Re: CephFS "corruption" -- Nulled bytes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Sage,

Will this patch be in 0.94.4? We've got the same problem here.

-Lincoln

> On Oct 8, 2015, at 12:11 AM, Sage Weil <sage@xxxxxxxxxxxx> wrote:
> 
> On Wed, 7 Oct 2015, Adam Tygart wrote:
>> Does this patch fix files that have been corrupted in this manner?
> 
> Nope, it'll only prevent it from happening to new files (that haven't yet 
> been migrated between the cache and base tier).
> 
>> If not, or I guess even if it does, is there a way to walk the
>> metadata and data pools and find objects that are affected?
> 
> Hmm, this may actually do the trick.. find a file that appears to be 
> zeroed, and do truncate it up and then down again.  For example, of foo is 
> 100 bytes, do
> 
> truncate --size 101 foo
> truncate --size 100 foo
> 
> then unmount and remound the client and see if the content reappears.
> 
> Assuming that works (it did in my simple test) it'd be pretty easy to 
> write something that walks the tree and does the truncate trick for any 
> file whose first however many bytes are 0 (though it will mess up 
> mtime...).
> 
>> Is that '_' xattr in hammer? If so, how can I access it? Doing a
>> listxattr on the inode just lists 'parent', and doing the same on the
>> parent directory's inode simply lists 'parent'.
> 
> This is the file in /var/lib/ceph/osd/ceph-NNN/current.  For example,
> 
> $ attr -l ./3.0_head/10000000000.00000000__head_F0B56F30__3
> Attribute "cephos.spill_out" has a 2 byte value for ./3.0_head/10000000000.00000000__head_F0B56F30__3
> Attribute "cephos.seq" has a 23 byte value for ./3.0_head/10000000000.00000000__head_F0B56F30__3
> Attribute "ceph._" has a 250 byte value for ./3.0_head/10000000000.00000000__head_F0B56F30__3
> Attribute "ceph._@1" has a 5 byte value for ./3.0_head/10000000000.00000000__head_F0B56F30__3
> Attribute "ceph.snapset" has a 31 byte value for ./3.0_head/10000000000.00000000__head_F0B56F30__3
> 
> ...but hopefully you won't need to touch any of that ;)
> 
> sage
> 
> 
>> 
>> Thanks for your time.
>> 
>> --
>> Adam
>> 
>> 
>> On Mon, Oct 5, 2015 at 9:36 AM, Sage Weil <sage@xxxxxxxxxxxx> wrote:
>>> On Mon, 5 Oct 2015, Adam Tygart wrote:
>>>> Okay, this has happened several more times. Always seems to be a small
>>>> file that should be read-only (perhaps simultaneously) on many
>>>> different clients. It is just through the cephfs interface that the
>>>> files are corrupted, the objects in the cachepool and erasure coded
>>>> pool are still correct. I am beginning to doubt these files are
>>>> getting a truncation request.
>>> 
>>> This is still consistent with the #12551 bug.  The object data is correct,
>>> but the cephfs truncation metadata on the object is wrong, causing it to
>>> be implicitly zeroed out on read.  It's easily triggered by writers who
>>> use O_TRUNC on open...
>>> 
>>>> Twice now have been different perl files, once was someones .bashrc,
>>>> once was an input file for another application, timestamps on the
>>>> files indicate that the files haven't been modified in weeks.
>>>> 
>>>> Any other possibilites? Or any way to figure out what happened?
>>> 
>>> You can confirm by extracting the '_' xattr on the object (append any @1
>>> etc fragments) and feeding it to ceph-dencoder with
>>> 
>>> ceph-dencoder type object_info_t import <path_to_extrated_xattr> decode dump_json
>>> 
>>> and confirming that truncate_seq is 0, and verifying that the truncate_seq
>>> on the read request is non-zero.. you'd need to turn up the osd logs with
>>> debug ms = 1 and look for the osd_op that looks like "read 0~$length
>>> [$truncate_seq@$truncate_size]" (with real values in there).
>>> 
>>> ...but it really sounds like you're hitting the bug.  Unfortunately
>>> the fix is not backported to hammer just yet.  You can follow
>>>        http://tracker.ceph.com/issues/13034
>>> 
>>> sage
>>> 
>>> 
>>> 
>>>> 
>>>> --
>>>> Adam
>>>> 
>>>> On Sun, Sep 27, 2015 at 10:44 PM, Adam Tygart <mozes@xxxxxxx> wrote:
>>>>> I've done some digging into cp and mv's semantics (from coreutils). If
>>>>> the inode is existing, the file will get truncated, then data will get
>>>>> copied in. This is definitely within the scope of the bug above.
>>>>> 
>>>>> --
>>>>> Adam
>>>>> 
>>>>> On Fri, Sep 25, 2015 at 8:08 PM, Adam Tygart <mozes@xxxxxxx> wrote:
>>>>>> It may have been. Although the timestamp on the file was almost a
>>>>>> month ago. The typical workflow for this particular file is to copy an
>>>>>> updated version overtop of it.
>>>>>> 
>>>>>> i.e. 'cp qss kstat'
>>>>>> 
>>>>>> I'm not sure if cp semantics would keep the same inode and simply
>>>>>> truncate/overwrite the contents, or if it would do an unlink and then
>>>>>> create a new file.
>>>>>> --
>>>>>> Adam
>>>>>> 
>>>>>> On Fri, Sep 25, 2015 at 8:00 PM, Ivo Jimenez <ivo@xxxxxxxxxxx> wrote:
>>>>>>> Looks like you might be experiencing this bug:
>>>>>>> 
>>>>>>>  http://tracker.ceph.com/issues/12551
>>>>>>> 
>>>>>>> Fix has been merged to master and I believe it'll be part of infernalis. The
>>>>>>> original reproducer involved truncating/overwriting files. In your example,
>>>>>>> do you know if 'kstat' has been truncated/overwritten prior to generating
>>>>>>> the md5sums?
>>>>>>> 
>>>>>>> On Fri, Sep 25, 2015 at 2:11 PM Adam Tygart <mozes@xxxxxxx> wrote:
>>>>>>>> 
>>>>>>>> Hello all,
>>>>>>>> 
>>>>>>>> I've run into some sort of bug with CephFS. Client reads of a
>>>>>>>> particular file return nothing but 40KB of Null bytes. Doing a rados
>>>>>>>> level get of the inode returns the whole file, correctly.
>>>>>>>> 
>>>>>>>> Tested via Linux 4.1, 4.2 kernel clients, and the 0.94.3 fuse client.
>>>>>>>> 
>>>>>>>> Attached is a dynamic printk debug of the ceph module from the linux
>>>>>>>> 4.2 client while cat'ing the file.
>>>>>>>> 
>>>>>>>> My current thought is that there has to be a cache of the object
>>>>>>>> *somewhere* that a 'rados get' bypasses.
>>>>>>>> 
>>>>>>>> Even on hosts that have *never* read the file before, it is returning
>>>>>>>> Null bytes from the kernel and fuse mounts.
>>>>>>>> 
>>>>>>>> Background:
>>>>>>>> 
>>>>>>>> 24x CentOS 7.1 hosts serving up RBD and CephFS with Ceph 0.94.3.
>>>>>>>> CephFS is a EC k=8, m=4 pool with a size 3 writeback cache in front of it.
>>>>>>>> 
>>>>>>>> # rados -p cachepool get 10004096b95.00000000 /tmp/kstat-cache
>>>>>>>> # rados -p ec84pool get 10004096b95.00000000 /tmp/kstat-ec
>>>>>>>> # md5sum /tmp/kstat*
>>>>>>>> ddfbe886420a2cb860b46dc70f4f9a0d  /tmp/kstat-cache
>>>>>>>> ddfbe886420a2cb860b46dc70f4f9a0d  /tmp/kstat-ec
>>>>>>>> # file /tmp/kstat*
>>>>>>>> /tmp/kstat-cache: Perl script, ASCII text executable
>>>>>>>> /tmp/kstat-ec:    Perl script, ASCII text executable
>>>>>>>> 
>>>>>>>> # md5sum ~daveturner/bin/kstat
>>>>>>>> 1914e941c2ad5245a23e3e1d27cf8fde  /homes/daveturner/bin/kstat
>>>>>>>> # file ~daveturner/bin/kstat
>>>>>>>> /homes/daveturner/bin/kstat: data
>>>>>>>> 
>>>>>>>> Thoughts?
>>>>>>>> 
>>>>>>>> Any more information you need?
>>>>>>>> 
>>>>>>>> --
>>>>>>>> Adam
>>>>>>>> _______________________________________________
>>>>>>>> ceph-users mailing list
>>>>>>>> ceph-users@xxxxxxxxxxxxxx
>>>>>>>> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>>>> _______________________________________________
>>>> ceph-users mailing list
>>>> ceph-users@xxxxxxxxxxxxxx
>>>> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>>>> 
>>>> 
>> _______________________________________________
>> ceph-users mailing list
>> ceph-users@xxxxxxxxxxxxxx
>> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>> 
>> 
> _______________________________________________
> ceph-users mailing list
> ceph-users@xxxxxxxxxxxxxx
> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

_______________________________________________
ceph-users mailing list
ceph-users@xxxxxxxxxxxxxx
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com



[Index of Archives]     [Information on CEPH]     [Linux Filesystem Development]     [Ceph Development]     [Ceph Large]     [Linux USB Development]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [xfs]


  Powered by Linux