lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200227090929.GA57547@gmail.com>
Date:   Thu, 27 Feb 2020 10:09:29 +0100
From:   Ingo Molnar <mingo@...nel.org>
To:     Mel Gorman <mgorman@...hsingularity.net>
Cc:     Vincent Guittot <vincent.guittot@...aro.org>,
        Peter Zijlstra <peterz@...radead.org>,
        Juri Lelli <juri.lelli@...hat.com>,
        Dietmar Eggemann <dietmar.eggemann@....com>,
        Steven Rostedt <rostedt@...dmis.org>,
        Ben Segall <bsegall@...gle.com>,
        Valentin Schneider <valentin.schneider@....com>,
        Phil Auld <pauld@...hat.com>, Hillf Danton <hdanton@...a.com>,
        LKML <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH 00/13] Reconcile NUMA balancing decisions with the load
 balancer v6


* Mel Gorman <mgorman@...hsingularity.net> wrote:

> On Tue, Feb 25, 2020 at 02:28:16PM +0100, Vincent Guittot wrote:
> > >
> > > Will do.
> > >
> > > However I noticed that "sched/fair: Fix find_idlest_group() to handle
> > > CPU affinity" did not make it to tip/sched/core. Peter seemed to think it
> > > was fine. Was it rejected or is it just sitting in Peter's queue somewhere?
> > 
> > The patch has already reached mainline through tip/sched-urgent-for-linus
> > 
> 
> Bah, I pasted the wrong subject. I am thinking of your
> patch "sched/fair: fix statistics for find_idlest_group" --
> https://lore.kernel.org/lkml/20200218144534.4564-1-vincent.guittot@linaro.org/
> It still appears to be relevant or did I miss something else?

Applied to tip:sched/urgent now, thanks guys!

	Ingo

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ