[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200630092254.GW27795@twin.jikos.cz>
Date: Tue, 30 Jun 2020 11:22:55 +0200
From: David Sterba <dsterba@...e.cz>
To: Sebastian Hyrwall <sh@...f.org>
Cc: linux-kernel@...r.kernel.org
Subject: Re: BTRFS/EXT4 Data Corruption
On Mon, Jun 29, 2020 at 01:55:40AM +0700, Sebastian Hyrwall wrote:
> Sorry if this is not the right place for this email but I can't think of
> another place (might be linux-fsdevel)
You can always CC the mailinglists of the filesystems.
> Someone here is ought to be an expert in this.
>
> It all started as having file corruptions inside VMs that then led to
> alot of testing that
> resulted in replicatable results on the backend NAS.
>
> Tests where done by generating 100 1GB files from /dev/urandom to
> "volume1" (both BTRFS and EXT4 tested).
> MD5 hashing the files and then copying the files to "volume2". 2-4% of
> the files would fail the hash match every time
> the test was done.
>
> After alot of fiddling around it turned out that the problem goes away
> if doing "cp --sparse=never"
> when copying the files. This would to me exclude any hardware errors and
> feels more like something
> deeper inside the kernel.
That the problem goes away when you use a completely different way to
write data maybe just hiding the fact that hardware is faulty.
Generating 100G of data will have different memory usage pattern and
likely spanning way more pages than the reflink approach that will be
metadata-only operation (adding the extent references).
> The box runs Kernel 3.10.105. Version >4 seems unaffected (not 100%
> confirmed, too few testboxes).
>
> Here is a diff between a hexdump of a failed file,
>
> 43861581c43861581
> < 29d464c0: aca0 d68f 0ff4 0bad fa4M-5 1339 8148 30e8 .........E.9.H0.
> ---
> > 29d464c0: aca0 d68f 0ff4 0bad fa45 1339 8148 30e8 .........E.9.H0.
> 55989446c55989446
> < 35654c50: 31f4 f7b5 40be 2188 c539 043b 35b4 abb5 1...@....9.;5...
> ---
> > 35654c50: 3174 f7b5 40be 2188 c539 043b 35b4 abb5 1t..@....9.;5...
>
> As you can see it's a single flipped bit (31f4, 3174). I'm not sure
> about "fa4M-5". Never seen "M-" before.
If it's a bitflip, then it's faulty RAM. All other explanations like
random memory overwrites typically lead to whole byte or byte sequences.
The reasons for bad RAM could be a faulty module, but I've also seen
transient bitflips on a box without enough PSU power when the system was
under load. Which also makes it hard to make sure memtest will catch the
errors, as was in my case, because the disks were not active.
I'd recommend to stop using the machine for anything than testing.
Powered by blists - more mailing lists