lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20111116111023.502d6a6e@lxorguk.ukuu.org.uk>
Date:	Wed, 16 Nov 2011 11:10:23 +0000
From:	Alan Cox <alan@...rguk.ukuu.org.uk>
To:	Klaus Ripke <klaus@...ke.com>
Cc:	linux-kernel@...r.kernel.org, Clemens Ladisch <clemens@...isch.de>
Subject: Re: LOAD_FREQ (4*HZ+61) avoids loadavg Moire

On Wed, 16 Nov 2011 12:03:30 +0100
Klaus Ripke <klaus@...ke.com> wrote:

> On Mon, Nov 14, 2011 at 09:10:44AM +0100, Clemens Ladisch wrote:
> > Klaus Ripke wrote:
> > > With some seconds based load (like SSL heartbeats)
> > > and LOAD_FREQ at (5*HZ+1) I see Moire patterns like inverse sawtooth,
> > 
> > Thanks for researching this, but I don't see them because I'm too lazy
> > to reproduce this.  Could you please publish a colorful screenshot
> > somewhere?
> 
> there you go http://ripke.com/loadavg/moire

And for any load you pick you'll be able to generate patterns and
inaccurate load average data unless you actually count used cycles via
the perf counters and such on processors.

Shannon says we can't win. Changing the computation may well change load
values other users use in order to predict and balance workloads so while
it has clear limits futzing with it to make one workload look better is
simply going to break stuff for other people.

Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ