recon verifying file system
play

Recon: Verifying File System Consistency at Runtime Daniel Fryer, - PowerPoint PPT Presentation

Recon: Verifying File System Consistency at Runtime Daniel Fryer, Jack (Kuei) Sun, Rahat Mahmood, TingHao Cheng, Shaun Benjamin, Angela Demke Brown and Ashvin Goel University of Toronto October 4, 2011 Metadata Integrity is Crucial D Kernel


  1. Recon: Verifying File System Consistency at Runtime Daniel Fryer, Jack (Kuei) Sun, Rahat Mahmood, TingHao Cheng, Shaun Benjamin, Angela Demke Brown and Ashvin Goel University of Toronto October 4, 2011

  2. Metadata Integrity is Crucial D Kernel D D M M M File System a D D t D D Block Layer a D D You don’t know what Storage you’ve got ’til it’s gone… 2

  3. File Systems Have Bugs Bugs in Linux Ext3 File System Closed panic/ext3 fs corruption with RHEL4-U6-re20070927.0 2007-11 Re: [2.6.27] filesystem (ext3) corruption (access beyond end) 2008-06 linux-2.6: ext3 filesystem corruption 2008-09 linux-image-2.6.29-2-amd64: occasional ext3 filesystem 2009-06 corruption ENOSPC during fsstress leads to filesystem corruption on ext2, 2010-03 ext3, and ext4 ext3: Fix fs corruption when make_indexed_dir() fails 2011-06 Data corruption: resume from hibernate always ends up with Not yet EXT3 fs errors Why can’t existing solutions handle this problem? 3

  4. “Solutions” Existing approaches assume file systems are correct Kernel File System Checksums? Journals? Block Layer RAID? Storage None of these protect against bugs in file systems 4

  5. Offline Checking • Check consistency offline, e.g., fsck • Consistency properties necessary for correctness FS1: No double FS2: Refcount-based allocation sharing M M M M metadata data D D D Ref: 2 5

  6. Problems with Offline Checking • Slow, getting slower with larger disks • Requires taking file system offline • After the fact, repair is error prone M M metadata data D 6

  7. Outline • Problem • Metadata can be corrupted by bugs and existing techniques are inadequate • Our Solution: Recon • a system for protecting metadata from bugs • Key idea • Runtime consistency checking • Design • Evaluation 7

  8. Runtime Consistency Checking • Ensure every update results in a consistent file system • Makes repair unnecessary! • “What happens in DRAM stays in DRAM” BUT • Consistency properties are global • Global properties require full scan • We can’t run fsck at every write 8

  9. Consistency Invariants • We transform global consistency properties to fast, local consistency invariants • Assume initial consistent state • New file system is clean • Use checksums/redundancy to handle errors below FS • At runtime, check only what is changing • Do so before changes become persistent • Resulting new state is consistent 9

  10. Example: Block Allocation in Ext3 • Ext3 maintains a block bitmap – every allocated block is marked in the bitmap Block Bitmap inode 5 6 7 8 9 Updated Block size time 7 Block 7 Updated Block 8 8 Block 8 10

  11. Example: Block Allocation in Ext3 • Consistency Invariant Bitmap bit X flip Block pointer from “0” to “1” set to X • Invariant fails if either update is missing • Should not mark allocated without setting block pointer • Should not set block pointer without marking allocated • Can any consistency property be transformed? • File systems should maintain consistency efficiently 11

  12. When to Check Invariants • Invariants involve changes to multiple blocks • When should they be consistent? • Transactions are used for crash consistency • Consistency can be checked at transaction boundaries Transaction Memory Must check transaction just before commit block reaches disk Disk 12

  13. Outline • Problem • Metadata corruption cause by bugs • Solution • Recon • Key idea • Runtime checking • Design • Metadata interpretation • Logical change generation • Evaluation 13

  14. The Recon Design File System FS Recon Interface Block Layer Recon Ext3_Recon Metadata Write Cache Metadata Btrfs_Recon Read Cache Metadata interpretation Logical change generation Ye Olde Disk 14

  15. Metadata Interpretation • To check invariants, we need to determine the type of a block on a read or write • Take advantage of tree structure of metadata • Superblock is the root of the tree • Parents are read before children • For example, inode is read before indirect blocks • We see the pointer to the block before the block, and • The pointer within the parent determines the type of the child block 15

  16. Logical Change Generation • Invariants are expressed in terms of logical changes to structures, e.g., bitmaps, pointers Bitmap bit X flip Block pointer from “0” to “1” set to X • Recon generates these changes based on • Block types • Comparing the blocks in the write and read cache • Logical changes to metadata structures are represented as a set of change records: [type, id, field, old, new] 16

  17. Checking with Change Records type id field oldval newval inode 12 blockptr[1] 0 501 inode 12 i_size 4096 8192 inode 12 i_blocks 8 16 Bitmap 501 -- 0 1 BGD 0 free_blocks 1500 1499 Transaction appends a new block to inode 12 Bitmap bit X flip Block pointer from “0” to “1” set to X 17

  18. Outline • Problem • Metadata corruption cause by bugs • Solution • Recon • Key idea • Runtime checking • Design • Evaluation • Complexity • Corruption detection • Performance overhead 18

  19. Complexity • Much simpler than FS code • Only need to verify result of file system operations • Each invariant can be checked independently • Code divided into three sections • Generic Recon framework: 1.5 kLOC • Ext3 metadata interpretation: 1.5kLOC • 31 Ext3 invariants: 800 LOC 19

  20. Corruption Detection 1 25 8 23 100% 31 Corruptions 4 2 Caught 79 112 2 17 72 352 59 52 31 0% inode inode inode ibm dir bbm random bgd (blk ptr) (stat) (others) Detected by both e2fsck only Recon only Recon matches e2fsck 20

  21. Performance Evaluation • Used Linux port of Sun’s FileBench • Used 5 different emulated workloads • webserver, webproxy, varmail, fileserver, ms_nfs • ms_nfs configured to match metadata characteristics from Microsoft study (FAST’11) • 3 GHz dual core Xeon CPUs, 2 GB RAM • 1 TB ext3 file system 21

  22. Performance Evaluation Cache Size = 128MB webserver webproxy varmail fileserver ms_nfs For reasonable cache sizes, performance impact is modest 22

  23. Handling Violations Several options • Prevent all writes, remount read-only • Preserves correctness • Reduces availability • Take snapshot of filesystem and continue • Minimal availability impact, snapshot is correct • Requires repair afterwards • Micro-reboot file system or kernel • Transparent to applications • Overcomes transient failures 23

  24. Conclusion • All consistency properties of fsck can be enforced on updates without full disk scan • Checking can be done outside the file system, entirely at the block layer • Preventing corruption from being committed is a huge win over after-the-fact repair! 24

  25. Thanks! • To our anonymous reviewers • To our shepherd, Junfeng Yang • To the Systems Software Reading Group @ U of T For their many insightful comments & suggestions! • To Vivek Lakshmanan For early insights that helped start the project! This work was supported by NSERC through the Discovery Grants program 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend