Bug 2239455
Summary: | [RHCS-5.X backport] [RFE] BLK/Kernel: Improve protection against running one OSD twice | ||
---|---|---|---|
Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Bipin Kunal <bkunal> |
Component: | RADOS | Assignee: | Prashant Dhange <pdhange> |
Status: | CLOSED ERRATA | QA Contact: | skanta |
Severity: | high | Docs Contact: | Ranjini M N <rmandyam> |
Priority: | high | ||
Version: | 3.3 | CC: | akupczyk, amathuri, bhubbard, ceph-eng-bugs, cephqe-warriors, choffman, ksirivad, lflores, nojha, pdhange, pdhiran, rfriedma, rmandyam, rzarzyns, skanta, sseshasa, tserlin, vereddy, vumrao |
Target Milestone: | --- | Keywords: | FutureFeature |
Target Release: | 5.3z6 | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ceph-16.2.10-240.el8cp | Doc Type: | Enhancement |
Doc Text: |
.Improved protection against running BlueStore twice
Previously, advisory locking was used to protect against running BlueStore twice. This works well on baremetal deployments. However, when used on containers it would create unrelated inodes that targeted same `mknod b` block device. As a result, two containers might assume that they can have exclusive access which led to severe errors.
With this release, you can improve protection against running OSDs twice at the same time on one block device. You can reinforce advisory locking with O_EXCL open flag dedicated for block devices. It is no longer possible to open one BlueStore instance twice and the overwrite and corruption does not occur.
|
Story Points: | --- |
Clone Of: | 2239449 | Environment: | |
Last Closed: | 2024-02-08 16:55:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2149453, 2239449 | ||
Bug Blocks: | 2258797 |
Description
Bipin Kunal
2023-09-18 13:03:15 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Red Hat Ceph Storage 5.3 Security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2024:0745 |