[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220511162520.6174f487@kernel.org>
Date: Wed, 11 May 2022 16:25:20 -0700
From: Jakub Kicinski <kuba@...nel.org>
To: Joe Damato <jdamato@...tly.com>
Cc: netdev@...r.kernel.org, davem@...emloft.net,
linux-kernel@...r.kernel.org, x86@...nel.org
Subject: Re: [RFC,net-next,x86 0/6] Nontemporal copies in unix socket write
path
On Tue, 10 May 2022 20:54:21 -0700 Joe Damato wrote:
> Initial benchmarks are extremely encouraging. I wrote a simple C program to
> benchmark this patchset, the program:
> - Creates a unix socket pair
> - Forks a child process
> - The parent process writes to the unix socket using MSG_NTCOPY - or not -
> depending on the command line flags
> - The child process uses splice to move the data from the unix socket to
> a pipe buffer, followed by a second splice call to move the data from
> the pipe buffer to a file descriptor opened on /dev/null.
> - taskset is used when launching the benchmark to ensure the parent and
> child run on appropriate CPUs for various scenarios
Is there a practical use case?
The patches look like a lot of extra indirect calls.
Powered by blists - more mailing lists