lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171101210755.yd5gerren4xosisz@linux-n805>
Date:   Wed, 1 Nov 2017 14:07:55 -0700
From:   Davidlohr Bueso <dave@...olabs.net>
To:     Andrew Morton <akpm@...ux-foundation.org>
Cc:     Jason Baron <jbaron@...mai.com>, linux-kernel@...r.kernel.org,
        Alexander Viro <viro@...iv.linux.org.uk>,
        Salman Qazi <sqazi@...gle.com>, Hou Tao <houtao1@...wei.com>
Subject: Re: [PATCH] epoll: remove ep_call_nested() from ep_eventpoll_poll()

On Wed, 01 Nov 2017, Andrew Morton wrote:

>This is tempting, but boy it is late in the -rc cycle.
>
>How important are these workloads?  Would the world end if we held off
>on this for 4.15?

While it's very important to one customer, nested epoll is certainly not
the common case, and this performance bottleneck has been there for 7+
years, so no hurry in that regard.

I'd like to target for v4.16 some of the series of epoll patches out there
to (1) remove the remaining loop_ncalls list, and (2) remove the epmutex
global lock. So this patch would fit in fine there.

Now, could you please pick this patch up and just leave it in linux-next
for a while to get some more testing/exposure? I mainly ask because the
patch will most likely be running in production before this time.

Thanks,
Davidlohr

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ