| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20150831092449.GJ19282@twins.programming.kicks-ass.net> Date: Mon, 31 Aug 2015 11:24:49 +0200 From: Peter Zijlstra <peterz@...radead.org> To: Morten Rasmussen <morten.rasmussen@....com> Cc: mingo@...hat.com, vincent.guittot@...aro.org, daniel.lezcano@...aro.org, Dietmar Eggemann <Dietmar.Eggemann@....com>, yuyang.du@...el.com, mturquette@...libre.com, rjw@...ysocki.net, Juri Lelli <Juri.Lelli@....com>, sgurrappadi@...dia.com, pang.xunlei@....com.cn, linux-kernel@...r.kernel.org Subject: Re: [PATCH 0/6] sched/fair: Compute capacity invariant load/utilization tracking On Fri, Aug 14, 2015 at 05:23:08PM +0100, Morten Rasmussen wrote: > Target: ARM TC2 A7-only (x3) > Test: hackbench -g 25 --threads -l 10000 > > Before After > 315.545 313.408 -0.68% > > Target: Intel(R) Core(TM) i5 CPU M 520 @ 2.40GHz > Test: hackbench -g 25 --threads -l 1000 (avg of 10) > > Before After > 6.4643 6.395 -1.07% > A quick run here gives: IVB-EP (2*20*2): perf stat --null --repeat 10 -- perf bench sched messaging -g 50 -l 5000 Before: After: 5.484170711 ( +- 0.74% ) 5.590001145 ( +- 0.45% ) Which is an almost 2% slowdown :/ I've yet to look at what happens. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists