lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 07 May 2007 11:27:49 -0700 From: "Michael Chan" <mchan@...adcom.com> To: "Rick Jones" <rick.jones2@...com> cc: "David Miller" <davem@...emloft.net>, jeff@...zik.org, "netdev" <netdev@...r.kernel.org> Subject: Re: [PATCH 10/11][TG3]: Reduce spurious interrupts. On Mon, 2007-05-07 at 09:39 -0700, Rick Jones wrote: > On how "topologically big" a system has this resurrection of the PIO read been > tried so far? > If you're asking how much impact the read will have on performance, the answer is that it will depend on whether you frequently get spurious interrupts or not without the read. The read itself has a measurable impact on performance, but it will offset the performance hit of entering the IRQ handler twice if you get frequent spurious interrupts. It also prevents the kernel from shutting down the IRQ in some extreme cases. If you get spurious interrupts infrequently, the read is unfortunately a net loss. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists