lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <7ecb8f3c-2aeb-a905-0d4a-aa768b9649b5@huawei.com>
Date:   Mon, 26 Dec 2022 16:45:20 +0800
From:   Hui Tang <tanghui20@...wei.com>
To:     Russell King <linux@...linux.org.uk>
CC:     <linux-arm-kernel@...ts.infradead.org>,
        <linux-kernel@...r.kernel.org>, Jens Axboe <axboe@...nel.dk>,
        <tanghui20@...wei.com>
Subject: [bug-report] possible performance problem in ret_to_user_from_irq

hi folks.

I found a performance problem which is introduced by commit
32d59773da38 ("arm: add support for TIF_NOTIFY_SIGNAL").
After the commit,  any bit in the range of 0..15 will cause
do_work_pending() to be invoked. More frequent do_work_pending()
invoked possible result in worse performance.

Some of the tests I've doneļ¼Œ as follows:
lmbench test			base		with patch
./lat_ctx -P 1 -s 0  2		7.3167		11.04
./lat_ctx -P 1 -s 16 2          8.0467		14.5367
./lat_ctx -P 1 -s 64 2		7.8667		11.43
./lat_ctx -P 1 -s 16 16		16.47		18.3667
./lat_pipe -P 1			28.1671		44.7904

libMicro-0.4.1 test		base		with patch
./cascade_cond -E -C 200\
  -L -S -W -N "c_cond_1" -I 100	286.3333	358

When I adjust test bit, the performance problem gone.
-	movs	r1, r1, lsl #16
+	ldr	r2, =#_TIF_WORK_MASK
+	tst	r1, r2

Does anyone have a good suggestion for this problem?
should just test _TIF_WORK_MASK, as before?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ