lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20231214104901.1318423-1-edumazet@google.com>
Date: Thu, 14 Dec 2023 10:48:58 +0000
From: Eric Dumazet <edumazet@...gle.com>
To: "David S . Miller" <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, 
	Paolo Abeni <pabeni@...hat.com>
Cc: Neal Cardwell <ncardwell@...gle.com>, Willem de Bruijn <willemb@...gle.com>, 
	Mina Almasry <almasrymina@...gle.com>, Chao Wu <wwchao@...gle.com>, 
	Pavel Begunkov <asml.silence@...il.com>, netdev@...r.kernel.org, eric.dumazet@...il.com, 
	Eric Dumazet <edumazet@...gle.com>
Subject: [PATCH net-next 0/3] net: optmem_max changes

optmem_max default value is too small for tx zerocopy workloads.

First patch increases default from 20KB to 128 KB,
which is the value we have used for seven years.

Second patch makes optmem_max sysctl per netns.

Last patch tweaks two tests accordingly.

Eric Dumazet (3):
  net: increase optmem_max default value
  net: Namespace-ify sysctl_optmem_max
  selftests/net: optmem_max became per netns

 Documentation/admin-guide/sysctl/net.rst          |  5 ++++-
 include/net/netns/core.h                          |  1 +
 include/net/sock.h                                |  1 -
 net/core/bpf_sk_storage.c                         |  3 ++-
 net/core/filter.c                                 | 12 +++++++-----
 net/core/net_namespace.c                          |  4 ++++
 net/core/sock.c                                   |  8 ++------
 net/core/sysctl_net_core.c                        | 15 ++++++++-------
 net/ipv4/ip_sockglue.c                            |  6 +++---
 net/ipv6/ipv6_sockglue.c                          |  4 ++--
 .../testing/selftests/net/io_uring_zerocopy_tx.sh |  9 ++++-----
 tools/testing/selftests/net/msg_zerocopy.sh       |  9 ++++-----
 12 files changed, 41 insertions(+), 36 deletions(-)

-- 
2.43.0.472.g3155946c3a-goog


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ