lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 4 Apr 2007 13:21:59 -0600
From:	Andreas Dilger <adilger@...sterfs.com>
To:	Cordenner jean noel <jean-noel.cordenner@...l.net>
Cc:	linux-ext4@...r.kernel.org, Mingming Cao <cmm@...ibm.com>,
	"AVANTIKA R. MATHUR" <mathur@...ux.vnet.ibm.com>
Subject: Re: Ext4 benchmarks

On Apr 04, 2007  19:06 +0200, Cordenner jean noel wrote:
> here is the first results of the round:
> http://www.bullopensource.org/ext4/20070404/

Jean Noel,
thank you for the test results.  It is always nice to see that ext4 is
doing so well compared to ext3 and XFS.

Ming Ming,
it should be possible to just include the mballoc+delalloc patches that
Jean Noel used into the upstream ext4 patch series.  When Alex or Christoph
get a chance to do the VFS delalloc rewrite we can move to that new patch,
but until then it seems pointless to not include this functionality which
improves the performance so much.

Also, if we include those patches the mballoc and delalloc features (along
with extents) should be enabled by default if INCOMPAT_EXTENTS is in the
superblock unless:
- "noextents", "nomballoc", or "nodelalloc" mount options are given
- delalloc needs to be disabled if blocksize != PAGE_SIZE

Cheers, Andreas
--
Andreas Dilger
Principal Software Engineer
Cluster File Systems, Inc.

-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ