lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 14 May 2014 12:12:35 +0000 From: Jon Maloy <jon.maloy@...csson.com> To: Eric Dumazet <eric.dumazet@...il.com> CC: "davem@...emloft.net" <davem@...emloft.net>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, Paul Gortmaker <paul.gortmaker@...driver.com>, "Erik Hugne" <erik.hugne@...csson.com>, "ying.xue@...driver.com" <ying.xue@...driver.com>, "maloy@...jonn.com" <maloy@...jonn.com>, "tipc-discussion@...ts.sourceforge.net" <tipc-discussion@...ts.sourceforge.net> Subject: RE: [PATCH net-next v2 1/8] tipc: decrease connection flow control window > -----Original Message----- > From: Eric Dumazet [mailto:eric.dumazet@...il.com] > Sent: May-14-14 7:51 AM > To: Jon Maloy > Cc: davem@...emloft.net; netdev@...r.kernel.org; Paul Gortmaker; Erik > Hugne; ying.xue@...driver.com; maloy@...jonn.com; tipc- > discussion@...ts.sourceforge.net > Subject: Re: [PATCH net-next v2 1/8] tipc: decrease connection flow control > window > > On Wed, 2014-05-14 at 05:39 -0400, Jon Maloy wrote: > > Memory overhead when allocating big buffers for data transfer may be > > quite significant. E.g., truesize of a 64 KB buffer turns out to be > > 132 KB, 2 x the requested size. > > It might be time to use a different strategy for skb allocations then ? Absolutely. That is already ongoing. See my answer to David M about this. ///jon > > Is this because TIPC does not support SG ? >
Powered by blists - more mailing lists