lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 30 Apr 2014 13:36:45 -0400 (EDT) From: David Miller <davem@...emloft.net> To: kys@...rosoft.com Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org, devel@...uxdriverproject.org, olaf@...fle.de, apw@...onical.com, jasowang@...hat.com Subject: Re: [PATCH V1 net-next 1/1] hyperv: Enable sendbuf mechanism on the send path From: "K. Y. Srinivasan" <kys@...rosoft.com> Date: Wed, 30 Apr 2014 10:14:31 -0700 > We send packets using a copy-free mechanism (this is the Guest to Host transport > via VMBUS). While this is obviously optimal for large packets, > it may not be optimal for small packets. Hyper-V host supports > a second mechanism for sending packets that is "copy based". We implement that > mechanism in this patch. > > In this version of the patch I have addressed a comment from David Miller. > > With this patch (and all of the other offload and VRSS patches), we are now able > to almost saturate a 10G interface between Linux VMs on Hyper-V > on different hosts - close to 9 Gbps as measured via iperf. > > Signed-off-by: K. Y. Srinivasan <kys@...rosoft.com> > Reviewed-by: Haiyang Zhang <haiyangz@...rosoft.com> Applied. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists