lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 02 Nov 2012 21:31:10 -0400 (EDT) From: David Miller <davem@...emloft.net> To: mst@...hat.com Cc: vyasevic@...hat.com, edumazet@...gle.com, akpm@...ux-foundation.org, alexander.h.duyck@...el.com, Ian.Campbell@...rix.com, kvm@...r.kernel.org, virtualization@...ts.linux-foundation.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCHv3 net-next 0/8] enable/disable zero copy tx dynamically From: "Michael S. Tsirkin" <mst@...hat.com> Date: Thu, 1 Nov 2012 21:16:17 +0200 > > tun supports zero copy transmit since 0690899b4d4501b3505be069b9a687e68ccbe15b, > however you can only enable this mode if you know your workload does not > trigger heavy guest to host/host to guest traffic - otherwise you > get a (minor) performance regression. > This patchset addresses this problem by notifying the owner > device when callback is invoked because of a data copy. > This makes it possible to detect whether zero copy is appropriate > dynamically: we start in zero copy mode, when we detect > data copied we disable zero copy for a while. > > With this patch applied, I get the same performance for > guest to host and guest to guest both with and without zero copy tx. Series applied, thanks Michael. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists