| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <a94b00d9-8bbc-4c54-b5c9-4a7902220312@gmx.net> Date: Sun, 15 Oct 2023 12:23:51 +0200 From: Stefan Wahren <wahrenst@....net> To: Eric Dumazet <edumazet@...gle.com>, Neal Cardwell <ncardwell@...gle.com> Cc: Jakub Kicinski <kuba@...nel.org>, Fabio Estevam <festevam@...il.com>, linux-imx@....com, Stefan Wahren <stefan.wahren@...rgebyte.com>, Michael Heimpold <mhei@...mpold.de>, netdev@...r.kernel.org, Yuchung Cheng <ycheng@...gle.com> Subject: Re: iperf performance regression since Linux 5.18 Hi, Am 15.10.23 um 01:26 schrieb Stefan Wahren: > Hi Eric, > > Am 15.10.23 um 00:51 schrieb Eric Dumazet: >> On Sat, Oct 14, 2023 at 9:40 PM Neal Cardwell <ncardwell@...gle.com> >> wrote: ... >> Hmm, we receive ~3200 acks per second, I am not sure the >> tcp_tso_should_defer() logic >> would hurt ? >> >> Also the ss binary on the client seems very old, or its output has >> been mangled perhaps ? > this binary is from Yocto kirkstone: > > # ss --version > ss utility, iproute2-5.17.0 > > This shouldn't be too old. Maybe some missing kernel settings? > i think i was able to fix the issue by enable the proper kernel settings. I rerun initial bad and good case again and overwrote the log files: https://github.com/lategoodbye/tcp_tso_rtt_log_regress/commit/93615c94ba1bf36bd47cc2b91dd44a3f58c601bc
Powered by blists - more mailing lists