lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 30 Apr 2014 14:17:04 +0000 From: KY Srinivasan <kys@...rosoft.com> To: KY Srinivasan <kys@...rosoft.com>, "davem@...emloft.net" <davem@...emloft.net>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "devel@...uxdriverproject.org" <devel@...uxdriverproject.org>, "olaf@...fle.de" <olaf@...fle.de>, "apw@...onical.com" <apw@...onical.com>, "jasowang@...hat.com" <jasowang@...hat.com> Subject: RE: [PATCH V1 net-next 1/1] hyperv: Enable sendbuf mechanism on the send path > -----Original Message----- > From: K. Y. Srinivasan [mailto:kys@...rosoft.com] > Sent: Wednesday, April 23, 2014 2:25 PM > To: davem@...emloft.net; netdev@...r.kernel.org; linux- > kernel@...r.kernel.org; devel@...uxdriverproject.org; olaf@...fle.de; > apw@...onical.com; jasowang@...hat.com > Cc: KY Srinivasan > Subject: [PATCH V1 net-next 1/1] hyperv: Enable sendbuf mechanism on the > send path > > We send packets using a copy-free mechanism (this is the Guest to Host > transport via VMBUS). While this is obviously optimal for large packets, it may > not be optimal for small packets. Hyper-V host supports a second mechanism > for sending packets that is "copy based". We implement that mechanism in > this patch. > > In this version of the patch I have addressed a comment from David Miller. David, Please let me know if there is some other issue you want addressed in this patch. Regards, K. Y -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists