lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 29 May 2009 21:07:18 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Diego Calleja <diegocg@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: Performance regressions in 2.6.30-rc7?

On Thu, 28 May 2009 22:49:28 +0200 Diego Calleja <diegocg@...il.com> wrote:

> Hi, phoronix.com has run some benchmarks in 2.6.30-rc7 [1], there're some
> good numbers, but there's also a couple of regressions. Some people think
> that phoronix benchmarks are not very serious/reliable/meaningful, but i
> thought it'd be better to post false warnings than letting real regressions
> slip in without notice.
> 
> The regressions would be:
> - 7zip MIPS ("7zr b" command) http://www.phoronix.com/data/img/results/linux_2630/1.png
> 
> - tiobench latency (not throughput) using 64MB writes with 32 threads
> http://www.phoronix.com/data/img/results/linux_2630/7.png
> 
> -gnupg 2GB file encryption http://www.phoronix.com/data/img/results/linux_2630/3.png
> 
> 
> Full article: http://www.phoronix.com/scan.php?page=article&item=linux_2630

Those regressions are huge.  They appear to be on compute-intensive
workloads too.

I wonder if some expensive debugging option turned itself on or
something silly like that.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ