lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171028140533.e3n4zpno66kyfdm3@linux-n805>
Date:   Sat, 28 Oct 2017 07:05:33 -0700
From:   Davidlohr Bueso <dave@...olabs.net>
To:     Jason Baron <jbaron@...mai.com>
Cc:     akpm@...ux-foundation.org, linux-kernel@...r.kernel.org,
        linux-fsdevel@...r.kernel.org,
        Alexander Viro <viro@...iv.linux.org.uk>,
        Salman Qazi <sqazi@...gle.com>
Subject: Re: [PATCH] epoll: avoid calling ep_call_nested() from
 ep_poll_safewake()

On Wed, 18 Oct 2017, Jason Baron wrote:

>http://lkml.iu.edu/hypermail//linux/kernel/1501.1/05905.html
>
>We can work through these ideas or others...

So, unsurprisingly, I got some _really_ good results on the epoll_wait()
benchmark by removing the readywalk list altogether -- something like
4000% in some cases. It's also survived more testing, although I'm still
waiting for customer confirmation on his real workload, which helps
further test the changes (along with this patch to move the safewake
list to debug).

Could you please resend patch 1 in the series above?

Thanks,
Davidlohr

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ