lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 29 Oct 2014 16:12:11 -0400 (EDT) From: David Miller <davem@...emloft.net> To: nicolas.dichtel@...nd.com Cc: netdev@...r.kernel.org Subject: Re: [PATCH net-next] neigh: optimize neigh_parms_release() From: Nicolas Dichtel <nicolas.dichtel@...nd.com> Date: Wed, 29 Oct 2014 19:29:31 +0100 > In neigh_parms_release() we loop over all entries to find the entry given in > argument and being able to remove it from the list. By using a double linked > list, we can avoid this loop. > > Here are some numbers with 30 000 dummy interfaces configured: > > Before the patch: > $ time rmmod dummy > real 2m0.118s > user 0m0.000s > sys 1m50.048s > > After the patch: > $ time rmmod dummy > real 1m9.970s > user 0m0.000s > sys 0m47.976s > > Suggested-by: Thierry Herbelot <thierry.herbelot@...nd.com> > Signed-off-by: Nicolas Dichtel <nicolas.dichtel@...nd.com> Looks great, applied, thanks Nicolas. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists