lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <65634d660904082140k727720c5o22f203aa092727a6@mail.gmail.com>
Date:	Wed, 8 Apr 2009 21:40:28 -0700
From:	Tom Herbert <therbert@...gle.com>
To:	David Miller <davem@...emloft.net>
Cc:	netdev@...r.kernel.org
Subject: Re: [PATCH] Software receive packet steering

On Wed, Apr 8, 2009 at 5:36 PM, David Miller <davem@...emloft.net> wrote:
> From: Tom Herbert <therbert@...gle.com>
> Date: Wed, 8 Apr 2009 15:48:12 -0700
>
>> +#ifdef CONFIG_NET_SOFTRPS
>> +     int                     rps_cpu;
>> +     struct list_head        rps_poll_list;
>> +     spinlock_t              rps_poll_list_lock;
>> +     struct call_single_data rps_csd;
>> +     unsigned long           rps_flags;
>> +#define RPS_SOFTIRQ_PENDING  0x1
>> +#define RPS_SOFTIRQ_COMPLETING       0x2
>> +#endif
>
> Have you seen my patch that does this with remote softirqs?
> Then you don't need a lock for the list, it can be lockless
> since only the local processor ever accesses the list.
>
> In fact, it kills the per-cpu backlog completely, everything
> takes the netif_receive_skb() path and shoots the packet to
> the remote cpu.
>
> Here is that patch, for reference.  It won't apply to anything
> recent but all the ideas are there.
>

Thanks for the reference to that patch, are you planning to apply it?
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ