lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 31 Jul 2008 10:00:32 -0700
From:	Rick Jones <rick.jones2@...com>
To:	Lennert Buytenhek <buytenh@...tstofly.org>
CC:	netdev@...r.kernel.org, Ashish Karkare <akarkare@...vell.com>,
	Nicolas Pitre <nico@....org>
Subject: Re: using software TSO on non-TSO capable netdevices

Lennert Buytenhek wrote:
> When using sendfile() to send a GiB worth of zeroes over a single TCP
> connection to another host on a 100 Mb/s network, with a vanilla
> 2.6.27-rc1 kernel, this runs as expected at wire speed, taking the
> following amount of CPU time per test:
> 
> 	sys     0m5.410s
> 	sys     0m5.380s
> 	sys     0m5.620s
> 	sys     0m5.360s

That's output from "time" run against your test program right?  Are 
folks confident that will account for all the CPU time consumed on 
behalf of that program?  FWIW netperf is unwilling to make such an 
assumption.  Perhaps I and it are being too paranoid but there you have 
it :)

rick jones
fwiw, there is a TCP_SENDFILE test in netperf
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ