lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220531103834.vhscyk3yzsocorco@quack3.lan>
Date:   Tue, 31 May 2022 12:38:34 +0200
From:   Jan Kara <jack@...e.cz>
To:     Donald Buczek <buczek@...gen.mpg.de>
Cc:     linux-ext4@...r.kernel.org, linux-fsdevel@...r.kernel.org,
        dm-devel@...hat.com, it+linux@...gen.mpg.de,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: ext4_writepages: jbd2_start: 5120 pages, ino 11; err -5

Late reply but maybe it is still useful :)

On Thu 14-04-22 17:19:49, Donald Buczek wrote:
> We have a cluster scheduler which provides each cluster job with a
> private scratch filesystem (TMPDIR). These are created when a job starts
> and removed when a job completes. The setup works by fallocate, losetup,
> mkfs.ext4, mkdir, mount, "losetup -d", rm and the teardown just does a
> umount and rmdir.
> 
> This works but there is one nuisance: The systems usually have a lot of
> memory and some jobs write a lot of data to their scratch filesystems. So
> when a job finishes, there often is a lot to sync by umount which
> sometimes takes many minutes and wastes a lot of I/O bandwidth.
> Additionally, the reserved space can't be returned and reused until the
> umount is finished and the backing file is deleted.
> 
> So I was looking for a way to avoid that but didn't find something
> straightforward. The workaround I've found so far is using a dm-device
> (linear target) between the filesystem and the loop device and then use
> this sequence for teardown:
> 
> - fcntl EXT4_IOC_SHUTDOWN with EXT4_GOING_FLAGS_NOLOGFLUSH
> - dmestup reload $dmname --table "0 $sectors zero"
> - dmsetup resume $dmname --noflush
> - umount $mountpoint
> - dmsetup remove --deferred $dmname
> - rmdir $mountpoint
> 
> This seems to do what I want. The unnecessary flushing of the temporary data is redirected from the backing file into the zero target and it works really fast. There is one remaining problem though, which might be just a cosmetic one: Although ext4 is shut down to prevent it from writing, I sometimes get the error message from the subject in the logs:
> 
> [2963044.462043] EXT4-fs (dm-1): mounted filesystem without journal. Opts: (null)
> [2963044.686994] EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null)
> [2963044.728391] EXT4-fs (dm-2): mounted filesystem without journal. Opts: (null)
> [2963055.585198] EXT4-fs (dm-2): shut down requested (2)
> [2963064.821246] EXT4-fs (dm-2): mounted filesystem without journal. Opts: (null)
> [2963074.838259] EXT4-fs (dm-2): shut down requested (2)
> [2963095.979089] EXT4-fs (dm-0): shut down requested (2)
> [2963096.066376] EXT4-fs (dm-0): ext4_writepages: jbd2_start: 5120 pages, ino 11; err -5
> [2963108.636648] EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null)
> [2963125.194740] EXT4-fs (dm-0): shut down requested (2)
> [2963166.708088] EXT4-fs (dm-1): shut down requested (2)
> [2963169.334437] EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null)
> [2963227.515974] EXT4-fs (dm-0): shut down requested (2)
> [2966222.515143] EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null)
> [2966222.523390] EXT4-fs (dm-1): mounted filesystem without journal. Opts: (null)
> [2966222.598071] EXT4-fs (dm-2): mounted filesystem without journal. Opts: (null)

> 
> So I'd like to ask a few questions:
> 
> - Is this error message expected or is it a bug?

Well, shutdown is not 100% tuned for clean teardown. It is mostly a testing
/ debugging aid.

> - Can it be ignored or is there a leak or something on that error path.

The error recovery path should be cleaning up everything. If not, that
would be a bug :)

> - Is there a better way to do what I want? Something I've overlooked?

Why not just rm -rf $mountpoint/*? That will remove all dirty data from
memory without writing it back. It will cost you more in terms of disk IOs
than the above dance with shutdown but unless you have many files, it
should be fast... And it is much more standard path than shutdown :).

> - I consider to create a new dm target or add an option to an existing
> one, because I feel that "zero" underneath a filesystem asks for problems
> because a filesystem expects to read back the data that it wrote, and the
> "error" target would trigger lots of errors during the writeback
> attempts. What I really want is a target which silently discard writes
> and returns errors on reads. Any opinion about that?

> - But to use devicemapper to eat away the I/O is also just a workaround
> to the fact that we can't parse some flag to umount to say that we are
> okay to lose all data and leave the filesystem in a corrupted state if
> this was the last reference to it. Would this be a useful feature?

I think something like this might be useful if the "rm -rf" solution is too
slow. But it is a bit of a niche usecase ;).


								Honza
-- 
Jan Kara <jack@...e.com>
SUSE Labs, CR

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ