Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757210Ab0GWTQw (ORCPT ); Fri, 23 Jul 2010 15:16:52 -0400 Received: from moutng.kundenserver.de ([212.227.17.10]:60975 "EHLO moutng.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752279Ab0GWTQu (ORCPT ); Fri, 23 Jul 2010 15:16:50 -0400 Message-ID: <4C49EA91.3060908@vlnb.net> Date: Fri, 23 Jul 2010 23:16:33 +0400 From: Vladislav Bolkhovitin User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.10) Gecko/20100527 Thunderbird/3.0.5 MIME-Version: 1.0 To: Gennadiy Nerubayev CC: James Bottomley , Christof Schmitt , Boaz Harrosh , "Martin K. Petersen" , linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Chris Mason Subject: Re: Wrong DIF guard tag on ext2 write References: <20100531112817.GA16260@schmichrtp.mainz.de.ibm.com> <1275318102.2823.47.camel@mulgrave.site> <4C03D5FD.3000202@panasas.com> <20100601103041.GA15922@schmichrtp.mainz.de.ibm.com> <1275398876.21962.6.camel@mulgrave.site> <4C078FE2.9000804@vlnb.net> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Provags-ID: V02:K0:UUwWoIV6F+GTW2JEjBHkLI6vLowL6nG29cBqo8bZhTz DZnKS/LwHeNzIfvJXZ+vWvtqx6hU8KOhIiD68+wvEpmCU7c/NT +pIMD8rJfSGmGTPrg35ItInwuSMxGFLNKmJtZZ0KFsg8BXJOcd 4xiPx/MRVPVCLjPsQEmVSMYFXKS4VvpBpW7212Xqyzb3+Vx11Q I65Y4W+tzlhPPbW0MgVbQ== Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5759 Lines: 96 Gennadiy Nerubayev, on 07/23/2010 09:59 PM wrote: > On Thu, Jun 3, 2010 at 7:20 AM, Vladislav Bolkhovitin wrote: >> >> James Bottomley, on 06/01/2010 05:27 PM wrote: >>> >>> On Tue, 2010-06-01 at 12:30 +0200, Christof Schmitt wrote: >>>> >>>> What is the best strategy to continue with the invalid guard tags on >>>> write requests? Should this be fixed in the filesystems? >>> >>> For write requests, as long as the page dirty bit is still set, it's >>> safe to drop the request, since it's already going to be repeated. What >>> we probably want is an error code we can return that the layer that sees >>> both the request and the page flags can make the call. >>> >>>> Another idea would be to pass invalid guard tags on write requests >>>> down to the hardware, expect an "invalid guard tag" error and report >>>> it to the block layer where a new checksum is generated and the >>>> request is issued again. Basically implement a retry through the whole >>>> I/O stack. But this also sounds complicated. >>> >>> No, no ... as long as the guard tag is wrong because the fs changed the >>> page, the write request for the updated page will already be queued or >>> in-flight, so there's no need to retry. >> >> There's one interesting problem here, at least theoretically, with SCSI or similar transports which allow to have commands queue depth>1 and allowed to internally reorder queued requests. I don't know the FS/block layers sufficiently well to tell if sending several requests for the same page really possible or not, but we can see a real life problem, which can be well explained if it's possible. >> >> The problem could be if the second (rewrite) request (SCSI command) for the same page queued to the corresponding device before the original request finished. Since the device allowed to freely reorder requests, there's a probability that the original write request would hit the permanent storage *AFTER* the retry request, hence the data changes it's carrying would be lost, hence welcome data corruption. >> >> For single parallel SCSI or SAS devices such race may look practically impossible, but for sophisticated clusters when many nodes pretending to be a single SCSI device in a load balancing configuration, it becomes very real. >> >> The real life problem we can see in an active-active DRBD-setup. In this configuration 2 nodes act as a single SCST-powered SCSI device and they both run DRBD to keep their backstorage in-sync. The initiator uses them as a single multipath device in an active-active round-robin load-balancing configuration, i.e. sends requests to both nodes in parallel, then DRBD takes care to replicate the requests to the other node. >> >> The problem is that sometimes DRBD complies about concurrent local writes, like: >> >> kernel: drbd0: scsi_tgt0[12503] Concurrent local write detected! [DISCARD L] new: 144072784s +8192; pending: 144072784s +8192 >> >> This message means that DRBD detected that both nodes received overlapping writes on the same block(s) and DRBD can't figure out which one to store. This is possible only if the initiator sent the second write request before the first one completed. >> >> The topic of the discussion could well explain the cause of that. But, unfortunately, people who reported it forgot to note which OS they run on the initiator, i.e. I can't say for sure it's Linux. > > Sorry for the late chime in, but here's some more information of > potential interest as I've previously inquired about this to the drbd > mailing list: > > 1. It only happens when using blockio mode in IET or SCST. Fileio, > nv_cache, and write_through do not generate the warnings. Some explanations for those who not familiar with the terminology: - "Fileio" means Linux IO stack on the target receives IO via vfs_readv()/vfs_writev() - "NV_CACHE" means all the cache synchronization requests (SYNCHRONIZE_CACHE, FUA) from the initiator are ignored - "WRITE_THROUGH" means write through, i.e. the corresponding backend file for the device open with O_SYNC flag. > 2. It happens on active/passive drbd clusters (on the active node > obviously), NOT active/active. In fact, I've found that doing round > robin on active/active is a Bad Idea (tm) even with a clustered > filesystem, until at least the target software is able to synchronize > the command state of either node. > 3. Linux and ESX initiators can generate the warning, but I've so far > only been able to reliably reproduce it using a Windows initiator and > sqlio or iometer benchmarks. I'll be trying again using iometer when I > have the time. > 4. It only happens using a random write io workload (any block size), > with initiator threads>1, OR initiator queue depth>1. The higher > either of those is, the more spammy the warnings become. > 5. The transport does not matter (reproduced with iSCSI and SRP) > 6. If DRBD is disconnected (primary/unknown), the warnings are not > generated. As soon as it's reconnected (primary/secondary), the > warnings will reappear. It would be great if you prove or disprove our suspicions that Linux can produce several write requests for the same blocks simultaneously. To be sure we need: 1. The initiator is Linux. Windows and ESX are not needed for this particular case. 2. If you are able to reproduce it, we will need full description of which application used on the initiator to generate the load and in which mode. Target and DRBD configuration doesn't matter, you can use any. Thanks, Vlad -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/