lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 23 Aug 2010 08:05:43 -0700
From:	Stephen Hemminger <shemminger@...tta.com>
To:	Marc Aurele La France <tsi@...berta.ca>
Cc:	linux-kernel@...r.kernel.org, netdev@...r.kernel.org
Subject: Re: RFC:  MTU for serving NFS on Infiniband

On Mon, 23 Aug 2010 08:44:37 -0600 (MDT)
Marc Aurele La France <tsi@...berta.ca> wrote:

> My apologies for the multiple post.  I got bit the first time around by my 
> MUA's configuration.
> 
> ----
> 
> Greetings.
> 
> For some time now, the kernel and I have been having an argument over what 
> the MTU should be for serving NFS over Infiniband.  I say 65520, the 
> documented maximum for connected mode.  But, so far, I've been unable to have 
> anything over 32192 remain stable.
> 
> Back in the 2.6.14 -> .15 period, sunrpc's sk_buff allocations were changed 
> from GFP_KERNEL to GFP_ATOMIC (b079fa7baa86b47579f3f60f86d03d21c76159b8 
> mainstream commit).  Understandably, this was to prevent recursion through 
> the NFS and sunrpc code.  This is fine for the most common MTU out there, as 
> the kernel is almost certain to find a free page.  But, as one increases the 
> MTU, memory fragmentation starts to play a role in nixing these allocations.
> 
> These allocation failures ultimately result in sparse files being written 
> through NFS.  Granted, many of my users' application are oblivious to 
> this because they don't check for such errors.  But it would be nice if the 
> kernel were more resilient in this regard.
> 
> For a few months now, I've been running with sunrpc sk_buff allocations using 
> GFP_NOFS instead, which allows for dirty data to be flushed out and still 
> avoids recursion through sunrpc.  With this, I've been able to increase the 
> stable MTU to 32192.  But no further, as eventually there is no dirty data 
> left and memory fragmentation becomes mostly due to yet-to-be-sync'ed 
> filesystem data.  There's also the matter that using GFP_NOFS for this can 
> slow down NFS quite a bit.
> 
> In regrouping for my next tack at this, I noticed that all stack traces go 
> through ip_append_data().  This would be ipv6_append_data() in the IPv6 case.
> A _very_ rough draft that would have ip_append_data() temporarily drop down 
> to a smaller fake MTU follows ...

Why doesn't NFS generate page size fragments?  Does Infiniband or your
device not support this?  Any thing that requires higher order allocation
is going to unstable under load.  Let's fix the cause not the apply bandaid
solution to the symptom.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ