-off-by: Sage Weil <sage@inktank.com> - 11:37 PM Revision 412efc16 (ceph): admin_socket: fix '0' protocol version
- Broken by 895e24d198ced83ab7fed3725f12f75e3bc97b0b.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision d68a8062 (ceph): striper: expose method that works directrly from a map<>
- Some callers will want to call the stripe method multiple times and
accumulate IO on a single result set. Expose acc... - 10:34 PM Revision b7682c5d (ceph): librbd: use map-based stripe method to avoid fragmenting io
- If we have multiple extents to read from the parent, accumulate the
resulting IO requests on a single map of ObjectEx... - 10:34 PM Revision 79575005 (ceph): librbd: log why create failed when striping features missing
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision a43ba9ae (ceph): rbd: fix striping feature bit addition
- Add the STRIPINGV2 feature bit when striping is non-default.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision 80ebceea (ceph): filer: uninline StripedReadResult
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision 819f9391 (ceph): filer: add debug printability for striped read result stuff
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision a736cb02 (ceph): librbd: allow striping to be specified for clones
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision 059ebac6 (ceph): test_librbd_fsx: randomly vary striping on clone
- This exercises the io paths that read from the parent for client reads and
for cloning.
Signed-off-by: Sage Weil <sa... - 10:34 PM Revision b4f28292 (ceph): filer: fix add_partial_sparse_result
- Fix advancement of bl_off, and handling of case where bl has no more bytes
to consume.
Signed-off-by: Sage Weil <sag... - 10:34 PM Revision e6c98e94 (ceph): filer: more debug output
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision 17bb2c50 (ceph): osd: include buffer_extents in ObjectExtent operator<<
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision c7b5cdf8 (ceph): filer: trivial unit test
- Perhaps the presence of this file will inspire me and others to write
proper unit tests.
Signed-off-by: Sage Weil <s... - 10:34 PM Revision 5d5863c6 (ceph): librbd: rename get_size() -> get_current_size()
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision 62420599 (ceph): librbd: factor out copy from image create/open/close
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision ff304c80 (ceph): librbd: implement user-facing image to image copy
- copy2, copy_with_progress2
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision 5599eb7c (ceph): Striper: move from Filer
- Move all the static striping code from Filer to Striper.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision 113f698a (ceph): librbd: make trim_image() behave with new world striping order
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision 26601295 (ceph): librbd: make rollback use new striping accessors
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision cdb165e9 (ceph): librbd: write sync read over an extent list
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision d556eda4 (ceph): librbd: reimplement flatten in terms of child objects
- Iterate over child *objects*, and map each one to the parent extents it
represents.
Signed-off-by: Sage Weil <sage@i... - 10:34 PM Revision e9e197bc (ceph): librbd: kill legacy striping helpers
- These are replaced by ImageCtx accessors or the use of the Filer striping
helper.
Signed-off-by: Sage Weil <sage@ink... - 10:34 PM Revision 94de63a9 (ceph): librbd: kill unused get_block_osd()
- Replaced by ImageCtx::get_object_name().
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision a8042c70 (ceph): librbd: make read methods target buffers or bufferlists
- This will let us transition much of the read code to move bufferlists
around instead of copying data between buffers.... - 10:34 PM Revision b1b33248 (ceph): librbd: use bufferlist target for read_iterate()
- Save ourselves a copy for read_iterate.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision ecb040c9 (ceph): librbd: read_from_parent into a bufferlist
- This avoids a copy.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision fd8013a9 (ceph): librbd: avoid read copy for c++ api read
- Read directly into the user's bufferlist instead of copying the buffer
contents.
NOTE: this potentially exposes cach... - 10:34 PM Revision 827ad53a (ceph): filer: add optional buffer offset
- It may be that some range is being mapped that is intended for some offset
within the result buffer.
Signed-off-by: ... - 10:34 PM Revision 36a2245d (ceph): buffer: add claim_prepend()
- Steal another bufferlist's content and prepend it to our own.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision 3c2024de (ceph): filer: helper to assemble striped read results into a single result
- This is intended to replace the Objecter::_sg_read_finish() monstrosity,
and be reused by the librbd striping code.
... - 10:34 PM Revision 3d010fc4 (ceph): objecter: use StripedReadResult for scatter/gather read
- This vastly simplifies the code, and uses the more generic helper class.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision 6cd51fec (ceph): librbd: remove callback from handle_sparse_read
- We always used simple_read_cb, so put it inline.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision 08d1eb5b (ceph): filer: make tail zeroing in stripe result assembly optional
- Objecter doesn't want it, librbd will.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision 9e109e18 (ceph): filer: add sparse result into a striped read result
- Add a helper to assimilate a sparse read result into the destriper
helper class.
Signed-off-by: Sage Weil <sage@inkt... - 10:34 PM Revision 61518996 (ceph): librbd: reimplement striping
- This replaces most of the existing striping code with use of the Filer
striping helper methods and a more general cep... - 10:34 PM Revision e114cbff (ceph): librbd/ImageCtx: accessors
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision 3ae9f572 (ceph): librbd: make read_iterate iterate over periods
- Object sizes no longer make sense since we are iterating over the logical
device image space, and the striping may ma... - 10:34 PM Revision 0aeedf65 (ceph): librbd: generate format_string in ImageCtx
- Prebuild the format string on image load so that it is handy at all times.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision d6501dbe (ceph): librbd: allow striping to be specified on image creation
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision 81432062 (ceph): rbd: allow striping to be specified on image creation
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision e0b4638e (ceph): cls_rbd: fix snap key filtering
- Ignore any omap keys that don't begin with "snap_". We got away with this
previously because it was (lexiographicall... - 10:34 PM Revision efa1bea1 (ceph): librbd: expose image striping properties
- Fix C and C++ APIs.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision 848a9421 (ceph): rbd: show striping parameters with 'info' command
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision d54ca672 (ceph): filer: generalize file_to_extents to take a format string
- Allow any format string to be used, so long as it takes a long long
unsigned.
Signed-off-by: Sage Weil <sage@inktank... - 10:34 PM Revision 79a365ac (ceph): librbd: populate struct ceph_file_layout for image
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision d7b912f5 (ceph): librbd: document create3
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision ae7271e1 (ceph): rbd: document stripe unit options on man page
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision a7f634a8 (ceph): librbd: update python bindings for striped image creation
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:34 PM Revision 058c24ff (ceph): filer: include (numeric) objectno in ObjectExtent
- This lets us map backwards, if we need to. Arguably the oid and oloc
don't belong here at all. That can come later.... - 10:34 PM Revision c3f186e6 (ceph): filer: use vector<pair<>> instead of map<> for buffer extent map
- This is less inefficient. :)
Signed-off-by: Sage Weil <sage@inktank.com> - 10:34 PM Revision c85b9016 (ceph): filer: add helper to map from object extent to file extents
- Given an extent in an object and a layout, map it back to extent(s) in the
original file.
Signed-off-by: Sage Weil <... - 10:34 PM Revision 2e403ef2 (ceph): cls_rbd: add stripe_unit, stripe_count metadata
- * add STRIPINGV2 feature
* add stripe_unit, stripe_count keys
* add accessor methods
Signed-off-by: Sage Weil <sage@... - 10:34 PM Revision 4ef9a3d2 (ceph): librbd: load striping information when opening image
- Silently tolerate an -ENOEXEC or -EINVAL (which means striping is not
present or is not supported by the osd class).
... - 09:22 PM Revision 18a3cee2 (ceph): client: avoid possible null deref
- CID 716910 (#1 of 1): Explicit null dereferenced (FORWARD_NULL)
At (6): Dereferencing null pointer "mds_session".
Si... - 09:20 PM Revision 0095a138 (ceph): client: fix shadowing in inode ctor
- CID 728080 (#1 of 1): Incorrect sizeof expression (BAD_SIZEOF)
Taking the size of pointer parameter "layout" is suspi... - 09:19 PM Revision d8bb685d (ceph): client: init readdir fields
- At (2): Non-static class member "readdir_offset" is not initialized in this constructor nor in any functions that it ...
- 09:14 PM Revision 071fdc21 (ceph): Makefile: Improve test for boost system library.
- 09:14 PM Revision 0219b66e (ceph): leveldb: fix-up submodule entry.
- 09:14 PM Revision 3ecd2891 (ceph): Makefile: update submodule reference for leveldb.
- 09:14 PM Revision 0cc828ba (ceph): Makefiles: Update submodule reference to latestes for leveldb.
- 09:14 PM Revision d28ba52b (ceph): autogen.sh: Create m4 directory for leveldb submodule.
- 09:14 PM Revision f525534b (ceph): autogen.sh: On some platforms, the m4 is created earlier.
- 09:14 PM Revision 4c134a42 (ceph): Makefiles: Add ar-lib to .gitignore.
- 09:14 PM Revision 55115642 (ceph): Makefile: Add CRYPTO_C(XX)FLAGS to librdb
- 09:14 PM Revision 3658157b (ceph): Makefile: Updates to eliminates warnings, add test for boost system lib.
- 09:14 PM Revision 151d9403 (ceph): Makefiles: ignore the m4 macro directory
- 09:14 PM Revision 7ea734c4 (ceph): Makefiles: Missing boost library should not be fatal.
- 09:14 PM Revision a1d8267c (ceph): cls_rgw: init var in ctor
- CID 727992 (#1 of 1): Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "tag_timeout" is not i... - 08:59 PM Feature #3191 (Resolved): client: coverity clean
- 08:59 PM Documentation #2996 (Resolved): doc: write install Ceph with RPMs doc
- 06:58 PM Revision ea2182b7 (ceph): fix kernel symlink for fs
- 05:54 PM rgw Feature #771 (Fix Under Review): rgw: POST
- 04:59 PM Revision 8d7c8e3b (ceph): rgw: don't add port to url if already has one
- Fixes: #3296
Specifically, is host name string already has ':', then
don't try to append theport (swift auth).
backp... - 04:34 PM Revision 662c69e5 (ceph): ceph-disk-prepare, debian/control: Support external journals.
- Previously, ceph-disk-* would only let you use a journal that was a
file inside the OSD data directory. With this, yo... - 02:16 PM Feature #3235 (Resolved): doc: procedure for collecting data from failed node/whatever
- 02:15 PM Feature #3167 (Resolved): auth: separate read/write capabilities for classes
- 02:14 PM Feature #3193 (Resolved): cls: coverity clean
- 01:35 PM devops Feature #3119 (Duplicate): chef: support destroying an osd
- Duplicate of #2939
- 01:34 PM devops Feature #2939: chef: Write up how cluster shrinking should work
- Moving content from duplicate #3119:
DH cookbooks do this by setting a node attribute that maps osd.id -> desired ... - 01:27 PM devops Documentation #2976 (Closed): doc: update chef doc to git clone with http, not ssh
- 01:22 PM Bug #3287: OSD dies when using zfs
- Clean new unused zfs filesystems are mounted at /data/osd.N, /data is in the root ext4 filesystem. The ceph filesyste...
- 01:16 PM rbd Feature #3100 (In Progress): rbd-fuse prototype
- 12:39 PM devops Feature #3313 (Resolved): ceph-deploy: some way to initialize GPT on SSD storing multiple journals?
- 12:39 PM devops Feature #2398: chef: external osd journal support
- ceph-disk-prepare now has external journal support, much of this doesn't have to live in the cookbook.
If admin wa... - 11:25 AM devops Feature #3312 (Resolved): ceph-deploy: pushy uses pickle, that's a security problem
- That means "ceph-deploy osd myhost:sdb" could allow myhost to attack the admin workstation. Deserializing pickles fro...
- 11:25 AM devops Feature #3311: ceph-deploy: pushy bug triggers on interpreter shutdown
- Probably a threading bug inside the pushy library, perhaps in a __del__ method. At the time it triggers, all actions ...
- 11:24 AM devops Feature #3311 (Resolved): ceph-deploy: pushy bug triggers on interpreter shutdown
- 11:19 AM devops Feature #3310 (Resolved): ceph-deploy: handle stderr from commands better
- Currently, we use pushy (http://pypi.python.org/pypi/pushy/ ) for RPC-over-SSH to the target node, and don't really d...
- 11:18 AM devops Feature #3019: juju: modernize ceph charm, mon & osd bootstrap
- James Page from Canonical has been making nice progress with this.
- 10:50 AM Feature #3305 (Closed): have way of separating auth keys per host
- It would be nice to separate hosts from each other.. myapp on host1 is not the same as myapp on host2, even if both r...
- 10:45 AM devops Feature #3304 (Resolved): ceph-deploy: add "ceph-deploy client HOST", that adds ceph.conf and cli...
- 10:32 AM devops Feature #3303: ceph-deploy: support external journals
- Using ceph-disk-prepare external journal support from #3078, #3079, support
ceph-deploy osd HOST:DATADISK[:JOURN... - 10:30 AM devops Feature #3303 (Resolved): ceph-deploy: support external journals
- 10:29 AM devops Feature #3082 (Closed): ceph-deploy: Support deployments without a framework like Chef, Puppet, J...
- http://github.com/ceph/ceph-deploy is plenty good enough to serve as a base for further tickets.
- 09:55 AM CephFS Bug #3301: cfuse: chmod not getting respected
- yeah, apparently fuse isn't doing the check itself... :/ we should enforce this in Client::_open(), methinks. after...
- 07:17 AM CephFS Bug #3301 (Resolved): cfuse: chmod not getting respected
- echo "foo" > foo
chmod 400 foo
echo "bar" >> foo
Should fail with EPERM, but it succeeds.
Attached is a clien... - 09:54 AM devops Feature #3302: ceph-disk: activate-journal, and matching udev rule
- Summary: try starting the OSD again when the journal disk appears.
Currently, osd data disk add is seen in /etc/in... - 09:47 AM devops Feature #3302 (Resolved): ceph-disk: activate-journal, and matching udev rule
- 09:42 AM devops Feature #3078 (Resolved): support journal in 2nd partition on same disk as osd
- In master as commit 662c69e525fe8c88c65e8d5c597e29634ea3d521, pushed to branch for-stable-ext-journal as commit 68fe1...
- 09:42 AM devops Feature #3079 (Resolved): support journal on any accessible block device
- In master as commit 662c69e525fe8c88c65e8d5c597e29634ea3d521, pushed to branch for-stable-ext-journal as commit 68fe1...
- 04:44 AM rgw Bug #3294: Ceph S3 API test
- I have figured it out that the error is due to lacking lib???when I try to compile the ceph,I forget the "--with-rado...
10/14/2012
- 11:10 AM Bug #3300 (Resolved): ceph::buffer::end_of_buffer isn't caught
- A program using librados terminates with the following uncaught exception:...
- 05:34 AM Revision 4db12511 (ceph): logrotate: fix bash syntax
- Introduced by 32a6394be0725b4742ebe87d7537b98c7025e4f6.
Signed-off-by: Chris Dunlop <chris@onthe.net.au> - 03:13 AM Revision 251649cd (ceph): doc: remove cephfs warning
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:12 AM Revision 168bd10e (ceph): doc: fix file system recs
- - drop xattr warning; this is not an issue with the leveldb stuff.
- the ext3 vs xattr discussion was somewhat inaccu...
10/13/2012
- 11:17 PM Bug #3284 (Resolved): logrotate script broken
- thanks, applied this (with your signed-off-by; assuming that's ok).
- 09:17 PM Feature #1720 (Duplicate): qa: rpm autobuilders
- 09:16 PM Feature #2807 (Resolved): RPM git-builder
- 07:39 PM Revision d123e318 (ceph): msg/Pipe: avoid duplicated code to randomize out_seq
- Use helper.
Fix whitespace.
Signed-off-by: Sage Weil <sage@inktank.com> - 07:39 PM Revision e0bc5556 (ceph): cephx: simplify signature and check code
- Signed-off-by: Sage Weil <sage@inktank.com>
- 08:14 AM rgw Documentation #3299 (Closed): rgw: docs should be clearer about fastcgi module
- Docs don't really mention where to get the fastcgi module. Also, the fastcgi should also mention that it fixes chunke...
- 08:13 AM rgw Bug #3297: Rados Gateway does not handle Transfer-Encoding: chunked
- Yeah, looking at the docs now I can't find a concrete reference to the fastcgi module. So the issue is that the fastc...
10/12/2012
- 09:23 PM rgw Bug #3294: Ceph S3 API test
- Yehuda Sadeh wrote:
> Is there anything on the radosgw/apache logs?
Absolutely?there is nothing wrong reported ... - 10:50 AM rgw Bug #3294: Ceph S3 API test
- Is there anything on the radosgw/apache logs?
- 06:31 AM rgw Bug #3294 (Rejected): Ceph S3 API test
- hello,everyone...
nowadays i try to test Ceph s3 API. I have configure the ceph to run and can use it's POSIX API
a... - 09:03 PM Revision 389fac7a (ceph): rgw: replace bucket creation with explicit pool creation
- Following a recent cleanup, usage should create a pool and
not a bucket.
Signed-off-by: Yehuda Sadeh <yehuda@inktank... - 08:12 PM rgw Bug #3297: Rados Gateway does not handle Transfer-Encoding: chunked
- Yehuda Sadeh wrote:
> What version are you using? It actually is supported, but it might be that your fastcgi module... - 04:55 PM rgw Bug #3297: Rados Gateway does not handle Transfer-Encoding: chunked
- What version are you using? It actually is supported, but it might be that your fastcgi module swallows it. What fast...
- 03:39 PM rgw Bug #3297 (Rejected): Rados Gateway does not handle Transfer-Encoding: chunked
- You can test this using curl & bash to PUT and object using Transfer-Encoding: chunked and thus no Content-Length hea...
- 03:55 PM Bug #3287: OSD dies when using zfs
- For reference, osd.0 is failing with this backtrace:...
- 03:37 PM rgw Bug #3296 (Resolved): Ceph RADOS gateway does not handle apache listening on ports other than 80
- See http://ceph.com/docs/master/radosgw/config/
Anything other than <VirtualHost *:80> is broken. You will be able... - 09:50 AM Bug #3285 (Closed): rbd map w/ cephx
- Cool, glad that fixed it. Probably the best way to get the solution indexed is to email ceph-devel. The list archives...
- 09:18 AM rbd Bug #2937: btrfs filesystem on rbd device kernel BUG writing large file
- Possibly related: http://tracker.newdream.net/issues/3291
- 09:18 AM Linux kernel client Bug #3291: rbd: BUG in bio from rbd_rq_fn
- This may be a duplicate of http://tracker.newdream.net/issues/2937
and even if not, it's probably related. - 08:39 AM devops Feature #3295 (Rejected): UML: configure boot image for Ubuntu
- I'm not sure how to classify or assign this.
I use UML a lot for efficient development of the kernel code. This
... - 12:30 AM Bug #3286: librbd, kvm, async io hang
- FYI, 8 rounds of the full size=4g test passed without a hitch.
10/11/2012
- 07:39 PM Bug #3286: librbd, kvm, async io hang
- Attached, output of:...
- 06:26 PM Bug #3286: librbd, kvm, async io hang
- Thanks for investigating so much. It certainly sounds like the issue is with the cache. Could you get a log with debu...
- 05:41 PM Bug #3286: librbd, kvm, async io hang
- Reducing the amount of data fio is testing with produces different behaviour. The default is size=4g. Below about siz...
- 03:01 PM Bug #3286: librbd, kvm, async io hang
- Err, I read that second part backwards - the hanging case is skipping the page cache, so an strace of the fio in the ...
- 02:54 PM Bug #3286: librbd, kvm, async io hang
- So we'll need to dig deeper to figure out exactly what is hanging. There's a couple general possibilities - a deadloc...
- 07:19 PM Revision 5c5feaec (ceph): Merge branch 'wip-fix-getdents'
- 06:41 PM Bug #3285: rbd map w/ cephx
- Aha! That did it, thanks.
After installing cbc.ko (already had aes):... - 05:44 PM Bug #3285: rbd map w/ cephx
- The only path I'm seeing that could lead to that error is if the kernel wasn't compiled with support for "cbc(aes)" w...
- 03:57 PM Bug #3285: rbd map w/ cephx
- Augh. Sorry, I should have noticed that before:...
- 02:37 PM Bug #3285: rbd map w/ cephx
- After you the map fails, is there anything added to dmesg?
- 04:32 PM rgw Bug #2527: RGW may return 409 Conflict when deleting a bucket
- Recent log: ubuntu@teuthology:/a/teuthology-2012-10-10_02:00:02-regression-testing-master-basic/5604
- 04:29 PM Bug #3275: Monitors unable to recover after network line card replacement
- Their cluster is currently running:
ceph version 0.48.1argonaut-9-g657ca11 (commit:657ca118a7658617b9117311d9ee1cb... - 04:20 PM Bug #3292: osd crash in handle_osd_ping
- Logs: ubuntu@teuthology:/a/teuthology-2012-10-10_00:00:05-regression-next-testing-basic/5460...
- 04:14 PM Bug #3292 (Resolved): osd crash in handle_osd_ping
- Logs:ubuntu@teuthology:/a/teuthology-2012-10-10_00:00:05-regression-next-testing-basic/5458
2012-10-10 01:54:05.66... - 02:07 PM Linux kernel client Bug #3291 (Resolved): rbd: BUG in bio from rbd_rq_fn
- From #ceph, with linux 3.6.1:...
- 01:47 PM Bug #3290 (Resolved): libceph: unable to handle osdmap
- tziOm on IRC reported getting this 'corrupt' osdmap in dmesg when trying to map an rbd image with vanilla linux 3.6.1...
- 01:21 PM CephFS Feature #3289 (Resolved): ceph-fuse: somehow exert pressure on the VFS to remove dentries from th...
- We think this is the cause of some ballooning caches in ceph-fuse and the MDS that have been reported. The VFS will h...
- 01:12 PM rbd Bug #2933: rbd: bio_pair leak in bio_chain_clone()
- I'm sorry I haven't been updating this. Zhao has provided
several patches that aim to solve this problem. The late... - 11:49 AM Feature #3288 (Resolved): docs: document the chooseleaf command in crush
- choose is ok, but can cause issues with the default crushmap. chooseleaf should usually be used instead.
- 11:14 AM Bug #3271: kernel BUG() on unmount after export/unexport of ceph using kclient
I've pushed code to Teuthology repo implementing Feature #3245. So now this can be reproduced using the following ...- 10:50 AM Bug #3287 (Resolved): OSD dies when using zfs
- OSD dies during startup for a new ceph fs when backed by zfs
- 02:05 AM Linux kernel client Bug #2573: libceph: many "socket closed" messages
- Hi Alex,
looking for annoying messages I got aware of this ticket... we are currently running:
Linux fcmsnode1 3.... - 01:18 AM Revision 3ca2e220 (ceph): Fix typo in README
- Signed-off-by: David Zafman <david.zafman@inktank.com>
Reviewed-by: Josh Durgin <josh.durgin@inktank.com> - 01:18 AM Revision 558590c1 (ceph): Fix ceph-fuse example
- Signed-off-by: David Zafman <david.zafman@inktank.com>
Reviewed-by: Josh Durgin <josh.durgin@inktank.com> - 01:18 AM Revision 939c3aee (ceph): New kcon_most task that enables most ceph kernel logging
- Signed-off-by: David Zafman <david.zafman@inktank.com>
Reviewed-by: Josh Durgin <josh.durgin@inktank.com> - 01:18 AM Revision cac4a6ac (ceph): New knfsd task that does an nfs server export
- Ability to specify options
By default only export to current hosts
Fixes: 3245
Signed-off-by: David Zafman <davi... - 01:18 AM Revision ce7d9973 (ceph): New nfs task that performs NFS client mount of export (see knfsd)
- Fixes: 3245
Signed-off-by: David Zafman <david.zafman@inktank.com>
Reviewed-by: Josh Durgin <josh.durgin@inktank.com> - 12:41 AM Revision 0ec45201 (ceph): rbd: don't issue usage on errors
- Change bare calls to usage() to an informative targeted error message
Remove all calls to usage() except when request...
10/10/2012
- 10:41 PM CephFS Feature #3245 (Resolved): qa: test knfsd reexport in teuthology
- 10:16 PM Revision 29bd4767 (ceph): Merge branch 'master' of https://github.com/ceph/ceph
- 10:15 PM Revision 7477a081 (ceph): doc: Added radosgw temp remove.
- fixes: #3278
Signed-off-by: John Wilkins <john.wilkins@inktank.com> - 10:14 PM Revision 041081ca (ceph): doc: Minor clean-up.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 10:13 PM Revision 94aec21f (ceph): doc: minor clean-up.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 10:00 PM Revision fc34f16a (ceph): rgw: fix compilation
- Signed-off-by: Noah Watkins <noahwatkins@gmail.com>
- 09:38 PM Revision c0f0317b (ceph): Merge branch 'master' of https://github.com/ceph/ceph
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:36 PM Revision 8069aed9 (ceph): Merge branch 'master' of https://github.com/ceph/ceph
- 09:36 PM Revision 8f07729a (ceph): Merge branch 'wip-rbd-openstack-doc'
- 09:20 PM Revision 714254cb (ceph): mon: drop command replies on paxos reset
- If paxos resets, do not send the reply for the commit we were waiting for;
let the command be reprocessed and re-prop... - 09:19 PM Revision 15775f89 (ceph): mon: drop command replies on paxos reset
- If paxos resets, do not send the reply for the commit we were waiting for;
let the command be reprocessed and re-prop... - 08:22 PM Revision 06a8d953 (ceph): doc: Editing and cleanup.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 08:20 PM Bug #3286: librbd, kvm, async io hang
- Yes, it works when using a raw image file.
- 08:14 PM Bug #3286: librbd, kvm, async io hang
- All the IOs in the log completed successfully, so I'm not sure what's causing these hangs. Does this work with the sa...
- 06:55 PM Bug #3286: librbd, kvm, async io hang
- ...
- 06:14 PM Bug #3286: librbd, kvm, async io hang
- Is your cluster entirely healthy?
If so, could you add :debug_rbd=20:debug_ms=1:log_file=/path/writeable/by/qemu.l... - 06:06 PM Bug #3286 (Resolved): librbd, kvm, async io hang
- Fio hangs in a linux-2.6.32 vm on librbd when using direct and libaio, with ceph at commit:c8721b956.
Libvirt conf... - 06:48 PM Bug #3285: rbd map w/ cephx
- self-compiled 3.4.12
- 06:28 PM Bug #3285: rbd map w/ cephx
- What kernel version are you using? That error is coming directly from the kernel rbd module.
- 06:17 PM Bug #3285: rbd map w/ cephx
- Attached output of "strace -o /tmp/trace -s 60 -f rbd map test1"
- 06:07 PM Bug #3285: rbd map w/ cephx
- Can you post the output of 'strace -f rbd map test1'?
- 05:53 PM Bug #3285: rbd map w/ cephx
- I just tested again, ensuring a complete ceph restart on all devices after setting auth cephx. The mapping failed as ...
- 05:34 PM Bug #3285: rbd map w/ cephx
- Did you perhaps add the cephx option after enabling your monitors? If you tell the client to use cephx but it's not e...
- 05:30 PM Bug #3285 (Closed): rbd map w/ cephx
- "rbd map" with "auth supported = cephx" doesn't work (using ceph at commit c8721b956):...
- 05:45 PM rbd Feature #3281 (Resolved): rbd: dont do usage on error
- 05:42 PM rbd Feature #3281: rbd: dont do usage on error
- commit:0ec45201f51b44e3d34a04e4680125cdfd1f181e
- 11:26 AM rbd Feature #3281: rbd: dont do usage on error
- 09:12 AM rbd Feature #3281 (Resolved): rbd: dont do usage on error
- 04:46 PM Revision 2e129678 (ceph): regression: update for new kernel collections
- 03:57 PM Bug #3284 (Resolved): logrotate script broken
- Commit 32a6394 introduced shell scripting errors.
The attached patch fixes these. - 03:20 PM rbd Bug #2933: rbd: bio_pair leak in bio_chain_clone()
- Assigning this to me so I can find it again.
- 03:18 PM rgw Documentation #3278 (Resolved): doc: Document the need to run "radosgw temp remove" regularly
- Added page: radosgw/purge-temp/index.html
- 07:59 AM rgw Documentation #3278: doc: Document the need to run "radosgw temp remove" regularly
- The docs should note that this is required for argonaut but not 0.52 or later.
- 02:02 PM rbd Feature #3283 (Duplicate): rbd: calc-utilization or similar
- rbd command to scan blocks comprising an image and see how many bytes it's consuming. this could be coarse (count ex...
- 12:54 PM rbd Bug #2937: btrfs filesystem on rbd device kernel BUG writing large file
- I looked at rbd_merge_bvec() this morning. I believe that,
given how it's used, it should be preventing callers fro... - 11:40 AM Bug #2683 (In Progress): ceph-fuse: crash during fsstress
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-10-06_04:00:05-regression-stable-master-basic/3157
2012-10-07T06... - 09:53 AM Linux kernel client Feature #3282 (Resolved): add new 'performance' kernel gitbuilder
- no lockdep
disable most debugging crap
no dynamic_printk (which apparently does not play well with kdb) - 02:11 AM Revision 410ebacb (ceph): test: Allow randomized tests to be repeatable
- Outputs the random number used for the Dir_ls
test and allows setting the value through an
environment variable.
Sig... - 01:35 AM Revision baf54b2e (ceph): client: Reset cache_name pos on dirp
- Reset the at_cache_name field on the directory
stream pointer for rewinddir.
This fixes a bug where getdents after re... - 12:13 AM Revision 8518115e (ceph): rbd cli tests: copy.sh was looking for old version of rbd ls -l output
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
10/09/2012
- 11:42 PM Revision 04426077 (ceph): clean up of rbd functionality script
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
- 11:40 PM Revision 73462f05 (ceph): cleaned up the perl module
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
- 11:16 PM Revision bd471696 (ceph): cleaned up the script
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
- 09:57 PM Revision 11c51dc0 (ceph): radosgw-admin: don't try to parse date if wasn't specified
- This fixes a regression following the merge of wip-admin-rest.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 09:53 PM rbd Bug #3204 (Resolved): rbd client kernel panic when osd connection is lost
- This problem has been resolved. The last thing I added
describes the commits that address it, and they're now
in t... - 08:59 PM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- There are two commits that fixed the problem--one on the read side
and one on the write side. They may require othe... - 09:52 PM rbd Bug #2937: btrfs filesystem on rbd device kernel BUG writing large file
- Also, given what I last wrote, I no longer think it's related
to the bio_chain_clone() problem mentioned earlier.
... - 09:47 PM rbd Bug #2937: btrfs filesystem on rbd device kernel BUG writing large file
- ...
- 09:22 PM Revision fe313a35 (ceph): kernel: add msgr failure facet to rbd collection
- 09:21 PM Revision bc6244af (ceph): kernel: break basic collection into rbd, kclient
- 09:13 PM Revision f268d4ef (ceph): ceph-debugpack: updates
- - avoid copying data around; tar things directly into the tgz
- 'ceph report' instead of all the little bits
- unrota... - 09:06 PM Revision 9810517d (ceph): doc: separate config from I/O in openstack diagram
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 08:53 PM Revision 4ebe8c26 (ceph): doc: clarify rbd openstack docs
- * give upstart example
* restart all relevant services
* explain OpenStack terminology more
Signed-off-by: Josh Durg... - 08:38 PM Revision dd462ce3 (ceph): configure.ac: Typo in human-readable description.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 08:38 PM Revision 8fab9729 (ceph): gitignore: Update to match packaging changes and additions, rest-bench ...
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 08:36 PM Revision 7ef0df25 (ceph): mon: Monitor: resolve keyring option to a file before loading keyring
- Otherwise our keyring default location, or any other similarly formatted
location, will be taken as the actual locati... - 06:27 PM CephFS Feature #3245 (Fix Under Review): qa: test knfsd reexport in teuthology
- Pushed to the wip-nfs-dzafman branch of the teuthology repo.
- 01:36 PM CephFS Feature #3245 (In Progress): qa: test knfsd reexport in teuthology
- 06:24 PM rbd Feature #3280 (Resolved): fsx: test flatten when cloning
- Periodically flatten some clones during a run. At the end of the run each clone could be flattened after being verifi...
- 05:35 PM Revision 4eabe57d (ceph): doc: simplify wording for rbd-openstack config
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 04:43 PM Revision e3529cf9 (ceph): Merge remote-tracking branch 'gh/wip-gtest-libcephfs'
- Reviewed-by: Sage Weil <sage@inktank.com>
- 03:33 PM Revision b83d38a1 (ceph): doc: Add doxygen style documentation for libcephfs
- As well as doxygen doc, we document a few parts of
the interface that are otherwise undocumented and
don't match the ... - 03:33 PM Revision 9da5b537 (ceph): test: Refactored testceph.cc into gtest framework
- Moved all the functionality tests for the libcephfs
API into the gtest framework. Also adds tests for
directories to... - 02:42 PM rbd Feature #3205: doc: pool permissions for cloning use-case
- 02:40 PM rbd Documentation #2992: doc: RBD parent/child snapshot
- 02:17 PM Revision a00a2406 (ceph): test: Allow readdir test to be repeated
- Use test dir/files that include the pid to avoid
hitting errors when running the same test twice.
Signed-off-by: Sam... - 02:17 PM Revision 3b5b9ef9 (ceph): libcephfs: Check that buffer is non-null
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 02:00 PM devops Feature #2548 (Resolved): ceph-disk-activate: take mount options from ceph.conf
- In stable as commit 4aa13c6d228b9256870e02a57496f00a75e17349.
In master as commit ab84949da204da4a94473f353b4b0f3c... - 01:59 PM devops Feature #2549 (Resolved): ceph-disk-prepare: take fstype, mkfs and mount options from ceph.conf
- In stable as commits cf2e3b15cea99cc100169e7a67103676d8990aee and da86e4e43676ceaf0b39635954489c297de88025.
In mas... - 01:37 PM Bug #3279 (Resolved): mon/caps: cap comparison in get-or-create is based on a string literal
- If you run ceph auth get-or-create and your caps string differs by a space, then it returns an error:...
- 01:36 PM CephFS Feature #3242 (In Progress): samba: push plugin upstream
- 01:35 PM Bug #3276 (Resolved): auth: keyring comma-separated locations not being parsed
- 08:29 AM Bug #3276 (Fix Under Review): auth: keyring comma-separated locations not being parsed
- Fix on branch 'mon-3276-fix' commit '760ad6adf576b72a483d6c161e48c2738bc0ea08'
- 08:25 AM Bug #3276 (Resolved): auth: keyring comma-separated locations not being parsed
- The default keyring location is a set of comma-separated files.
The KeyRing class will try to open a single file s... - 12:55 PM Bug #2563: leveldb corruption
- Just got another report of this on the list.
This user has enabled btrfs' lzo compression, and I believe btrfs compr... - 12:12 PM Documentation #3264 (Resolved): docs: put osd and client usage restrictions in quick-start docs
- 10:06 AM rgw Documentation #3278 (Resolved): doc: Document the need to run "radosgw temp remove" regularly
- 09:57 AM CephFS Feature #3248 (Resolved): libcephfs: move testceph.cc tests into gtest framework
- 09:10 AM CephFS Feature #3248 (Fix Under Review): libcephfs: move testceph.cc tests into gtest framework
- The wip-gtest-libcephfs branch contains the libcephfs tests now part of the gtest framework
- 09:37 AM devops Feature #3277 (Rejected): chef: support multiple clusters on same nodes ("ceph" vs other)
- 09:13 AM CephFS Bug #2285 (Resolved): libcephfs: failure with empty name components
- Fix merged to master
- 05:44 AM Bug #3275: Monitors unable to recover after network line card replacement
- On which version was this triggered on?
- 04:02 AM Revision d9e981f4 (ceph): Merge remote-tracking branch 'gh/for-stable-fstypes-and-ext-journal' in...
- 03:56 AM Revision e5de8810 (ceph): Merge remote-tracking branch 'gh/wip-client-stale'
- Reviewed-by: Sage Weil <sage@inktank.com>
- 03:55 AM Revision 323a52ee (ceph): mds: Fix removexattr ENODATA error
- If a client sets an xattr and then attempts to remove in a short
time window, the xattr may not have been committed t... - 03:50 AM Revision 629cad59 (ceph): osdmap: fix null deref in dump
- CID 731938 (#1 of 1): Dereference after null check (FORWARD_NULL)
At (15): Passing null pointer "f" to function "ceph... - 03:49 AM Revision 0406d0c5 (ceph): osdmap: fix osdmap dump null check
- CID 731939 (#1 of 1): Dereference after null check (FORWARD_NULL)
At (5): Passing null pointer "out" to function "std... - 03:48 AM Revision 5129620a (ceph): mds: note fall-thru to please coverity
- CID 731940 (#1 of 1): Missing break in switch (MISSING_BREAK)
This case (value 23) is not terminated by a 'break' sta... - 03:47 AM Revision d68985fd (ceph): test_cfuse_cache_invalidate: check for errors
- CID 731941 (#1 of 2): Argument cannot be negative (NEGATIVE_RETURNS)
At (6): "fd" is passed to a parameter that canno... - 03:44 AM Revision 75bed108 (ceph): mon/Elector: fix leak on monmap from peer
- CID 731942 (#1 of 1): Resource leak (RESOURCE_LEAK)
At (12): Variable "peermap" going out of scope leaks the storage ... - 03:44 AM Revision 1a28cceb (ceph): test_cfuse_cache_invalidate: zero buffer
- CID 731943 (#1 of 1): Uninitialized scalar variable (UNINIT)
At (5): Using uninitialized element of array "buf" when ... - 03:33 AM Revision 97c2f196 (ceph): FileJournal: ignore osd journal size for block devices
- Using part of a block device doesn't make much sense. This makes the
common case, where you partition a disk to act a...
10/08/2012
- 11:34 PM Revision df1d17fc (ceph): rgw: switch perm to uint32_t
- Should fix a warning.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 11:14 PM Revision f4a0b2d9 (ceph): rgw: flexible attr fields
- Fixes: #3114
Instead of having a few hard coded attrs that are
special cased, make it more generic. This allows suppo... - 10:44 PM Revision d4725c06 (ceph): rgw: get bucket logging stub
- Trivial implementation that just returns that
bucket logging is not enabled.
Fixes: #3225
Signed-off-by: Yehuda Sad... - 10:42 PM Revision c0b53706 (ceph): rgw: check_disk_state also updates other object metadata
- When we do a check_disk_state() on an object that is not complete,
we need to also update etag, content_type, owner, ... - 10:23 PM Revision 7ebab4a0 (ceph): Merge branch 'wip-rgw-coverity2'
- 10:15 PM Revision acb30539 (ceph): rgw: set null termination explicitly
- Make sure that string is null terminated.
Fixes coverity issue.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:15 PM Revision 8731d0d1 (ceph): cls_rgw: return returned ret code
- Wasn't setting the ret code. A coverity issue.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:14 PM Revision 58ad3bf3 (ceph): rgw: add missing parantheses
- .. around logic operations at process_intent_log().
Another coverity fix.
Signed-off-by: Yehuda Sadeh <yehuda@inktan... - 10:12 PM Revision b13a36c0 (ceph): rgw: check NULL before dereference
- Another coverity fix.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:12 PM Revision 148ba6e5 (ceph): rgw-admin: pass object by reference
- Large object should be passed by reference (coverity fix).
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:12 PM Revision 091bf455 (ceph): rgw: fix leaks in certain error paths
- Fixes a few coverity issues
Conflicts:
src/rgw/rgw_rados.cc
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:11 PM Revision ce948751 (ceph): rgw: fix (im)possible leak
- Fixes coverity issue
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:11 PM Revision 79b15a26 (ceph): rgw: catch possible exception
- Fix coverity issue 717168.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:11 PM Revision 5dbda139 (ceph): rgw: initialize member variables at req_state
- Fixes more coverity issues
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:11 PM Revision 5a615f18 (ceph): rgw: initialize data members
- Fixes a few coverity issues.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:10 PM Revision ddb1bb0d (ceph): rgw: RGWObjState() initialize memebers
- Initialize members at constructor. Fixes coverity issues.
Conflicts:
src/rgw/rgw_rados.h
Signed-off-by: Yehuda Sad... - 10:09 PM Revision 7eb366c7 (ceph): rgw: initialize members at RGWRados()
- fixes coverity issues
Conflicts:
src/rgw/rgw_rados.h
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:08 PM Revision d16e25f4 (ceph): cls_rgw: check pointer before dereferencing
- Fixes coverity issue 719577
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:08 PM Revision 7ab3d2a2 (ceph): rgw: multiple coverity fixes of uninitialized fields
- Fields were not initialized explicitly by constractor.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:08 PM Revision b5ed23d1 (ceph): rgw: trivial fix
- fix coverity issue 728052
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:07 PM Revision e042d6be (ceph): rgw: change size_t to ssize_t for string.rfind() result
- fixes coverity bug 728053
string.rfind() may return negative value, switch to ssize_t instead
of size_t.
Signed-off... - 10:07 PM Revision d2159bf0 (ceph): rgw: fix resource leak
- coverity bug 728055
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 10:00 PM Revision e233dffa (ceph): Revert "admin/build-doc: Use installed Sphinx and its dependencies, whe...
- This reverts commit c65ffe9f7f27bc0fe5afab36e9ef0de42bc3c74c.
oneiric, where the doc gitbuilder runs, doesn't have t... - 09:30 PM Revision a780d47f (ceph): Merge branch 'wip-admin-rest'
- Conflicts:
doc/radosgw/index.rst
src/rgw/rgw_admin.cc
src/rgw/rgw_main.cc
src/rgw/rgw_op.cc
src/rgw/rgw_op.h
sr... - 07:01 PM Bug #3270: osd crash during rbd test run
- 06:59 PM Bug #3270: osd crash during rbd test run
- Caught another instance of something similar; attached is the coredump and ceph-osd binary
- 02:28 PM Bug #3270: osd crash during rbd test run
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-10-06_00:00:05-regression-next-testing-basic/2901
0> 2012-1... - 06:27 PM Revision 3091b5f5 (ceph): rgw: virtual bucket affects resource lookup
- Removed special casing of virtual bucket handling
and just prepending it to the URI. So now virtual
bucket also affec... - 06:27 PM Revision 0344c6b1 (ceph): rgw: document admin, usage api
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 06:25 PM Revision 511e639e (ceph): rgw: configurable set of enabled apis
- We can now specify which set of apis the gateway supports. Also,
passed resource should not start with a slash, we pr... - 06:25 PM Revision 3d1dee2b (ceph): rgw: abort_early should initialize formatter if needed
- The formatter might not have been initialized, as we
abort early (e.g., when protocol handler wasn't found)
so we nee... - 06:25 PM Revision cb1fdb9e (ceph): rgw: fix chunked object PUT for small objects
- We didn't update buffer size according to read data.
Also, didn't update the total obj_size (was doing it only
for th... - 06:24 PM Revision d22aa6c9 (ceph): rgw: add user caps
- User info now holds caps map, which contains a mapping between
a freestyle cap name string to permissions bitfield (r... - 06:20 PM Revision d8223fa5 (ceph): rgw: usage trim
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 06:20 PM Revision ed04755a (ceph): rgw: usage show accepts more params
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 06:12 PM Revision 42d873e9 (ceph): rgw: different formatters for different services
- Use json formatter by default for new usage stuff. Also
make it configurable.
We use the JSON formatter for the swif... - 06:12 PM Revision 2b6a27d3 (ceph): rgw: add a flusher to handle output data, simplify client api
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 06:06 PM Revision fca6d3b9 (ceph): rgw: REST resources init uses configurables
- Also, move it to main().
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 06:06 PM Revision 02f78705 (ceph): rgw: add rest-usage handler
- Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
- 06:06 PM Revision cecd7afa (ceph): Formatter: fix XML formatter
- XML formatter wasn't clearing stream string buffer
when completing the section.
Signed-off-by: Yehuda Sadeh <yehuda@... - 06:06 PM Revision cea28f8c (ceph): rgw: refactor protocol stacking
- New RESTMgr* classes to handle a specific uri entry
point. Actions are handled by RGWHandler*.
Changing init order, ... - 05:57 PM Revision e153bcee (ceph): rgw: start moving usage management functions
- Move usage management functionality to its own place.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 05:57 PM Revision b71b8b09 (ceph): rgw: sed 's/_REST/_ObjStore/g' *
- It's all REST, we want to add new non objstore handling,
so let's differentiate by the actual type.
Signed-off-by: Y... - 05:57 PM Revision 85f137d2 (ceph): rgw: tie callbacks in different handlers directly to REST
- Don't translate RESTful operations into a more meaningful
callback name. The handlers themselves should do that
trans... - 05:57 PM Revision a9c9f96b (ceph): rgw: hide fcgi details from client code
- client code (rgw_rest* et al) does not need to see the
fcgi library details.
Signed-off-by: Yehuda Sadeh <yehuda@ink... - 05:48 PM Revision c038c3f6 (ceph): doc: Added admonishments to use separate host for clients.
- fixes: 3264
Signed-off-by: John Wilkins <john.wilkins@inktank.com> - 05:00 PM Bug #3275: Monitors unable to recover after network line card replacement
- I'm contacting Kyle about the log and will upload a copy to this bug as soon as I get it.
- 04:59 PM Bug #3275 (Can't reproduce): Monitors unable to recover after network line card replacement
- Roughly around the time that several line cards were replaced the ceph monitors stopped working and were not able to ...
- 04:15 PM rgw Feature #3274 (Resolved): rgw: RESTful admin api for user admin
- Design and implement RESTful admin api.
- 04:13 PM rgw Feature #3114 (Resolved): rgw: support cache-control header field
- Done, commit:f4a0b2d9260a4523745875e3977a8a1ef9dc5e2e.
- 03:58 PM Revision fa66eaa1 (ceph): mds: Reset session stale timer at end of open
- The mds gets an open session request and immediately sets the session
stale timer. If logging the session and sendin... - 03:45 PM rgw Feature #3225 (Resolved): rgw: stub for get bucket logging
- Done, commit:d4725c06ab8fb965b2979a381340d3edbb1ed10d.
- 03:44 PM rgw Bug #3234 (Resolved): rgw: missing content-type, etag when listing bucket on some objects
- 03:44 PM rgw Bug #3234: rgw: missing content-type, etag when listing bucket on some objects
- Fixed merged to master, commit:c0b537063dda9c2069b280a9d54d2259ff0d62e0.
- 03:34 PM Feature #3273 (Need More Info): mon: simple dm-crypt key management
- ability to (easily, painlessly) slip dm-crypt underneath ceph-osd file systems.
use monitor or separate keyserver ... - 02:54 PM rgw Feature #3216 (Resolved): rgw: RESTful usage api
- Merged at commit:a780d47fbbd8fcb81397ab14e28066fd322e3b12
- 02:16 PM Bug #3041: ceph manager down during osd recovery
- ubuntu@teuthology:/a/teuthology-2012-10-06_00:00:05-regression-next-testing-basic/2831
- 10:36 AM Documentation #3264 (In Progress): docs: put osd and client usage restrictions in quick-start docs
- 10:32 AM rbd Subtask #3272 (Rejected): send/receive rbd snapshots
- It would be great to be able to send and receive incremental RBD snapshots as is done in zfs.
zfs send -i snap1 .....
10/07/2012
- 08:56 PM Revision 5d84b4a2 (ceph): ceph-authtool: Fix usage, it's --print-key not --print.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
10/06/2012
- 12:33 AM Revision d9482124 (ceph): Printing the number of tests passed when 'all' tests are successful
- Signed-off-by: tamil <tamil.muthamizhan@inktank.com>
10/05/2012
- 11:49 PM Revision 6a0979dc (ceph): radsogw-admin: bump up logging
- debug ms = 1
debug objclass = 20
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 11:21 PM Revision c8721b95 (ceph): Merge branch 'wip-osd-caps'
- Conflicts:
src/osd/OSDCap.cc
src/test/osd/osdcap.cc
Reviewed-by: Sage Weil <sage.weil@inktank.com> - 10:43 PM Revision da86e4e4 (ceph): ceph-disk-prepare: Allow setting mkfs arguments and mount options in ce...
- Tested with meaningless but easy-to-verify values:
[global]
osd_fs_type = xfs
osd_fs_mkfs_arguments_xfs = -i s... - 10:43 PM Revision ce5e1f8d (ceph): ceph-disk-activate: Unmount on errors (if it did the mount).
- This cleans up the error handling to not leave disks mounted
in /var/lib/ceph/tmp/mnt.* when something fails, e.g. wh... - 10:43 PM Revision b684ab1d (ceph): ceph-disk-activate: Refactor to extract detect_fstype call.
- This allows us to use the fstype for a config lookup.
Signed-off-by: Tommi Virtanen <tv@inktank.com> - 10:43 PM Revision 4aa13c6d (ceph): ceph-disk-activate: Use mount options from ceph.conf
- Always uses default cluster name ("ceph") for now, see
http://tracker.newdream.net/issues/3253
Closes: #2548
Signed-... - 10:43 PM Revision 03cec77e (ceph): ceph-disk-activate: Add a comment about user_xattr being default now.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 10:43 PM Revision a6229b90 (ceph): ceph-disk-prepare: Avoid triggering activate before prepare is done.
- Earlier testing never saw this, but now a mount of a disk triggers a
udev blockdev-added event, causing ceph-disk-act... - 10:43 PM Revision 4c3997dc (ceph): ceph-disk-{prepare,activate}: Default mkfs arguments and mount options.
- The values for the settings were copied from teuthology task "ceph".
Signed-off-by: Tommi Virtanen <tv@inktank.com> - 10:43 PM Revision fa3aa41e (ceph): debian/control, ceph-disk-prepare: Depend on xfsprogs, use xfs by default.
- Ext4 as a default is a bad choice, as we don't perform enough QA with
it. To use XFS as the default for ceph-disk-pre... - 10:43 PM Revision 86546d7d (ceph): ceph-disk-prepare: Use the OSD uuid as the partition GUID.
- This will make locating the right data partition for a given journal
partition a lot easier.
Signed-off-by: Tommi Vi... - 10:43 PM Revision f65daf3f (ceph): osd: Make --get-journal-fsid not attempt aio or direct_io.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 10:43 PM Revision d9dfa2d1 (ceph): osd: Make --get-journal-fsid not really start the osd.
- This way, it won't need -i ID and it won't access the osd_data_dir.
That makes it useful for locating the right osd t... - 10:43 PM Revision 13b448b8 (ceph): upstart: OSD journal can be a symlink; if it's dangling, don't start.
- This lets a $osd_data/journal symlink point to
/dev/disk/by-partuuid/UUID and the osd will not attempt to start until... - 10:43 PM Revision cf2e3b15 (ceph): ceph-disk-prepare: Allow specifying fs type to use.
- Either use ceph.conf variable osd_fs_type or command line option
--fs-type=
Default is still ext4, as currently noth... - 10:41 PM Revision d94e4217 (ceph): ceph-disk-activate: Unmount on errors (if it did the mount).
- This cleans up the error handling to not leave disks mounted
in /var/lib/ceph/tmp/mnt.* when something fails, e.g. wh... - 10:41 PM Revision 8eeebe86 (ceph): ceph-disk-activate: Refactor to extract detect_fstype call.
- This allows us to use the fstype for a config lookup.
Signed-off-by: Tommi Virtanen <tv@inktank.com> - 10:41 PM Revision ab84949d (ceph): ceph-disk-activate: Use mount options from ceph.conf
- Always uses default cluster name ("ceph") for now, see
http://tracker.newdream.net/issues/3253
Closes: #2548
Signed-... - 10:41 PM Revision 79320ff4 (ceph): ceph-disk-activate: Add a comment about user_xattr being default now.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 10:41 PM Revision b40b2d6c (ceph): ceph-disk-prepare: Avoid triggering activate before prepare is done.
- Earlier testing never saw this, but now a mount of a disk triggers a
udev blockdev-added event, causing ceph-disk-act... - 10:41 PM Revision 2e9afc21 (ceph): ceph-disk-{prepare,activate}: Default mkfs arguments and mount options.
- The values for the settings were copied from teuthology task "ceph".
Signed-off-by: Tommi Virtanen <tv@inktank.com> - 10:41 PM Revision d6b065ce (ceph): debian/control, ceph-disk-prepare: Depend on xfsprogs, use xfs by default.
- Ext4 as a default is a bad choice, as we don't perform enough QA with
it. To use XFS as the default for ceph-disk-pre... - 10:41 PM Revision 88fc8b78 (ceph): ceph-disk-prepare: Use the OSD uuid as the partition GUID.
- This will make locating the right data partition for a given journal
partition a lot easier.
Signed-off-by: Tommi Vi... - 10:41 PM Revision 435a5c14 (ceph): osd: Make --get-journal-fsid not attempt aio or direct_io.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 10:41 PM Revision 8d718caf (ceph): osd: Make --get-journal-fsid not really start the osd.
- This way, it won't need -i ID and it won't access the osd_data_dir.
That makes it useful for locating the right osd t... - 10:41 PM Revision 48fc340c (ceph): upstart: OSD journal can be a symlink; if it's dangling, don't start.
- This lets a $osd_data/journal symlink point to
/dev/disk/by-partuuid/UUID and the osd will not attempt to start until... - 10:41 PM Revision 0b934e19 (ceph): ceph-disk-prepare: Allow specifying fs type to use.
- Either use ceph.conf variable osd_fs_type or command line option
--fs-type=
Default is still ext4, as currently noth... - 10:41 PM Revision a146f053 (ceph): ceph-disk-prepare: Allow setting mkfs arguments and mount options in ce...
- Tested with meaningless but easy-to-verify values:
[global]
osd_fs_type = xfs
osd_fs_mkfs_arguments_xfs = -i s... - 09:57 PM Revision 075c321a (ceph): rbd: ls -l format tweaks:
- Add PROT and LOCK columns, for protection status and presence of any
locks of type "excl" or "shr" (lock list for the... - 09:56 PM Revision 8a484be5 (ceph): rbd: Make lock list adapt 'number' of msg (1 lock, 2 locks)
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
Reviewed-by: Josh Durgin <josh.durgin@inktank.com> - 09:56 PM Revision 19147c00 (ceph): rbd: set_conf_param() rewhack:
- 1) comment set_conf_param and the loop that uses it
2) put back error checking for "called with full param list" in m... - 09:56 PM Revision 88ea0271 (ceph): Add si_t type for large-number "just the suffix, no space"
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
Reviewed-by: Josh Durgin <josh.durgin@inktank.com> - 09:48 PM Revision 18d1580d (ceph): doc: clarify osd journal as a block device
- Someone on IRC was confused by this and thought it had to be a file.
Signed-off-by: Josh Durgin <josh.durgin@inktank... - 09:12 PM Revision 082746d6 (ceph): client: Fix assert when stale arrives before open
- The client sends an open session request to the mds, which may not
get a chance to reply before the mds timer times o... - 06:15 PM Bug #3271: kernel BUG() on unmount after export/unexport of ceph using kclient
By default our kernels don't drop into kdb. Here is the logging before and after the BUG() after executing ceph/sr...- 03:37 PM Bug #3271 (Resolved): kernel BUG() on unmount after export/unexport of ceph using kclient
- plana78:
$ sudo exportfs '*:/tmp/cephtest/mnt.1' -o fsid=1234,rw,no_root_squash
NFS client
$ sudo mount plana78:... - 06:10 PM Revision 0405a443 (ceph): ceph-disk-activate, upstart: Use "initctl emit" to start OSDs.
- This avoids an error if the daemon was running already, and is
already being done with the other services.
Signed-of... - 06:09 PM Revision 4302f12a (ceph): ceph-create-keys: Create a bootstrap-osd key too.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 06:09 PM Revision 1f3a50a5 (ceph): ceph-create-keys: Refactor to share wait_for_quorum call.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 03:54 PM Revision a53a4a21 (ceph): client: Don't keep sending SESSION_REQUEST_OPEN
- This fixes a bug where the client keeps resending session open requests
to the target mds because the waiting_for_ses... - 02:01 PM Bug #3061: osd crash during shutdown
- Recent logs: ubuntu@teuthology:/a/teuthology-2012-09-30_19:00:06-regression-master-testing-gcov/33616
- 01:56 PM Bug #3209: rbd_fsx_cache_writethrough test failure in the nightlies
- Logs: ubuntu@teuthology:/a/teuthology-2012-09-30_19:00:06-regression-master-testing-gcov/33620
- 08:20 AM CephFS Bug #3267: Multiple active MDSes stall when listing freshly created files
- Greg Farnum wrote:
> I'll try and take a look at this, but multi-MDS setups are known to be pretty unstable at this ... - 04:14 AM Revision 2d6953a4 (ceph): Revert "rbd: gracefully handle extra arguments"
- Insufficient understanding of fragile algorithm. This needs more
thought and I don't want the parsing broken as it i... - 01:36 AM Revision 20496b8d (ceph): OSD: separate class caps from normal read/write
- This properly accounts for multi-op requests. Use MOSDOp->rmw_flags for
internal caps requirements, leaving MOSDOp->f... - 01:08 AM Revision 0d488793 (ceph): rbd: gracefully handle extra arguments
- Instead of looping across all args, with increments inside the loop,
which can run off the end of the vector, demand ... - 12:04 AM Revision 37ffb278 (ceph): qa scripts: Replace cut -f 1 with awk '{print $1;}'
- This is to handle TextTable output, which doesn't use tabs
Signed-off-by: Dan Mick <dan.mick@inktank.com>
Reviewed-b... - 12:01 AM Revision aed3612f (ceph): MOSDBoot: fix compatibility with ~argonaut
- I revved this message and forgot to set the compat version correctly,
preventing post-change (e.g., bobtail) OSDs fro...
10/04/2012
- 11:50 PM Revision f1ad4192 (ceph): qa: report success if race is not detected
- This test still verifies that the race is handled correctly if it
occurs, but will no longer clutter test results wit... - 11:20 PM Revision bed55369 (ceph): rbd: Use TextTable for showmapped and lock list
- Also update ocf/rbd.in to handle new output form (spaces)
Signed-off-by: Dan Mick <dan.mick@inktank.com>
Reviewed-by... - 11:16 PM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- Hi Alex,
Since kernel 3.6 was releases a few days ago (https://lkml.org/lkml/2012/9/30/152) , what would be ... - 10:45 PM Revision c1093292 (ceph): librbd: simplify math
- Bending over backwards hasn't made coverity happy. We'll just ignore it
there.
Signed-off-by: Sage Weil <sage@inkta... - 10:20 PM Revision 9889d819 (ceph): librbd: fix error handling in get_parent_info
- Return ENOENT if no parent.
Return error if pool reverse lookup fails.
Signed-off-by: Dan Mick <dan.mick@inktank.com... - 10:20 PM Revision fb88683c (ceph): Add TextTable class for table output
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
Reviewed-by: Josh Durgin <josh.durgin@inktank.com> - 10:20 PM Revision 61b2e4d6 (ceph): rbd: use TextTable to implement ls -l
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
Reviewed-by: Josh Durgin <josh.durgin@inktank.com> - 09:54 PM Revision 2411ba69 (ceph): rbd.py: Docstring syntax.
- It's meth for referring to Python class methods:
http://sphinx.pocoo.org/domains.html#python-roles
The links to form... - 09:54 PM Revision 36f16984 (ceph): rbd.py: Fix docstring syntax of list_lockers().
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 09:54 PM Revision 790b5089 (ceph): doc: rst syntax fixes.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 09:54 PM Revision 3ba7ab2b (ceph): doc: Whitespace cleanup.
- Signed-off-by: Tommi Virtanen <tv@inktank.com>
- 09:53 PM Revision c65ffe9f (ceph): admin/build-doc: Use installed Sphinx and its dependencies, when possible.
- This avoids the delay of installing Sphinx inside the virtualenv;
especially, compiling lxml is slow.
If Sphinx is n... - 05:11 PM rbd Feature #2788 (Resolved): rbd: add -l to rbd ls, show snapshots
- 05:08 PM Revision ad97bbb0 (ceph): Merge remote-tracking branch 'gh/next'
- 05:05 PM Bug #3209: rbd_fsx_cache_writethrough test failure in the nightlies
- ...
- 05:04 PM Bug #3209: rbd_fsx_cache_writethrough test failure in the nightlies
- recent logs:ubuntu@teuthology:/a/teuthology-2012-10-01_19:00:09-regression-master-testing-gcov/212
- 04:36 PM Revision d5c3c476 (ceph): mon: Elector: clean ack set on election start
- We should never consider old 'acks' from monitors on a new election. We
usually do it, but we didn't if an election e... - 04:36 PM Revision 35f5effa (ceph): mon: Elector: bootstrap on new monmap from elector
- Whenever we update the monmap we should bootstrap, in order to reset the
monitor's on-going activities and re-probe.
... - 04:29 PM Bug #3270 (Duplicate): osd crash during rbd test run
- Logs: ubuntu@teuthology:/a/teuthology-2012-10-03_19:00:11-regression-master-testing-gcov/1570...
- 04:11 PM Revision a6ba95fe (ceph): mon: dump formatted crushmap on report
- Signed-off-by: Joao Eduardo Luis <joao.luis@inktank.com>
- 02:46 PM Bug #3269 (Closed): nightly failure-kclient_workunit_suites_fsstress
- Logs: ubuntu@teuthology:/a/teuthology-2012-10-03_19:00:11-regression-master-testing-gcov/1453...
- 02:26 PM Bug #3268 (Rejected): osd: localize reads handling is incorrect
- Found by code inspection when changing the way MOSDOp->rmw_flags is populated.
The only place that checks for CEPH_O... - 01:03 PM CephFS Bug #3267: Multiple active MDSes stall when listing freshly created files
- I'll try and take a look at this, but multi-MDS setups are known to be pretty unstable at this point. Have you tried ...
- 11:54 AM CephFS Bug #3267 (Closed): Multiple active MDSes stall when listing freshly created files
- The output from ceph-debugpack can be found at the following location: [[http://cumulonim.biz/mds.tar.gz]] We were ru...
- 10:52 AM CephFS Bug #3266 (Resolved): "ceph mds tell 0 dumpcache /etc/passwd" is not cool
- This might have plenty of security implications.
- 10:43 AM rgw Feature #771 (In Progress): rgw: POST
- 10:33 AM CephFS Feature #3245: qa: test knfsd reexport in teuthology
- * knfsd.py task to export an existing client
* nfs.py task to mount another client
so you can do something like
... - 10:21 AM rgw Tasks #3265: test Amanda against RGW
- http://pastebin.com/L005BSQ7
- 09:58 AM rgw Tasks #3265: test Amanda against RGW
- ...
- 09:51 AM rgw Tasks #3265 (Closed): test Amanda against RGW
- There were reports in irc that Amanda Backup causes problems with RGW. We should test it against a gateway and see if...
- 09:48 AM Documentation #3264: docs: put osd and client usage restrictions in quick-start docs
- Tommi Virtanen wrote:
> ... because of #3076
- 09:47 AM Documentation #3264: docs: put osd and client usage restrictions in quick-start docs
- ... because of http://tracker.newdream.net/issues/3076
- 09:45 AM Documentation #3264 (Resolved): docs: put osd and client usage restrictions in quick-start docs
- Users following the quick-start guide might naturally try to reduce the number of machines they're using and use a ke...
- 09:22 AM Feature #3263 (Resolved): mon: 'mon report' needs to include crush map
- commit a6ba95fec06778ad12705fc081c83ebe3ddddbfd on master
- 08:25 AM Feature #3263 (Resolved): mon: 'mon report' needs to include crush map
- 04:45 AM Bug #3252: mon: mixed mon cluster of argonaut + master eats cpu on new code
- Looked like this was caused by a couple of lingering bugs on mon/Elector.cc.
One would not clean up the list of mo...
10/03/2012
- 11:24 PM Revision 36efcb55 (ceph): mon: do not tick() until all paxos instances recover
- We cannot propose until they all recover.
Fixes: #3260
Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Joao... - 07:57 PM Linux kernel client Bug #2754 (Resolved): cephfs show_location produces kernel "divide error: 0000 [#1]" when run aga...
- A suite of tests including these fixes completed without
error. As I said, I did not specifically test this
proble... - 07:53 PM Linux kernel client Bug #3112 (Resolved): ceph 32 bit kernel client issue with file size more than 4GB.
- Sage ran a test using the current testing branch, which
includes this fix. The tests he ran completed without
erro... - 05:43 PM Revision db7c4193 (ceph): Merge branch 'wip-mds'
- 05:04 PM rbd Feature #3262 (Resolved): librbd: use 'assert exists' operation to guard cloned writes
- 04:56 PM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- I wonder if there's any chance this also affects http://tracker.newdream.net/issues/2937 ?
- 04:45 PM rbd Feature #2788 (In Progress): rbd: add -l to rbd ls, show snapshots
- 04:38 PM Revision 68fbbea2 (ceph): ceph-fuse: Test for fuse cache issue (#2215)
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 04:38 PM Revision 847728e5 (ceph): client: Remove unnecessary checkafter parameter
- The logic in put_cap_ref doesn't do anything but inode->put_cap_ref
if cap is set to CEPH_CAP_FILE_CACHE, so checkaft... - 04:38 PM Revision fec19121 (ceph): client: Fix #2215 with cache inval in thread
- The client currently deadlocks with kernel buffer cache invalidation
enabled, due to the client lock calling the inva... - 04:24 PM Bug #3260 (Resolved): ceph monitor crashed : In function 'void PaxosService::propose_pending()
- 02:48 PM Bug #3260 (Resolved): ceph monitor crashed : In function 'void PaxosService::propose_pending()
- Logs: /a/teuthology-2012-10-02_19:00:06-regression-master-testing-gcov/731...
- 04:12 PM Revision 2de56705 (ceph): mds: make migrate_stray() specify full path
- The handle_client_rename() check expects a full path rooted in the MDSDIR.
Do so in migrate_stray().
Also, use the c... - 03:57 PM CephFS Bug #3261: mds crashes in EMetaBlob::replay
- aww. i had debug ms = 20 in my ceph.conf. sorry.
the new one is attached - 03:49 PM CephFS Bug #3261 (Need More Info): mds crashes in EMetaBlob::replay
- can you put 'debug mds = 20' in the ceph.conf, restart ceph-mds, and then attach the resulting log (assuming it crash...
- 03:46 PM CephFS Bug #3261 (Rejected): mds crashes in EMetaBlob::replay
- while testing cephfs using the debian wheezy packages on a fairly large volume (2TB) i ran into random unreproduceabl...
- 03:44 PM Revision 74ea0cb5 (ceph): doc: update release-process.rst
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:23 PM Revision 9cabbb26 (ceph): mds: fix stray reintegration check in handle_client_rename
- The stray reintegration generates a source path that will be rooted in a
(possibly remote) MDS's MDSDIR; adjust this ... - 12:59 PM devops Feature #3259 (Rejected): ceph-disk-prepare: don't re-prepare a disk if it has the right partitio...
- 12:53 PM devops Feature #3258 (Rejected): ceph-disk-prepare: give pretty error if sgdisk not found
- 12:53 PM devops Feature #3257 (Rejected): ceph-disk-prepare: give pretty error if mkfs.$foo not found
- 12:52 PM devops Feature #3256 (Resolved): ceph-disk-prepare: abort if target disk has any partition mounted
- 10:47 AM Feature #3192 (Resolved): osd: coverity clean
- 10:47 AM Feature #3194 (Resolved): common: coverity clean
- 09:14 AM devops Feature #3255: ceph-disk: allow prepare without activate (for spares)
- This is enough to trigger hotplug:
sudo sgdisk --typecode=1:4fbd7e29-9d25-41b8-afd0-062c0ceff05d /dev/vdb
That'... - 09:12 AM devops Feature #3255 (Resolved): ceph-disk: allow prepare without activate (for spares)
- 08:07 AM Bug #3252: mon: mixed mon cluster of argonaut + master eats cpu on new code
- it could be that in the burnupi environment one of the clients only has one of the mon addresses in its config, and i...
- 08:03 AM Bug #3252: mon: mixed mon cluster of argonaut + master eats cpu on new code
- Not sure how we reach this state, but with the debug levels cranked up, the leader (say, mon.a), shows the following ...
- 07:33 AM Bug #3252: mon: mixed mon cluster of argonaut + master eats cpu on new code
- Was finally able to reproduce it. The trick mainly relies on not specifying the cluster's monmap during --mkfs.
St... - 03:03 AM Bug #3252: mon: mixed mon cluster of argonaut + master eats cpu on new code
- This hasn't been verified while running all three monitors on the same machine with the default configuration generat...
- 06:41 AM Revision 2519bd39 (ceph): doc: Added description of ceph release process.
- 05:09 AM CephFS Bug #3254 (Resolved): mds: Replica inode's parent snaprealms are not open
- When an inode with snaprealm get replicated, its parent snaprealms are not open on the dest MDS. This is problematic ...
10/02/2012
- 11:06 PM Revision 01bfe559 (ceph): Merge branch 'wip-msgr' into next
- 11:04 PM Revision 67a201d6 (ceph): Avoid sign-extension of non-magic Message* values
- Cast to (unsigned long) when checking for magic values, so
real ptrs don't get sign-extended. Avoids triggering
asse... - 10:43 PM Revision 9362f726 (ceph): doc: add rbd example to ceph-authtool man page
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 10:43 PM Revision fcc987b8 (ceph): release: note possible osd caps incompatibilities
- We can use this file to store release notes for the next release.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 10:43 PM Revision 135c85a4 (ceph): OSDCap: add separate caps for class read and class write
- These are useful for rbd layering, since reading an rbd image
requires read-only class methods.
Fixes: #3167
Signed-... - 10:43 PM Revision 13ba5ec5 (ceph): objclass: require each class method to have a flag set
- The osd depends on this to set the client op flags for class call ops.
Signed-off-by: Josh Durgin <josh.durgin@inkta... - 10:43 PM Revision 7ea8f16e (ceph): doc: update ceph-authtool man page for new osd caps
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 10:43 PM Revision 2e366ea8 (ceph): OSD: deprecate CLS_METHOD_PUBLIC flag
- Remove all existing usage, but leave the definition so third-party
class plugins don't break.
The public flag let *a... - 10:40 PM Revision bf333d8e (ceph): OSDCap: allow runs of spaces anywhere
- I couldn't find a way to do this with skip parsers,
so these are explicitly included in the grammar.
Signed-off-by: ... - 07:33 PM Revision 9e8f69a0 (ceph): qa: try to reproduce a race more times
- This was failing occassionally in the nightly runs.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 06:26 PM Revision 56735232 (ceph): mds: Properly re-calculate mdsdir inode's auth bit
- Signed-off-by: Yan, Zheng <zheng.z.yan@intel.com>
- 06:26 PM Revision e8df6a74 (ceph): mds: Avoid creating unnecessary snaprealm
- When moving directory between snaprealms, we can avoid creating snaprealm
if the directory doesn't has its own snapre... - 06:26 PM Revision 60b93a71 (ceph): mds: Trim non auth subtree directory
- Trim non auth subtree directory if all its dentries were trimmed
and it's not bound of auth subtree.
Signed-off-by: ... - 06:24 PM Revision d2861d9a (ceph): mds: Properly update dirty dir fragstat during log replay
- Dirty dir fragstat is managed by filelock instead of nestlock.
Signed-off-by: Yan, Zheng <zheng.z.yan@intel.com> - 06:24 PM Revision f8110cb0 (ceph): mds: Allow export subtrees in other MDS' stray directory
- Stray migration is implemented by rename, it may create auth subtrees
in other MDS' stray directory.
Signed-off-by: ... - 06:23 PM Revision 1cc28d58 (ceph): mds: Avoid save unnecessary parent snaprealm
- We can avoid save parent snaprealm if current_parent_since is greater
than parent snaprealm's newest sequence.
Signe... - 06:23 PM Revision 824e593b (ceph): mds: Set metablob.renamed_dirino in do_rename_rollback()
- Signed-off-by: Yan, Zheng <zheng.z.yan@intel.com>
- 06:22 PM Revision 35dc2218 (ceph): mds: Fix xlock imports
- Xlock imports and capability imports are uncorrelated, we should call
xlock_import() even there is no capability impo... - 06:22 PM Revision bc1e52ff (ceph): mds: Allow rename request for stray migration/reintegration
- Allow rename request to modify system directory if it is for stray
migration/reintegration.
Signed-off-by: Yan, Zhen... - 06:22 PM Revision c6c6de5d (ceph): mds: Add finish callback to waiting_for_base_ino wait queue
- Signed-off-by: Yan, Zheng <zheng.z.yan@intel.com>
- 06:22 PM Revision 7004829c (ceph): mds: Consider stopping MDS when finding peer inode
- To migrate strays, the receiving MDS need find stopping MDS' mdsdir
Signed-off-by: Yan, Zheng <zheng.z.yan@intel.com> - 06:22 PM Revision b8aeb767 (ceph): mds: Don't drop client request from MDS
- MDS may send client request for stray migration/reintegration.
Signed-off-by: Yan, Zheng <zheng.z.yan@intel.com> - 06:00 PM Revision 60a5d78e (ceph): doc: first draft of full OpenStack integration
- Includes glance, cinder, and nova config with cloning.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 05:42 PM Revision 13b841c7 (ceph): osdmap, mon: optional dump 'osd tree' in json
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:42 PM Revision e2f6ae03 (ceph): filejournal: check lseek() return value on darwin
- Signed-off-by: Sage Weil <sage@inktank.com>
- 05:05 PM Revision f868718e (ceph): rbd: reduce fsx runtimes
- These go way slower now that they are doing the cloning stuff.
- 04:48 PM Bug #3253 (Won't Fix): ceph-disk-activate: support clusters not named "ceph"
- When activating an osd data disk, read mount options from ceph.conf, mount the disk, read the cluster uuid, find the ...
- 04:27 PM Revision 14de7a53 (ceph): client: Resolves coverity NULL dereference issue
- Client::insert_trace() was handling readdir and lssnap replies
assuming that the directory inode was not null. This ... - 04:27 PM Messengers Bug #3251 (Resolved): 32-bit Debian: ceph dies in assert(inq == &local_queue)
- commit:67a201d64b5b4f1a8effd677dd932680144265d6
- 03:00 PM Messengers Bug #3251 (Resolved): 32-bit Debian: ceph dies in assert(inq == &local_queue)
- 32-bit installation was breaking (while testing with ./vstart.sh, in the ceph
tool itself) with an assert failure on... - 03:48 PM Linux kernel client Bug #3112: ceph 32 bit kernel client issue with file size more than 4GB.
- Reviewed, committed. Waiting for a test run to complete
before marking this one resolved. - 08:48 AM Linux kernel client Bug #3112: ceph 32 bit kernel client issue with file size more than 4GB.
- Patch to fix this is out for review.
- 08:18 AM Linux kernel client Bug #3112: ceph 32 bit kernel client issue with file size more than 4GB.
- (Note--the problem writing files from the 32-bit environment has
been resolved. More info here: http://tracker.newd... - 03:33 PM Bug #3252 (Resolved): mon: mixed mon cluster of argonaut + master eats cpu on new code
- 3 mon cluster, 2 running argonaut, one upgraded to current next. the new one eats cpu and spams log with...
- 11:23 AM Bug #3250 (Resolved): debs don't include Contents-<arch>.gz
- We're building the debs without Contents-<arch>.gz; this breaks at least
apt-file (which caches package contents for... - 11:09 AM Feature #3249 (New): Efficient access in distributed data centers
- As I understand it, in Ceph one can cluster storage nodes, but otherwise every node is essentially identical.
This... - 08:47 AM Linux kernel client Bug #3187 (Resolved): ceph fs: crash/hang on 32-bit architecture
- This has been resolved. The problem was exactly the thing I pointed out.
The fix is upstream now:
5ce765a5 ... - 05:49 AM CephFS Feature #3248 (In Progress): libcephfs: move testceph.cc tests into gtest framework
- 05:39 AM Linux kernel client Bug #2754: cephfs show_location produces kernel "divide error: 0000 [#1]" when run against a dire...
- Reviewed, just waiting for a nightly test to complete before
marking this resolved. I did NOT explicitly test the f... - 04:08 AM Revision d250bb85 (ceph): libcephfs: destroy cmount on ceph_shutdown()
- Otherwise this chunk of the heap is leaked.
Signed-off-by: Sage Weil <sage@inktank.com> - 04:02 AM Revision 965ab908 (ceph): filestore: check ioctl SYNC return code
- CID 716860: Unchecked return value (CHECKED_RETURN)
At (22): Calling function "ioctl(int, unsigned long, ...)" withou... - 12:17 AM Revision 7c9dc932 (ceph): radosgw-admin: usage should time out after 20 minutes
- Not 45 seconds.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
10/01/2012
- 10:41 PM Revision 8237f686 (ceph): obj_bencher: fix leak in error path
- CID 717076: Resource leak (RESOURCE_LEAK)At (26): Variable "newContents" going
out of scope leaks the storage it poin... - 10:27 PM Revision 709ff145 (ceph): PG: assert auth is not end in _compare_scrubmaps
- This should make coverity happy.
Signed-off-by: Samuel Just <sam.just@inktank.com> - 10:23 PM Revision 7ca754be (ceph): FileStore: copy paste error _do_copy_range
- CID 728419: Copy-paste error (COPY_PASTE_ERROR)At (2): "srcoff" in "actual !=
(int64_t)srcoff" looks like a copy-past... - 09:53 PM Revision 106dc66f (ceph): doc: Removed languages from librados in tech-specific stack diagrams.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:51 PM CephFS Feature #3248 (Resolved): libcephfs: move testceph.cc tests into gtest framework
- 09:45 PM Feature #3200 (Resolved): os: coverity clean
- 09:09 PM Revision 763ae7c5 (ceph): doc: Added stack diagram for rgw. Noted NO MDS. Corrected namespace com...
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:08 PM Revision 2e780475 (ceph): doc: Removed a setting we can ignore for now.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 08:51 PM Revision c3f158f3 (ceph): doc: Minor updates to filesystem settings.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 08:50 PM Revision 8799ef6e (ceph): doc: Added journal settings to the config TOC.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 08:50 PM Revision d962e892 (ceph): doc: Completed a journal configuration reference. Journaler is separate.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 08:14 PM Revision 1166f3a0 (ceph): Compatibility code for session authentication; mostly passing keys arou...
- Signed-off-by: Peter Reiher <reiher@inktank.com>
- 08:13 PM Revision 2b56e800 (ceph): Code to allow pipes to be prepared to sign messages and to call the aut...
- Signed-off-by: Peter Reiher <reiher@inktank.com>
- 08:13 PM Revision 27974c46 (ceph): Changes to cephx protocol to handle session authentication.
- Signed-off-by: Peter Reiher <reiher@inktank.com>
- 08:13 PM Revision cc5d05bc (ceph): Changes to existing None and Unknown authentication protocols to handle...
- Signed-off-by: Peter Reiher <reiher@inktank.com>
- 08:12 PM Revision 7cce4d41 (ceph): Changes to basic authentication class to enable session authentication
- Signed-off-by: Peter Reiher <reiher@inktank.com>
- 08:12 PM Revision 35488061 (ceph): New documentation about Cephx protocol and session authentication.
- Signed-off-by: Peter Reiher <reiher@inktank.com>
- 06:56 PM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- Hi Alex,
could you let us know which commits we should apply in order to address this issue? we would like to app... - 11:49 AM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- There already was a fix available that addressed the
write case. I put it in originally as a cleanup but
it turns ... - 05:26 PM Revision 12bba4a5 (ceph): OSDCap: parse spaces explicitly
- This is necessary to avoid matching things like "allow r poolfoo".
It's also needed to distinguish "allow r class-rea... - 05:24 PM Revision b57b86a2 (ceph): test: remove commented out test cases
- These are copied from non-commented out ones a few lines above.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 05:08 PM rbd Feature #3239 (In Progress): librbd: make striping fancier
- 09:58 AM rbd Feature #3239 (Resolved): librbd: make striping fancier
- 04:02 PM Revision 32a6394b (ceph): logrotate: check for executables to avoid cron errors
- Signed-off-by: Tobias Florek <tobias.florek@bytesandbutter.de>
- 03:24 PM Linux kernel client Bug #2754: cephfs show_location produces kernel "divide error: 0000 [#1]" when run against a dire...
- Sage posted four patches for review. I just reviewed them
and am working on some final testing before committing th... - 01:07 PM Documentation #3247 (Resolved): doc: Move content out of wiki, kill it with fire
- Please kill http://ceph.com/wiki with extreme prejudice.
People keep reading the stale content in the wiki. Blogs ... - 12:48 PM CephFS Feature #3245 (Resolved): qa: test knfsd reexport in teuthology
- 12:48 PM CephFS Feature #3244 (In Progress): qa: integrate Ganesha into teuthology testing to regularly exercise ...
- 12:48 PM CephFS Feature #3243 (Resolved): qa: test samba reexport via libcephfs vfs plugin in teuthology
- 12:47 PM CephFS Feature #3242 (Resolved): samba: push plugin upstream
- 12:08 PM Bug #3233 (Fix Under Review): osd: caps in master are incompatible with argonaut caps
- The pool=foo support is added again in wip-osd-caps
- 11:28 AM Feature #3241 (Resolved): qa: integration tests for mon, osd, and mds caps
- This could be done as a shell script run by the client.admin user, so that it can create users with different caps an...
- 11:13 AM Feature #3167 (Fix Under Review): auth: separate read/write capabilities for classes
- 11:11 AM rbd Feature #3198 (Resolved): librbd: coverity clean
- 09:53 AM Bug #3236 (Resolved): logrotate.d script from debian repo does not work
- 09:51 AM Bug #3236: logrotate.d script from debian repo does not work
- yes.
- 09:03 AM Bug #3236 (Fix Under Review): logrotate.d script from debian repo does not work
- Tobias Florek wrote:
> i did not read closely. you are, of course, right. the problem is, that on all debian systems... - 01:31 AM Bug #3236: logrotate.d script from debian repo does not work
- i did not read closely. you are, of course, right. the problem is, that on all debian systems, initctl won't exist, s...
- 05:43 AM Bug #3238 (Resolved): ceph-client: osd BUG_ON() tripped
- ...
- 04:08 AM Revision 7a593a08 (ceph): console: add console task
- Log the sol console of every target to a file in the archive dir.
- 04:07 AM Revision b22e3ea5 (ceph): internal: stop warning about lockdep circular dependency
- This is coming from xfs, currently. Bah.
- 04:02 AM Revision 7af24bbd (ceph): libcephfs: fix test workunit
- Signed-off-by: Sage Weil <sage@inktank.com>
- 03:54 AM Revision 15ebc0ff (ceph): filejournal: check lseek64 return value
- CID 716858: Other violation (CHECKED_RETURN)
At (6): Calling function "lseek64(this->fd, pos, 0)" without checking re... - 03:54 AM Revision 409fbb7c (ceph): filestore: check ioctl WAIT_SYNC return value
- CID 716860: Unchecked return value (CHECKED_RETURN)
At (27): Calling function "ioctl(int, unsigned long, ...)" withou... - 03:54 AM Revision 2bf3f8c5 (ceph): filestore: check lseek64 return value
- CID 716862: Other violation (CHECKED_RETURN)
At (3): Calling function "lseek64(to, dstoff, 0)" without checking retur... - 03:45 AM Revision ef393b50 (ceph): mon: fix large pass by value
- CID 717046: Big parameter passed by value (PASS_BY_VALUE)
At (1): Passing parameter i of type entity_inst_t (size 152... - 03:44 AM Revision 5defa926 (ceph): mon/PGMap: fix nearfull check
- CID 716881: Copy-paste error (COPY_PASTE_ERROR)
At (2): "full_ratio" in "inc.full_ratio" looks like a copy-paste erro... - 03:24 AM Revision 821f61d1 (ceph): Merge branch 'next'
- 03:24 AM Revision 72ca9566 (ceph): test_libcephfs: fix test
- Can't close an already-closed dir handle.
Signed-off-by: Sage Weil <sage@inktank.com>
09/30/2012
- 10:17 PM Revision 07a5a141 (ceph): Merge branch 'next'
- 10:12 PM Revision 1ad339f7 (ceph): mon: fix recovered_peon assert
- Recovered_peon() can get called multiple times for a given machine id.
Signed-off-by: Sage Weil <sage@inktank.com> - 10:12 PM Revision 238b497a (ceph): mon: debug recovered_{peon,leader}
- Signed-off-by: Sage Weil <sage@inktank.com>
- 10:12 PM Revision b8cbe26c (ceph): mon: fix recovered_peon assert
- Recovered_peon() can get called multiple times for a given machine id.
Signed-off-by: Sage Weil <sage@inktank.com> - 09:26 PM Revision 1708cf8d (ceph): mon: debug recovered_{peon,leader}
- Signed-off-by: Sage Weil <sage@inktank.com>
- 09:21 PM rgw Feature #3037 (Resolved): rgw: unit test for rgw objclass
- 09:17 PM Bug #3236 (Need More Info): logrotate.d script from debian repo does not work
- the logrotate script is an 'all of the above':...
- 06:52 AM Bug #3236 (Resolved): logrotate.d script from debian repo does not work
- it uses initctl, which does only work with recentish versions of upstart, which are not in wheezy or sysvinit.
- 09:10 PM rbd Bug #3237 (Resolved): rbd_header_race failes to reproduce a race
- on current master. see /a/*/33351
09/29/2012
- 03:55 PM Revision ee3407fa (ceph): include newpool in osd cap for client.0
- This is needed by the kclient_workunit_kclient task.
- 08:35 AM Revision 6f7067f4 (ceph): mon: avoid large pass by value in MForward
- CID 717035: Big parameter passed by value (PASS_BY_VALUE)
At (1): Passing parameter caps of type MonCaps (size 144 by... - 08:34 AM Revision 4878fdcc (ceph): mds: fix MDSCacheObject pin printer * logic
- CID 716895: Logically dead code (DEADCODE)
At (4): Execution cannot reach this statement "(out << "*") << c;".
Signe... - 08:32 AM Revision a3e42d80 (ceph): mdsmap: init fields in ctor
- At (2): Non-static class member "session_timeout" is not initialized in this constructor nor in any functions that it...
- 08:30 AM Revision 1cebd989 (ceph): mds: fix potential overflow
- CID 717014: Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)
At (1): Potentially overflowing expression "in->in... - 08:29 AM Revision 694a4f0f (ceph): mds: init atid in context
- CID 717236: Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "atid" is not initialized in thi... - 08:29 AM Revision 18668ba0 (ceph): mds: init log layout in MDCcahe ctor
- CID 717237: Uninitialized scalar field (UNINIT_CTOR)
At (8): Non-static class member field "default_file_layout.fl_st... - 08:27 AM Revision 7594e9ce (ceph): mds: simplify get_dirfrag()
- Avoid useless have_inode() call.
CID 716996: Dereference null return value (NULL_RETURNS)
At (13): Dereferencing a p... - 08:26 AM Revision bef66e01 (ceph): mds: fix mlogger shutdown
- CID 716880: Copy-paste error (COPY_PASTE_ERROR)
At (2): "logger" in "this->logger" looks like a copy-paste error. Sho... - 08:25 AM Revision 4aef86f5 (ceph): mds: fix leak from get_current_dir_name
- CID 717086: Resource leak (RESOURCE_LEAK)
At (18): Ignoring storage allocated by "get_current_dir_name()" leaks it.
... - 08:22 AM Revision c517fde2 (ceph): librbd: simplify math
- Bending over backwards hasn't made coveirty happy. We'll just ignore it
there.
Signed-off-by: Sage Weil <sage@inkta... - 08:17 AM Revision 7779901e (ceph): mds: add assert to lock path
- This makes coverity happy:
CID 716916: Explicit null dereferenced (FORWARD_NULL)
At (28): Passing null pointer "in" ... - 08:16 AM Revision 816bb7e9 (ceph): mds: fix uninit Dumper fields in ctor
- CID 717234: Uninitialized pointer field (UNINIT_CTOR)
At (8): Non-static class member "rank" is not initialized in th... - 08:14 AM Revision e9f350f1 (ceph): mds: fix fd leak in dumper
- CID 717084: Resource leak (RESOURCE_LEAK)
At (6): Handle variable "fd" going out of scope leaks the handle.
Signed-o... - 08:12 AM Revision e604de1d (ceph): mds: fix uninit Capability::last_issue
- CID 717233: Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "last_issue" is not initialized ... - 08:11 AM Revision 82aecedf (ceph): mds: fix uninit field in CInode
- CID 717231: Uninitialized scalar field (UNINIT_CTOR)
At (3): Non-static class member "auth_pin_freeze_allowance" is n... - 08:09 AM Revision 1acd1092 (ceph): mds: fix typo in rsubdirs warning
- CID 716879: Copy-paste error (COPY_PASTE_ERROR)
At (2): "rfiles" in "pi->rstat.rfiles" looks like a copy-paste error.... - 08:08 AM Revision 310e4868 (ceph): mds: init CDir fields
- CID 717230: Uninitialized scalar field (UNINIT_CTOR)
At (8): Non-static class member "num_dentries_auth_subtree_neste... - 08:06 AM Revision 5e51f550 (ceph): mds: avoid useless have_inode() call
- CID 716989: Dereference null return value (NULL_RETURNS)
At (83): Dereferencing a pointer that might be null "in" whe... - 07:59 AM Revision 60473257 (ceph): osd: pass by value
- CID 717054: Big parameter passed by value (PASS_BY_VALUE)
At (1): Passing parameter recovery_info of type ObjectRecov... - 07:57 AM Revision af115314 (ceph): osd: fix coverity NULL warning
- Session is alwasy set on requests.
CID 717008: Dereference null return value (NULL_RETURNS)
At (34): Dereferencing a... - 07:53 AM Revision ada0db36 (ceph): osd: logger is never NULL
- We set this up in init(), so we don't need to make these dereferences
conditional.
Signed-off-by: Sage Weil <sage@in... - 07:51 AM Revision 020856bb (ceph): osd/PG: remove redundant NamedState
- Signed-off-by: Sage Weil <sage@inktank.com>
- 07:50 AM Revision 0769a1d3 (ceph): osd: init all vars in PG::NamedState
- CID 717341: Uninitialized pointer field (UNINIT_CTOR)
At (2): Non-static class member "state_name" is not initialized... - 01:34 AM Revision 09f602d2 (ceph): ceph tool: fix cli test
- Signed-off-by: Sage Weil <sage@inktank.com>
- 01:23 AM Feature #3197 (Resolved): librados: coverity clean
- 01:16 AM Revision 7827c566 (ceph): mon: fix uninit var warning in session startup
- This is a false positive; just init the var.
CID 717198: Uninitialized scalar variable (UNINIT)
At (18): Using unini... - 01:14 AM Revision f4c34c06 (ceph): filstore: fix leak of fd in write error paths
- CID 717095: Resource leak (RESOURCE_LEAK)
At (13): Handle variable "fd" going out of scope leaks the handle.
Signed-... - 01:12 AM Revision e0820d21 (ceph): filestore: fix fd leak
- CID 717088: Resource leak (RESOURCE_LEAK)
At (11): Handle variable "tmpfd" going out of scope leaks the handle.
Also... - 12:56 AM Revision dfac9b34 (ceph): mds: dentry always has dir
- CID 716912: Dereference after null check (FORWARD_NULL)
At (3): Passing null pointer "this->dir" to function "CDir::i... - 12:54 AM Revision d5f8e42b (ceph): librbd: init value in CopyProgressCtx ctor
- CID 717227: Uninitialized pointer field (UNINIT_CTOR)
At (4): Non-static class member "src_size" is not initialized i... - 12:53 AM Revision e43f4ff8 (ceph): librbd: fix overflow assert check
- Signed-off-by: Sage Weil <sage@inktank.com>
- 12:38 AM Revision 5a0461af (ceph): ceph tool: update url in man page
- Signed-off-by: Sage Weil <sage@inktank.com>
- 12:37 AM Revision f1f7ac78 (ceph): ceph tool: document 'ceph osd map ...' command
- Closes: #3223
Signed-off-by: Sage Weil <sage@inktank.com> - 12:31 AM Revision da43de34 (ceph): Merge remote-tracking branch 'gh/wip-coverity-common'
- Reviewed-by: Samuel Just <sam.just@inktank.com>
09/28/2012
- 11:33 PM Revision 2e1ea3f0 (ceph): OSDCap: parse 'pool=<poolname>' in addition to 'pool <poolname>'
- This was used in releases before 0.49, and was the documented way
to use it in several places, so support it again fo... - 11:31 PM Revision 1d675cc0 (ceph): Merge branch 'next'
- 11:29 PM Revision c925ce86 (ceph): FileStore: use fresh vector for calls for listing collection
- In collection_list_range, use an empty vector to pass into
collection_list_partial. collection_list_partial stops
li... - 11:09 PM Revision 142d9021 (ceph): OSDCaps: fix allow_all()
- OSD_CAP_ANY is not a mask. Treating it as one made any allowance
equivalent to 'allow *'.
Fixes: #3228
Signed-off-by... - 11:09 PM Revision 524a438d (ceph): test: add more OSDCap unit tests
- Check that allow_all() returns false when 'allow *' is not specified.
This would have caught #3228.
Add tests for the... - 11:09 PM Revision 67ab9659 (ceph): Makefile.am: recompile small file instead of libosd for unit test
- Linking with libosd requires a lot more recompilation
when testing changes to OSDCap.cc.
Signed-off-by: Josh Durgin ... - 11:09 PM Revision 42a63f34 (ceph): OSDCap: remove grants added during failed parsing
- Parsing has side effects that must be undone if it fails. A
capability string like 'allow rwx pool=bar' will add the... - 11:09 PM Revision 47a2f41b (ceph): OSDCap: fix typo in comment
- The grammar uses auid, not uid.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 11:09 PM Revision 30903662 (ceph): OSDCap: fix output operators for caps
- OSD_CAP_ANY is not a flag, but a value (0xff) that will always
be true when treated as a mask with a non-zero rwxa_t.... - 08:18 PM Revision e61b965a (ceph): osdmap: restore stream format
- CID 727986: Not restoring ostream format (STREAM_FORMAT_STATE)
At (20): Changing format state of stream "out" for cat... - 08:18 PM Revision cb0d9690 (ceph): MMonJoin: avoid large pass by value
- CID 717036: Big parameter passed by value (PASS_BY_VALUE)
At (1): Passing parameter a of type entity_addr_t (size 136... - 08:18 PM Revision d2cbe1fb (ceph): MOSDFailure: avoid big pass by value
- CID 727975: Big parameter passed by value (PASS_BY_VALUE)
At (1): Passing parameter f of type entity_inst_t (size 152... - 08:18 PM Revision 50460f90 (ceph): filer: fix overflow
- CID 717017: Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)
At (1): Potentially overflowing expression "layout... - 08:18 PM Revision 7b90139f (ceph): journaler: uninit var in ctor
- CID 717348: Uninitialized scalar field (UNINIT_CTOR)
At (14): Non-static class member field "layout.fl_pg_pool" is no... - 08:18 PM Revision a1f9dbc6 (ceph): journaler: uninit var in ctor
- CID 717349: Uninitialized scalar field (UNINIT_CTOR)
At (14): Non-static class member field "layout.fl_pg_pool" is no... - 08:18 PM Revision e5103b44 (ceph): objectcacher: avoid confusing coverity
- CID 716932: Explicit null dereferenced (FORWARD_NULL)
At (21): Passing null pointer "final" to function "ObjectCacher... - 08:18 PM Revision 62273b5c (ceph): objectcacher: fix uninit it ctor
- CID 717350: Uninitialized scalar field (UNINIT_CTOR)
At (4): Non-static class member field "ex.length" is not initial... - 08:18 PM Revision b1d85130 (ceph): objectcacher: fix uninit var in ctor
- CID 717351: Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "tid" is not initialized in this... - 08:18 PM Revision 0b3c5dc5 (ceph): objecter: fix dereference after null check
- CID 716933: Dereference after null check (FORWARD_NULL)
At (4): Passing null pointer "extra_ops->ops" to function "st... - 08:18 PM Revision d5b4f9af (ceph): osdmaptool: check return values
- CID 716864: Unchecked return value (CHECKED_RETURN)
At (155): Calling function "ceph::buffer::list::read_file(char co... - 08:18 PM Revision 903f60ae (ceph): osdmaptool: fix pg_t::parse() return value check
- CID 716876: Operands don't affect result (CONSTANT_EXPRESSION_RESULT)
At (1): pgid.parse(test_map_pg.c_str()) < 0 is ... - 08:18 PM Revision 67caceec (ceph): rados: fix error paths in do_put()
- CID 716986: Improper use of negative value (NEGATIVE_RETURNS)
At (9): "count" is passed to a parameter that cannot be... - 08:18 PM Revision 779e0f0f (ceph): cls_refcount: fix uninit vals in ctor
- CID 727989: Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "implicit_ref" is not initialize... - 08:18 PM Revision 70e35ba9 (ceph): cephtool: fix resource leak
- CID 717124: Resource leak (RESOURCE_LEAK)
At (17): Variable "m" going out of scope leaks the storage it points to.
S... - 08:18 PM Revision b7cf6030 (ceph): crushtester: avoid divide by zero
- CID 716906: Division or modulo by zero (DIVIDE_BY_ZERO)
At (214): In expression "(float)weight[i] / (float)total_weig... - 08:18 PM Revision 687d6d58 (ceph): crushtester: fix uninit var
- CID 717197: Uninitialized scalar variable (UNINIT)
At (35): Using uninitialized value "only_osd_affected".
Fix some ... - 08:18 PM Revision 98da9f9b (ceph): pidfile: fix fd leak from pidfile_remove()
- CID 717081: Resource leak (RESOURCE_LEAK)
At (10): Handle variable "fd" going out of scope leaks the handle.
Signed-... - 08:18 PM Revision 884daeb1 (ceph): addr_parsing: fix memory leak
- CID 717082: Resource leak (RESOURCE_LEAK)
At (4): Variable "buf" going out of scope leaks the storage it points to.
... - 08:18 PM Revision 95dca989 (ceph): stringify: use const ref
- CID 727974: Big parameter passed by value (PASS_BY_VALUE)
At (1): Passing parameter a of type entity_addr_t (size 136... - 08:18 PM Revision 2381f12a (ceph): utime: restore ostream state
- CID 717130: Not restoring ostream format (STREAM_FORMAT_STATE)
At (4): Changing format state of stream "out" for cate... - 08:18 PM Revision ae1c38f1 (ceph): LogEntry: fix uninit in ctor
- At (2): Non-static class member "m_thread" is not initialized in this constructor nor in any functions that it calls....
- 08:18 PM Revision 797d3ccb (ceph): msg/Accepter: check getsockbyname() return value
- CID 717442: Other violation (CHECKED_RETURN)
At (10): Calling function "getsockname(this->listen_sd, (sockaddr *)list... - 08:18 PM Revision b5fb298d (ceph): msg/Messenger: avoid large pass by value
- CID 717049: Big parameter passed by value (PASS_BY_VALUE)
At (1): Passing parameter bind_addr of type entity_addr_t (... - 08:18 PM Revision 02e48394 (ceph): messages: uninit values
- CID 717259: Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "global_id" is not initialized i... - 08:18 PM Revision e92b92b2 (ceph): MRoute: avoid pass by value
- CID 717038: Big parameter passed by value (PASS_BY_VALUE)
At (1): Passing parameter i of type entity_inst_t (size 152... - 08:18 PM Revision dfb9488a (ceph): adminsocket: change failure test
- This makes coverity happier:
CID 716941: Using invalid iterator (INVALIDATE_ITERATOR)
At (35): Dereferencing iterato... - 08:18 PM Revision 9bd673f1 (ceph): adminsocket: init vars in ctor
- At (2): Non-static class member "m_version_hook" is not initialized in this constructor nor in any functions that it ...
- 08:18 PM Revision 05dc45f6 (ceph): buffer: restore stream state after hexdump()
- CID 717129: Not restoring ostream format (STREAM_FORMAT_STATE)
At (51): Changing format state of stream "out" for cat... - 08:18 PM Revision 66f7c41e (ceph): buffer: init data val in ctor
- CID 717213: Uninitialized pointer field (UNINIT_CTOR)
At (2): Non-static class member "data" is not initialized in th... - 08:18 PM Revision 6f897659 (ceph): config: don't leak buf on dump config
- CID 717074: Resource leak (RESOURCE_LEAK)
At (26): Variable "buf" going out of scope leaks the storage it points to.
... - 08:18 PM Revision 4bd27998 (ceph): ipaddr: fix buffer overrun on ipv6 prefix of 128
- CID 717020: Out-of-bounds read (OVERRUN)
At (3): Overrunning array "addr->__in6_u.__u6_addr8" of 16 bytes at byte off... - 08:18 PM Revision ce063398 (ceph): lockep: fix leak in failure/assert path
- This is useless excepto make coverity happy.
CID 717075: Resource leak (RESOURCE_LEAK)
At (12): Variable "bt" going ... - 08:18 PM Revision f577c829 (ceph): obj_bencher: possible divice by zero
- CID 716903: Division or modulo by zero (DIVIDE_BY_ZERO) [select defect]
Signed-off-by: Sage Weil <sage@inktank.com> - 08:18 PM Revision 5846e27b (ceph): obj_bencher: protect with lock
- This makes coverity happy.
CID 716963: Data race condition (MISSING_LOCK)
At (1): Accessing "this->data.finished" ("... - 08:18 PM Revision cf6639a0 (ceph): perfcounters: remove unused members
- Avoids coverity warning
CID 717214: Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "m_shut... - 08:18 PM Revision af5f1437 (ceph): PrebufferedStream: avoid dereferencing end()
- This appeared to work, but probably isn't a good idea.
CID 716940: Using invalid iterator (INVALIDATE_ITERATOR)
At (... - 08:18 PM Revision 74900320 (ceph): adminsocket: fix sock-fd leak in failure path
- CID 728088: Resource leak (RESOURCE_LEAK)
At (9): Handle variable "sock_fd" going out of scope leaks the handle.
Sig... - 08:18 PM Revision ffe0e09b (ceph): crushtester: avoid divide by zero
- CID 716904: Division or modulo by zero (DIVIDE_BY_ZERO)
At (4): In expression "(float)weight[i] / (float)total_weight... - 08:18 PM Revision 69840378 (ceph): doc: Added commentary for BMC and VLAN.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 08:18 PM Revision 8d4e6e2a (ceph): LogEntry: init in ctor
- Signed-off-by: Sage Weil <sage@inktank.com>
- 08:18 PM Revision bdadc4ec (ceph): MemoryModel: init in ctor
- CID 717211: Uninitialized scalar field (UNINIT_CTOR)
At (18): Non-static class member field "last.mmap" is not initia... - 08:18 PM Revision 73d85497 (ceph): workqueue: reset heartbeat timeout under lock
- This makes coverity happier:
CID 727967: Value not atomically updated (ATOMICITY)
At (44): Using an unreliable value... - 08:18 PM Revision 3ec32c94 (ceph): adminsocket: check return value
- CID 716847: Other violation (CHECKED_RETURN)
At (5): Calling function "fcntl(sock_fd, 2, 1)" without checking return ... - 07:27 PM Revision 3223b3de (ceph): ceph.spec.in: Build rpms with nss instead of cryptopp.
- 05:59 PM Revision 53c1db9e (ceph): vstart.sh: let you specific specific ip to bind to
- e.g. 192.168.122.1
Signed-off-by: Sage Weil <sage@inktank.com> - 05:40 PM Feature #3000 (In Progress): osd: balance recovery vs client io
- 05:40 PM Feature #3189 (In Progress): osd: use reservations for non-backfill recovery too
- 05:39 PM Feature #3199 (Resolved): msg: coverity clean
- 10:33 AM Feature #3199 (Fix Under Review): msg: coverity clean
- 07:15 AM Feature #3199 (In Progress): msg: coverity clean
- 05:39 PM Feature #3195 (Resolved): crush: coverity clean
- 10:34 AM Feature #3195 (Fix Under Review): crush: coverity clean
- 07:15 AM Feature #3195 (In Progress): crush: coverity clean
- 05:39 PM Feature #3196 (Resolved): include: coverity clean
- 10:34 AM Feature #3196 (Fix Under Review): include: coverity clean
- 05:38 PM Documentation #3223 (Resolved): Doc: ceph osd map not documented
- 05:17 PM rgw Feature #3114 (Fix Under Review): rgw: support cache-control header field
- 05:07 PM Revision 13c91dba (ceph): misc: use new syntax for osd caps
- pool=pool1,pool2 is not valid for the new grammar
- 03:17 PM rgw Bug #2527: RGW may return 409 Conflict when deleting a bucket
- Might be related to the messenger issues that were fixed in 0.52. We'll wait a bit, see if it still happens.
- 02:51 PM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- Well, I hit a similar issue with the previous fix in place.
However, this is in the write path. When looking at the... - 02:23 PM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- OK, I think I found it.
a410702 libceph: (re)initialize bio_iter on start of message receive
I'm going to f... - 07:54 AM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- I found another bug fix that I thought might make this go
away. This time it was this one:
3b5ede07 libceph: f... - 05:49 AM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- I have a clue to pursue this morning.
I have noticed in two crashes that the state of the connection is
not one t... - 02:14 PM Feature #3235 (Resolved): doc: procedure for collecting data from failed node/whatever
- 01:32 PM rgw Bug #3211 (Resolved): rgw: crash on armhf architecture
- Fixed, commit:2fddfb0a95288d39cee2e82376297ce43296743b.
- 10:39 AM Feature #3167 (In Progress): auth: separate read/write capabilities for classes
- 10:20 AM Bug #3233 (In Progress): osd: caps in master are incompatible with argonaut caps
- 10:11 AM rgw Bug #3234 (Resolved): rgw: missing content-type, etag when listing bucket on some objects
- When we list the bucket and see objects that exist, but their index update is not complete, we return results accordi...
09/27/2012
- 11:50 PM Revision 165ac0f4 (ceph): Merge branch 'master' of https://github.com/ceph/ceph
- 11:50 PM Revision 0ee6a951 (ceph): doc: Added commentary for BMC and VLAN.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 11:34 PM Revision 404e7589 (ceph): Merge remote-tracking branch 'gh/wip-osd-caps'
- Reviewed-by: Sage Weil <sage@inktank.com>
- 10:38 PM Revision cc4dcf60 (ceph): test: add more OSDCap unit tests
- Check that allow_all() returns false when 'allow *' is not specified.
This would have caught #3228.
Add tests for the... - 10:38 PM Revision de6e0d81 (ceph): OSDCaps: fix allow_all()
- OSD_CAP_ANY is not a mask. Treating it as one made any allowance
equivalent to 'allow *'.
Fixes: #3228
Signed-off-by... - 10:36 PM Revision e903ca7a (ceph): OSDCap: fix output operators for caps
- OSD_CAP_ANY is not a flag, but a value (0xff) that will always
be true when treated as a mask with a non-zero rwxa_t.... - 10:36 PM Revision 1d747d1e (ceph): OSDCap: fix typo in comment
- The grammar uses auid, not uid.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 10:02 PM Revision 30e10a9a (ceph): doc: RST cleanup for RPM dev package installs.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 10:02 PM Revision 2fc29fe9 (ceph): doc: Removed old ops directory structure and redundant files.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:34 PM Revision a1cfe74a (ceph): client: Mods to fix #3184 for messenger shutdown
- This moves the shutdown of the messenger outside of the client
to be able to handle error cases more appropriately.
... - 09:34 PM Revision 27c7c71f (ceph): client: Remove unmaintained ldceph.cc from tree
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 09:34 PM Revision ff96789e (ceph): client: add WARN_UNUSED_RESULT to client init func
- Adds the gcc attribute (if available) to client init functions to
ensure proper error handling.
Signed-off-by: Sam L... - 09:33 PM Revision 3c1e2e19 (ceph): manpage-howto.txt: note that man/Makefile.am may need update too
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 09:33 PM Revision 1d231f93 (ceph): Refresh manpages from .rst sources
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 09:20 PM Revision eb27f9ad (ceph): Add howto for changing man pages
- Signed-off-by: Dan Mick <dan.mick@inktank.com>
- 09:15 PM Revision d37ca798 (ceph): mon: update 'auth' help/usage
- Fixes: #3227
Signed-off-by: Sage Weil <sage@inktank.com> - 09:10 PM Revision 1d552a4b (ceph): rados: fix man page
- Default bench IO size if 4MB.
Fixes: 3230
Signed-off-by: Sage Weil <sage@inktank.com> - 09:01 PM Feature #3194 (In Progress): common: coverity clean
- 09:00 PM Revision 8740ddf9 (ceph): doc: fix rpm url (part deux)
- Signed-off-by: Sage Weil <sage@inktank.com>
- 08:55 PM Revision 38f7f3dd (ceph): rbd: add test for reading an up to date header
- This is racy, but in all my test runs it has produced the
problem successfully. - 08:49 PM rgw Feature #3201 (In Progress): rgw: coverity clean
- 08:46 PM Linux kernel client Bug #2754 (Fix Under Review): cephfs show_location produces kernel "divide error: 0000 [#1]" when...
- 08:37 PM Revision 18921ed2 (ceph): Merge remote-tracking branch 'gh/wip-watch-header-race'
- 08:34 PM Revision 6c5c939f (ceph): librbd: fix includes for portability
- This needs limits.h for Centos, and the inttypes.h wrapper for FreeBSD.
Signed-off-by: Josh Durgin <josh.durgin@inkt... - 08:33 PM Revision aae9214c (ceph): Merge remote-tracking branch 'gh/wip-osd'
- Reviewed-by: Samuel Just <sam.just@inktank.com>
- 08:31 PM Revision c9266d65 (ceph): rgw: check that realloc succeeded
- Was missing a test after a realloc.
Backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 08:26 PM Revision 45133971 (ceph): ReplicatedPG: track incoming pushes with perf counters
- Add perf counters tracking the number of inbound pushes along with the
amount of data in each request.
Signed-off-by... - 08:21 PM Revision 3f952afe (ceph): PG: explicitely delay ops on backfill_pos
- Previously, we considered backfill_pos degraded in order to delay
ops since a write to backfill_pos could generate a ... - 08:21 PM Revision a351f7a1 (ceph): Merge remote-tracking branch 'gh/wip_backfill_full2'
- Conflicts:
src/include/ceph_features.h - 08:20 PM Revision 0a2f8278 (ceph): PG: last_complete might be outside of the log
- When we encounter a divergent log entry, we put the
object into the missing set at the prior_version
for the divergen... - 08:06 PM Revision 4c4c9d50 (ceph): doc: fix rpm url
- Signed-off-by: Sage Weil <sage@inktank.com>
- 07:54 PM Revision 879b34da (ceph): Merge tag 'v0.52'
- v0.52
Conflicts:
src/rgw/rgw_rados.cc - 07:52 PM Revision 214327ef (ceph): rgw: copy_object should not override ETAG implicitly
- When copying an object with new attrs, we still need to
maintain the ETAG.
Signed-off-by: Yehuda Sadeh <yehuda@inkta... - 06:09 PM Revision 25a9620a (ceph): FileJournal: correctly check return value of lseek in write_fd
- Signed-off-by: Jim Schutt <jaschut@sandia.gov>
- 05:50 PM Revision 303f640c (ceph): OSDCap: remove grants added during failed parsing
- Parsing has side effects that must be undone if it fails. A
capability string like 'allow rwx pool=bar' will add the... - 05:33 PM CephFS Fix #2215: ceph-fuse does not invalidate page cache
- 05:19 PM Revision 31446909 (ceph): doc: fix injectargs syntax
- The OSD processes only a single string. The existing example wouldn't
even be passed to the OSD, since it would be in... - 05:04 PM Bug #3233 (Resolved): osd: caps in master are incompatible with argonaut caps
- In argonaut, caps could say 'allow rwx pool=blah', while releases since then have a new parser (from commit:c06e40753...
- 04:58 PM Bug #2508 (In Progress): osdc/ObjectCacher.cc:761: void ObjectCacher::bh_write_commit(int64_t, so...
- 04:54 PM Bug #2508 (Closed): osdc/ObjectCacher.cc:761: void ObjectCacher::bh_write_commit(int64_t, sobject...
- Recent logs: ubuntu@teuthology: /a/teuthology-2012-09-24_19:00:29-regression-master-testing-gcov/29465...
- 04:55 PM Bug #3226: osd: invalid capability string can allow arbitrary access
- Argonaut does not have this bug. It was introduced in a post-argonaut refactoring of OSDCaps.
- 04:44 PM Bug #3226 (Resolved): osd: invalid capability string can allow arbitrary access
- 04:43 PM Bug #3226: osd: invalid capability string can allow arbitrary access
- Fixed by commit:303f640ce561c22a85a16b49585a22115273f790
- 04:55 PM Bug #3228: osd: capspec parsing is broken
- Argonaut does not have this bug. It was introduced in a post-argonaut refactoring of OSDCaps.
- 04:43 PM Bug #3228 (Resolved): osd: capspec parsing is broken
- Fixed by commit:de6e0d8112d74e8c22281128dfe3085ad1ec01b0
- 04:45 PM Bug #3232 (Resolved): osd: 0.15 scrub stat mismatch, got 25/25 objects, 15/15 clones, 50453469/49...
- Logs are in ubuntu@teuthology: /a/teuthology-2012-09-22_00:00:04-regression-next-testing-basic/27498...
- 04:26 PM Revision e4885947 (ceph): v0.52
- 03:46 PM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- I am able to reproduce this problem at will using stock
Linux 3.5.4, and running "fio" in a loop, and then making
o... - 03:11 PM Revision 9e9c5f25 (ceph): osd: make 'pg <pgid> revert ...' command idempotent
- A failure in the ceph tool -> osd connection may mean this command is sent
twice. This regularly causes failures in ... - 02:38 PM CephFS Bug #3184 (Resolved): ceph-fuse should not segfault without a keyring
- 02:32 PM Documentation #2996 (Fix Under Review): doc: write install Ceph with RPMs doc
- 02:31 PM Feature #2440 (Resolved): osd: understand btrfs performance
- 02:15 PM Bug #3227 (Resolved): mon: usage for 'ceph auth' is outdated
- 02:10 PM Bug #3230 (Resolved): man page: rados bench has wrong default write size
- 12:44 PM Bug #3230 (Resolved): man page: rados bench has wrong default write size
- ...
- 02:02 PM rbd Bug #2534 (Resolved): librbd: make sure watch is established on same header version as initial re...
- Fixed by commit: e1776809031c6dad441cfb2b9fac9612720b9083
- 01:55 PM Feature #3203 (Resolved): Add support for Ubuntu 12.10 (Quantal Quetzal) in deb repository
- 01:55 PM Feature #2011 (Resolved): osd: do not backfill/recover to full osds
- 01:55 PM Feature #2826 (Resolved): osd: backfill target reservations
- 10:49 AM rgw Feature #3225 (Fix Under Review): rgw: stub for get bucket logging
- 10:36 AM devops Feature #3229 (Resolved): Support clean ceph-fuse fstab automounting
- Right now, you need to do something like the following:...
- 01:43 AM Revision d3d1b7b3 (ceph): Merge remote-tracking branch 'gh/wip-rbd-docs'
- 01:43 AM Revision de5bb62e (ceph): Merge remote-tracking branch 'gh/wip_coverity_osd'
- Conflicts:
src/librbd/internal.cc
Reviewed-by: Sage Weil <sage@inktank.com> - 01:42 AM Revision f6da4377 (ceph): Merge branch 'wip-rpm-doc'
- 12:50 AM Revision 175465bb (ceph): cephfs: Fix breakage of cephfs link
- Add libcommon.la to LDADD for cephfs.
Signed-off-by: Sam Lang <sam.lang@inktank.com>
Reviewed-by: Samuel Just <sam.j... - 12:41 AM Revision f586add4 (ceph): doc: extend QEMU/RBD docs
- Describe running a vm from RBD, cache options, and discard support.
Signed-off-by: Josh Durgin <josh.durgin@inktank.... - 12:41 AM Revision 8964f10f (ceph): doc: remove MDS from diagram describing RBD and OpenStack
- The MDS is not used with RBD or librados.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 12:41 AM Revision f0a5c562 (ceph): doc: small fixes to the OpenStack page
- * 'Ceph common' is not a package name
* config dir is /etc/nova, not /etc/conf
* remove trailing whitespace
Signed-o... - 12:41 AM Revision fa3a7472 (ceph): doc: fix typo in dev layering notes
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 12:41 AM Revision 3b0e1205 (ceph): doc: clarify rbd caching
- * note that it's only for librbd
* put settings in the [client] section for clarity
* fix typo
* re-indent and clarif... - 12:41 AM Revision 8c3bfaa3 (ceph): doc: update ceph-authtool man page
- * document osd capabilities
* fix librados user example
* fix example with outdated syntax (pool= and uid= are not su... - 12:38 AM Revision 4ea9b9f3 (ceph): doc: minor fixups to rpm install doc
- Signed-off-by: Sage Weil <sage@inktank.com>
- 12:33 AM Revision 85b01517 (ceph): doc: draft rpm installation
- 12:28 AM Revision cc9d7da5 (ceph): cephfs: Fix warning - use err instead of errno
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 12:26 AM Revision e8c734bb (ceph): client: Fix compile error: bad {0} initializers
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 12:06 AM Revision e0af6a54 (ceph): Merge remote-tracking branch 'gh/wip-3186
- Reviewed-by: Sage Weil <sage@inktank.com>
09/26/2012
- 11:55 PM Revision 67535f2d (ceph): rgw: different test for multi object delete
- We need to check for the existence of the sub-resource.
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 11:45 PM Revision b74b0f90 (ceph): Merge branch 'wip-coverity-client'
- Reviewed-by: Sage Weil <sage@inktank.com>
- 11:44 PM Revision bc45cded (ceph): cephfs: Fixes for coverity bugs 716840 and 716970
- Fixes for two coverity bugs in cephfs.cc.
716840 (CHECKED_RETURN) reported that the return value from
fstat wasn't g... - 11:44 PM Revision 65700fc4 (ceph): client: Coverity fixes for 716841-716844
- Fixes coverity errors (CHECKED_RETURN) for all calls to
Client::path_walk() where return value wasn't getting checked... - 11:44 PM Revision 7945f8bf (ceph): client: Fixes coverity defect 716890 [DEADCODE]
- In choose_target_mds, the mds number is initialized to 0 and
then a separate target mds number is chosen based on the... - 11:44 PM Revision 10186fe7 (ceph): client: Fixes coverity defect 716891
- Fix for coverity defect 716891 [DEADCODE] in
Client::encode_dentry_release where the released var is initialized
to 0... - 11:44 PM Revision 68dea676 (ceph): client: Add asserts for coverity bugs
- Coverity 716907-716909 [FORWARD_NULL} doesn't like using a pointer
that might be null. Assertions check that pointer... - 11:44 PM Revision 844ffd6a (ceph): client: Fix coverity 716909 [FORWARD_NULL]
- If we fill the request path from the dentry instead of the inode, we
need to use the dentry inode. This fixes a segf... - 11:44 PM Revision cd154055 (ceph): client: Fix coverity UNINIT_CTOR defects
- Coverity finds cases where constructors are not initializing
all the members of the struct/class.
Signed-off-by: Sam... - 11:14 PM Revision bba17662 (ceph): rgw: copy_object should not override ETAG implicitly
- When copying an object with new attrs, we still need to
maintain the ETAG.
Signed-off-by: Yehuda Sadeh <yehuda@inkta... - 11:04 PM Revision a9e30411 (ceph): mds: Move check for empty path lookup to getattr
- Signed-off-by: Sam Lang <sam.lang@inktank.com>
- 10:43 PM Revision f031046c (ceph): rgw: copy_object should not override ETAG implicitly
- When copying an object with new attrs, we still need to
maintain the ETAG.
Signed-off-by: Yehuda Sadeh <yehuda@inkta... - 06:57 PM Revision c6895568 (ceph): PG, OSD: reject backfills when an OSD is nearly full
- Reject backfills when an OSD reaches a configurable full ratio. Retry
backfilling periodically in the hopes that the ... - 06:57 PM Revision a6b0d55b (ceph): timer: add unsafe callbacks option
- Using unsafe callbacks drops the lock between invocations of event
callbacks. It is useful under some circumstances, ... - 06:06 PM Revision 5b232a66 (ceph): doc: Fixed typo.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 05:46 PM Bug #3228 (Resolved): osd: capspec parsing is broken
- It's always returning ANY, even for simple cases like "allow r". Test cases are in wip-osd-caps.
- 05:43 PM Bug #3227 (Resolved): mon: usage for 'ceph auth' is outdated
- Currently the output is:...
- 05:16 PM Revision 620701df (ceph): FileStore: fix filedescriptor leak in mkfs
- CID 717091: Resource leak (RESOURCE_LEAK)At (39): Handle variable "fd" going
out of scope leaks the handle.
Signed-o... - 05:16 PM Revision b99979cf (ceph): FileStore: fix leaked fd and check lseek in _test_fiemap
- CID 716861: Other violation (CHECKED_RETURN)At (3): Calling function "lseek(fd,
off, 0)" without checking return valu... - 05:16 PM Revision f9c5ac36 (ceph): FileStore: fix fd and tmpfd leaks in _detect_fs()
- CID 717088: Resource leak (RESOURCE_LEAK)At (11): Handle variable "tmpfd" going
out of scope leaks the handle.
Signe... - 05:16 PM Revision 3bef5eb4 (ceph): FileStore: don't leak r in mount
- ID 717092: Resource leak (RESOURCE_LEAK)At (40): Handle variable "r" going out
of scope leaks the handle.
Signed-off... - 05:16 PM Revision 0e73313b (ceph): FileStore: fix omap_store and dbomap leaks in mount
- CID 717093: Resource leak (RESOURCE_LEAK)At (48): Variable "omap_store" going
out of scope leaks the storage it point... - 05:16 PM Revision d3bd9cbd (ceph): FileStore: uninit var in ctor OpSequencer::parent
- CID 717334: Uninitialized pointer field (UNINIT_CTOR)At (2): Non-static class
member "parent" is not initialized in t... - 05:16 PM Revision e0225851 (ceph): FlatIndex: terminate dir_name buffer passed to strncpy
- CID 716836: Buffer not null terminated (BUFFER_SIZE_WARNING)At (1): Calling
strncpy with a maximum size argument of 4... - 05:16 PM Revision 9f6ee01e (ceph): JournalingObjectStore: lock journal_lock at top of journal_replay
- CID 716968: Data race condition (MISSING_LOCK)At (6): Accessing "this->op_seq"
("JournalingObjectStore.op_seq") requi... - 05:16 PM Revision 33f96181 (ceph): FileStore: fix statfs,fstatfs,fstat ret val checks
- CID 716863: Other violation (CHECKED_RETURN)At (20): Calling function
"fstat(basedir_fd, &basest)" without checking r... - 05:15 PM Revision 147e90c0 (ceph): FileJournal: uninit var in ctor FileJournal
- CID 717332: Uninitialized pointer field (UNINIT_CTOR)At (12): Non-static class
member field "iocb.aio_fildes" is not ... - 05:15 PM Revision ea91ee58 (ceph): FileJournal: uninit var in ctor aio_ctx FileJournal
- CID 717333: Uninitialized pointer field (UNINIT_CTOR)At (2): Non-static class
member "aio_ctx" is not initialized in ... - 05:15 PM Revision 8ec08c2d (ceph): FileJournal: check return value of lseek in write_fd
- CID 716859: Other violation (CHECKED_RETURN)At (1): Calling function
"lseek64(this->fd, pos, 0)" without checking ret... - 05:06 PM CephFS Bug #3186 (Resolved): mds: mds crash on client shutdown
- 04:50 PM Revision 66b1eb2c (ceph): rgw: better protocols separation
- This change will make it easier to add new protocol
handlers. We now determine which protocol handler to
use by query... - 04:47 PM Revision 577184dd (ceph): Merge remote-tracking branch 'gh/wip-mon-gv'
- Reviewed-by: Joao Eduardo Luis <joao.luis@inktank.com>
Reviewed-by: Greg Farnum <greg@inktank.com>
Conflicts:
src/i... - 04:42 PM Revision 35cd5f3c (ceph): rgw: clean up ops initialization, completion
- ops init() was a reminiscent of an old design. Since we're
allocating new op for every request we can just init every... - 04:27 PM Bug #3226: osd: invalid capability string can allow arbitrary access
- The first commit in wip-osd-caps fixes this.
- 04:27 PM Bug #3226 (Resolved): osd: invalid capability string can allow arbitrary access
- If you use the cap osd 'allow rwx pool=bar', the parser will add the grant for 'allow rwx', but fail to parse the 'fo...
- 04:15 PM rgw Bug #3224 (Resolved): rgw: copy object with alternative attrs does not set ETAG
- commit:f031046c4d600ce0a0c2c9ad5856dc100b0901fb fixes that.
- 03:47 PM rgw Bug #3224 (Resolved): rgw: copy object with alternative attrs does not set ETAG
- When using copy object with alternative attrs, ETAG is not getting set,
- 04:03 PM rgw Feature #3225 (Resolved): rgw: stub for get bucket logging
- Even if not implementing bucket logging api, we can still have a simple stub that returns that bucket logging is disa...
- 03:24 PM Revision f310a1c5 (ceph): mds: fix ino release on session close
- If we project an inode release, we need to follow through, even if for
some reason we decide to keep the session acti... - 03:24 PM Revision 47983df4 (ceph): client: Fix for #3184 cfuse segv with no keyring
- Fixes bug #3184 where the ceph-fuse client segfaults if authx is
enabled but no keyring file is present. This was du... - 01:54 PM Documentation #3084: doc: Why and when should I use latest stable kernel and not the 3.2.0 from U...
- Some more details:
The kernel that comes with 12.04 is old. This ticket requests a place in the documentation (FA... - 10:51 AM rgw Bug #2527: RGW may return 409 Conflict when deleting a bucket
- The bucket index update when doing object removal is async. That means that when we get to remove the bucket, the ind...
- 10:20 AM rgw Feature #3216 (Fix Under Review): rgw: RESTful usage api
- 08:25 AM CephFS Bug #1677 (Resolved): mds interval_set.h: 385: FAILED assert(p->first <= start)
- 08:20 AM Bug #2919 (Resolved): ceph kernel module looks for :/ in path, but / stripped by precise mountall
- it's fixed in our testing branch, but i didn't send it to linus in for 3.6; it was late in the -rc cycle to be fixing...
- 05:31 AM Revision feb1946a (ceph): Merge remote-tracking branch 'gh/wip-rbd-coverity
- Reviewed-by: Sage Weil <sage@inktank.com>
- 01:14 AM Revision 26882dac (ceph): client: Put all libcephfs gtest tests into one bin
- * Modify the Makefile.am to run all gtest libcephfs tests through
a single binary: test_libcephfs.
* Add tests for #... - 01:06 AM Revision c92e1dd7 (ceph): mds: Handle empty relpath from client getattr
- A bug in the client (see 2b54391) results in an empty relpath on
a lookup request. This causes a segfault in the mds...
09/25/2012
- 09:59 PM Revision 5c8aea78 (ceph): FileJournal: fix potential overflow in create()
- CID 717016: Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)At (1):
Potentially overflowing expression "g_conf-... - 09:59 PM Revision 5bf6d225 (ceph): FileJournal: fix memory leak in _open_file
- CID 717087: Resource leak (RESOURCE_LEAK)At (16): Variable "buf" going out of
scope leaks the storage it points to.
... - 09:55 PM Revision 2455147c (ceph): doc: Added an anchor to enable linking from CRUSH map section.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:55 PM Revision c8be4640 (ceph): doc: Clarified descriptions, and improved IA and navigation.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 09:53 PM Bug #2919: ceph kernel module looks for :/ in path, but / stripped by precise mountall
- Was this not fixed?
- 09:51 PM Documentation #3223 (Resolved): Doc: ceph osd map not documented
- > $ ceph osd getmap -o osdmap
> got osdmap epoch 59
> $ osdmaptool --test-map-object dmick.rbd osdmap
> osdmaptool... - 09:48 PM Revision 2b543918 (ceph): client: Fix to client filepath initializing
- The filepath constructor that takes a const char * is missing the
initializer for the encoded member. This results i... - 09:32 PM Revision d5bcf414 (ceph): mon: include auth mon's paxos version on latest gv calculation
- Signed-off-by: Joao Eduardo Luis <joao.luis@inktank.com>
Reviewed-by: Sage Weil <sage@inktank.com> - 09:13 PM Revision 6b35b883 (ceph): DBObjectMap::_get_header fix shadowed var causing dead code
- CID 716897: Logically dead code (DEADCODE)At (5): Execution cannot reach this
statement "return r;".
The outer r was... - 09:10 PM Revision 8a3efbbc (ceph): osd_types: uninit var in ctor pg_query_t
- CID 717346: Uninitialized scalar field (UNINIT_CTOR)At (2): Non-static class
member "epoch_sent" is not initialized i... - 09:09 PM Revision 10e1ac7b (ceph): PG: uninit var in ctor Scrubber
- CID 728001: Uninitialized scalar field (UNINIT_CTOR)At (2): Non-static class
member "epoch_start" is not initialized ... - 09:09 PM Revision 4f621a1a (ceph): ReplicatedPG: add assert to snapset.clones search
- CID 716943: Using invalid iterator (INVALIDATE_ITERATOR)At (27): Dereferencing
iterator "p" though it is already past... - 09:09 PM Revision 3e4f3794 (ceph): osd_types: typo in object_info_t::decode for struct_v==6
- hoid.hash is uninitialized, and should not be used to
initialize hoid.hash.
CID 717200: Uninitialized scalar variabl... - 09:09 PM Revision 8e214edc (ceph): PG: big param passed by value, C_PGActivateCommitted
- CID 717052: Big parameter passed by value (PASS_BY_VALUE)At (1): Passing
parameter pi of type entity_inst_t (size 152... - 09:09 PM Revision dd10b1e8 (ceph): secret: close fd on error
- CID 717079: Resource leak (RESOURCE_LEAK)
At (6): Handle variable "fd" going out of scope leaks the handle.
Signed-o... - 09:09 PM Revision 2d44a1a3 (ceph): rbd: fix leak of fd when importing an image from a file
- CID 719579: Resource leak (RESOURCE_LEAK)
At (7): Handle variable "fd" going out of scope leaks the handle.
Signed-o... - 09:09 PM Revision 84fa74e6 (ceph): rbd: fix leak of fd on error when reading an entire file
- CID 717100: Resource leak (RESOURCE_LEAK)
At (6): Handle variable "fd" going out of scope leaks the handle.
Signed-o... - 09:09 PM Revision cd78cd24 (ceph): rbd: fix leak of dir handle in get_rbd_seq
- CID 717098: Resource leak (RESOURCE_LEAK)
At (6): Variable "device_dir" going out of scope leaks the storage it
point... - 09:09 PM Revision 37881a32 (ceph): mds: Fix SessionMap::is_any_state()
- is_any_state() should return false when the by_state list is empty.
Signed-off-by: Yan, Zheng <zheng.z.yan@intel.com... - 09:09 PM Revision 681f6140 (ceph): mds: Adjust mydir auth when starting MDS that was stopped cleanly
- When starting a MDS that was stopped cleanly, we need manually
adjust mydir's auth. This is because MDS log is empty ... - 09:09 PM Revision b5814642 (ceph): librados: protect lookup_pool, get_pool_name with lock
- Fixes: #2525
Signed-off-by: Sage Weil <sage@inktank.com> - 09:09 PM Revision 61545de3 (ceph): librados: cleanup: use Mutex::Locker
- Signed-off-by: Sage Weil <sage@inktank.com>
- 09:09 PM Revision c683fa87 (ceph): OSD: big parameter passed by value, send_still_alive
- CID 717050: Big parameter passed by value (PASS_BY_VALUE)At (1): Passing
parameter i of type entity_inst_t (size 152 ... - 09:09 PM Revision 7808e501 (ceph): OSDMap: clear setprecision in print_osd_line
- CID 727987: Not restoring ostream format (STREAM_FORMAT_STATE)At (5): Changing
format state of stream "out" for categ... - 09:09 PM Revision eccf60e4 (ceph): librbd: fix coverity warnings for AioCompletions
- CID 717220: Uninitialized pointer field (UNINIT_CTOR)
At (4): Non-static class member "aio_type" is not initialized i... - 09:09 PM Revision efb2a574 (ceph): librbd: init everything in default AioRequest constructors
- CID 717222: Uninitialized pointer field (UNINIT_CTOR)
At (16): Non-static class member "m_hide_enoent" is not initial... - 09:09 PM Revision 38aeb000 (ceph): librbd: initialize on-disk header in ImageCtx ctor
- CID 717224: Uninitialized scalar field (UNINIT_CTOR)
At (26): Non-static class member field "header.snaps" is not
ini... - 09:09 PM Revision 404d45b5 (ceph): librbd: init m_req in LibrbdWriteback::C_Read ctor
- CID 717225: Uninitialized pointer field (UNINIT_CTOR)
At (2): Non-static class member "m_req" is not initialized in t... - 09:09 PM Revision 11da12fa (ceph): librbd: init cookie in WatchCtx ctor
- CID 717226: Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "cookie" is not initialized in t... - 09:09 PM Revision 74b85e7c (ceph): librbd: use 64-bits to shift order
- Order is never actually this high currently, but it be via librbd.
CID 716937: Overflowed return value (INTEGER_OVER... - 09:09 PM Revision 52943a6a (ceph): librbd: don't allow order to be more than 64
- Otherwise it will overflow a uint64_t when shifting.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 09:09 PM Revision 399fc01b (ceph): librbd: fix list for more than 1024 format 2 images
- r was not being set in the loop.
CID 716936: Infinite loop (INFINITE_LOOP)
At (1): Top of the loop.
Signed-off-by: ... - 09:09 PM Revision 68b1fd66 (ceph): rbd: make sure we have a device before trying to unmap
- CID 717444: Explicit null dereferenced (FORWARD_NULL)
At (48): Passing null pointer "devpath" to function
"do_kernel... - 09:09 PM Revision f35ab0fd (ceph): librados: init everything in default IoCtxImpl ctor
- CID 717219: Uninitialized pointer field (UNINIT_CTOR)
At (14): Non-static class member "objecter" is not initialized ... - 09:09 PM Revision e6ced04f (ceph): librados: fix use without NULL check in rados_pool_list
- CID 716911: Dereference after null check (FORWARD_NULL)
At (5): Passing null pointer "b" to function "strncat(char *,... - 09:09 PM Revision 23713527 (ceph): librados: always free buffer allocated by md_config_t::_get_val
- CID 717083: Resource leak (RESOURCE_LEAK)
At (3): Variable "str" going out of scope leaks the storage it points
to.
... - 07:59 PM Revision b841df00 (ceph): doc: fix broken link in command reference
- Signed-off-by: Ross Turk <ross@inktank.com>
- 07:39 PM Revision 5f9d0112 (ceph): Merge remote-tracking branch 'gh/wip-2525'
- Reviewed-by: Josh Durgin <josh.durgin@inktank.com>
- 07:29 PM Revision 24ef2ef0 (ceph): librados: init all variables in ctors
- C_aio_sparse_read_Ack's members are filled in by the only caller
immediately after construction, so make them argumen... - 06:43 PM Revision 796b9b6c (ceph): osd/: add PG_STATE_BACKFILLING
- PG_STATE_BACKFILLING is set when the pg enters the Backfilling state.
That is, +backfilling indicates that the pg has... - 06:43 PM Revision 3ebf52df (ceph): doc/: added documentation for backfill_reservation
- Signed-off-by: Samuel Just <sam.just@inktank.com>
- 06:43 PM Revision 1fafd99c (ceph): PG: add CEPH_FEATURE for backfill reservation
- Also adds backwards compatibility by just post_event-ing
the RemoteBackfillReserved() rather than sending the
message... - 06:43 PM Revision 4015343f (ceph): PG,osd_types,PGMonitor: make backfill state names more descriptive
- PG_STATE_BACKFILL->PG_STATE_BACKFILL_WAIT
and
PG_STATE_BACKFILLING->PG_STATE_BACKFILL
backfill -> wait_backfill
back... - 06:43 PM Revision b54a0a25 (ceph): osd/: add backfill reservations
- Previously, a new osd would be bombarded by backfills from many osds
simultaneously, resulting in excessively high lo... - 06:27 PM Feature #3219 (In Progress): Run tests in valgrind on gitbuilder
- It turns out this handled by teuthology tests, we just need to update the test suite to include running valgrind on c...
- 03:31 PM Feature #3219 (Resolved): Run tests in valgrind on gitbuilder
- This probably means modifying the scripts to run the test binaries within valgrind and using the --valgrind option in...
- 06:24 PM CephFS Bug #2285 (Fix Under Review): libcephfs: failure with empty name components
- This was probably caused by the memory error in filepath (encoded member not getting initialized), which may explain ...
- 06:22 PM CephFS Bug #3186 (Fix Under Review): mds: mds crash on client shutdown
- Proposed fix in wip-3186, specifically c92e1dd7b0106fa986985d8179a8ed66c61e6709. Needs review.
- 06:20 PM CephFS Bug #3184 (Fix Under Review): ceph-fuse should not segfault without a keyring
- 05:55 PM Documentation #3222 (Resolved): DOC: Get an Object from a Primary OSD
- ceph/doc/cluster-ops/control.rst should have usage for `ceph osd map {pool-name} {object-name}`
A knowledgebase ar... - 05:51 PM Revision fa219249 (ceph): test_librbd_fsx: add missing break statement
- Fortunately we never used the -m option.
CID 716962: Missing break in switch (MISSING_BREAK)
At (1): This case (valu... - 05:42 PM Revision c2cf8eb7 (ceph): librbd: assert overflow will not happen
- CID 716937: Overflowed return value (INTEGER_OVERFLOW)
At (3): Overflowed or truncated value (or a value computed fro... - 05:16 PM Bug #3221 (Resolved): disconnect_session_watchers missing pg
- /a/teuthology-2012-09-24_04:00:04-regression-stable-master-basic/28971/remote
--- end dump of recent events ---
2... - 05:03 PM rbd Documentation #3220 (Resolved): doc: more detail on QEMU+RBD page
- This page could use a bit more detail on the nature of the integration and how to use it. For example, why would som...
- 03:49 PM Revision e653816e (ceph): rgw: url_decode should allocate extra byte for dest
- Was missing extra byte for null termination
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 03:00 PM Bug #3002: ceph-authtool: --print does not work
- commit 4e40a7849442d633c9801639fbdaf27a97f39888
Author: Tommi Virtanen <tv@inktank.com>
Date: 2012-08-02 13:02:04... - 02:33 PM Revision 200ed2b3 (ceph): mds: Adjust mydir auth when starting MDS that was stopped cleanly
- When starting a MDS that was stopped cleanly, we need manually
adjust mydir's auth. This is because MDS log is empty ... - 02:19 PM RADOS Documentation #3218 (Closed): Doc: osdmaptool manpage out of date with code *and* usage
- 01:31 PM Feature #3191 (In Progress): client: coverity clean
- 01:05 PM rgw Feature #3216 (In Progress): rgw: RESTful usage api
- 01:03 PM rgw Feature #3216 (Resolved): rgw: RESTful usage api
- 01:03 PM rgw Documentation #3217 (Closed): rgw: document RESTful usage api
- 12:39 PM Feature #3215 (Resolved): qa: fix up system tests and add them to regression suite
- These tests produce the testrados_* binaries, and their source is in src/test/system/.
There are a few tests we ha... - 12:39 PM Bug #2525 (Resolved): librados: some functions are not thread-safe
- 11:47 AM Bug #3214 (Closed): osdmaptool's usage is incomplete
- --test-map-pg is shown, but not --test-map-object. In fact, there are a pile
of options missing from usage:
--du... - 11:18 AM Bug #3208: osd/PG.cc: 1346: FAILED assert(info.last_complete >= log.tail)
- wip_last_complete_assert has a fix/explanation.
#3213 also needs to be handled in this case. - 11:16 AM Bug #3213 (Resolved): PG: we do not persist missing set elements not in the log
- Normally the missing set is reconstructed on OSD startup by scanning the log and adding objects which are missing or ...
- 09:46 AM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- Here is an excerpt from the log that Chris originally provided....
- 09:42 AM rbd Bug #3204: rbd client kernel panic when osd connection is lost
- I believe have reproduced this problem (or perhaps something
like it) using stock stable kernel 3.5.4. I'm not 100% ... - 06:27 AM Bug #2476: osd: watch timeout depends on operations to an object
- Have you made any progress with this issue? It is very annoying and breaks my CI. Is there any way to avoid or workar...
- 03:29 AM Revision 05715359 (ceph): mds: Fix SessionMap::is_any_state()
- is_any_state() should return false when the by_state list is empty.
Signed-off-by: Yan, Zheng <zheng.z.yan@intel.com... - 02:42 AM Bug #3212: librados: failed to decode message of type 59 v1: buffer::end_of_buffer
- Ok, with packages 0.51-700-g1a9c8c7-1precise from wip-3212 and back to 0.41-1ubuntu2.1 on the client, it now refuses ...
- 01:24 AM Revision 2fddfb0a (ceph): rgw: url_decode should allocate extra byte for dest
- Was missing extra byte for null termination
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com> - 01:16 AM Revision df59a069 (ceph): Merge branch 'wip-rbd-coverity'
- Reviewed-by: Sage Weil <sage.weil@inktank.com>
- 12:57 AM Revision 4567a6df (ceph): librados: always free buffer allocated by md_config_t::_get_val
- CID 717083: Resource leak (RESOURCE_LEAK)
At (3): Variable "str" going out of scope leaks the storage it points
to.
... - 12:57 AM Revision 2c1b7f2c (ceph): secret: close fd on error
- CID 717079: Resource leak (RESOURCE_LEAK)
At (6): Handle variable "fd" going out of scope leaks the handle.
Signed-o... - 12:57 AM Revision 5b22c1d6 (ceph): rbd: fix leak of fd when importing an image from a file
- CID 719579: Resource leak (RESOURCE_LEAK)
At (7): Handle variable "fd" going out of scope leaks the handle.
Signed-o... - 12:57 AM Revision 55f72301 (ceph): rbd: fix leak of fd on error when reading an entire file
- CID 717100: Resource leak (RESOURCE_LEAK)
At (6): Handle variable "fd" going out of scope leaks the handle.
Signed-o... - 12:57 AM Revision 1747c1c1 (ceph): rbd: fix leak of dir handle in get_rbd_seq
- CID 717098: Resource leak (RESOURCE_LEAK)
At (6): Variable "device_dir" going out of scope leaks the storage it
point... - 12:42 AM Revision a204058a (ceph): librbd: fix list for more than 1024 format 2 images
- r was not being set in the loop.
CID 716936: Infinite loop (INFINITE_LOOP)
At (1): Top of the loop.
Signed-off-by: ... - 12:42 AM Revision ee1fe151 (ceph): rbd: make sure we have a device before trying to unmap
- CID 717444: Explicit null dereferenced (FORWARD_NULL)
At (48): Passing null pointer "devpath" to function
"do_kernel... - 12:42 AM Revision a5c77761 (ceph): librados: init everything in default IoCtxImpl ctor
- CID 717219: Uninitialized pointer field (UNINIT_CTOR)
At (14): Non-static class member "objecter" is not initialized ... - 12:42 AM Revision a677f479 (ceph): librados: fix use without NULL check in rados_pool_list
- CID 716911: Dereference after null check (FORWARD_NULL)
At (5): Passing null pointer "b" to function "strncat(char *,... - 12:42 AM Revision 7df76de6 (ceph): librbd: don't allow order to be more than 64
- Otherwise it will overflow a uint64_t when shifting.
Signed-off-by: Josh Durgin <josh.durgin@inktank.com> - 12:41 AM Revision 118c2127 (ceph): librbd: use 64-bits to shift order
- Order is never actually this high currently, but it be via librbd.
CID 716937: Overflowed return value (INTEGER_OVER... - 12:41 AM Revision cd3d3aa6 (ceph): librbd: init cookie in WatchCtx ctor
- CID 717226: Uninitialized scalar field (UNINIT_CTOR)
At (2): Non-static class member "cookie" is not initialized in t... - 12:41 AM Revision 073786eb (ceph): librbd: init m_req in LibrbdWriteback::C_Read ctor
- CID 717225: Uninitialized pointer field (UNINIT_CTOR)
At (2): Non-static class member "m_req" is not initialized in t... - 12:41 AM Revision dea894d4 (ceph): librbd: initialize on-disk header in ImageCtx ctor
- CID 717224: Uninitialized scalar field (UNINIT_CTOR)
At (26): Non-static class member field "header.snaps" is not
ini... - 12:41 AM Revision c1ffe08c (ceph): librbd: init everything in default AioRequest constructors
- CID 717222: Uninitialized pointer field (UNINIT_CTOR)
At (16): Non-static class member "m_hide_enoent" is not initial... - 12:41 AM Revision 3486050d (ceph): librbd: fix coverity warnings for AioCompletions
- CID 717220: Uninitialized pointer field (UNINIT_CTOR)
At (4): Non-static class member "aio_type" is not initialized i...
09/24/2012
- 08:30 PM rbd Feature #2788: rbd: add -l to rbd ls, show snapshots
- 08:16 PM Revision 3ca3cd4c (ceph): Merge branch 'next'
- 07:29 PM Revision 86b3e8ae (ceph): OSD: add init and shutdown for OSDService
- Signed-off-by: Samuel Just <sam.just@inktank.com>
- 07:09 PM Revision e1776809 (ceph): librbd: ensure header is up to date after initial read
- Use an assert version op in combination with our watch, and re-read
the header until it's not stale. Header updates a... - 06:57 PM Revision 5cba7782 (ceph): librados: note that watch's version param is ignored
- Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
- 06:47 PM rbd Feature #3198: librbd: coverity clean
- we'll see if coverity detects anything else
- 06:12 PM rbd Feature #3198 (Fix Under Review): librbd: coverity clean
- wip-rbd-coverity
- 03:24 PM rbd Feature #3198 (In Progress): librbd: coverity clean
- 06:47 PM Feature #3197: librados: coverity clean
- we'll see if coverity detects anything else
- 06:12 PM Feature #3197 (Fix Under Review): librados: coverity clean
- wip-rbd-coverity
- 03:24 PM Feature #3197 (In Progress): librados: coverity clean
- 06:36 PM Bug #3212: librados: failed to decode message of type 59 v1: buffer::end_of_buffer
- see wip-3212
we weren't encoding using the pre-v0.42 pool_stat_t.. or at least that's what it looks like, i wasn't... - 06:35 PM Bug #3212 (Resolved): librados: failed to decode message of type 59 v1: buffer::end_of_buffer
- from ML:...
- 06:08 PM rgw Bug #3211 (Resolved): rgw: crash on armhf architecture
- Ubuntu, launchpad issue #149582....
- 05:57 PM CephFS Bug #3210 (Resolved): mds crashed and segfault at unlink_local_finish
- Logs: /a/teuthology-2012-09-23_19:00:07-regression-master-testing-gcov/28428...
- 05:55 PM Bug #3209 (Resolved): rbd_fsx_cache_writethrough test failure in the nightlies
- Logs: ubuntu@teuthology:/a/teuthology-2012-09-23_19:00:07-regression-master-testing-gcov/28530...
- 04:29 PM Bug #3208 (Resolved): osd/PG.cc: 1346: FAILED assert(info.last_complete >= log.tail)
- ...
- 03:22 PM rgw Feature #3207 (Resolved): qa: swift functional tests in nightly
- 03:19 PM rgw Feature #3206 (Resolved): rgw: resolve vanity CNAMEs
- 10:58 AM rbd Feature #3205 (New): doc: pool permissions for cloning use-case
- 10:50 AM rbd Feature #2326 (Resolved): krbd: use new class interfaces, new image format
- 10:00 AM CephFS Bug #3184: ceph-fuse should not segfault without a keyring
- client->init() wasn't getting checked for error. Proposed fix in wip-3184 branch.
- 09:21 AM rbd Bug #3204 (Resolved): rbd client kernel panic when osd connection is lost
- From ML:...
- 04:55 AM Revision 7782ccb5 (ceph): doc: Added messaging section to ref. Placeholders. Definitions needed.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:54 AM Revision 88534690 (ceph): doc: Added space for Emacs users.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:54 AM Revision 446e68cf (ceph): doc: Added journal section placeholders. Definitions needed.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:53 AM Revision 04ddd14e (ceph): doc: Fixed hyperlink.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:52 AM Revision abf1bf43 (ceph): doc: Clean up and added placeholders for new definitions.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:51 AM Revision 78439e96 (ceph): doc: Fixed hyperlink.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:51 AM Revision 873ccdfe (ceph): doc: Fixed hyperlink.
- Signed-off-by: John Wilkins <john.wilkins@inktank.com>
- 04:50 AM Revision 441ae009 (ceph): doc: Restored "Differences from Posix" to /doc/dev
- Fixes: #3185
Signed-off-by: John Wilkins <john.wilkins@inktank.com>
Also available in: Atom