lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 10 Jun 2011 06:47:50 +0200 From: Eric Dumazet <eric.dumazet@...il.com> To: David Miller <davem@...emloft.net> Cc: tim.c.chen@...ux.intel.com, netdev@...r.kernel.org, andi@...stfloor.org Subject: Re: [PATCH net-next-2.6] inetpeer: lower false sharing effect Le jeudi 09 juin 2011 à 20:43 -0700, David Miller a écrit : > From: Tim Chen <tim.c.chen@...ux.intel.com> > Date: Thu, 09 Jun 2011 17:03:55 -0700 > > > When I retest with original 3.0-rc2 kernel, inet_putpeer no longer shows > > up, wonder if dst->peer was not set for some reason. > > The overhead will only show up if an inetpeer entry exists for > the destination IP address. > > You can force one to be created, for example, by making a TCP > connection to that destination. Or sending big frames, to force ip fragmentation (we store the id generator in inetpeer cache) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists