From: Chris Mason <chris.mason@oracle.com>
To: Mike Snitzer <snitzer@redhat.com>
Cc: Andi Kleen <andi@firstfloor.org>,
linux-btrfs <linux-btrfs@vger.kernel.org>,
dm-devel <dm-devel@redhat.com>, Milan Broz <mbroz@redhat.com>,
Matt <jackdachef@gmail.com>,
Linux Kernel <linux-kernel@vger.kernel.org>,
htd <htd@fancy-poultry.org>
Subject: Re: DM-CRYPT: Scale to multiple CPUs v3 on 2.6.37-rc* ?
Date: Mon, 08 Nov 2010 12:59:45 -0500 [thread overview]
Message-ID: <1289238930-sup-9765@think> (raw)
In-Reply-To: <20101108145809.GD29714@redhat.com>
Excerpts from Mike Snitzer's message of 2010-11-08 09:58:09 -0500:
> On Sun, Nov 07 2010 at 6:05pm -0500,
> Andi Kleen <andi@firstfloor.org> wrote:
>
> > On Sun, Nov 07, 2010 at 10:39:23PM +0100, Milan Broz wrote:
> > > On 11/07/2010 08:45 PM, Andi Kleen wrote:
> > > >> I read about barrier-problems and data getting to the partition when
> > > >> using dm-crypt and several layers so I don't know if that could be
> > > >> related
> > > >
> > > > Barriers seem to be totally broken on dm-crypt currently.
> > >
> > > Can you explain it?
> >
> > e.g. the btrfs mailing list is full of corruption reports
> > on dm-crypt and most of the symptoms point to broken barriers.
>
> [cc'ing linux-btrfs, hopefully in the future dm-devel will get cc'd when
> concerns about DM come up on linux-btrfs (or other lists)]
>
> I spoke with Josef Bacik and these corruption reports are apparently
> against older kernels (e.g. <= 2.6.33). I say <= 2.6.33 because:
We've consistently seen reports about corruptions on power hits with
dm-crypt. The logs didn't have any messages about barriers failing, but
the corruptions were still there. The most likely cause is that
barriers just aren't getting through somehow.
>
> https://btrfs.wiki.kernel.org/index.php/Gotchas states:
> "btrfs volumes on top of dm-crypt block devices (and possibly LVM)
> require write-caching to be turned off on the underlying HDD. Failing to
> do so, in the event of a power failure, may result in corruption not yet
> handled by btrfs code. (2.6.33)"
>
> But Josef was not aware of any reports with kernels newer than 2.6.32
> (F12).
>
> Josef also noted that until last week btrfs wouldn't retry another
> mirror in the face of some corruption, the fix is here:
> http://git.kernel.org/?p=linux/kernel/git/mason/btrfs-unstable.git;a=commit;h=cb44921a09221
>
> This obviously doesn't fix any source of corruption but it makes btrfs
> more resilient when it encounters the corruption.
Right.
>
> > > Barriers/flush change should work, if it is broken, it is not only dm-crypt.
> > > (dm-crypt simply relies on dm-core implementation, when barrier/flush
> > > request come to dmcrypt, all previous IO must be already finished).
> >
> > Possibly, at least it doesn't seem to work.
>
> Can you please be more specific? What test(s)? What kernel(s)?
>
> Any pointers to previous (and preferably: recent) reports would be
> appreciated.
>
> The DM barrier code has seen considerable change recently (via flush+fua
> changes in 2.6.37). Those changes have been tested quite a bit
> (including ext4 consistency after a crash).
>
> But even prior to those flush+fua changes DM's support for barriers
> (Linux >= 2.6.31) was held to be robust. No known (at least no
> reported) issues with DM's barrier support.
I think it would be best to move forward with just hammering on the
dm-crypt barriers:
http://oss.oracle.com/~mason/barrier-test
This script is the best I've found so far to reliably trigger
corruptions with barriers off. I'd start with ext3 + barriers off just
to prove it corrupts things, then move to ext3 + barriers on.
-chris
next prev parent reply other threads:[~2010-11-08 17:59 UTC|newest]
Thread overview: 104+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <AANLkTim6WTCChWGbTb-PUGd2AERGibeRtgan-WDznf2s@mail.gmail.com>
[not found] ` <4CD6B7FA.3050005@redhat.com>
[not found] ` <AANLkTikbsU+SGAaoq_oek=7tfDdjg+0wFoydhA+K9ZU+@mail.gmail.com>
[not found] ` <AANLkTinna7BiGHogXnn1iEG6ccUAjFM3p3S3aHpv=h-E@mail.gmail.com>
[not found] ` <20101107194547.GA12521@basil.fritz.box>
[not found] ` <4CD71C8B.1050604@redhat.com>
[not found] ` <20101107230508.GB17592@basil.fritz.box>
2010-11-08 14:58 ` DM-CRYPT: Scale to multiple CPUs v3 on 2.6.37-rc* ? Mike Snitzer
2010-11-08 17:59 ` Chris Mason [this message]
2010-11-14 20:59 ` dm-crypt barrier support is effective (was: Re: DM-CRYPT: Scale to multiple CPUs v3 on 2.6.37-rc* ?) Mike Snitzer
2010-11-14 21:49 ` Matt
2010-11-14 21:54 ` dm-crypt barrier support is effective Milan Broz
2010-11-14 23:24 ` Matt
2010-12-01 16:05 ` Matt
2010-12-01 16:52 ` Mike Snitzer
2010-12-01 17:35 ` Matt
2010-12-01 18:24 ` Milan Broz
2010-12-01 19:34 ` Jon Nelson
2010-12-01 20:45 ` Milan Broz
2010-12-01 21:23 ` hunt for 2.6.37 dm-crypt+ext4 corruption? (was: Re: dm-crypt barrier support is effective) Mike Snitzer
2010-12-02 21:30 ` Matt
2010-12-04 19:18 ` Matt
2010-12-04 19:38 ` Mike Snitzer
2010-12-04 23:47 ` Matt
2010-12-07 14:21 ` Chris Mason
2010-12-07 18:10 ` Jon Nelson
2010-12-07 18:15 ` Chris Mason
2010-12-07 18:22 ` Mike Snitzer
2010-12-07 18:45 ` Jon Nelson
2010-12-07 18:52 ` Chris Mason
2010-12-07 19:34 ` Jon Nelson
2010-12-07 20:02 ` Chris Mason
2010-12-07 20:25 ` Jon Nelson
2010-12-07 20:33 ` Chris Mason
2010-12-07 20:36 ` Jon Nelson
2010-12-07 20:41 ` Chris Mason
2010-12-07 20:48 ` Jon Nelson
2010-12-07 21:02 ` Chris Mason
2010-12-08 3:29 ` Jon Nelson
2010-12-08 8:03 ` hunt for 2.6.37 dm-crypt+ext4 corruption? Milan Broz
2010-12-08 12:20 ` hunt for 2.6.37 dm-crypt+ext4 corruption? (was: Re: dm-crypt barrier support is effective) Chris Mason
2010-12-16 3:37 ` Dave Chinner
2010-12-16 12:29 ` Chris Mason
2010-12-08 3:55 ` Jon Nelson
2010-12-07 19:35 ` Ted Ts'o
2010-12-07 21:01 ` Jon Nelson
2010-12-07 21:01 ` Jon Nelson
2010-12-08 3:37 ` Jon Nelson
2010-12-08 3:37 ` Jon Nelson
2010-12-08 15:26 ` Jon Nelson
2010-12-08 15:26 ` Jon Nelson
2010-12-09 18:01 ` Ted Ts'o
2010-12-09 18:10 ` Jon Nelson
2010-12-09 18:10 ` Jon Nelson
2010-12-09 20:13 ` Ted Ts'o
2010-12-09 20:38 ` Jon Nelson
2010-12-09 20:38 ` Jon Nelson
2010-12-09 23:16 ` Andi Kleen
2010-12-10 1:38 ` Chris Mason
2010-12-10 1:53 ` Matt
2010-12-10 2:38 ` Ted Ts'o
2010-12-10 6:52 ` Jon Nelson
2010-12-10 14:58 ` Jon Nelson
2010-12-10 16:54 ` Jon Nelson
2010-12-11 2:14 ` Jon Nelson
2010-12-11 2:14 ` Jon Nelson
2010-12-12 1:40 ` Ted Ts'o
2010-12-12 2:34 ` Ted Ts'o
2010-12-12 3:16 ` Jon Nelson
2010-12-12 3:16 ` Jon Nelson
2010-12-12 10:18 ` Jon Nelson
2010-12-12 10:18 ` Jon Nelson
2010-12-12 12:43 ` Ted Ts'o
2010-12-12 13:11 ` Jon Nelson
2010-12-12 13:11 ` Jon Nelson
2010-12-13 2:06 ` Ted Ts'o
2010-12-13 18:56 ` Jon Nelson
2010-12-15 19:15 ` Matt
2010-12-15 19:16 ` Andi Kleen
2010-12-15 19:25 ` Matt
2010-12-15 19:28 ` Matt
2010-12-13 18:56 ` Jon Nelson
2010-12-10 16:54 ` Jon Nelson
2010-12-10 14:58 ` Jon Nelson
2010-12-10 6:52 ` Jon Nelson
2010-12-10 1:58 ` Mike Fedyk
2010-12-10 2:00 ` Chris Mason
2010-12-10 2:05 ` Jon Nelson
2010-12-07 18:10 ` Jon Nelson
2010-12-04 23:52 ` Matt
2010-12-05 10:09 ` Heinz Diehl
2010-12-05 10:21 ` hunt for 2.6.37 dm-crypt+ext4 corruption? Milan Broz
2010-12-05 12:49 ` Heinz Diehl
2010-12-05 13:24 ` [dm-devel] " Theodore Tso
2010-12-05 13:44 ` Matt
2010-12-05 14:02 ` Ted Ts'o
2010-12-05 14:33 ` Heinz Diehl
2010-12-05 20:17 ` Daniel J Blueman
2010-12-06 7:08 ` Heinz Diehl
2010-12-05 20:28 ` Andi Kleen
2010-12-05 21:15 ` Mike Snitzer
2010-12-05 21:42 ` [dm-devel] " Milan Broz
2010-12-06 2:37 ` Valdis.Kletnieks
2011-01-06 15:56 ` Heinz Diehl
2011-01-07 16:45 ` Matt
2010-12-05 13:30 ` hunt for 2.6.37 dm-crypt+ext4 corruption? (was: Re: dm-crypt barrier support is effective) Matt
2010-12-05 0:57 ` Matt
2010-12-04 20:51 ` Heinz Diehl
2010-12-01 19:59 ` dm-crypt barrier support is effective Heinz Diehl
2010-11-15 7:25 ` Heinz Diehl
2010-11-15 8:41 ` Milan Broz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1289238930-sup-9765@think \
--to=chris.mason@oracle.com \
--cc=andi@firstfloor.org \
--cc=dm-devel@redhat.com \
--cc=htd@fancy-poultry.org \
--cc=jackdachef@gmail.com \
--cc=linux-btrfs@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mbroz@redhat.com \
--cc=snitzer@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).