linux-btrfs.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: erenthetitan@mail.de
To: linux-btrfs@vger.kernel.org
Subject: List of known BTRFS Raid 5/6 Bugs?
Date: Fri, 10 Aug 2018 03:40:23 +0200	[thread overview]
Message-ID: <20180810014023.C3FBD8073A@smtp03.mail.de> (raw)

I am searching for more information regarding possible bugs related to BTRFS Raid 5/6. All sites i could find are incomplete and information contradicts itself:

The Wiki Raid 5/6 Page (https://btrfs.wiki.kernel.org/index.php/RAID56)
warns of the write hole bug, stating that your data remains safe (except data written during power loss, obviously) upon unclean shutdown unless your data gets corrupted by further issues like bit-rot, drive failure etc.

The Wiki Gotchas Page (https://btrfs.wiki.kernel.org/index.php/Gotchas)
warns of possible incorrigible "transid" mismatch, not stating which versions are affected or what transid mismatch means for your data. It does not mention the write hole at all.

This Mail Archive (linux-btrfs@vger.kernel.org/msg55161.html" target="_blank">https://www.mail-archive.com/linux-btrfs@vger.kernel.org/msg55161.html)
states that scrubbing BTRFS Raid 5/6 will always repair Data Corruption, but may corrupt your Metadata while trying to do so - meaning you have to scrub twice in a row to ensure data integrity.

The Bugzilla Entry (https://bugzilla.kernel.org/buglist.cgi?component=btrfs)
contains mostly unanswered bugs, which may or may not still count (2013 - 2018).

This Spinics Discussion (https://www.spinics.net/lists/linux-btrfs/msg76471.html)
states that the write hole can even damage old data eg. data that was not accessed during unclean shutdown, the opposite of what the Raid5/6 Status Page states!

This Spinics comment (https://www.spinics.net/lists/linux-btrfs/msg76412.html)
informs that hot-plugging a device will trigger the write hole. Accessed data will therefore be corrupted.
In case the earlier statement about old data corruption is true, random data could be permamently lost.
This is even more dangerous if you are connecting your devices via USB, as USB can unconnect due to external influence, eg. touching the cables, shaking...

Lastly, this Superuser question (https://superuser.com/questions/1325245/btrfs-transid-failure#1344494)
assumes that the transid mismatch bug could toggle your system unmountable.
While it might be possible to restore your data using sudo BTRFS Restore, it is still unknown how the transid mismatch is even toggled, meaning that your file system could fail at any time!

Do you know of any comprehensive and complete Bug list?

Do you know more about the stated Bugs?

Do you know further Bugs that are not addressed in any of these sites?

-------------------------------------------------------------------------------------------------
FreeMail powered by mail.de - MEHR SICHERHEIT, SERIOSITÄT UND KOMFORT

             reply	other threads:[~2018-08-10  4:07 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-08-10  1:40 erenthetitan [this message]
2018-08-10  7:12 ` List of known BTRFS Raid 5/6 Bugs? Zygo Blaxell
  -- strict thread matches above, loose matches on Subject: below --
2018-08-10 23:32 erenthetitan
2018-08-11  0:45 Zygo Blaxell
2018-08-11  2:18 erenthetitan
2018-08-11  5:49 ` Zygo Blaxell
2018-08-11  6:27   ` erenthetitan
2018-08-11 15:25     ` Zygo Blaxell
2018-08-13  7:20       ` Menion
2018-08-14  3:49         ` Zygo Blaxell
2018-08-13 21:56 erenthetitan
2018-08-14  4:09 ` Zygo Blaxell
2018-08-14  7:32 ` Menion
2018-08-15  3:33   ` Zygo Blaxell
2018-08-15  7:27     ` Menion
2018-08-16 19:38       ` erenthetitan
2018-08-17  8:33         ` Menion
2018-09-07 13:58 Stefan K
2018-09-08  8:40 ` Duncan
2018-09-11 11:29   ` Stefan K
2018-09-12  1:57     ` Duncan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180810014023.C3FBD8073A@smtp03.mail.de \
    --to=erenthetitan@mail.de \
    --cc=linux-btrfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).