* * * READ ME * * * * * * Veritas File System 5.1 SP1 PR2 RP2 * * * * * * P-patch 1 * * * Patch Date: 2012-02-08 This document provides the following information: * PATCH NAME * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * OPERATING SYSTEMS SUPPORTED BY THE PATCH * INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- Veritas File System 5.1 SP1 PR2 RP2 P-patch 1 PACKAGES AFFECTED BY THE PATCH ------------------------------ VRTSvxfs BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * Veritas Storage Foundation for Oracle RAC 5.1 SP1 PR2 * Veritas Storage Foundation Cluster File System 5.1 SP1 PR2 * Veritas Storage Foundation 5.1 SP1 PR2 * Veritas Storage Foundation High Availability 5.1 SP1 PR2 * Veritas Storage Foundation Cluster File System for Oracle RAC 5.1 SP1 PR2 * Symantec VirtualStore 5.1 SP1 PR2 * Symantec VirtualStore 5.1 SP1 PR3 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- RHEL5 x86-64 RHEL6 x86-64 SLES10 x86-64 SLES11 x86-64 INCIDENTS FIXED BY THE PATCH ---------------------------- This patch fixes the following Symantec incidents: Patch ID: 5.1.132.100 * 2244612 (Tracking ID: 2196308) SYMPTOM: Write and read performance concerns on CFS when running apps that read of the end of a file which is being increased in size by another writere thread at the same time. DESCRIPTION: =============================================== Circumstances requiring investigation by Symantec =============================================== Circumstance 1: Writer thread writing to inode with masterless locks, big impact on throughput if locks are then normalized. Stage1: - a file is created on a cluster mounted file system using 8Kb fs-blocksize (touch xx) - we preallocate a single 32Gb extent (setext -r 4194304 -f contig ../xx) - we run 'Dtool -r 6386 -W -s 4096 -f ...../xx' (not all args listed) - what this does is perform 6836*4Kb writes per second, which is 26.70 Mb/Sec - volume has 2 stripes, write_nstream=2, write_pref_io=128K - vxstat shows ~54588 sectors-writes/sec and ~108 write ops, i.e. ~26.7 Mb/Sec to disk. - we only access the new file from one node. Stage2: - from another node, we read 4Kb of the file - "dd if=./xx of=/dev/null bs=4k count=1" - this 'normalizes' the locks for file 'xx' - no other operations are performed from this node. Stage3: - the writer thread throughput drops immediately to 16Mb/Sec, and this persists - So despite only writing and being able to cache the GLM locks locally on this node the throughput drops by nearly half. - Do not know the GLM lock mastering, but at the time of testing there were still at least 6 nodes in the cluster. Circumstance 2: Writer thread appending, reader[s] on different node[s] reading in a different range impacts writer throughput Stage1: - a file is created on a cluster mounted file system using 8Kb fs-blocksize (touch yy) - we preallocate a single 32Gb extent (setext -r 4194304 -f contig ./yy) - we run 'Dtool -r 6386 -W -s 4096' -f./yy' (not all args listed) - what this does is perform 6836*4Kb writes per second - we access the file from another node to normalize the glm locks - the writer thread throughput drops to ~16Mb/Sec, and this persists - We allow this writer process to continuing running a while to allow the file to grow - This writer process simulates a producer thread. - The writer is always appending to the file, so its range-lock is from EOF to maxfileoffset. Stage2: - from a second node we start a reader process (or start two, each from different nodes) - we run 'Dtool -r 27 -R -s 524288 -f ./yy' (not all args listed) - what this does is perform 27*512Kb sequential reads of file 'yy' per second - setting discovered direct i/o to 256K or 1Mb made no notable difference (if I recall correctly) - This reader process simulates a DSS consumer process. - Logically the reader has to catch-up with the writer - so the reader is reading a difference range to the writer Stage3 - However as soon as the Dtool reader process starts the writer process throughput drops to 10-11 Mb/sec (~from 16Mb/sec) - If the reader is reading from a difference range to the writer, why is the writer throughput affected. - Need to clearly understand this. Circumstance 3: Writer thread appending, reader[s] on different node reading in a the same range impacts writer throughput a little more Stage1: - a file is created on a cluster mounted file system using 8Kb fs-blocksize (touch zz) - we preallocate a single 32Gb extent (setext -r 4194304 -f contig ../zz) Stage2: - from a second node we start a reader process (or start two, each from different nodes) - we run 'Dtool -r 27 -R -s 524288 -f ./zz' (not all args listed) - what this does is perform 27*512Kb sequential reads of file 'zz' per second - This reader process simulates a DSS consumer process. - however the reader's read(2) call returns 0, as no data is written into the file yet Stage3: - we run 'Dtool -r 6386 -W -s 4096' -f./zz' (not all args listed) - what this does is perform 6836*4Kb writes per second - the writer thread throughput drops to ~9-10Mb/Sec, and this persists - are the reader processes now reading from/near the same range as the writer process..? - either way the throughput is lower than circumstance 2. Circumstance 4: Writer thread appending, reader[s] on different node reading as in circumstance3, however one reader is using 10000 128byte i/o's per sec Stage1: - a file is created on a cluster mounted file system using 8Kb fs-blocksize (touch aa) - we preallocate a single 32Gb extent (setext -r 4194304 -f contig ./aa) Stage2: - from a second node we start one reader process to simulate DSS consumer thread - we run 'Dtool -r 27 -R -s 524288 -f ./aa' (not all args listed) - what this does is perform 27*512Kb sequential reads of file 'zz' per second Stage3: - from a third node we start one reader process to simulate Surveillance consumer thread - we run 'Dtool -r 10000 -R -s 128 -f ./aa' (not all args listed) - This performs 10000 read i/o per second, where each read i/o is 128 bytes Stage4: - however these reader's read(2) calls returns 0, as no data is written into the file yet - we run 'Dtool -r 6386 -W -s 4096' -f./aa' (not all args listed) - what this does is perform 6836*4Kb writes per second - the writer thread throughput drops to ~6-7Mb/Sec, and this persists circumstance7, detail in brief: o writer node (CFS secondary) performing DTool and the usual 26.7 Mb/Sec o reader node (CFS secondary) is running 'dd if=./xx of=/dev/null bs=128' o dd is started a few seconds after the DTool writer, dd reader reads at ~6.5Mb/sec - so it cannot keep up o stop the DTool writer, and the dd reader i/o rate remains unchanged at ~6.5Mb/sec o dd eventually runs to EOF and reports 6.5Mb/sec average. (glmstat showed continued activity) o Now, simply run the dd again (umount/mount if wished) and the dd will read at 166Mb/sec !! o Why does the dd reader run so slowly, even when the writer has stopped! RESOLUTION: 3 changes are involved here :- 1. Lock ahead the pglock if we are taking the RWlock off the end of the file. This means that now the writer will not fight with the readers for the pglock. 2. Allow the pdflush threads to do more of the work on flushing dirty pages. this eliminates some locking by vxfs. 3. Change the read codepath to only lock the range that it can actually read ( due to EOF ) rather than taking the RWlock over the end of the file. * 2340836 (Tracking ID: 2314212) SYMPTOM: Poor DB2 performance when upgrading from 9.1 of DB2 to 9.7 DESCRIPTION: DB2 9.5 onwards changed to using posix threads. As DB2 uses CIO this led to some workloads having contention on the mmap_sem which is taken to avoid a locking hierarchy violation with vx_mmap RESOLUTION: Introduced a new mount option "nommapcio" which can be used to fail mmap() requests for files open with CIO. Then in this case we need not take the mmap_sem which will eliminate the contention. * 2413811 (Tracking ID: 1590963) SYMPTOM: Maximum Number of subdirectories is limited to 32767 DESCRIPTION: Currently, there limit on maximum numbers of subdirectories. This limit is fixed to 32767. This value can be increased to 64K on Linux, HP and Solaris platforms. Also there is a need to provide Flexibility to change the value of maximum numbers of subdirectories. RESOLUTION: Code is modified to add vx_maxlink tunable to control maximum number of sub directories * 2508171 (Tracking ID: 2246127) SYMPTOM: Mount command may take more time in case of large IAU file. DESCRIPTION: At time of mount, IAU file is read one block at time. The read block is processed and then next block is read. In case there are huge number of files in filesystem, IAU file for the filesystem becomes large. Reading of such large IAU file, one block at time is taking time to complete mount command. RESOLUTION: Code is changed to read IAU file using multiple threads in parallel, also now complete extent is read and then it is processed. * 2521456 (Tracking ID: 2429281) SYMPTOM: "repquota" command is taking too long to complete when the user with large id is set quota on the file system. DESCRIPTION: If there is a user whose uid is large and the file system use quota, the quota file becomes huge. The external quota file consists of user quota record (32 bytes per record), which are organized in an linear way, so if the user with large id is set quota on the file system, the file size would be increased to "(largest id)*32"(bytes) accordingly. The way "repquota" to display the user quota info for a file system is looping through each record in the quota file by calling fread, it , it would issue a huge number of small I/O although fread has some buffers for its own use. So in case of any user whose id is very large, the size of external quota file would be huge, the main problems here is too many small I/Os are slowing the execution time of "repquota". RESOLUTION: Allocated the internal buffers which are big enough such that many quota records info can be read into the buffers in one system call instead of using fread to read the quota record through the external quota file one by one. * 2521672 (Tracking ID: 2515380) SYMPTOM: The ff command hangs and later it exits after program exceeds memory limit with following error. # ff -F vxfs /dev/vx/dsk/bernddg/testvol UX:vxfs ff: ERROR: V-3-24347: program limit of 30701385 exceeded for directory data block list UX:vxfs ff: ERROR: V-3-20177: /dev/vx/dsk/bernddg/testvol DESCRIPTION: 'ff' command lists all files on device of vxfs file system. In 'ff' command we do directory lookup. In a function we save the block addresses for a directory. For that we traverse all the directory blocks. Then we have function which keeps track of buffer in which we read directory blocks and the extent up to which we have read directory blocks. This function is called with offset and it return the offset up to which we have read the directory blocks. The offset passed to this function has to be the offset within the extent. But, we were wrongly passing logical offset which can be greater than extent size. As a effect the offset returned gets wrapped to 0. The caller thinks that we have not read anything and hence the loop. RESOLUTION: Remove call to function which maintains buffer offsets for reading data. That call was incorrect and redundant. We actually call that function correctly from one of the functions above. * 2561355 (Tracking ID: 2561334) SYMPTOM: System log file may contain following error message on multi-threaded environment with Dynamic Storage Tiers(DST). UX:vxfs fsppadm: ERROR: V-3-26626: File Change Log IOTEMP and ACCESSTEMP index creation failure for /vx/fsvm with message Argument list too long DESCRIPTION: In DST, while enforcing policy, SQL queries are generated and written to file .__fsppadm_enforcesql present in lost+found. In multi threaded environment, 16 threads works in parallel on ILIST and geenrate SQL queries and write it to file. This may lead to corruption of file, if multiple threads write to file simultaneously. RESOLUTION: using flockfile() instead of adding new code to take lock on .__fsppadm_enforcesq file descriptor before writing into it. * 2563929 (Tracking ID: 2648078) SYMPTOM: Manual upgrade for VxFS will fail in when ODM is running DESCRIPTION: ODM module is dependent on the VXFS module and should be stopped before upgrading VXFS. RESOLUTION: Added check to make sure that ODM is not running while upgrading VXFS. The upgrade will now fail with the following message vxodm is still running, please stop it before upgrading. '/etc/init.d/vxodm stop' to stop vxodm. Please upgrade vxodm also before starting it again. * 2564431 (Tracking ID: 2515459) SYMPTOM: Local mount hangs in vx_bc_binval_cookie like the following stack delay vx_bc_binval_cookie vx_blkinval_cookie vx_freeze_flush_cookie vx_freeze_all vx_freeze vx_set_tunefs1 vx_set_tunefs vx_aioctl_full vx_aioctl_common vx_aioctl vx_ioctl genunix:ioctl unix:syscall_trap32 DESCRIPTION: The hanging process for local mount is waiting for a buffer to be unlocked. But that buffer can only be released if its associated cloned map writes get flushed. But a necessary flush is missed. RESOLUTION: Add code to synchronize cloned map writes so that all the cloned maps will be cleared and the buffers associated with them will be released. * 2574396 (Tracking ID: 2433934) SYMPTOM: Performance degradation observed when CFS is used compared to standalone VxFS as back-end NFS data servers. DESCRIPTION: In CFS, if one thread holding read-write lock on inode in exclusive mode, other threads are stuck for the same inode, even if they want to access inode in shared mode, resulting in performance degradation. RESOLUTION: Code is changed to avoid taking read-write lock for inode in exclusive mode, where it is not required. * 2578625 (Tracking ID: 2275679) SYMPTOM: On SLES10 machine with high I/O activity some writes may appear to be stalled. DESCRIPTION: The stall occurs as SLES10 only checks the overall state of dirty memory - not the dirty memory associated with the file system that is being written to. This causes flushing on filesystems which are not heavily dritied , thus increasing time for writes to complete. RESOLUTION: The code is modified to ensure that dedicated flushing threads are invoked at regular intervals per filesystem ensuring that we never end up with a heavily dirtied vxfs file-system. * 2578631 (Tracking ID: 2342067) SYMPTOM: While mounting a filesystem the machine and there is any error while reading the super block from the disk may panic due to null pointer de-reference and the following stack trace will be displayed. vx_kill_sb deactivate_super get_sb_bdev vx_get_sb_bdev vx_get_sb_impl vx_get_sb DESCRIPTION: While mounting the filesystem we read the super block from the disk , if there is any error during this operation we have to do a cleanup. During the cleanup we use unitiialised data structures, which leads to panic RESOLUTION: The code is modified to ensure that only properly initialized data structures are processed during the error handling of the mount operation. * 2578637 (Tracking ID: 2191031) SYMPTOM: VxFS performance may be impacted due to the frequent triggering of swapping daemon (kswapd). DESCRIPTION: Filesystem used to allocate physically contigous memory in larger chunk at some places triggering kswapd RESOLUTION: The memory allocation request was relaxed to use memory which not physically contiguos. * 2578643 (Tracking ID: 2212686) SYMPTOM: The read /write performance may degrade over a period of time due to memory fragmentation. DESCRIPTION: The fragmentation detection mechanism used did not detect fragmentation effectively. RESOLUTION: is modified to use the advanced fragmentation detection mechanism to identify fragmentation. * 2581351 (Tracking ID: 2588593) SYMPTOM: df(1M) shows wrong usage value for volume when large file is deleted. DESCRIPTION: We maintain all freed extent size in the in core global variable and transaction subroutine specific data structures. After deletion of a large file, we were missing to update this in core global variable. df(1M) while reporting usage data, read the freed space information from this global variable which contains stale information. RESOLUTION: Code is modified to account the freed extent data into global vaiable used by df(1M) so that correct usage for volume is reported by df(1M). * 2587025 (Tracking ID: 2528819) SYMPTOM: AIX can fail to create new worker threads for VxFS. The following message is seen in the system log- "WARNING: msgcnt 175 mesg 097: V-2-97: vxfs failed to create new thread" DESCRIPTION: AIX is failing the thread creation because it cannot find a free slot in that kproc and returning ENOMEM. RESOLUTION: Limit the maximum number of VxFS worker threads. * 2587035 (Tracking ID: 2576794) SYMPTOM: access() system call fails with EPERM (Permission denied) on cluster node even if the file has executable permissions. DESCRIPTION: The cluster node on which the access() failed had stale permissions for the vxfs inode. This was due to not holding the proper RW-lock while initializing the Linux OS inode (struct inode) for the corresponding vxfs inode. RESOLUTION: We now hold the appropriate RW-lock before initializing the Linux inode. * 2603008 (Tracking ID: 2528888) SYMPTOM: CFS mount fails after recovery from I/O path failure. The system message contains the following error: vxfs: msgcnt 19 mesg 037: V-2-37: vx_metaioerr - vx_pnolt_stateupd_notran_2 - /dev/vx/dsk/testdg/vol3 file system me ta data read error in dev/block 0/196608 DESCRIPTION: When unmount file system, updating the per node metadata could fail with EIO error because the volume is already unavailable for example disabled by vxdmpadm. The EIO failure affects vxfs unmount function since it can't be returned to Linux kernel interface, which will ignore any unmount errors from filesystem. In that circumstance, the file system is only disabled but not cleaned up that can result in next mount failure. RESOLUTION: When hitting EIO, convert the error to EBUSY and disable the fs, then retry vxfs unmount function. * 2603015 (Tracking ID: 2565400) SYMPTOM: Sequential buffered I/O reads are slow in performance. DESCRIPTION: Read-Aheads are not happening because the file-system's read-ahead size gets incorrectly calculated. RESOLUTION: Fixed the incorrect typecast. * 2607637 (Tracking ID: 2607631) SYMPTOM: vxportal may fail to load DESCRIPTION: Loading vxportal creates device file under "/dev". Udevd daemon creates all the device file under "/dev". At time boot time this daemon may be busy with creating other device in case there are lot of luns to be initialize. This will delay creation if vxportal device under "/dev". RESOLUTION: Modified code which will retry the device creation if it fails because of busy udev daemon. * 2616395 (Tracking ID: 2609010) SYMPTOM: The vxfs_fcl_seektime function seeks to the first record in the FCL file that has a timestamp greater than or equal to the specified time. FCL vxfs_fcl_seektime()API can incorrectly return EINVAL(no records in FCL file newer than specified time) error even though records after specified time are present in FCL log. DESCRIPTION: While doing binary search, it hit the case where last block only had one "partial" record. In this case, search is continued even after the last record in the block and therefore end offsets(where search should end) were not set correctly. This resulted into wrongly returning EINVAL error. RESOLUTION: Now case where last block only had one "partial" record is handled such that end offsets are set correctly. * 2616398 (Tracking ID: 2611279) SYMPTOM: Filesystem with shared extents may panic with following stack trace. page_fault vx_overlay_bmap vx_bmap_lookup vx_bmap vx_local_get_sharedblkcnt vx_get_sharedblkcnt vx_aioctl_get_sharedblkcnt vx_aioctl_common mntput_no_expire vx_aioctl vx_ioctl DESCRIPTION: The mechanism to manage shared extent uses special file. We never expects HOLE in this special file. In HOLE cases we may see panic while working on this file. RESOLUTION: Code has been modified to check if HOLE is present in special file. In case if it is HOLE processing is skipped and thus panic is avoided. * 2619930 (Tracking ID: 2584531) SYMPTOM: System hangs with the stack schedule_timeout vx_iget vx_dirlook vx_lookup do_lookup do_path_lookup DESCRIPTION: The hanging thread is attempting to get an inode which it finds in reuse state. The thread awaits with hope that the reuse flag will get reset. But the flag never gets reset as the inode is not actually being reused by any other thread. While doing the cleanup of inodes in a chunk for reuse, we set the flag on all inodes in chunck upfront. We remove all those inoeds from freelist. Then we clean inodes one by one. After that we clear the reuse flag. During this process the inotify watch can be set on this inode. We skip the inode cleanup for such inode and do not reset the flag. We add all inodes in the the chunk to the freelist again. We reset the reuse flag on all inodes except for which the inotify watch has come. RESOLUTION: During inode cleanup if we find a watch on inode then reset the reuse flag first then return. So now inode goes to freelist with reuse flag reset. * 2624650 (Tracking ID: 2624262) SYMPTOM: Panic hit in vx_bc_do_brelse() function while executing dedup functionality with following backtrace. vx_bc_do_brelse() vx_mixread_compare() vx_dedup_extents() enqueue_entity() __alloc_pages_slowpath() __get_free_pages() vx_getpages() vx_do_dedup() vx_aioctl_dedup() vx_aioctl_common() vx_rwunlock() vx_aioctl() vx_ioctl() vfs_ioctl() do_vfs_ioctl() sys_ioctl() DESCRIPTION: While executing function vx_mixread_compare() in dedup codepath, we hit error due to which an allocated data structure remained uninitialised. The panic occurs due to writing to this uninitialised allocated data structure in the function vx_mixread_compare(). RESOLUTION: Code is changed to free the memory allocated to the data structure when we are going out due to error. * 2627346 (Tracking ID: 1590324) SYMPTOM: Umount can hang if linux is using inotify. DESCRIPTION: We may see hang while unmounting FS in case Linux is using inotify mechanism. Internally inotify increments reference count for inode which is causing hang in VxFS RESOLUTION: Modified code to take care of increased reference count by inotify at time of unmounting FS. * 2631026 (Tracking ID: 2332314) SYMPTOM: Internal noise.fullfsck test with ODM enabled hit an assert fdd_odm_aiodone:3 DESCRIPTION: In case of failed IO in fdd_write_clone_end() function, error was not set on buffer which is causing the assert. RESOLUTION: Code is changed so we set the error on buffer in case of IO failures in fdd_write_clone_end() function. * 2631315 (Tracking ID: 2631276) SYMPTOM: Lookup fails for the file which is in partitioned directory and is being accessed using its vxfs namespace extension name. DESCRIPTION: If file is present in the partitioned directory and is accessed using its vxfs namespace extension name then its name is searched in one of the hidden leaf directory. This leaf directory mostly doesn't contains entry for this file. Due this lookup fails. RESOLUTION: Code has been modified to call partitioned directory related lookup routine at upper level so that lookup doesn't fails even if file is accessed using its extended namespace name. * 2631390 (Tracking ID: 2530747) SYMPTOM: Threads doing rename, create and remove can wait indefinitely for the exclusive cluster wide dirlock of the file-system. The stack of rename thread will look like - #0 [ffff8132af5e5898] schedule #1 [ffff8132af5e5970] vxg_svar_sleep_unlock #2 [ffff8132af5e59c0] vxg_grant_sleep #3 [ffff8132af5e59f0] vxg_cmn_lock #4 [ffff8132af5e5a40] vxg_api_lock #5 [ffff8132af5e5a80] vx_glm_lock #6 [ffff8132af5e5aa0] vx_pd_rename #7 [ffff8132af5e5c10] vx_rename1_pd #8 [ffff8132af5e5cd0] vx_rename1 #9 [ffff8132af5e5d20] vx_rename #10 [ffff8132af5e5dc0] vfs_rename #11 [ffff8132af5e5e10] sys_renameat #12 [ffff8132af5e5f80] sysenter_do_call DESCRIPTION: Thread holding the exclusive cluster wide dirlock of the file-system won't release it in certain error code-paths. RESOLUTION: Added code to release the dirlock of the file-system. * 2635583 (Tracking ID: 2271797) SYMPTOM: Internal Noise Testing with locally mounted VxFS filesystem hit an assert "f:vx_getblk:1a" DESCRIPTION: The assert is hit due to overlay inode is being marked with the flag regarding bad copy of inode present on disk. RESOLUTION: Code is changed to set the flag regarding bad copy of inode present on disk, only if the inode is not overlay. * 2642027 (Tracking ID: 2350956) SYMPTOM: Internal noise test on locally mounted filesystem exited with error message "bin/testit : Failed to full fsck cleanly, exiting" and in the logs we get the userspace assert "bmaptops.c 369: ASSERT(devid == 0 || (start == VX_HOLE && devid == VX_DEVID_HOLE)) failed". DESCRIPTION: The function bmap_data4_set() gets called while entering bmap allocation information for typed extents of type VX_TYPE_DATA_4 or VX_TYPE_IADDR_4. The assert expects that, either devid should be zero or if extent start is a hole, then devid should be VX_DEVID_HOLE. However, we never have extent descriptors to represent holes in typed extents. The assertion is incorrect. RESOLUTION: The assert corrected to check that extent start is not a hole and either devid is zero, or extent start is VX_OVERLAY with devid being VX_DEVID_HOLE. * 2669195 (Tracking ID: 2326037) SYMPTOM: Internal Stress Test on cluster file system with clones failed while writing to file with error ENOENT. DESCRIPTION: VxFS file-system trying to write to clone which is in process of removal. As clone removal process works asynchronously, process starts to push changes from inode of primary fset to inode of clone fset. But when actual write happens the inode of clone fset is removed, hence error ENOENT is returned. RESOLUTION: Code is added to re-validate the inode being written. Patch ID: 5.1.132.000 * 2169326 (Tracking ID: 2169324) SYMPTOM: On LM , When clone is mounted for a file system and some quota is assigned to clone. And if quota exceeds then clone is removed and if files from clones are being accessed then assert may hit in function vx_idelxwri_off() through vx_trunc_tran() DESCRIPTION: During clone removable, we go through the all inodes of the clone(s) being removed and hit the assert because there is difference between on-disk and in-core sizes for the file , which is being modified by the application. RESOLUTION: While truncating files, if VX_IEPTTRUNC op is set, set the in-core file size to on_disk file size. * 2243061 (Tracking ID: 1296491) SYMPTOM: Performing a nested mount on a CFS file system triggers a data page fault if a forced unmount is also taking place on the CFS file system. The panic stack trace involves the following kernel routines: vx_glm_range_unlock vx_mount domount mount syscall DESCRIPTION: When the underlying cluster mounted file system is in the process of unmounting, the nested mount dereferences a NULL vfs structure pointer, thereby causing a system panic. RESOLUTION: The code has been modified to prevent the underlying cluster file system from a forced unmount when a nested mount above the file system, is in progress. The ENXIO error will be returned to the forced unmount attempt. * 2243063 (Tracking ID: 1949445) SYMPTOM: Hang when file creates were being performed on large directory. stack of hung thread is similar to below: vxglm:vxg_grant_sleep+226 vxglm:vxg_cmn_lock+563 vxglm:vxg_api_lock+412 vxfs:vx_glm_lock+29 vxfs:vx_get_ownership+70 vxfs:vx_exh_coverblk+89 vxfs:vx_exh_split+142 vxfs:vx_dexh_setup+1874 vxfs:vx_dexh_create+385 vxfs:vx_dexh_init+832 vxfs:vx_do_create+713 DESCRIPTION: For large directories, Large Directory Hash(LDH) is enabled to improve lookup on such large directories. Hang was due to taking ownership of LDH inode twice in same thread context i.e. while building hash for directory. RESOLUTION: Avoid taking ownership again if we already have the ownership of the LDH inode. * 2243064 (Tracking ID: 2111921) SYMPTOM: On linux platforms readv()/writev() performance with DIO/CIO can be more than 2x slower on vxfs than on raw volumes. DESCRIPTION: In the current implementation of DIO If there are multiple iovecs passed during IO [eg. readv()/writev()] , we do a DIO for each iovec in a loop. We cannot do coalescing of the given iovecs directly, because there is no guarantee that the user addresses are contiguous. RESOLUTION: We introduced a concept of Parrallel-DIO with this we can submit iovecs in the same extent together. By doing this and the use of the io_submit interface directly we are able to make use of linux's scatter gather enahancements. This change brings the readv() writev() performance in vxfs to the same as raw. * 2247299 (Tracking ID: 2161379) SYMPTOM: In a CFS enviroment various filesytems operations hang with the following stack trace T1: vx_event_wait+0x40 vx_async_waitmsg+0xc vx_msg_send+0x19c vx_iread_msg+0x27c vx_rwlock_getdata+0x2e4 vx_glm_cbfunc+0x14c vx_glmlist_thread+0x204 T2: vx_ilock+0xc vx_assume_iowner+0x100 vx_hlock_getdata+0x3c vx_glm_cbfunc+0x104 vx_glmlist_thread+0x204 DESCRIPTION: Due to improper handling of the ENOTOWNER error in the iread receive function. We continously retry the operation while holding an Inode Lock blocking all other threads and causing a deadlock RESOLUTION: The code is modified to release the inode lock on ENOTOWNER error and acquire it again, thus resolving the deadlock There are totally 4 vx_msg_get_owner() caller with ilocked=1: vx_rwlock_getdata() : Need Fix vx_glock_getdata() : Need Fix vx_cfs_doextop_iau(): Not using the owner for message loop, no need to fix. vx_iupdat_msg() : Already has 'unlock/delay/lock' on ENOTOWNER condition! * 2249658 (Tracking ID: 2220300) SYMPTOM: 'vx_sched' hogs CPU resources. DESCRIPTION: vx_sched process calls vx_iflush_list() to perform the background flushing processing. vx_iflush_list() calls vx_logwrite_flush() if the file has had logged-writes performed upon it. vx_logwrite_flush() performs a old trick that is ineffective when flushing in chunks. The trick is to flush the file asynchronously, then flush the file again synchronously. This therefore flushes the entire file twice, this is double the work when chunk flushing. RESOLUTION: vx_logwrite_flush() has been changed to flush the file once rather than twice. So Removed asynchronous flush in vx_logwrite_flush(). * 2255786 (Tracking ID: 2253617) SYMPTOM: Fullfsck fails to run cleanly using "fsck -n". DESCRIPTION: In case of duplicate file name entries in one directory, fsck compares the directory entry with the previous entries. If the filename already exists further action is taken according to the user input [Yes/No]. As we are using strncmp, it will compare first n characters, if it matches it will return success and will consider it as a duplicate file name entry and fails to run cleanly using "fsck -n" RESOLUTION: Checking the filename size and changing the length in strncmp to name_len + 1 solves the issue. * 2257904 (Tracking ID: 2251223) SYMPTOM: The 'df -h' command can take 10 seconds to run to completion and yet still report an inaccurate free block count, shortly after removing a large number of files. DESCRIPTION: When removing files, some file data blocks are released and counted in the total free block count instantly. However blocks may not always be freed immediately as VxFS can sometimes delay the releasing of blocks. Therefore the displayed free block count, at any one time, is the summation of the free blocks and the 'delayed' free blocks. Once a file 'remove transaction' is done, its delayed free blocks will be eliminated and the free block count increased accordingly. However, some functions which process transactions, for example a metadata update, can also alter the free block count, but ignore the current delayed free blocks. As a result, if file 'remove transactions' have not finished updating their free blocks and their delayed free blocks information, the free space count can occasionally show greater than the real disk space. Therefore to obtain an up-to-date and valid free block count for a file system a delay and retry loop was delaying 1 second before each retry and looping 10 times before giving up. Thus the 'df -h' command can sometimes take 10 seconds, but even if the file system waits for 10 seconds there is no guarantee that the output displayed will be accurate or valid. RESOLUTION: The delayed free block count is recalculated accurately when transactions are created and when metadata is flushed to disk. * 2275543 (Tracking ID: 1475345) SYMPTOM: write() system call hangs for over 10 seconds DESCRIPTION: While performing a transactions in case of logged write we used to asynchronously flush one buffer at a time belonging to the transaction space. Such Asynchronous flushing was causing intermediate delays in write operation because of reduced transaction space. RESOLUTION: Flush all the dirty buffers on the file in one attempt through synchronous flush, which will free up a large amount of transaction space. This will reduce the delay during write system call. * 2280386 (Tracking ID: 2061177) SYMPTOM: 'fsadm -de' command erroring with 'bad file number' on filesystem(s) on 5.0MP3RP1. DESCRIPTION: <1>first, Our kernel fs doesn't have any problem. There is not corrupt layout in their system. The metasave got from the customer is the proof (we can't reproduce this problem and there is not corrupted inode in that metasave). <2>second, As you know, fsadm is a application which has 2 parts: the application part and the kernel part. The application part read layout from raw disk to make strategy and the kernel part is to implement. So, For a buffer write fs, there should be a problem that can't be avoided that is the sync problem. In our customer's system, when they do fsadm -de, they also so huge of write operation (they also have many check points and As you know more check points more copy on write which means checkpoint will multi the write operation. That why more checkpoints more problem). RESOLUTION: our solution is to add sync operation in fsadm before it read layout from raw disk to avoid kernel and application un-sync. * 2280552 (Tracking ID: 2246579) SYMPTOM: Filesystem corruptions and system panic when attempting to extend a 100%-full disk layout version 5(DLV5) VxFS filesystem using fsadm(1M). DESCRIPTION: The behavior is caused by filesystem metadata that is relocated to the intent log area inadvertently being destroyed when the intent log is cleared during the resize operation. RESOLUTION: Refresh the incore intent log extent map by reading the bmap of the intent log inode before clearing it. * 2296277 (Tracking ID: 2296107) SYMPTOM: The fsppadm command (fsppadm query -a mountpoint ) displays ""Operation not applicable" " while querying the mount point. DESCRIPTION: During fsppadm query process, fsppadm will try to open every file's named data stream "" in the filesystem. but vxfs inernal file FCL: "changelog" doesn't support this operation. "ENOSYS" is returned in this case. fsppadm will translate "ENOSYS" into "Operation not applicable", and print the bogus error message. RESOLUTION: Fix fsppadm's get_file_tags() to ignore the "ENOSYS" error. * 2311490 (Tracking ID: 2074806) SYMPTOM: a dmapi program using dm_punch_hole may result in corrupted data DESCRIPTION: When the dm_punch_hole call is made on a file with allocated extents is used immediatly after a previous write then data can be written through stale pages. This causes data to be written to the wrong location RESOLUTION: dm_punch_hole will now invalidate all the pages within the hole its creating. * 2320044 (Tracking ID: 2419989) SYMPTOM: ncheck(1M) command with '-i' option does not limit the output to the specified inodes. DESCRIPTION: Currently, ncheck(1M) command with '-i' option currently shows free space information and other inodes that are not in the list provides by '-i' option. RESOLUTION: ncheck(1M) command is modified to print only those inodes that are specified by '-i' option. * 2320049 (Tracking ID: 2419991) SYMPTOM: There is no way to specify an inode that is unique to the file system since we reuse inode numbers in multiple filesets. We therefore would need to be able to specify a list of filesets similar to the '-i' option for inodes, or add a new '-o' option where you can specify fileset+inode pairs. DESCRIPTION: When ncheck command is called with '-i' option in conjunction with -oblock/device/sector option, it displays inodes having same inode number from all filesets. We don't have any command line option that helps us to specify a unique inode and fileset combination. RESOLUTION: Code is modified to add '-f' option in ncheck command using which one could specify the fset number on which one wants to filter the results. Further, if this option is used with '-i' option, we could uniquely specify the inode-fileset pair/s that that we want to display. * 2329887 (Tracking ID: 2253938) SYMPTOM: In a Cluster File System (CFS) environment , the file read performances gradually degrade up to 10% of the original read performance and the fsadm(1M) -F vxfs -D -E shows a large number (> 70%) of free blocks in extents smaller than 64k. For example, % Free blocks in extents smaller than 64 blks: 73.04 % Free blocks in extents smaller than 8 blks: 5.33 DESCRIPTION: In a CFS environment, the disk space is divided into Allocation Units (AUs).The delegation for these AUs is cached locally on the nodes. When an extending write operation is performed on a file, the file system tries to allocate the requested block from an AU whose delegation is locally cached, rather than finding the largest free extent available that matches the requested size in the other AUs. This leads to a fragmentation of the free space, thus leading to badly fragmented files. RESOLUTION: The code is modified such that the time for which the delegation of the AU is cached can be reduced using a tuneable, thus allowing allocations from other AUs with larger size free extents. Also, the fsadm(1M) command is enhanced to de-fragment free space using the -C option. * 2329893 (Tracking ID: 2316094) SYMPTOM: vxfsstat incorrectly reports "vxi_bcache_maxkbyte" greater than "vx_bc_bufhwm" after reinitialization of buffer cache globals. reinitialization can happen in case of dynamic reconfig operations. vxfsstat's "vxi_bcache_maxkbyte" counter shows maximum memory available for buffer cache buffers allocation. Maximum memory available for buffer allocation depends on total memory available for Buffer cache(buffers + buffer headers) i.e. "vx_bc_bufhwm" global. Therefore vxi_bcache_maxkbyte should never greater than vx_bc_bufhwm. DESCRIPTION: "vxi_bcache_maxkbyte" is per-CPU counter i.e. part of global per-CPU 'vx_info' counter structure. vxfsstat does sum of all per-cpu counters and reports result of sum. During re-intitialation of buffer cache, this counter was not set to zero properly before new value is assigned to it. Therefore total sum of this per-CPU counter can be more than 'vx_bc_bufhwm'. RESOLUTION: During buffer cache re-initialization, "vxi_bcache_maxkbyte" is now correctly set to zero such that final sum of this per-CPU counter is correct. * 2338010 (Tracking ID: 2337737) SYMPTOM: For Linux version 2.6.27 and onwards, a write() may never complete due to forever looping of the write kernel thread, thus consuming most of the CPU leading to system hang like situation. A kernel stack of such looping write thread looks like - <> bad_to_user vx_uiomove vx_write_default vx_write1 vx_rwsleep_unlock vx_do_putpage vx_write_common_slow handle_mm_fault d_instantiate do_page_fault vx_write_common vx_prefault_uio_readable vx_write vfs_write sys_write system_call_fastpath <> DESCRIPTION: Some pages created during a write() may be partially initialized and are therefore destroyed. However due to a bug, the variable representing number of bytes copied is not updated correctly to reflect this destroying of page. Thus subsequent page-fault for the destroyed page occur at incorrect offset leading to indefinite looping of write kernel thread. RESOLUTION: Update correctly the number of bytes copied after destroying partially initialized pages. * 2340741 (Tracking ID: 2282201) SYMPTOM: On a VxFS filesystem, vxdump(1m) operation running in parallel with other filesystem Operations like create, delete etc. can fail with signal SIGSEGV generating a core file. DESCRIPTION: vxdump caches the inodes to be dumped in a bit map before starting the dump of a directory, however this value can change if there are creates and deletes happening in the background leading to inconsistent bit map eventually generating a core file. RESOLUTION: The code is updated to refresh the inode bit map before actually starting the dump operation thus avoiding the core file generation. * 2340799 (Tracking ID: 2059611) SYMPTOM: system panics because NULL tranp in vx_unlockmap(). DESCRIPTION: vx_unlockmap is to unlock a map structure of file system. If the map is being handled, we incremented the hold count. vx_unlockmap() attempts to check whether this is an empty mlink doubly linked list while we have an async vx_mapiodone routine which can change the link at unpredictable timing even though the hold count is zero. RESOLUTION: evaluation order is changed inside vx_unlockmap(), such that further evaluation can be skipped over when map hold count is zero. * 2340817 (Tracking ID: 2192895) SYMPTOM: System panics when performing fcl commands at unix:panicsys unix:vpanic_common unix:panic genunix:vmem_xalloc genunix:vmem_alloc unix:segkmem_xalloc unix:segkmem_alloc_vn genunix:vmem_xalloc genunix:vmem_alloc genunix:kmem_alloc vxfs:vx_getacl vxfs:vx_getsecattr genunix:fop_getsecattr genunix:cacl genunix:acl unix:syscall_trap32 DESCRIPTION: The acl count in inode can be corrupted due to race condition. For example, setacl can change the acl count when getacl is processing the same inode, which could cause a invalid use of acl count. RESOLUTION: Code is modified to add the protection for the vulnerable acl count to avoid corruption. * 2340825 (Tracking ID: 2290800) SYMPTOM: When using fsdb to look at the map of ILIST file ("mapall" command), fsdb can wrongly report a large hole at the end of ILIST file. DESCRIPTION: while reading bmap of ILIST file, if hole at the end of indirect extents is found, fsdb may incorrectly end up marking the hole as the last extent in the bmap, causing the mapall command to show a large hole till the end of file. RESOLUTION: Code has been modified to read ILIST file's bmap correctly when holes at the end of indirect extents found, instead of marking that hole as the last extent of file. * 2340831 (Tracking ID: 2272072) SYMPTOM: GAB panics the box because VCS engine "had" did not respond, the lbolt wraps around. DESCRIPTION: The lbolt wraps around after 498 days machine uptime. In VxFS, we flush VxFS meta data buffers based on their age. The age calculation happens taking lbolt in account. Due to lbolt wrapping the buffers were not flushed. So, a lot of metadata IO's stopped and hence, the panic. RESOLUTION: In the function for handling flushing of dirty buffers, also handle the condition if lbolt has wrapped. If it has then assign current lbolt time to the last update time of dirtylist. * 2340834 (Tracking ID: 2302426) SYMPTOM: System panics when multiple 'vxassist mirror' commands are running concurrently with following stack strace: 0) panic+0x410 1) unaligned_hndlr+0x190 2) bubbleup+0x880 ( ) +------------- TRAP #1 ---------------------------- | Unaligned Reference Fault in KERNEL mode | IIP=0xe000000000b03ce0:0 | IFA=0xe0000005aa53c114 <--- | p struct save_state 0x2c561031.0x9fffffff5ffc7400 +------------- TRAP #1 ---------------------------- LVL FUNC ( IN0, IN1, IN2, IN3, IN4, IN5, IN6, IN7 ) 3) vx_copy_getemap_structs+0x70 4) vx_send_getemapmsg+0x240 5) vx_cfs_getemap+0x240 6) vx_get_freeexts_ioctl+0x990 7) vxportal_ioctl+0x4d0 8) spec_ioctl+0x100 9) vno_ioctl+0x390 10) ioctl+0x3c0 11) syscall+0x5a0 DESCRIPTION: Panic is caused because of de-referencing an unaligned address in CFS message structure. RESOLUTION: Used bcopy to ensure proper alignment of the addresses. * 2340839 (Tracking ID: 2316793) SYMPTOM: Shortly after removing files in a file system commands like 'df', which use 'statfs()', can take 10 seconds to complete. DESCRIPTION: To obtain an up-to-date and valid free block count in a file system a delay and retry loop was delaying 1 second before each retry and looping 10 times before giving up. This unnecessarily excessive retying could cause a 10 second delay per file system when executing the df command. RESOLUTION: The original 10 retries with a 1 second delay each, have been reduced to 1 retry after a 20 millisecond delay, when waiting for an updated free block count. * 2341007 (Tracking ID: 2300682) SYMPTOM: When a file is newly created, issuing "fsppadm query -a /mount_point" could show incorrect IOTemp information. DESCRIPTION: fsppadm query outputs incorrect data when the file re-uses the inode number which belonged to a removed file, but the database still contains this obsolete record for the removed one. fsppadm utility takes use of a database to save inodes' historical data. It compares the nearest and the farthest records for an inode to compute IOTemp in a time window. And it picks the generation of inode in the farthest record to check the inode existence. However, if the farthest is missing, zero as the generation is used mistakenly. RESOLUTION: If the nearest record for a given inode exists in database, we extract the generation entry instead of that from the farthest one. * 2360817 (Tracking ID: 2332460) SYMPTOM: Executing the VxFS 'vxedquota -p user1 user2' command to copy quota information of one user to other users takes a long time to run to completion. DESCRIPTION: VxFS maintains quota information in two files - external quota files and internal quota files. Whilst copying quota information of one user to another, the required quota information is read from both the external and internal files. However the quota information should only need to be read from the external file in a situation where the read from the internal file has failed. Reading from both files is therefore causing an unnecessary delay in the command execution time. RESOLUTION: The unnecessary duplication of reading both the external and internal Quota files to retrieve the same information has been removed. * 2360819 (Tracking ID: 2337470) SYMPTOM: Cluster File System can unexpectedly and prematurely report a 'file system out of inodes' error when attempting to create a new file. The error message reported will be similar to the following: vxfs: msgcnt 1 mesg 011: V-2-11: vx_noinode - /dev/vx/dsk/dg/vol file system out of inodes DESCRIPTION: When allocating new inodes in a cluster file system, vxfs will search for an available free inode in the 'Inode-Allocation-Units' [IAUs] that are currently delegated to the local node. If none are available, it will then search the IAUs that are not currently delegated to any node, or revoke an IAU delegated to another node. It is also possible for gaps or HOLEs to be created in the IAU structures as a side effect of the CFS delegation processing. However when searching for an available free inode vxfs simply ignores any HOLEs it may find, if the maximum size of the metadata structures has been reached (2^31) new IAUs cannot be created, thus one of the HOLEs should then be populated and used for new inode allocation. The problem occurred as HOLEs were being ignored, consequently vxfs can prematurely report the "file system out of inodes" error message even though there is plenty of free space in the vxfs file system to create new inodes. RESOLUTION: New inodes will now be allocated from the gaps, or HOLEs, in the IAU structures (created as a side effect of the CFS delegation processing). The HOLEs will be populated rather than returning a 'file system out of inodes' error. * 2360821 (Tracking ID: 1956458) SYMPTOM: When attempting to check information of checkpoints by fsckptadm -C blockinfo , the command failed with error 6 (ENXIO), the file system is disabled and some errors come out in message file: vxfs: msgcnt 4 mesg 012: V-2-12: vx_iget - /dev/vx/dsk/sfsdg/three file system invalid inode number 4495 vxfs: msgcnt 5 mesg 096: V-2-96: vx_setfsflags - /dev/vx/dsk/sfsdg/three file system fullfsck flag set - vx_cfs_iread DESCRIPTION: VxFS takes use of ilist files in primary fileset and checkpoints to accommodate inode information. A hole in a ilist file indicates that inodes in the hole don't exist and are not allocated yet in the corresponding fileset or checkpoint. fsckptadm will check every inode in the primary fileset and the downstream checkpoints. If the inode falls into a hole in a prior checkpoint, i.e. the associated file was not generated at the time of the checkpoint creation, fsckptadm exits with error. RESOLUTION: Skip inodes in the downstream checkpoints, if these inodes are located in a hole. * 2368738 (Tracking ID: 2368737) SYMPTOM: If a file which has shared extents has corrupt indirect blocks, then in certain cases the reference count tracking system can try to interpret this block and panic the system. Since this is a asynchronous background operation, this processing will retry repeatedly on every file system mount and hence can result in panic every time the file system is mounted. DESCRIPTION: Reference count tracking system for shared extents updates reference count in a lazy fashion. So in certain cases it asynchronously has to access shared indirect blocks belonging to a file to account for reference count updates. But due if this indirect block has been corrupted badly "a priori", then this tracking mechanism can panic the system repeatedly on every mount. RESOLUTION: The reference count tracking system validates the read indirect extent from the disk and in case it is not found valid sets VX_FULLFSCK flag in the superblock marking it for full fsck and disables the file system on the current node. * 2373565 (Tracking ID: 2283315) SYMPTOM: System may panic when "fsadm -e" is run on a file system containing file level snapshots. The panic stack looks like: crash_kexec() __die at() do_page_fault() error_exit() [exception RIP: vx_bmap_lookup+36] vx_bmap_lookup() vx_bmap() vx_reorg_emap() vx_extmap_reorg() vx_reorg() vx_aioctl_full() vx_aioctl_common() vx_aioctl() vx_ioctl() do_ioctl() vfs_ioctl() sys_ioctl() tracesys DESCRIPTION: The panic happened because of a NULL inode pointer passed to vx_bmap_lookup() function. During reorganizing extents of a file, block map (bmap) lookup operation is done on a file to get the information about the extents of the file. If this bmap lookup finds a hole at an offset in a file containing shared extents, a local variable is not updated that makes the inode pointer NULL during the next bmap lookup operation. RESOLUTION: Initialized the local variable such that inode pointer passed to vx_bmap_lookup() will be non NULL. * 2386483 (Tracking ID: 2374887) SYMPTOM: Access to a file system can hang when creating a named attribute due to a read/write lock being held exclusively and indefinitely causing a thread to loop in vx_tran_nattr_dircreate() A typical stacktrace of a looping thread: vx_itryhold_locked vx_iget vx_attr_iget vx_attr_kgeti vx_attr_getnonimmed vx_acl_inherit vx_aclop_creat vx_attr_creatop vx_new_attr vx_attr_inheritbuf vx_attr_inherit vx_tran_nattr_dircreate vx_nattr_copen vx_nattr_open vx_setea vx_linux_setxattr vfs_setxattr link_path_walk sys_setxattr system_call DESCRIPTION: The initial creation of a named attribute for a regular file or directory will result in the automatic creation of a 'named attribute directory'. Creations are initially attempted in a single transaction. Should the single transaction fail due to a read/write lock being held then a retry should split the task into multiple transactions. An incorrect reset of a tracking structure meant that all retries were performed using a single transaction creating an endless retry loop. RESOLUTION: The tracking structure is no longer reset within the retry loop. * 2402643 (Tracking ID: 2399178) SYMPTOM: Full fsck does large directory index validation during pass2c. However, if the number of large directories are more then this pass takes a lot of time. There is huge scope to improve the full fsck performance during this pass. DESCRIPTION: Pass2c consists of following basic operations:- [1] Read the entries in the large directory [2] Cross check hash values of those entries with the hash directory inode contents residing on the attribute ilist. This means this is another heavy IO intensive pass. RESOLUTION: 1.Use directory block read-ahead during Step [1]. 2.Wherever possible, access the file contents extent-wise rather than in fs block size (while reading entries in the directory) or in hash block size (8k, during dexh_getblk) Using above mentioned enhancements, the buffer cache can be utilized in better way. * 2412029 (Tracking ID: 2384831) SYMPTOM: System panics with the following stack trace. This happens in some cases when names streams are used in VxFS. machine_kexec() crash_kexec() __die do_page_fault() error_exit() [exception RIP: iput+75] vx_softcnt_flush() vx_ireuse_clean() vx_ilist_chunkclean() vx_inode_free_list() vx_ifree_scan_list() vx_workitem_process() vx_worklist_process() vx_worklist_thread() vx_kthread_init() kernel_thread() DESCRIPTION: VxFS internally creates a directory to keep the named streams pertaining to a file. In some scenarios, an error code path is missing to release the hold on that directory. Due to this unmount of the file system will not clean the inode belonging to that directory. Later when VxFS reuses such a inode panic is seen. RESOLUTION: Release the hold on the named streams directory in case of an error. * 2412169 (Tracking ID: 2371903) SYMPTOM: There is an extra empty line in "/proc/devices" when activating file system checkpoints, like # tail -6 /proc/devices 199 VxVM 201 VxDMP 252 vxclonefs-0 <<< There is a space here. 253 device-mapper 254 mdp DESCRIPTION: vxfs improperly adds a new line character i.e. "\n", when composing device name of clone. As a result, when the function "register_blkdev" is called with the device name to register block device driver, an additional blank line is showed in "/proc/devices". RESOLUTION: Remove the new line when creating the clone device. * 2412177 (Tracking ID: 2371710) SYMPTOM: User quota file corruption occurs when DELICACHE feature is enabled, the current usage of inodes of a user becomes negative after frequent file creations and deletions. Checking quota info using command "vxquota -vu username", the number of files is "-1" like: # vxquota -vu testuser2 Disk quotas for testuser2 (uid 500): Filesystem usage quota limit timeleft files quota limit timeleft /vol01 1127809 8239104 8239104 -1 0 0 DESCRIPTION: This issue is introduced by the inode DELICACHE feature in 5.1SP1, it is a performance enhancement to optimize the updates done to inode map during file creations and deletions. The feature is enabled by default, and can be changed by vxtunefs. When DELICACHE is enabled and quota is set for vxfs, there will be an extra quota update for the inodes on inactive list during removing process. Since these inodes' quota has been updated already before put on delicache list, the current number of user files gets decremented twice eventually. RESOLUTION: Add a flag to identify the inodes moved to inactive list from delicache list, so that the flag can be used to prevent updating the quota again during removing process. * 2412179 (Tracking ID: 2387609) SYMPTOM: Quota usage gets set to ZERO when umount/mount the file system though files owned by users exist. This issue may occur after some file creations and deletions. Checking the quota usage using "vxrepquota" command and the output would be like following: # vxrepquota -uv /vx/sofs1/ /dev/vx/dsk/sfsdg/sofs1 (/vx/sofs1): Block limits File limits User used soft hard timeleft used soft hard timeleft testuser1 -- 0 3670016 4194304 0 0 0 testuser2 -- 0 3670016 4194304 0 0 0 testuser3 -- 0 3670016 4194304 0 0 0 Additionally the quota usage may not be updated after inode/block usage reaches ZERO. DESCRIPTION: The issue occurs when VxFS merges external per node quota files with internal quota file. The block offset within external quota file could be calculated wrongly in some scenario. When any hole found in per node quota file, the file offset such that it points the next non-HOLE offset will be modified, but we miss to change the block offset accordingly which points to the next available quota record in a block. VxFS updates per node quota records only when global internal quota file shows either of some bytes or inode usage, otherwise it doesn't copy the usage from global quota file to per node quota file. But for the case where quota usage in external quota files has gone down to zero and both bytes and inode usage in global file becomes zero, per node quota records would be not updated and left with incorrect usage. It should also check bytes or inodes usage in per node quota record. It should skip coping records only when bytes and inodes usage in both global quota file and per node quota file is zero. RESOLUTION: Corrected the way to calculate the block offset when any hole is found in per node quota file. Added code to also check blocks or inodes usage in per node quota record while updating user quota usage. * 2412181 (Tracking ID: 2372093) SYMPTOM: New fsadm command options, to defragment a given percentage of the available freespace in a file system, have been introduced as part of an initiative to help improve Cluster File System [CFS] performance - the new additional command usage is as follows: fsadm -C -U We have since found that this new freespace defragmentation operation can sometimes hang (whilst it also continues to consume some cpu) in specific circumstances when executed on a Cluster mounted File System [CFS] DESCRIPTION: The hang can occur when file system metadata is being relocated. In our example case the hang occurs whilst relocating inodes whose corresponding files are being actively updated via a different node (from which the fsadm command is being executed) in the cluster. During the relocation an error code path is taken due to an unexpected mismatch between temporary replica metadata, the code path then results in a deadlock, or hang. RESOLUTION: As there is no overriding need to relocate structural metadata for the purposes of defragmenting the available freespace, we have chosen to simply leave all structural metadata where it is when performing this operation thus avoiding its relocation. The changes required for this solution are therefore very low risk. * 2418819 (Tracking ID: 2283893) SYMPTOM: In a Cluster File System (CFS) environment , the file read performances gradually degrade up to 10% of the original read performance and the fsadm(1M) -F vxfs -D -E shows a large number (> 70%) of free blocks in extents smaller than 64k. For example, % Free blocks in extents smaller than 64 blks: 73.04 % Free blocks in extents smaller than 8 blks: 5.33 DESCRIPTION: In a CFS environment, the disk space is divided into Allocation Units (AUs).The delegation for these AUs is cached locally on the nodes. When an extending write operation is performed on a file, the file system tries to allocate the requested block from an AU whose delegation is locally cached, rather than finding the largest free extent available that matches the requested size in the other AUs. This leads to a fragmentation of the free space, thus leading to badly fragmented files. RESOLUTION: The code is modified such that the time for which the delegation of the AU is cached can be reduced using a tuneable, thus allowing allocations from other AUs with larger size free extents. Also, the fsadm(1M) command is enhanced to de-fragment free space using the -C option. * 2420060 (Tracking ID: 2403126) SYMPTOM: Hang is seen in the cluster when one of the nodes in the cluster leaves or rebooted. One of the nodes in the cluster will contain the following stack trace. e_sleep_thread() vx_event_wait() vx_async_waitmsg() vx_msg_send() vx_send_rbdele_resp() vx_recv_rbdele+00029C () vx_recvdele+000100 () vx_msg_recvreq+000158 () vx_msg_process_thread+0001AC () vx_thread_base+00002C () threadentry+000014 (??, ??, ??, ??) DESCRIPTION: Whenever a node in the cluster leaves, reconfiguration happens and all the resources that are held by the leaving nodes are consolidated. This is done on one node of the cluster called primary node. Each node sends a message to the primary node about the resources it is currently holding. During this reconfiguration, in a corner case, VxFS is incorrectly calculating the message length which is larger than what GAB(Veritas Group Membership and Atomic Broadcast) layer can handle. As a result the message is getting lost. The sender thinks that the message is sent and waits for acknowledgement. The message is actually dropped at sender and never sent. The master node which is waiting for this message will wait forever and the reconfiguration never completes leading to hang. RESOLUTION: The message length calculation is done properly now and GAB can handle the messages. * 2425429 (Tracking ID: 2422574) SYMPTOM: On CFS, after turning the quota on, when any node is rebooted and rejoins the cluster, it fails to mount the filesystem. DESCRIPTION: At the time of mounting the filesystem after rebooting the node, mntlock was already set, which didn't allow the remount of filesystem, if quota is on. RESOLUTION: Code is changed so that the mntlock flag is masked in quota operation as it's already set on the mount. * 2425439 (Tracking ID: 2242630) SYMPTOM: Earlier distributions of Linux had a maximum size of memory that could be allocated via vmalloc(). This throttled the maximum size of VxFS's hash tables, and so limited the size of the inode and buffer caches. RHEL5/6 and SLES10/11 do not have this limit. DESCRIPTION: Limitations in the Linux kernel used to limit the inode and buffer cache for VxFS. RESOLUTION: Code is changed to accommodate the change of limits in Linux kernel, hence modified limits on inode and buffer cache for VxFS. * 2426039 (Tracking ID: 2412604) SYMPTOM: Once the time limit expires after exceeding the soft-limit of user quota size on VxFS filesystem, writes are still permissible over that soft-limit. DESCRIPTION: After exceeding the soft-limit, in the initial setup of the soft-limit the timer didn't use to start. RESOLUTION: Start the timer during the initial setting of quota limits if current usage has already crossed the soft quota limits. * 2427269 (Tracking ID: 2399228) SYMPTOM: Occasionally Oracle Archive logs can be created smaller than they should be, in the reported case the resultant Oracle Archive logs were incorrectly sized as 512 bytes. DESCRIPTION: The fcntl [file control] command F_FREESP [Free storage space] can be utilised to change the size of a regular file. If the file size is reduced we call it a "truncate", and space allocated in the truncated area will be returned to the file system freespace pool. If the file size is increased using F_FREESP we call it a "truncate-up", although the file size changes no space is allocated in the extended area of the file. Oracle archive logs utilize the F_FREESP fcntl command to perform a truncate-up of a new file before a smaller write of 512 bytes [at the the start of the file] is then performed. A timing window was found with F_FREESP which meant that 'truncate-up' file size was lost, or rather overwritten, by the subsequent write of the data, thus causing the file to appear with a size of just 512 bytes. RESOLUTION: A timing window has been closed whereby the flush of the allocating [512byte] write was triggered after the new F_FREESP file size has been updated in the inode. * 2427281 (Tracking ID: 2413172) SYMPTOM: vxfs_fcl_seektime() API seeks to the first record in the File change log(FCL) file after specified time. This API can incorrectly return EINVAL(FCL record not found)error while reading first block of FCL file. DESCRIPTION: To seek to the first record after the given time, first a binary search is performed to get the largest block offset where fcl record time is less than the given time. Then a linear search from this offset is performed to find the first record which has time value greater than specified time. FCL records are read in buffers. There can be scenarios where FCL records read in one buffer are less than buffer size, e.g. reading first block of FCL file. In such scenarios, buffer read can continue even when all data in current buffer has been read. This is due to wrong check which decides if all records in one buffer has been read. Thus reading buffer beyond boundary was causing search to terminate without finding record for given time and hence EINVAL error was returned. Actually, VxFS should detect that it is partially filled buffer and the search should continue reading the next buffer. RESOLUTION: Check which decides if all records in buffer have been read is corrected such that buffer is read within its boundaries. * 2430679 (Tracking ID: 1892045) SYMPTOM: A multitude of slab-1024 memory is consumed, which can be checked from /proc/slabinfo. For example, # cat /proc/slabinfo | grep "size-1024 " size-1024 51676 51700 1024 4 1 : tunables 54 27 8 : slabdata 12925 12925 0 where 51700 slabs are allocated with 1024 bytes unit size. DESCRIPTION: VxFS creates some fake inodes for various background and bookkeeping tasks for which the kernel wants VxFS to have an inode that doesn't strictly have to be a real file. The fake inode number is computed from NR_CPUS. If the kernel has a large NR_CPUS, the slab-1024 will become significant accordingly. RESOLUTION: Allocate the fake inodes based on the kernel's routine num_possible_cpus() that would help to reduce the slab-1024 number to thousands. * 2478237 (Tracking ID: 2384861) SYMPTOM: The following asserts are seen during internal stress and regression runs f:vx_do_filesnap:1b f:vx_inactive:2a f:xted_check_rwdata:31 f:vx_do_unshare:1 DESCRIPTION: These asserts validate some assumption in various function also there were some miscellaneous issues which were seen during internal testing. RESOLUTION: The code has been modified to fix the internal reported issues which other miscellaneous changes. * 2478325 (Tracking ID: 2251015) SYMPTOM: Command fsck(1M) will take longer time to complete. DESCRIPTION: Command fsck(1M), in extreme case like 2TB file system with a 1KB block size, 130+ checkpoints, and 100-250 million inodes per file set takes 15+ hours to complete intent log replay because it has to read a few GB of IAU headers and summaries one synchronous block at a time. RESOLUTION: Changing the fsck code, to do read ahead on the IAU file reduces the fsck log-replay time. * 2480949 (Tracking ID: 2480935) SYMPTOM: System log file may contain following error message on multi-threaded environment with Dynamic Storage Tiers(DST). UX:vxfs fsppadm: ERROR: V-3-26626: File Change Log IOTEMP and ACCESSTEMP index creation failure for /vx/fsvm with message Argument list too long DESCRIPTION: In DST, while enforcing policy, SQL queries are generated and written to file .__fsppadm_enforcesql present in lost+found. In multi threaded environment, 16 threads works in parallel on ILIST and geenrate SQL queries and write it to file. This may lead to corruption of file, if multiple threads write to file simultaneously. RESOLUTION: Mutex is used to serialize writing of threads on SQL file. * 2482337 (Tracking ID: 2431674) SYMPTOM: panic in vx_common_msgprint() via vx_inactive() DESCRIPTION: The problem is that the call VX_CMN_ERR( ) , uses a "llx" format character which vx_common_msgprint() doesn't understand. It gives up trying to process that format, but continues on without consuming the corresponding parameter. Everything else in the parameter list is effectively shifted by 8 bytes, and when we get to processing the string argument, it's game over. RESOLUTION: Changed the format to "llu", which vx_common_msgprint() understands. * 2482344 (Tracking ID: 2424240) SYMPTOM: In the case of deduplication, when FS block size is bigger and there is a partial block match, we end up sharing the block anyway, resulting in corruption of files. DESCRIPTION: This is because to handle slivers we are rounding up the matched length to block boundary. RESOLUTION: Code is changed so to round-down the length that we intend to dedup to align with fs block size. * 2484815 (Tracking ID: 2440584) SYMPTOM: System panic when force unmounting the file system. The backtrace looks like machine_kexec crash_kexec __die do_page_fault error_exit vx_sync vx_sync_fs sync_filesystems do_sync sys_sync system_call or machine_kexec crash_kexec __die do_page_fault error_exit sync_filesystems do_sync sys_sync system_call DESCRIPTION: When we do force unmount, VxFS will free some memory structures which can still be referenced by the code path of sync. Thus, there is a window that allows the race between sync command and force unmount as shown in the first backtrace. For the second panic, prior to the completion of force unmount, sync_filesystems could invoke sync_fs (one member of super_operations) callback of VxFS which however could be already set NULL by force unmount. RESOLUTION: vx_sync function will not do real sync if detecting a force unmount is in process. Add dummy functions instead of NULL pointers to vxfs super_operations during force unmount. * 2486597 (Tracking ID: 2486589) SYMPTOM: Multiple threads may wait on a mutex owned by a thread that is in function vx_ireuse_steal() with following stack trace on machine with severe inode pressure. vx_ireuse_steal() vx_ireuse() vx_iget() DESCRIPTION: Several thread are waiting to get inodes from VxFS. The current number of inodes reached max number of inodes (vxfs_ninode) that can be created in memory. So no new allocations can be possible, which results in thread wait. RESOLUTION: Code is modified so that in such situation, threads return ENOINODE instead of retrying to get inodes. * 2494464 (Tracking ID: 2247387) SYMPTOM: Internal local mount noise.fullfsck.N4 test hit an assert vx_ino_update:2 With stack trace looking as below panic: f:vx_ino_update:2 Stack Trace: IP Function Name 0xe0000000023d5780 ted_call_demon+0xc0 0xe0000000023d6030 ted_assert+0x130 0xe000000000d66f80 vx_ino_update+0x230 0xe000000000d727e0 vx_iupdat_local+0x13b0 0xe000000000d638b0 vx_iupdat+0x230 0xe000000000f20880 vx_tflush_inode+0x210 0xe000000000f1fc80 __vx_fsq_flush___vx_tran.c__4096000_0686__+0xed0 0xe000000000f15160 vx_tranflush+0xe0 0xe000000000d2e600 vx_tranflush_threaded+0xc0 0xe000000000d16000 vx_workitem_process+0x240 0xe000000000d15ca0 vx_worklist_thread+0x7f0 0xe000000001471270 kthread_daemon_startup+0x90 End of Stack Trace DESCRIPTION: INOILPUSH flag is not set when inode is getting updated, which caused above assert. The problem was creation and deletion of clone resets the INOILPUSH flag and function vx_write1_fast() does not set the flag after updating the inode and file. RESOLUTION: Code is modified so that if INOILPUSH flag is not set while function vx_write1_fast(), then the flag is set in the function. * 2508164 (Tracking ID: 2481984) SYMPTOM: Access to the file system got hang. DESCRIPTION: In function 'vx_setqrec', it will call 'vx_dqget'. when 'vx_dqget' return errors, it will try to unlock DQ structure using 'VX_DQ_CLUSTER_UNLOCK'. But, in this situation, DQ structure doesn't hold the lock. hence, this hang happens. RESOLUTION: 'dq_inval' would be set in 'vx_dqget' in case of any error happens in 'vx_dqget'. Skip unlocking DQ structure in the error code path of 'vx_setqrec', if 'dq_inval' is set. * 2521514 (Tracking ID: 2177591) SYMPTOM: System panic in vx_softcnt_flush() with stack as below: #4 [ffff8104981a7d08] generic_drop_inode() #5 [ffff8104981a7d28] vx_softcnt_flush() #6 [ffff8104981a7d58] vx_ireuse_clean() #7 [ffff8104981a7d88] vx_ilist_chunkclean() #8 [ffff8104981a7df8] vx_inode_free_list() #9 [ffff8104981a7e38] vx_ifree_scan_list() #10 [ffff8104981a7e48] vx_workitem_process() #11 [ffff8104981a7e58] vx_worklist_process() #12 [ffff8104981a7ed8] vx_worklist_thread() #13 [ffff8104981a7ee8] vx_kthread_init() #14 [ffff8104981a7f48] kernel_thread() DESCRIPTION: panic occured in iput()(vx_softcnt_flush()) which was called to drop the softcount hold(i_count) held by VxFS. Panic thread is cleaning an inode on freelist. Inode being cleaned belongs to FS which is already unmounted. FS superblock structure is freed after vxfs unmount returns irrespective of unmount is successfull or failed as linux always expects umount to succeed. Unmount of this FS was not clean i.e. detach of this FS was failing with EBUSY error. Detach of FS can fail with EBUSY error if there are any busy inodes i.e. having pending operations. During an unmount operation, all the inodes belonging to that file system are cleaned. But as unmount of FS was not successful, inode processing of FS didn't completed. When background thread picked inodes of such unmounted FS, panic happened while accessing superblock structure which was freed. RESOLUTION: Check for busy inodes while unmounting comes before processing all inodes in inode cache. So this can leave inodes on freelist without their cleanup during unmount. Now after some failed attempt to detach fset, calling detach fset with force option. This can be more aggressive in tearing down fileset and therefore should help to clear fest's inodes. * 2529356 (Tracking ID: 2340953) SYMPTOM: During internal stress test, f:vx_iget:1a assert is seen. DESCRIPTION: While renaming certain file, we check if the target directory is in the path of the source file to be renamed. while using function vx_iget() to reach till root inode, one of parent directory incode number was 0 and hence the assert. RESOLUTION: Code is changed so that during renames, parent directory is first assigned correct inode number before using vx_iget() function to retrieve root inode. INSTALLING THE PATCH -------------------- (RHEL5_x86_64) # rpm -Uvh VRTSvxfs-5.1.132.100-SP1RP2P1_RHEL5.x86_64.rpm (RHEL6_x86_64) # rpm -Uvh VRTSvxfs-5.1.132.100-SP1RP2P1_RHEL6.x86_64.rpm (SLES10 x86_64) # rpm -Uvh VRTSvxfs-5.1.132.100-SP1RP2P1_SLES10.x86_64.rpm (SLES11 x86_64) # rpm -Uvh VRTSvxfs-5.1.132.100-SP1RP2P1_SLES11.x86_64.rpm REMOVING THE PATCH ------------------ rpm -e rpm_name SPECIAL INSTRUCTIONS -------------------- NONE OTHERS ------ NONE