Date: Sun, 23 Jun 2002 11:40:53 -0700 (PDT) From: Matthew Dillon <dillon@apollo.backplane.com> To: freebsd-stable@freebsd.org Subject: INN/Diablo and Postgres/Mysql/etc performance heads up Message-ID: <200206231840.g5NIerSq086779@apollo.backplane.com>
next in thread | raw e-mail | index | archive | help
This is just a heads up to people who use INN/Diablo (USENET news
feed systems), or postgres/mysql (database systems) in heavily
loaded environment. I recently MFC'd a major fix to a performance issue
that was accidently introduced in late 2000. A security fix had the
unintended (and not-noticed-enough at the time) side effect of creating
a severe loss in performance in the file block rewrite case, i.e.
writing into the middle of a previously created file. (appending to
a file is unaffected, performance remains good for that case).
This case has just been fixed. I wish I could take credit but I was
responsible for the original commit that created the problem in the
first place :-(
In anycase, the performance issue only effects the rewrite case which
means it will tend to only effect database applications (and then only
under write loads), and newsfeed applications (aka INN cyclic buffers).
Write performance for such applications should improve between 2x and 10x.
Yes, that's what I said(!). I've gotten verification from a number of
sources (two sources running INN and one running postgresql).
Maybe we'll win some benchmark tests now <GRIN>.
The fix is 1.65.2.11 of src/sys/ufs/ufs/ufs_readwrite.c, in -STABLE.
It did not make it into the release nor is it in the security branch.
I strongly recommend that people running these sorts of applications
who intend to upgrade to 4.6-REL anyway also upgrade their kernel to
the latest -stable after completing the initial upgrade to 4.6-REL.
-
Also this is a good time to remind people running Apache as of
4.6-RELEASE that they should upgrade to the latest in ports, due to
an exploit that was found just after we rolled the release. The Apache
in the 4.6-REL package/ports set is exploitable. Be careful to backup
your /usr/local/www before installing. (this is the same exploit that
has been discussed on the lists already. If you have already upgraded
your Apache you should be fine).
Thanks,
-Matt
Matthew Dillon
<dillon@backplane.com>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206231840.g5NIerSq086779>
