Bug 2228001

Summary: mds: do not send split_realms for CEPH_SNAP_OP_UPDATE msg
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Xiubo Li <xiubli>
Component: CephFSAssignee: Xiubo Li <xiubli>
Status: CLOSED ERRATA QA Contact: Hemanth Kumar <hyelloji>
Severity: medium Docs Contact: Ranjini M N <rmandyam>
Priority: unspecified    
Version: 5.3CC: ceph-eng-bugs, cephqe-warriors, ngangadh, rmandyam, sostapov, tserlin, vshankar
Target Milestone: ---   
Target Release: 5.3z6   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-16.2.10-222.el8cp Doc Type: Bug Fix
Doc Text:
.Sending `split_realms` information is skipped from CephFS MDS Previously, the `split_realms` information would be incorrectly sent from the CephFS MDS which could not be correctly decoded by `kclient`. As a result, the clients would not care about the `split_realms` and would treat it as a corrupted snaptrace. With this fix, `split_realms` are not sent to `kclient` and works as expected.
Story Points: ---
Clone Of: Environment:
Last Closed: 2024-02-08 16:50:11 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2258797    

Description Xiubo Li 2023-08-01 06:21:14 UTC
The clients won't care about the split_realms and the kclient will treat this as a corrupted snaptrace.

Fixes commit 93e7267 ("mds: send snap
related messages centrally during mds recovery")
Fixes: https://tracker.ceph.com/issues/61217
Signed-off-by: Xiubo Li xiubli

Comment 1 RHEL Program Management 2023-08-01 06:21:27 UTC
Please specify the severity of this bug. Severity is defined here:
https://bugzilla.redhat.com/page.cgi?id=fields.html#bug_severity.

Comment 5 Scott Ostapovicz 2023-08-17 14:19:20 UTC
Retargeting this to 5.3 z5.  However, if this is in fact just for testing, please verify and put back into 5.3 z5 if it is indeed fixed.

Comment 13 errata-xmlrpc 2024-02-08 16:50:11 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat Ceph Storage 5.3 Security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2024:0745