lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 25 May 2012 17:18:56 -0700 From: Kent Overstreet <koverstreet@...gle.com> To: linux-kernel@...r.kernel.org, linux-bcache@...r.kernel.org, dm-devel@...hat.com, linux-fsdevel@...r.kernel.org, tj@...nel.org, axboe@...nel.dk, agk@...hat.com, neilb@...e.de, drbd-dev@...ts.linbit.com, bharrosh@...asas.com, vgoyal@...hat.com, mpatocka@...hat.com, sage@...dream.net, yehuda@...newdream.net Subject: Re: [PATCH v3 13/16] Make generic_make_request handle arbitrarily large bios On Sat, May 26, 2012 at 12:12:33AM +0100, Alasdair G Kergon wrote: > What I'm trying to say is, by all means, let's continue to clean up this > patch set, but then give it some serious performance testing under > different regimes, compare it against the status quo, do whatever > tuning seems appropriate then let the results guide us. Ok, that is certainly fair. I'm not _terribly_ worried about the performance impact but it's certainly possible performance will require some more work, we do need that testing. What's also going to help with performance is for stacking block devices (and possibly drivers at some point) to be changed to handle arbitrary sized bios, so the splitting code in generic_make_request() can be disabled for them - that should also be pretty easy at this point. I have some other ideas/cleanups that should improve performance too but I'll leave that for later. I really do care deeply about performance - and it's been my experience that really the most important thing for performance is clean, simple code and interfaces - much more than people seem to generally assume, too... -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists