lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 22 Aug 2008 05:23:28 +0300
From:	Denys Fedoryshchenko <denys@...p.net.lb>
To:	netdev@...r.kernel.org
Cc:	linux-kernel@...r.kernel.org
Subject: Re: loaded router, excessive getnstimeofday in oprofile

On Friday 22 August 2008, Denys Fedoryshchenko wrote:

Most significant event types where i notice getnstimeofday at top of list.

Additions:
Counted MEMORY_REQUESTS events (Memory requests by type) with a unit mask of 
0x01 (Requests to non-cacheable (UC) memory) count 5000
samples  %        samples  %        symbol name
129      31.0843  596      31.1879  getnstimeofday
54       13.0120  251      13.1345  __napi_schedule
36        8.6747  178       9.3145  default_idle
34        8.1928  164       8.5819  irq_entries_start
23        5.5422  143       7.4830  __do_softirq

and
CPU: AMD64 processors, speed 2193.74 MHz (estimated)
Counted INTERRUPTS_MASKED_CYCLES events (Cycles with interrupts masked (IF=0)) 
with a unit mask of 0x00 (No unit mask) count 5000
samples  %        symbol name
630015   62.4741  getnstimeofday
28634     2.8394  get_next_timer_interrupt
23279     2.3084  __slab_alloc
15775     1.5643  schedule
14765     1.4641  __slab_free
11154     1.1061  native_read_tsc
10953     1.0861  kmem_cache_alloc
10918     1.0827  tick_nohz_stop_sched_tick
10752     1.0662  update_wall_time
10430     1.0343  net_rx_action
10220     1.0134  __do_softirq
9895      0.9812  __update_sched_clock
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ