lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 10 Oct 2007 15:37:05 -0700 (PDT) From: David Miller <davem@...emloft.net> To: hadi@...erus.ca Cc: andi@...stfloor.org, shemminger@...ux-foundation.org, jeff@...zik.org, johnpol@....mipt.ru, herbert@...dor.apana.org.au, gaagaan@...il.com, Robert.Olsson@...a.slu.se, netdev@...r.kernel.org, rdreier@...co.com, peter.p.waskiewicz.jr@...el.com, mcarlson@...adcom.com, jagana@...ibm.com, general@...ts.openfabrics.org, mchan@...adcom.com, tgraf@...g.ch, randy.dunlap@...cle.com, sri@...ibm.com, kaber@...sh.net Subject: Re: [ofa-general] Re: [PATCH 2/3][NET_BATCH] net core use batching From: jamal <hadi@...erus.ca> Date: Wed, 10 Oct 2007 09:08:48 -0400 > On Wed, 2007-10-10 at 03:44 -0700, David Miller wrote: > > > I've always gotten very poor results when increasing the TX queue a > > lot, for example with NIU the point of diminishing returns seems to > > be in the range of 256-512 TX descriptor entries and this was with > > 1.6Ghz cpus. > > Is it interupt per packet? From my experience, you may find interesting > results varying tx interupt mitigation parameters in addition to the > ring parameters. > Unfortunately when you do that, optimal parameters also depends on > packet size. so what may work for 64B, wont work well for 1400B. No, it was not interrupt per-packet, I was telling the chip to interrupt me every 1/4 of the ring. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists