Commit Graph

21564 Commits

Author SHA1 Message Date
Josh Durgin
f0a5c562f5 doc: small fixes to the OpenStack page
* 'Ceph common' is not a package name
* config dir is /etc/nova, not /etc/conf
* remove trailing whitespace

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Josh Durgin
8964f10faf doc: remove MDS from diagram describing RBD and OpenStack
The MDS is not used with RBD or librados.

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Josh Durgin
f586add47b doc: extend QEMU/RBD docs
Describe running a vm from RBD, cache options, and discard support.

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Sage Weil
4ea9b9f34d doc: minor fixups to rpm install doc
Signed-off-by: Sage Weil <sage@inktank.com>
2012-09-26 17:38:24 -07:00
Gary Lowell
85b01517bc doc: draft rpm installation 2012-09-26 17:33:04 -07:00
Sam Lang
cc9d7da5b8 cephfs: Fix warning - use err instead of errno
Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 17:28:21 -07:00
Sam Lang
e8c734bbf1 client: Fix compile error: bad {0} initializers
Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 17:26:34 -07:00
Sage Weil
e0af6a546e Merge remote-tracking branch 'gh/wip-3186
Reviewed-by: Sage Weil <sage@inktank.com>
2012-09-26 17:06:03 -07:00
Yehuda Sadeh
67535f2dc1 rgw: different test for multi object delete
We need to check for the existence of the sub-resource.

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-09-26 16:55:15 -07:00
Sage Weil
b74b0f905f Merge branch 'wip-coverity-client'
Reviewed-by: Sage Weil <sage@inktank.com>
2012-09-26 16:45:07 -07:00
Sam Lang
cd15405564 client: Fix coverity UNINIT_CTOR defects
Coverity finds cases where constructors are not initializing
all the members of the struct/class.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
844ffd6aff client: Fix coverity 716909 [FORWARD_NULL]
If we fill the request path from the dentry instead of the inode, we
need to use the dentry inode.  This fixes a segfault that would occur
in the case where request->inode is in fact null.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
68dea676d9 client: Add asserts for coverity bugs
Coverity 716907-716909 [FORWARD_NULL} doesn't like using a pointer
that might be null.  Assertions check that pointers are valid
before dereferencing.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
10186fe795 client: Fixes coverity defect 716891
Fix for coverity defect 716891 [DEADCODE] in
Client::encode_dentry_release where the released var is initialized
to 0, but never set, so the pre-emptive release of the dentry
capability (if requested by the drop flag) never happens.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
7945f8bf9f client: Fixes coverity defect 716890 [DEADCODE]
In choose_target_mds, the mds number is initialized to 0 and
then a separate target mds number is chosen based on the inode
set in the request.  If the inode isn't set, we drop to choosing
a random mds, but only if the mds number is < 0, which doesn't
happen with the initialize to 0.  This fix initializes the mds
number to -1, ensuring a random mds is chosen.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
65700fc4f6 client: Coverity fixes for 716841-716844
Fixes coverity errors (CHECKED_RETURN) for all calls to
Client::path_walk() where return value wasn't getting checked
in case of error.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
bc45cded3f cephfs: Fixes for coverity bugs 716840 and 716970
Fixes for two coverity bugs in cephfs.cc.

716840 (CHECKED_RETURN) reported that the return value from
fstat wasn't getting checked.  It now is checked, reports an
error and returns to the caller.

716970 (NEGATIVE_RETURNS) reported that the file descriptor passed
to fstat (*fd) might be negative, which isn't allowed.  The check at
the top that open failed wasn't aborting the function (when *fd < 0),
now it does.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Yehuda Sadeh
bba17662fa rgw: copy_object should not override ETAG implicitly
When copying an object with new attrs, we still need to
maintain the ETAG.

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-09-26 16:14:02 -07:00
Sam Lang
a9e304115f mds: Move check for empty path lookup to getattr
Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:04:50 -07:00
Mike Ryan
c689556896 PG, OSD: reject backfills when an OSD is nearly full
Reject backfills when an OSD reaches a configurable full ratio. Retry
backfilling periodically in the hopes that the OSD has become less full.

This changeset introduces two configuration options for dealing with
this: osd_refuse_backfill_full_ratio and osd_backfill_retry_interval.

We also introduce two new state transitions in the PG's Active state.

Signed-off-by: Mike Ryan <mike.ryan@inktank.com>
2012-09-26 11:57:31 -07:00
Mike Ryan
a6b0d55b2b timer: add unsafe callbacks option
Using unsafe callbacks drops the lock between invocations of event
callbacks. It is useful under some circumstances, but the user must take
caution. See the comment in Timer.h for full details.

Signed-off-by: Mike Ryan <mike.ryan@inktank.com>
2012-09-26 11:57:20 -07:00
John Wilkins
5b232a66b9 doc: Fixed typo.
Signed-off-by: John Wilkins <john.wilkins@inktank.com>
2012-09-26 11:06:26 -07:00
Samuel Just
9f6ee01e8d JournalingObjectStore: lock journal_lock at top of journal_replay
CID 716968: Data race condition (MISSING_LOCK)At (6): Accessing "this->op_seq"
("JournalingObjectStore.op_seq") requires the "Mutex._m" lock.

Doesn't really matter, but this should satisfy coverity.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
e02258516c FlatIndex: terminate dir_name buffer passed to strncpy
CID 716836: Buffer not null terminated (BUFFER_SIZE_WARNING)At (1): Calling
strncpy with a maximum size argument of 4096 bytes on destination array
"dir_name" of size 4096 bytes might leave the destination string unterminated.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
d3bd9cbd30 FileStore: uninit var in ctor OpSequencer::parent
CID 717334: Uninitialized pointer field (UNINIT_CTOR)At (2): Non-static class
member "parent" is not initialized in this constructor nor in any functions
that it calls.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
0e73313bb9 FileStore: fix omap_store and dbomap leaks in mount
CID 717093: Resource leak (RESOURCE_LEAK)At (48): Variable "omap_store" going
out of scope leaks the storage it points to.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
3bef5eb4d7 FileStore: don't leak r in mount
ID 717092: Resource leak (RESOURCE_LEAK)At (40): Handle variable "r" going out
of scope leaks the handle.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
f9c5ac3664 FileStore: fix fd and tmpfd leaks in _detect_fs()
CID 717088: Resource leak (RESOURCE_LEAK)At (11): Handle variable "tmpfd" going
out of scope leaks the handle.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
b99979cffc FileStore: fix leaked fd and check lseek in _test_fiemap
CID 716861: Other violation (CHECKED_RETURN)At (3): Calling function "lseek(fd,
off, 0)" without checking return value. This library function may fail and
return an error code.

CID 717090: Resource leak (RESOURCE_LEAK)At (10): Handle variable "fd" going
out of scope leaks the handle.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
620701df49 FileStore: fix filedescriptor leak in mkfs
CID 717091: Resource leak (RESOURCE_LEAK)At (39): Handle variable "fd" going
out of scope leaks the handle.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
33f96181dd FileStore: fix statfs,fstatfs,fstat ret val checks
CID 716863: Other violation (CHECKED_RETURN)At (20): Calling function
"fstat(basedir_fd, &basest)" without checking return value. This library
function may fail and return an error code.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:18 -07:00
Samuel Just
ea91ee58ff FileJournal: uninit var in ctor aio_ctx FileJournal
CID 717333: Uninitialized pointer field (UNINIT_CTOR)At (2): Non-static class
member "aio_ctx" is not initialized in this constructor nor in any functions
that it calls.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:15:13 -07:00
Samuel Just
147e90c084 FileJournal: uninit var in ctor FileJournal
CID 717332: Uninitialized pointer field (UNINIT_CTOR)At (12): Non-static class
member field "iocb.aio_fildes" is not initialized in this constructor nor in
any functions that it calls.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:15:13 -07:00
Samuel Just
8ec08c2dae FileJournal: check return value of lseek in write_fd
CID 716859: Other violation (CHECKED_RETURN)At (1): Calling function
"lseek64(this->fd, pos, 0)" without checking return value. This library
function may fail and return an error code.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:15:07 -07:00
Sage Weil
577184dd5b Merge remote-tracking branch 'gh/wip-mon-gv'
Reviewed-by: Joao Eduardo Luis <joao.luis@inktank.com>
Reviewed-by: Greg Farnum <greg@inktank.com>

Conflicts:
	src/include/ceph_features.h
2012-09-26 09:47:18 -07:00
Sam Lang
47983df4cb client: Fix for #3184 cfuse segv with no keyring
Fixes bug #3184 where the ceph-fuse client segfaults if authx is
enabled but no keyring file is present.  This was due to the
client->init() return value not getting checked.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 08:24:25 -07:00
Sage Weil
f310a1c5e6 mds: fix ino release on session close
If we project an inode release, we need to follow through, even if for
some reason we decide to keep the session active.  Clear out the session
interval_sets in case that happens.

Fixes: #1677
Signed-off-by: Sage Weil <sage@inktank.com>
2012-09-26 08:24:25 -07:00
Sage Weil
feb1946a02 Merge remote-tracking branch 'gh/wip-rbd-coverity
Reviewed-by: Sage Weil <sage@inktank.com>
2012-09-25 22:31:23 -07:00
Sam Lang
26882dace7 client: Put all libcephfs gtest tests into one bin
* Modify the Makefile.am to run all gtest libcephfs tests through
a single binary: test_libcephfs.

* Add tests for #2285, #3186, and #2778

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-25 18:14:12 -07:00
Sam Lang
c92e1dd7b0 mds: Handle empty relpath from client getattr
A bug in the client (see 2b54391) results in an empty relpath on
a lookup request.  This causes a segfault in the mds, because the
getattr logic expects a lookup to have a relpath to place in the
response.  The fix here ensures that lookups include a non-empty
relpath, o.w. aborting the request and returning -EINVAL to the
client.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-25 18:06:31 -07:00
Samuel Just
5c8aea783a FileJournal: fix potential overflow in create()
CID 717016: Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)At (1):
Potentially overflowing expression "g_conf->osd_max_write_size << 20" with type
"int" (32 bits, signed) is evaluated using 32-bit arithmetic before being used
in a context which expects an expression of type "int64_t" (64 bits, signed).
To avoid overflow, cast the left operand to "int64_t" before performing the
left shift.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-25 14:59:29 -07:00
Samuel Just
5bf6d22583 FileJournal: fix memory leak in _open_file
CID 717087: Resource leak (RESOURCE_LEAK)At (16): Variable "buf" going out of
scope leaks the storage it points to.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-25 14:59:25 -07:00
John Wilkins
2455147ca9 doc: Added an anchor to enable linking from CRUSH map section.
Signed-off-by: John Wilkins <john.wilkins@inktank.com>
2012-09-25 14:55:54 -07:00
John Wilkins
c8be4640cd doc: Clarified descriptions, and improved IA and navigation.
Signed-off-by: John Wilkins <john.wilkins@inktank.com>
2012-09-25 14:55:22 -07:00
Sam Lang
2b54391899 client: Fix to client filepath initializing
The filepath constructor that takes a const char * is missing the
initializer for the encoded member.  This results in uninitialized
memory, so the encoded field is sometimes true, resulting in mds
crashes (see #3186) and client errors with empty components in path
names.  This commit fixes #3186 and #2285.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-25 14:48:32 -07:00
Joao Eduardo Luis
d5bcf41402 mon: include auth mon's paxos version on latest gv calculation
Signed-off-by: Joao Eduardo Luis <joao.luis@inktank.com>
Reviewed-by: Sage Weil <sage@inktank.com>
2012-09-25 22:32:29 +01:00
Samuel Just
6b35b88313 DBObjectMap::_get_header fix shadowed var causing dead code
CID 716897: Logically dead code (DEADCODE)At (5): Execution cannot reach this
statement "return r;".

The outer r was shadowed.  Instead, just return the error code from the
loop.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-25 14:13:54 -07:00
Samuel Just
8a3efbbcff osd_types: uninit var in ctor pg_query_t
CID 717346: Uninitialized scalar field (UNINIT_CTOR)At (2): Non-static class
member "epoch_sent" is not initialized in this constructor nor in any functions
that it calls.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-25 14:10:11 -07:00
Samuel Just
3e4f3794cb osd_types: typo in object_info_t::decode for struct_v==6
hoid.hash is uninitialized, and should not be used to
initialize hoid.hash.

CID 717200: Uninitialized scalar variable (UNINIT)At (9): Using uninitialized
value "hoid.hash" when calling "hobject_t::hobject_t(object_t, std::string
const &, snapid_t, uint64_t, int64_t)".

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-25 14:09:32 -07:00
Samuel Just
4f621a1a1f ReplicatedPG: add assert to snapset.clones search
CID 716943: Using invalid iterator (INVALIDATE_ITERATOR)At (27): Dereferencing
iterator "p" though it is already past the end of its container.

The assert ensures that p will not be dereferenced if invalid.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-25 14:09:32 -07:00