lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87h7rqaw8u.fsf@nanos.tec.linutronix.de>
Date:   Tue, 22 Sep 2020 13:25:53 +0200
From:   Thomas Gleixner <tglx@...utronix.de>
To:     Abdul Anshad Azeez <aazees@...are.com>,
        "linux-kernel\@vger.kernel.org" <linux-kernel@...r.kernel.org>,
        "x86\@kernel.org" <x86@...nel.org>,
        "netdev\@vger.kernel.org" <netdev@...r.kernel.org>,
        "linux-fsdevel\@vger.kernel.org" <linux-fsdevel@...r.kernel.org>
Cc:     "rostedt\@goodmis.org" <rostedt@...dmis.org>
Subject: Re: Performance regressions in networking & storage benchmarks in Linux kernel 5.8

Abdul,

On Tue, Sep 22 2020 at 08:51, Abdul Anshad Azeez wrote:
> Part of VMware's performance regression testing for Linux Kernel upstream rele
> ases we compared Linux kernel 5.8 against 5.7. Our evaluation revealed perform
> ance regressions mostly in networking latency/response-time benchmarks up to 6
> 0%. Storage throughput & latency benchmarks were also up by 8%.
> In order to find the fix commit, we bisected again between 5.8 and 5.9-rc4 and
>  identified that regressions were fixed from a commit made by the same author 
> Thomas Gleixner, which unbreaks the interrupt affinity settings - "e027fffff79
> 9cdd70400c5485b1a54f482255985(x86/irq: Unbreak interrupt affinity setting)".
>
> We believe these findings would be useful to the Linux community and wanted to
>  document the same.

thanks for letting us know, but the issue is known already and the fix
has been backported to the stable kernel version 5.8.6 as of Sept. 3rd.

Please always check the latest stable version.

Thanks,

        tglx

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ