lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <167324941700.24554.6732820998527805542.git-patchwork-notify@kernel.org>
Date:   Mon, 09 Jan 2023 07:30:17 +0000
From:   patchwork-bot+netdevbpf@...nel.org
To:     Leesoo Ahn <lsahn@...eel.net>
Cc:     oneukum@...e.com, davem@...emloft.net, kuba@...nel.org,
        netdev@...r.kernel.org, linux-usb@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH net-next v4] usbnet: optimize usbnet_bh() to reduce CPU load

Hello:

This patch was applied to netdev/net-next.git (master)
by David S. Miller <davem@...emloft.net>:

On Fri,  6 Jan 2023 19:49:49 +0900 you wrote:
> The current source pushes skb into dev-done queue by calling
> skb_dequeue_tail() and then pop it by skb_dequeue() to branch to
> rx_cleanup state for freeing urb/skb in usbnet_bh(). It takes extra CPU
> load, 2.21% (skb_queue_tail) as follows,
> 
> -   11.58%     0.26%  swapper          [k] usbnet_bh
>    - 11.32% usbnet_bh
>       - 6.43% skb_dequeue
>            6.34% _raw_spin_unlock_irqrestore
>       - 2.21% skb_queue_tail
>            2.19% _raw_spin_unlock_irqrestore
>       - 1.68% consume_skb
>          - 0.97% kfree_skbmem
>               0.80% kmem_cache_free
>            0.53% skb_release_data
> 
> [...]

Here is the summary with links:
  - [net-next,v4] usbnet: optimize usbnet_bh() to reduce CPU load
    https://git.kernel.org/netdev/net-next/c/fb59bf28cd63

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ