Commit Graph

21412 Commits

Author SHA1 Message Date
Sage Weil
879b34daa9 v0.52
-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1.4.11 (GNU/Linux)
 
 iQIcBAABAgAGBQJQZIivAAoJEH6/3V0X7TFtgggQAKU97wvpdnqeYdGPDWH5A8sR
 HGzsSvJFTMTDCN42sJA/QFCaBYEO0BUlng8bJBFVCgPrn2Rl8GhMORRyTnzHiRhr
 DHHgI5zoGtteYHYByCXcTGh4iSxcClmXLNIP4kd4TY15By/npcHo5zDZ7fOQENb8
 9OCF38eu7xIU1VhNCo97pNoKCGM0THfCvY+qbRiZ7rSaMPoU2h55+f28n/8NHyoC
 a3COmQB3QHErf9J1o+6zwBRM+z03+5i5J5ojv+FFaOj8r0KgNTssDCuolYPdyhL/
 xaQOtEc6QHH4qYpEMxbMdTgyTkssnn8Qtqb1XqxjCoL7W1YxKiRfQCathVjROQ2b
 wTkyN1JihLxzcWmoFph7z2gtPcTaqajlp800qxUjC8kQj63YhIUiSLMMMUqkxhLw
 GkWRflrzVXRhrVfTajFzKrzjDm9vuzZz+hxvJLVRGwReJ48rxOybzA69hUc9fpbo
 Tgui3CSJAEqlqgXb8VKmwOJJu+IYjJrOEON/5++lNSexN8fAqDyMC2HTPlClQqnp
 fDK9AT9xGsm6V/PB40I8jmhOVH23LttAUqW6M3kEMmIBBdF/krv1K+UPfKCMxFS/
 xsxfRNmVd84ycJWvPSxUPkWdl0bDRj9PQnV9iCuZiAY9f19dYhPWJp3c8v7ThPTB
 oFL9UJFMDcFJ3uWcsa/p
 =MsuW
 -----END PGP SIGNATURE-----

Merge tag 'v0.52'

v0.52

Conflicts:
	src/rgw/rgw_rados.cc
2012-09-27 12:54:07 -07:00
Yehuda Sadeh
214327ef6f rgw: copy_object should not override ETAG implicitly
When copying an object with new attrs, we still need to
maintain the ETAG.

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>

Conflicts:
	src/rgw/rgw_rados.cc
2012-09-27 12:52:21 -07:00
Jim Schutt
25a9620a72 FileJournal: correctly check return value of lseek in write_fd
Signed-off-by: Jim Schutt <jaschut@sandia.gov>
2012-09-27 11:09:50 -07:00
Josh Durgin
3144690937 doc: fix injectargs syntax
The OSD processes only a single string. The existing example wouldn't
even be passed to the OSD, since it would be interpreted as an option
to the ceph command.

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-27 10:19:59 -07:00
Gary Lowell
e48859474c v0.52 2012-09-27 16:26:11 +00:00
Sage Weil
9e9c5f2591 osd: make 'pg <pgid> revert ...' command idempotent
A failure in the ceph tool -> osd connection may mean this command is sent
twice.  This regularly causes failures in QA.

Signed-off-by: Sage Weil <sage@inktank.com>
2012-09-27 08:11:58 -07:00
Sage Weil
d3d1b7b377 Merge remote-tracking branch 'gh/wip-rbd-docs' 2012-09-26 18:43:34 -07:00
Sage Weil
de5bb62e9c Merge remote-tracking branch 'gh/wip_coverity_osd'
Conflicts:
	src/librbd/internal.cc

Reviewed-by: Sage Weil <sage@inktank.com>
2012-09-26 18:43:12 -07:00
Sage Weil
f6da4377d0 Merge branch 'wip-rpm-doc' 2012-09-26 18:42:52 -07:00
Sam Lang
175465bbd1 cephfs: Fix breakage of cephfs link
Add libcommon.la to LDADD for cephfs.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
Reviewed-by: Samuel Just <sam.just@inktank.com>
2012-09-26 17:50:19 -07:00
Josh Durgin
8c3bfaa30a doc: update ceph-authtool man page
* document osd capabilities
* fix librados user example
* fix example with outdated syntax (pool= and uid= are not supported)
* ignore auid, object prefix, and class restrictions for now since
  they aren't usable yet
* fix header for keyring file section

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Josh Durgin
3b0e1205ce doc: clarify rbd caching
* note that it's only for librbd
* put settings in the [client] section for clarity
* fix typo
* re-indent and clarify sentence about clustered fs on top of RBD

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Josh Durgin
fa3a7472f9 doc: fix typo in dev layering notes
Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Josh Durgin
f0a5c562f5 doc: small fixes to the OpenStack page
* 'Ceph common' is not a package name
* config dir is /etc/nova, not /etc/conf
* remove trailing whitespace

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Josh Durgin
8964f10faf doc: remove MDS from diagram describing RBD and OpenStack
The MDS is not used with RBD or librados.

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Josh Durgin
f586add47b doc: extend QEMU/RBD docs
Describe running a vm from RBD, cache options, and discard support.

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-09-26 17:41:03 -07:00
Sage Weil
4ea9b9f34d doc: minor fixups to rpm install doc
Signed-off-by: Sage Weil <sage@inktank.com>
2012-09-26 17:38:24 -07:00
Gary Lowell
85b01517bc doc: draft rpm installation 2012-09-26 17:33:04 -07:00
Sam Lang
cc9d7da5b8 cephfs: Fix warning - use err instead of errno
Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 17:28:21 -07:00
Sam Lang
e8c734bbf1 client: Fix compile error: bad {0} initializers
Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 17:26:34 -07:00
Sage Weil
e0af6a546e Merge remote-tracking branch 'gh/wip-3186
Reviewed-by: Sage Weil <sage@inktank.com>
2012-09-26 17:06:03 -07:00
Yehuda Sadeh
67535f2dc1 rgw: different test for multi object delete
We need to check for the existence of the sub-resource.

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-09-26 16:55:15 -07:00
Sage Weil
b74b0f905f Merge branch 'wip-coverity-client'
Reviewed-by: Sage Weil <sage@inktank.com>
2012-09-26 16:45:07 -07:00
Sam Lang
cd15405564 client: Fix coverity UNINIT_CTOR defects
Coverity finds cases where constructors are not initializing
all the members of the struct/class.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
844ffd6aff client: Fix coverity 716909 [FORWARD_NULL]
If we fill the request path from the dentry instead of the inode, we
need to use the dentry inode.  This fixes a segfault that would occur
in the case where request->inode is in fact null.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
68dea676d9 client: Add asserts for coverity bugs
Coverity 716907-716909 [FORWARD_NULL} doesn't like using a pointer
that might be null.  Assertions check that pointers are valid
before dereferencing.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
10186fe795 client: Fixes coverity defect 716891
Fix for coverity defect 716891 [DEADCODE] in
Client::encode_dentry_release where the released var is initialized
to 0, but never set, so the pre-emptive release of the dentry
capability (if requested by the drop flag) never happens.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
7945f8bf9f client: Fixes coverity defect 716890 [DEADCODE]
In choose_target_mds, the mds number is initialized to 0 and
then a separate target mds number is chosen based on the inode
set in the request.  If the inode isn't set, we drop to choosing
a random mds, but only if the mds number is < 0, which doesn't
happen with the initialize to 0.  This fix initializes the mds
number to -1, ensuring a random mds is chosen.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
65700fc4f6 client: Coverity fixes for 716841-716844
Fixes coverity errors (CHECKED_RETURN) for all calls to
Client::path_walk() where return value wasn't getting checked
in case of error.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Sam Lang
bc45cded3f cephfs: Fixes for coverity bugs 716840 and 716970
Fixes for two coverity bugs in cephfs.cc.

716840 (CHECKED_RETURN) reported that the return value from
fstat wasn't getting checked.  It now is checked, reports an
error and returns to the caller.

716970 (NEGATIVE_RETURNS) reported that the file descriptor passed
to fstat (*fd) might be negative, which isn't allowed.  The check at
the top that open failed wasn't aborting the function (when *fd < 0),
now it does.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:44:47 -07:00
Yehuda Sadeh
bba17662fa rgw: copy_object should not override ETAG implicitly
When copying an object with new attrs, we still need to
maintain the ETAG.

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-09-26 16:14:02 -07:00
Sam Lang
a9e304115f mds: Move check for empty path lookup to getattr
Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 16:04:50 -07:00
John Wilkins
5b232a66b9 doc: Fixed typo.
Signed-off-by: John Wilkins <john.wilkins@inktank.com>
2012-09-26 11:06:26 -07:00
Samuel Just
9f6ee01e8d JournalingObjectStore: lock journal_lock at top of journal_replay
CID 716968: Data race condition (MISSING_LOCK)At (6): Accessing "this->op_seq"
("JournalingObjectStore.op_seq") requires the "Mutex._m" lock.

Doesn't really matter, but this should satisfy coverity.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
e02258516c FlatIndex: terminate dir_name buffer passed to strncpy
CID 716836: Buffer not null terminated (BUFFER_SIZE_WARNING)At (1): Calling
strncpy with a maximum size argument of 4096 bytes on destination array
"dir_name" of size 4096 bytes might leave the destination string unterminated.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
d3bd9cbd30 FileStore: uninit var in ctor OpSequencer::parent
CID 717334: Uninitialized pointer field (UNINIT_CTOR)At (2): Non-static class
member "parent" is not initialized in this constructor nor in any functions
that it calls.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
0e73313bb9 FileStore: fix omap_store and dbomap leaks in mount
CID 717093: Resource leak (RESOURCE_LEAK)At (48): Variable "omap_store" going
out of scope leaks the storage it points to.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
3bef5eb4d7 FileStore: don't leak r in mount
ID 717092: Resource leak (RESOURCE_LEAK)At (40): Handle variable "r" going out
of scope leaks the handle.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
f9c5ac3664 FileStore: fix fd and tmpfd leaks in _detect_fs()
CID 717088: Resource leak (RESOURCE_LEAK)At (11): Handle variable "tmpfd" going
out of scope leaks the handle.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
b99979cffc FileStore: fix leaked fd and check lseek in _test_fiemap
CID 716861: Other violation (CHECKED_RETURN)At (3): Calling function "lseek(fd,
off, 0)" without checking return value. This library function may fail and
return an error code.

CID 717090: Resource leak (RESOURCE_LEAK)At (10): Handle variable "fd" going
out of scope leaks the handle.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
620701df49 FileStore: fix filedescriptor leak in mkfs
CID 717091: Resource leak (RESOURCE_LEAK)At (39): Handle variable "fd" going
out of scope leaks the handle.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:24 -07:00
Samuel Just
33f96181dd FileStore: fix statfs,fstatfs,fstat ret val checks
CID 716863: Other violation (CHECKED_RETURN)At (20): Calling function
"fstat(basedir_fd, &basest)" without checking return value. This library
function may fail and return an error code.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:16:18 -07:00
Samuel Just
ea91ee58ff FileJournal: uninit var in ctor aio_ctx FileJournal
CID 717333: Uninitialized pointer field (UNINIT_CTOR)At (2): Non-static class
member "aio_ctx" is not initialized in this constructor nor in any functions
that it calls.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:15:13 -07:00
Samuel Just
147e90c084 FileJournal: uninit var in ctor FileJournal
CID 717332: Uninitialized pointer field (UNINIT_CTOR)At (12): Non-static class
member field "iocb.aio_fildes" is not initialized in this constructor nor in
any functions that it calls.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:15:13 -07:00
Samuel Just
8ec08c2dae FileJournal: check return value of lseek in write_fd
CID 716859: Other violation (CHECKED_RETURN)At (1): Calling function
"lseek64(this->fd, pos, 0)" without checking return value. This library
function may fail and return an error code.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-09-26 10:15:07 -07:00
Sage Weil
577184dd5b Merge remote-tracking branch 'gh/wip-mon-gv'
Reviewed-by: Joao Eduardo Luis <joao.luis@inktank.com>
Reviewed-by: Greg Farnum <greg@inktank.com>

Conflicts:
	src/include/ceph_features.h
2012-09-26 09:47:18 -07:00
Sam Lang
47983df4cb client: Fix for #3184 cfuse segv with no keyring
Fixes bug #3184 where the ceph-fuse client segfaults if authx is
enabled but no keyring file is present.  This was due to the
client->init() return value not getting checked.

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-26 08:24:25 -07:00
Sage Weil
f310a1c5e6 mds: fix ino release on session close
If we project an inode release, we need to follow through, even if for
some reason we decide to keep the session active.  Clear out the session
interval_sets in case that happens.

Fixes: #1677
Signed-off-by: Sage Weil <sage@inktank.com>
2012-09-26 08:24:25 -07:00
Sage Weil
feb1946a02 Merge remote-tracking branch 'gh/wip-rbd-coverity
Reviewed-by: Sage Weil <sage@inktank.com>
2012-09-25 22:31:23 -07:00
Sam Lang
26882dace7 client: Put all libcephfs gtest tests into one bin
* Modify the Makefile.am to run all gtest libcephfs tests through
a single binary: test_libcephfs.

* Add tests for #2285, #3186, and #2778

Signed-off-by: Sam Lang <sam.lang@inktank.com>
2012-09-25 18:14:12 -07:00