lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 16 Jan 2007 01:47:22 -0500
From:	Trond Myklebust <Trond.Myklebust@...app.com>
To:	Daniel Drake <dsd@...too.org>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: Some kind of 2.6.19 NFS regression

On Mon, 2007-01-15 at 18:26 -0500, Daniel Drake wrote:
> Hi,
> 
> Tim Ryan has reported the following bug at the Gentoo bugzilla:
> 
> https://bugs.gentoo.org/show_bug.cgi?id=162199
> 
> His home dir is mounted over NFS. 2.6.18 worked OK but 2.6.19 is very 
> slow to load the desktop environment. NFS is suspected here as the 
> problem does not exist for users with local homedirs. This might not be 
> a straightforward performance issue as it does seem to perform OK on the 
> console.
> 
> The bug still exists in unpatched 2.6.20-rc5.
> 
> Is this a known issue? Should we report a new bug on the kernel bugzilla?
> 
> Thanks,
> Daniel

I couldn't find any information whatsoever in that bug report as to what
mount options he is using, or what server export options are in use. No
info either about what networking hardware he is using (or what drivers
are in use).

I'd also recommend using something like ttcp to see if large packets
(NFS read/write packets are typically ~ 32k large) are being transmitted
efficiently.

Cheers
  Trond
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ