lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20171028140533.e3n4zpno66kyfdm3@linux-n805> Date: Sat, 28 Oct 2017 07:05:33 -0700 From: Davidlohr Bueso <dave@...olabs.net> To: Jason Baron <jbaron@...mai.com> Cc: akpm@...ux-foundation.org, linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org, Alexander Viro <viro@...iv.linux.org.uk>, Salman Qazi <sqazi@...gle.com> Subject: Re: [PATCH] epoll: avoid calling ep_call_nested() from ep_poll_safewake() On Wed, 18 Oct 2017, Jason Baron wrote: >http://lkml.iu.edu/hypermail//linux/kernel/1501.1/05905.html > >We can work through these ideas or others... So, unsurprisingly, I got some _really_ good results on the epoll_wait() benchmark by removing the readywalk list altogether -- something like 4000% in some cases. It's also survived more testing, although I'm still waiting for customer confirmation on his real workload, which helps further test the changes (along with this patch to move the safewake list to debug). Could you please resend patch 1 in the series above? Thanks, Davidlohr
Powered by blists - more mailing lists