lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20250128191042.GO1977892@ZenIV>
Date: Tue, 28 Jan 2025 19:10:42 +0000
From: Al Viro <viro@...iv.linux.org.uk>
To: Oliver Sang <oliver.sang@...el.com>
Cc: oe-lkp@...ts.linux.dev, lkp@...el.com, linux-kernel@...r.kernel.org,
	Christian Brauner <brauner@...nel.org>,
	linux-fsdevel@...r.kernel.org
Subject: Re: [linus:master] [do_pollfd()]  8935989798:
 will-it-scale.per_process_ops 11.7% regression

On Tue, Jan 28, 2025 at 05:37:39PM +0800, Oliver Sang wrote:

> > Just to make sure it's not a geniune change of logics somewhere,
> > could you compare d000e073ca2a, 893598979838 and d000e073ca2a with the
> > delta below?  That delta provably is an equivalent transformation - all
> > exits from do_pollfd() go through the return in the end, so that just
> > shifts the last assignment in there into the caller.
> 
> the 'd000e073ca2a with the delta below' has just very similar score as
> d000e073ca2a as below.

Not a change of logics, then...  AFAICS, the only differences in code generation
here are different spills and conditional fput() not taken out of line.

I'm somewhat surprised by the amount of slowdowns, TBH...  Is there any
chance to get per-insn profiles for those?  How much time is spent in
each insn of do_poll()/do_pollfd()?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ