lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAMENy5pb8ea+piKLg5q5yRTMZacQqYWAoVLE1FE9WhQPq92E0g@mail.gmail.com>
Date: Tue, 18 Jun 2024 17:28:09 +0200
From: Sebastiano Miano <mianosebastiano@...il.com>
To: bpf@...r.kernel.org, netdev@...r.kernel.org
Cc: saeedm@...dia.com, tariqt@...dia.com, hawk@...nel.org, edumazet@...gle.com, 
	kuba@...nel.org, pabeni@...hat.com
Subject: XDP Performance Regression in recent kernel versions

Hi folks,

I have been conducting some basic experiments with XDP and have
observed a significant performance regression in recent kernel
versions compared to v5.15.

My setup is the following:
- Hardware: Two machines connected back-to-back with 100G Mellanox
ConnectX-6 Dx.
- DUT: 2x16 core Intel(R) Xeon(R) Silver 4314 CPU @ 2.40GHz.
- Software: xdp-bench program from [1] running on the DUT in both DROP
and TX modes.
- Traffic generator: Pktgen-DPDK sending traffic with a single 64B UDP
flow at ~130Mpps.
- Tests: Single core, HT disabled

Results:

Kernel version |-------| XDP_DROP |--------|   XDP_TX  |
5.15                                30Mpps                  16.1Mpps
6.2                                21.3Mpps                 14.1Mpps
6.5                                19.9Mpps                  8.6Mpps
bpf-next (6.10-rc2)        22.1Mpps                 9.2Mpps

I repeated the experiments multiple times and consistently obtained
similar results.
Are you aware of any performance regressions in recent kernel versions
that could explain these results?

[1] https://github.com/xdp-project/xdp-tools

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ