Bug 710645 - Big performance regression found on connect/request/response test through IPSEC (openswan) transport
Summary: Big performance regression found on connect/request/response test through IPS...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.0
Hardware: All
OS: Linux
high
high
Target Milestone: rc
: ---
Assignee: Frantisek Hrbata
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard:
Depends On: 631833
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-03 21:46 UTC by Ken Reilly
Modified: 2011-08-18 14:42 UTC (History)
11 users (show)

Fixed In Version: kernel-2.6.32-71.33.1.el6
Doc Type: Bug Fix
Doc Text:
The XFRM_SUB_POLICY feature causes all bundles to be at the finest granularity possible. As a result of the data structure used to implement this, the system performance would drop considerably. This update disables a part of XFRM_SUB_POLICY, eliminating the poor performance at the cost of sub-IP address selection granularity in the policy.
Clone Of:
Environment:
Last Closed: 2011-08-02 16:54:46 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:1106 0 normal SHIPPED_LIVE Moderate: kernel security, bug fix, and enhancement update 2011-08-02 16:53:52 UTC

Description Ken Reilly 2011-06-03 21:46:38 UTC
This bug has been copied from bug #631833 and has been proposed
to be backported to 6.0 z-stream (EUS).

Comment 7 Adam Okuliar 2011-07-21 11:26:02 UTC
verified on 
hp-dl380g7-01.lab.eng.brq.redhat.com
with 
2.6.32-71.34.1.el6.x86_64

netperf -H 172.16.20.21 -L 172.16.20.11 -t TCP_CRR TCP Connect/Request/Response TEST from 172.16.20.11 (172.16.20.11) port 0 AF_INET to 172.16.20.21 (172.16.20.21) port 0 AF_INET : histogram : interval
Local /Remote
Socket Size   Request  Resp.   Elapsed  Trans.
Send   Recv   Size     Size    Time     Rate         
bytes  Bytes  bytes    bytes   secs.    per sec   

16384  87380  1        1       10.00    3306.19   
16384  87380 
[root@hp-dl380g7-01 ~]# netperf -H 172.16.20.21 -L 172.16.20.11 -t TCP_CRR 
TCP Connect/Request/Response TEST from 172.16.20.11 (172.16.20.11) port 0 AF_INET to 172.16.20.21 (172.16.20.21) port 0 AF_INET : histogram : interval
Local /Remote
Socket Size   Request  Resp.   Elapsed  Trans.
Send   Recv   Size     Size    Time     Rate         
bytes  Bytes  bytes    bytes   secs.    per sec   

16384  87380  1        1       10.00    3315.89   
16384  87380

Comment 8 errata-xmlrpc 2011-08-02 16:54:46 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-1106.html

Comment 9 Martin Prpič 2011-08-18 14:42:46 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
The XFRM_SUB_POLICY feature causes all bundles to be at the finest
granularity possible. As a result of the data structure used to implement
this, the system performance would drop considerably. This update disables
a part of XFRM_SUB_POLICY, eliminating the poor performance at the cost of
sub-IP address selection granularity in the policy.


Note You need to log in before you can comment on or make changes to this bug.