Commit Graph

26053 Commits

Author SHA1 Message Date
Danny Al-Gaaf
14871d0566 mount/mount.ceph.c: reduce scope of 'skip' in parse_options()
Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-16 14:15:51 +02:00
Danny Al-Gaaf
eb808cff39 src/mds/flock.cc: reduce scope of old_lock_to_end in two cases
Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-16 14:15:47 +02:00
Danny Al-Gaaf
ce84a226d3 mds/Locker.cc: reduce scope of forced_change_max
Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-16 14:15:40 +02:00
Danny Al-Gaaf
e7d47827f0 src/crush/mapper.c: reduce scope of some local variables
Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-16 14:15:13 +02:00
Danny Al-Gaaf
e0f1084580 auth/Crypto.cc: reduce scope of local variable in_buf
Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-16 14:11:08 +02:00
Danny Al-Gaaf
aa11c68fdd rgw/rgw_rados.cc: remove not needed code
Fix for cppcheck warning:
[src/rgw/rgw_rados.cc:2390]: (warning) Assignment of function
  parameter has no effect outside the function.

Assignment of if_nomatch_str.c_str() to if_nomatch has no
effect outside the function and the functions isn't used
inside the function after the assignment.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-16 14:11:02 +02:00
Danny Al-Gaaf
cd48f57039 rgw/rgw_gc.cc: fix possible NULL pointer dereference
Fix/silence cppcheck warning:
[src/rgw/rgw_gc.cc:185] -> [src/rgw/rgw_gc.cc:181]: (error) Possible
  null pointer dereference: ctx - otherwise it is redundant to check
  it against null.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-16 14:10:42 +02:00
Danny Al-Gaaf
403bfa43da osd/OSD.cc: remove unused variable
Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-16 14:04:18 +02:00
Sage Weil
2a441aa28a Merge pull request #279 from ceph/wip-libcephfs-env
Reviewed-by: Greg Farnum <greg@inktank.com>
2013-05-14 17:06:53 -07:00
John Wilkins
8f3fb97256 Added OSD to glossary, removed parenthetical.
Signed-off-by: John Wilkins <john.wilkins@inktank.com>
2013-05-14 17:06:12 -07:00
John Wilkins
f36ec02f93 doc: Updated architecture document.
fixes: #2968

Signed-off-by: John Wilkins <john.wilkins@inktank.com>
2013-05-14 17:05:43 -07:00
David Zafman
624c8cc30f Merge branch 'wip-5049'
Reviewed-by: Sam Just <sam.just@inktank.com>
2013-05-14 16:38:50 -07:00
David Zafman
48e89b5171 OSD: scrub interval checking
Do arithmetic so large intervals don't wrap
Fix log messages to reflect the change and improve output
Add message when skipping scrub due to load

fixes: #5049

Signed-off-by: David Zafman <david.zafman@inktank.com>
2013-05-14 16:28:45 -07:00
David Zafman
1f4e7a5aaf OSD: Don't scrub newly created PGs until min interval
Set initial values for last_scrub_stamp, last_deep_scrub_stamp

fixes: #5050, #5051

Signed-off-by: David Zafman <david.zafman@inktank.com>
2013-05-14 16:28:40 -07:00
Sage Weil
7b93d28757 doc/release-notes: v0.62
Signed-off-by: Sage Weil <sage@inktank.com>
2013-05-14 16:02:20 -07:00
Gary Lowell
2ba167be0e Merge branch 'next' 2013-05-14 15:38:24 -07:00
athanatos
5ff703d60a Merge pull request #283 from dachary/wip-5058
internal documentation proofreading

Reviewed-by: Sam Just <sam.just@inktank.com>
2013-05-14 15:28:45 -07:00
Sage Weil
52b0438c66 doc/rados/configuration: fix [mon] osd min down report* config docs
Fix other osd -> mon section name, and note the old config value name prior
to v0.62.

Fixes: #5044.
Signed-off-by: Sage Weil <sage@inktank.com>
2013-05-14 14:02:27 -07:00
Loic Dachary
2a4425af0e reflect recent changes in the pg deletion logic
No need to wait on DeletingStateRef for flush d3dd99b725
Fix typos

http://tracker.ceph.com/issues/5058 refs #5058

Signed-off-by: Loic Dachary <loic@dachary.org>
2013-05-14 22:46:37 +02:00
Loic Dachary
1c53991e4c fix typos and add hyperlink to peering
s/;/:/
s/up_acting_affected/acting_up_affected/
Add relative link to ../../peering

http://tracker.ceph.com/issues/5058 refs #5058

Signed-off-by: Loic Dachary <loic@dachary.org>
2013-05-14 22:46:37 +02:00
Loic Dachary
b7d4012c06 typo s/come/some/
http://tracker.ceph.com/issues/5058 refs #5058

Signed-off-by: Loic Dachary <loic@dachary.org>
2013-05-14 22:46:36 +02:00
Loic Dachary
dbddffef06 update op added to a waiting queue or discarded
The decision to discard an op happens either in OSD or in PG.
The operation queue goes to a single OpWQ object if waiting_map does not impose a delay op_queue.
The decision to add an op to a waiting queue regardless of its type is updated.
The decision to add a CEPH_MSG_OSD_OP to a waiting queue is described in full.

http://tracker.ceph.com/issues/5058 refs #5058

Signed-off-by: Loic Dachary <loic@dachary.org>
2013-05-14 22:44:58 +02:00
Sage Weil
afeb8f2d52 md/Sever.cc: fix straydn assert
From fb222a0a1c, we only know straydn is
non-null if oldin is non-null.

Signed-off-by: Sage Weil <sage@inktank.com>
2013-05-14 10:31:27 -07:00
Sage Weil
29d8ec4ecd Merge pull request #285 from dalgaaf/wip-da-CID-fixes-2-v3
Reviewed-by: Sage Weil <sage@inktank.com>
2013-05-14 10:30:20 -07:00
Danny Al-Gaaf
e69257eaee rgw/rgw_user.cc: fix possible NULL pointer dereference
CID 1019559 (#1 of 1): Dereference after null check (FORWARD_NULL)
  var_deref_model: Passing null pointer "usr" to function
  "RGWUser::get_store()", which dereferences it.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 19:20:29 +02:00
Danny Al-Gaaf
d69290219d mds/Server.cc: fix possible NULL pointer dereference
Assert if straydn is NULL.

CID 1019554 (#2 of 2): Dereference after null check (FORWARD_NULL)
  var_deref_model: Passing null pointer "straydn" to function
  "MDSCacheObject::is_auth() const", which dereferences it.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 19:15:23 +02:00
Danny Al-Gaaf
fb222a0a1c mds/Server.cc: fix possible NULL pointer dereference
Assert of straydn is NULL here.

CID 1019558 (#1 of 1): Dereference after null check (FORWARD_NULL)
  var_deref_model: Passing null pointer "straydn" to function
  "CDentry::get_dir() const", which dereferences it.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 19:07:29 +02:00
Danny Al-Gaaf
c87788b69b mds/Server.cc: fix possible NULL pointer dereference
Assert if destdn == NULL.

CID 1019557 (#1 of 1): Dereference after null check (FORWARD_NULL)
  var_deref_model: Passing null pointer "destdn" to function
  "CDentry::get_dir() const", which dereferences it.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 19:02:20 +02:00
Danny Al-Gaaf
088455f85e librados/AioCompletionImpl.h: add missing Lock
Add missing Lock around code changing AioCompletionImpl::rval/ack and safe
in C_AioCompleteAndSafe::finish().

CID 1019565 (#1 of 1): Data race condition (MISSING_LOCK)
  missing_lock: Accessing "this->c->rval" ("_ZN8librados17AioCompletionImplE.rval")
  requires the "Mutex._m" lock.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:50:09 +02:00
Danny Al-Gaaf
8a52350dd8 src/dupstore.cc: check return value of list_collections()
CID 1019545 (#1 of 1): Unchecked return value (CHECKED_RETURN)
  check_return: Calling function "ObjectStore::list_collections
  (std::vector<coll_t, std::allocator<coll_t> > &)" without
  checking return value (as is done elsewhere 5 out of 6 times).

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:44:06 +02:00
Danny Al-Gaaf
70a4a971f4 mds/Server.cc: fix possible NULL pointer dereference
CID 1019555 (#1 of 1): Dereference after null check (FORWARD_NULL)
  var_deref_model: Passing null pointer "in" to function
  "Server::_need_force_journal(CInode *, bool)", which dereferences it.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:43:37 +02:00
Danny Al-Gaaf
21489acffe src/rbd.cc: use 64-bits to shift 'order'
CID 1019568 (#1 of 1): Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)
  overflow_before_widen: Potentially overflowing expression "1 << *order" with
  type "int" (32 bits, signed) is evaluated using 32-bit arithmetic before being
  used in a context which expects an expression of type "uint64_t" (64 bits,
  unsigned). To avoid overflow, cast the left operand to "uint64_t" before
  performing the left shift.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:32 +02:00
Danny Al-Gaaf
3e44682519 mon/Monitor.cc: init 'timecheck_acks' with '0' in constructor
CID 1019623 (#1 of 1): Uninitialized scalar field (UNINIT_CTOR)
  uninit_member: Non-static class member "timecheck_acks" is not
  initialized in this constructor nor in any functions that it calls.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:31 +02:00
Danny Al-Gaaf
528ec3533a mon/Monitor.h: init 'crc' in constructor with '0'
CID 1019624 (#1 of 1): Uninitialized scalar field (UNINIT_CTOR)
  uninit_member: Non-static class member "crc" is not initialized
  in this constructor nor in any functions that it calls.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:31 +02:00
Danny Al-Gaaf
988363094a mon/QuorumService.h: remove unused QuorumService::flags
CID 1019626 (#1 of 1): Uninitialized scalar field (UNINIT_CTOR)
  uninit_member: Non-static class member "flags" is not initialized
  in this constructor nor in any functions that it calls.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:31 +02:00
Danny Al-Gaaf
8df55e0a8b test/test_cors.cc: initialize key_type in constructor
CID 1019635 (#1 of 1): Uninitialized pointer field (UNINIT_CTOR)
  uninit_member: Non-static class member "kt" is not initialized in
  this constructor nor in any functions that it calls.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:31 +02:00
Danny Al-Gaaf
eac545e12c tools/ceph.cc: cleanup memory allocated for 'buf'
CID 717123 (#1-2 of 2): Resource leak (RESOURCE_LEAK)
  leaked_storage: Variable "buf" going out of scope leaks the storage
  it points to.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:31 +02:00
Danny Al-Gaaf
c3c140b38c tools/ceph.cc: close file descriptor in error case
CID 717122 (#1 of 1): Resource leak (RESOURCE_LEAK)
  leaked_handle: Handle variable "fd" going out of scope leaks
  the handle.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:31 +02:00
Danny Al-Gaaf
043ea2ce9b tools/ceph.cc: close file descriptor in error case
CID 717121 (#1 of 1): Resource leak (RESOURCE_LEAK)
  leaked_handle: Handle variable "fd" going out of scope leaks the handle.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:31 +02:00
Danny Al-Gaaf
36028916c4 test_filejournal.cc: cleanup memory in destructor
CID 716885 (#1 of 1): Resource leak in object (CTOR_DTOR_LEAK)
  alloc_new: Allocating memory by calling "new C_SafeCond(&this->lock,
    &this->cond, &this->done, NULL)".
  ctor_dtor_leak: The constructor allocates field "c" of "C_Sync" but
    the destructor and whatever functions it calls do not free it.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:30 +02:00
Danny Al-Gaaf
7ea44ee06e librbd/test_librbd.cc: free memory in test_list_children()
CID 719581 (#7 of 7): Resource leak (RESOURCE_LEAK)
CID 719581 (#6 of 7): Resource leak (RESOURCE_LEAK)
  leaked_storage: Variable "pools" going out of scope leaks the
  storage it points to.
CID 719582 (#6-7 of 7): Resource leak (RESOURCE_LEAK)
  leaked_storage: Variable "children" going out of scope leaks
  the storage it points to.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:30 +02:00
Danny Al-Gaaf
3c285c44bd scratchtool.c: cleanup rados_t on error
Make sure rados_shutdown() get called also in error case.

CID 717106 (#1 of 1): Resource leak (RESOURCE_LEAK)
  leaked_storage: Variable "cl" going out of scope leaks the
  storage it points to.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:30 +02:00
Danny Al-Gaaf
cab8e9bfcd test/kv_store_bench.cc: fix resource leak
CID 727984 (#5 of 5): Resource leak (RESOURCE_LEAK)
  leaked_storage: Variable "cb_args" going out of scope leaks the storage
  it points to.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:30 +02:00
Danny Al-Gaaf
d8cb7dfc22 filestore/test_idempotent_sequence.cc: fix FileStore leaks
CID 717107 (#1 of 1): Resource leak (RESOURCE_LEAK)
  leaked_storage: Variable "store" going out of scope leaks the
  storage it points to.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:30 +02:00
Danny Al-Gaaf
349cfb41d0 ceph-filestore-dump.cc: cleanup on error case
CID 1019589 (#1 of 1): Resource leak (RESOURCE_LEAK)
  leaked_storage: Variable "t" going out of scope leaks the
  storage it points to.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:30 +02:00
Danny Al-Gaaf
df4c099af4 ceph-filestore-dump.cc: cleanup resource in error case
CID 1019590 (#1 of 1): Resource leak (RESOURCE_LEAK):
 leaked_storage: Variable "rmt" going out of scope leaks the
 storage it points to.

Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
2013-05-14 18:39:30 +02:00
Gary Lowell
9382379cc6 v0.62 2013-05-14 09:13:07 -07:00
Sage Weil
c5deb5dbe2 doc/release-notes: v0.61.2
Signed-off-by: Sage Weil <sage@inktank.com>
2013-05-13 20:48:20 -07:00
Sage Weil
45e19510a3 Merge remote-tracking branch 'gh/next' 2013-05-13 17:17:43 -07:00
Sage Weil
393140e77d Merge pull request #281 from ceph/wip-rbd-rm-enoent
Reviewed-by: Sage Weil <sage@inktank.com>
2013-05-13 16:07:55 -07:00