From: "Colin Simpson" <csimpson@csl.co.uk>
To: linux-raid@vger.kernel.org
Subject: Linux Software RAID a bit of a weakness?
Date: Fri, 23 Feb 2007 19:19:38 +0000 [thread overview]
Message-ID: <1172258378.21648.51.camel@cowie> (raw)
Hi,
We had a small server here that was configured with a RAID 1 mirror,
using two IDE disks.
Last week one of the drives failed in this. So we replaced the drive and
set the array to rebuild. The "good" disk then found a bad block and the
mirror failed.
Now I presume that the "good" disk must have had an underlying bad block
in either unallocated space or a file I never access. Now as RAID works
at the block level you only ever see this on an array rebuild when it's
often catastrophic. Is this a bit of a flaw?
I know there is the definite probability of two drives failing within a
short period of time. But this is a bit different as it's the
probability of two drives failing but over a much larger time scale if
one of the flaws is hidden in unallocated space (maybe a dirt particle
finds it's way onto the surface or something). This would make RAID buy
you a lot less in reliability, I'd have thought.
I seem to remember seeing in the log file for a Dell perc something
about scavenging for bad blocks. Do hardware RAID systems have a
mechanism that at times of low activity search the disks for bad blocks
to help guard against this sort of failure (so a disk error is reported
early)?
On Software RAID, I was thinking apart from a three way mirror, which I
don't think is at present supported. Is there any merit in say, cat'ing
the whole disk devices to /dev/null every so often to check that the
whole surface is readable (I presume just reading the raw device won't
upset thing, don't worry I don't plan on trying it on a production
system).
Any thoughts? As I presume people have thought of this before and I must
be missing something.
Colin
This email and any files transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If you are not the original recipient or the person responsible for delivering the email to the intended recipient, be advised that you have received this email in error, and that any use, dissemination, forwarding, printing, or copying of this email is strictly prohibited. If you received this email in error, please immediately notify the sender and delete the original.
next reply other threads:[~2007-02-23 19:19 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-02-23 19:19 Colin Simpson [this message]
2007-02-23 19:55 ` Linux Software RAID a bit of a weakness? Steve Cousins
2007-02-23 20:08 ` Justin Piszcz
2007-02-25 12:24 ` Colin Simpson
2007-02-25 19:15 ` Richard Scobie
2007-02-25 20:08 ` Mark Hahn
2007-02-25 21:02 ` Richard Scobie
2007-02-26 16:56 ` David Rees
2007-02-26 17:26 ` Colin Simpson
2007-02-26 19:40 ` Joshua Baker-LePain
2007-02-26 21:13 ` David Rees
2007-02-26 21:22 ` Neil Brown
2007-02-27 20:12 ` David Rees
2007-02-26 22:38 ` Jeff Garzik
2007-02-27 4:10 ` berk walker
2007-02-23 20:25 ` Neil Brown
2007-02-24 4:14 ` Richard Scobie
2007-02-25 20:08 ` Bill Davidsen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1172258378.21648.51.camel@cowie \
--to=csimpson@csl.co.uk \
--cc=linux-raid@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).