diff options
author | Eric Dumazet <edumazet@google.com> | 2016-04-14 08:05:40 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2016-04-15 23:45:44 +0300 |
commit | 8804b2722dc5d6f9b7ba0a9e812eae9ee5ce95bc (patch) | |
tree | fd1010fca7c152ca547f02d80a02dc9d1b9d7b20 /include/uapi/linux/if_ether.h | |
parent | b3d051477cf94e9d71d6acadb8a90de15237b9c1 (diff) | |
download | linux-8804b2722dc5d6f9b7ba0a9e812eae9ee5ce95bc.tar.xz |
tcp: remove false sharing in tcp_rcv_state_process()
Last known hot point during SYNFLOOD attack is the clearing
of rx_opt.saw_tstamp in tcp_rcv_state_process()
It is not needed for a listener, so we move it where it matters.
Performance while a SYNFLOOD hits a single listener socket
went from 5 Mpps to 6 Mpps on my test server (24 cores, 8 NIC RX queues)
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/uapi/linux/if_ether.h')
0 files changed, 0 insertions, 0 deletions