lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 28 Jul 2014 08:01:15 +0800
From:	Yuyang Du <>
To:	Mike Galbraith <>
Subject: Re: [PATCH 0/2 v4] sched: Rewrite per entity runnable load average

On Mon, Jul 28, 2014 at 09:49:18AM +0200, Mike Galbraith wrote:
> On Mon, 2014-07-28 at 03:34 +0800, Yuyang Du wrote: 
> > Thanks a lot, Mike.
> > 
> > Ben asked for this test, but actually I don't know how to get pipe-test, still
> > not even after google it.
> You could write it trivially, it's just pipe ping-pong.  I can send you
> a copy of the one I use if you like.  Ingo wrote it way back in the dark
> ages, I use it to watch out for fastpath lard accumulation.

Yes, please, drop me a copy.

> > So the result is flat compared to before or a pass?
> Yeah, my little box said it was a deep cgroup price noop, but a modest
> win for root.  I love minus signs, they work great, though sometimes in
> highly mysterious ways :)

Minus sign is great, and I hope this patchset is not mysterious, :)

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists