[Bugs] [Bug 1232165] New: NFS Authentication Performance Issue

bugzilla at redhat.com bugzilla at redhat.com
Tue Jun 16 08:20:54 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1232165

            Bug ID: 1232165
           Summary: NFS Authentication Performance Issue
           Product: GlusterFS
           Version: mainline
         Component: nfs
          Keywords: Patch
          Severity: high
          Assignee: ndevos at redhat.com
          Reporter: ndevos at redhat.com
                CC: bugs at gluster.org, gluster-bugs at redhat.com
            Blocks: 1231366



+++ This bug was initially created as a clone of Bug #1231366 +++

Description of problem:
When file operations are sent to the NFS server, authorized filehandles are
cached
using the exportid, mountid, gfid and host as the key to the cache. This meant
that any file OR directory will always fail on the *first* fop to that
filehandle since the
cache used the gfid as part of the key to the cache. However, if an export is
authorized, this effectively means that ALL subdirectories and files in the
export directory are authorized per the permissions of the export. This results
slow times to walking a directory structure over an NFS mount.

Version-Release number of selected component (if applicable): 3.7.1


How reproducible: Turn on authentication, make a large netgroups file and walk
the directory


Steps to Reproduce:
1. Make a large netgroups file, create an export and assign the netgroup to
that export
2. GDB and break on is_nfs_fh_cached, and you'll see many cache misses
3. Walk the filesystem and notice slower than expected performance

Actual results: Many misses in the auth cache, resulting in slower walks of the
filesystem


Expected results: More hits in the auth cache, resulting in faster walks of the
filesystem.


Additional info:


Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=1231366
[Bug 1231366] NFS Authentication Performance Issue
-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=dVjpKGktkp&a=cc_unsubscribe


More information about the Bugs mailing list