lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 14 Aug 2014 16:20:24 -0700 (PDT)
From:	David Miller <>
Subject: Re: Performance regression on kernels 3.10 and newer

From: Alexander Duyck <>
Date: Thu, 14 Aug 2014 16:16:36 -0700

> Are you sure about each socket having it's own DST?  Everything I see
> seems to indicate it is somehow associated with IP.

Right it should be, unless you have exception entries created by path
MTU or redirects.

WRT prequeue, it does the right thing for dumb apps that block in
receive.  But because it causes the packet to cross domains as it
does, we can't do a lot of tricks which we normally can do, and that's
why the refcounting on the dst is there now.

Perhaps we can find a clever way to elide that refcount, who knows.
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to
More majordomo info at

Powered by blists - more mailing lists