lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 1 Oct 2007 19:20:59 -0700 From: lm@...mover.com (Larry McVoy) To: Linus Torvalds <torvalds@...ux-foundation.org> Cc: Larry McVoy <lm@...mover.com>, davem@...emloft.net, wscott@...mover.com, netdev@...r.kernel.org Subject: Re: tcp bw in 2.6 On Mon, Oct 01, 2007 at 07:14:37PM -0700, Linus Torvalds wrote: > > > On Mon, 1 Oct 2007, Larry McVoy wrote: > > > > but the client looks like > > > > connect(3, {sa_family=AF_INET, sin_port=htons(31235), sin_addr=inet_addr("10.3.9.1")}, 16) = 0 > > read(3, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"..., 1048576) = 2896 > > read(3, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"..., 1048576) = 1448 > > read(3, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"..., 1048576) = 2896 > .. > > This is exactly what I'd expect if the machine is *not* under excessive > load. That's fine, but why is it that my trivial program can't do as well as dd | rsh dd? A short summary is "can someone please post a test program that sources and sinks data at the wire speed?" because apparently I'm too old and clueless to write such a thing. -- --- Larry McVoy lm at bitmover.com http://www.bitkeeper.com - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists