lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-id: <alpine.LFD.2.00.0902062157490.26256@localhost.localdomain>
Date:	Fri, 06 Feb 2009 22:00:54 -0500 (EST)
From:	Len Brown <lenb@...nel.org>
To:	Ingo Molnar <mingo@...e.hu>
Cc:	Ben Greear <greearb@...delatech.com>,
	Thomas Gleixner <tglx@...utronix.de>,
	linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: PATCH:  Allow over-ride of smp_found_cfg with kernel cmd-line
 option.

> > Without this override, performance drops by around 15% on
> > network throughput tests on this system.
> 
> The question is, _why_ does network performance drop?
>
> Do you have a before/after pair of /proc/interrupts output
> perhaps? Does the layout of IRQs change?
>
> The system is not SMP - so only something about UP-IOAPIC can
> be helpful to performance here - or some unknown effect.

I presume it is IOAPIC (good) vs PIC (bad), for the 
patch that provoked this regression was one that caused
the MPS table to be disabled.  (the problem with that patch
was that it was effective not just in ACPI mode, but in acpi=off mode)

The other un-answered question is why the system under test
has ACPI disabled in the BIOS when it did not ship that
way from the manufacturer.

cheers,
-Len
Intel Open Source Technology Center
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ