Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2481725imm; Mon, 28 May 2018 08:55:47 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoXwc9tEBENtvFMo92fz+LbnDYGfPKhEgHV41sX6LohVOBiKXsyxMZrcpbtuwkc0mk6Ydwn X-Received: by 2002:a63:4c8:: with SMTP id 191-v6mr11040311pge.129.1527522947511; Mon, 28 May 2018 08:55:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527522947; cv=none; d=google.com; s=arc-20160816; b=DOLHKQy3AMTU4AUXfjCpe4lIA8KGyb1M51wuvEEO9BPeIUYHmr/tOozaXxCaIlgVoP 6eKRzfNGGEQLxFXAFQF8rueId+00RzhWvH9AIX1JicElPg4kUnlG2kBvoa6p5HiOXIu/ PIHvhWy8UYPHgMY4jb4znilSRqalBPJQtinBFi/hie4EgWCX+6w3iCIQyItP8Yw1SXDS YeVgyvZsSchvWLeNbgisFMi7Ke0ZwXP1RZ7I+x5kOUqvyUmi5k2K6Wra0NLZqcEt+Vr+ MMwHX3/sFSAFcIVVZc6+Ui1l9BVOLTRygdMBY8JrxcQcpwmG66PLVJ9PMMrX8nK8i43s wopA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=dSnleOMZzL8E6lWmNuVQg3UbQcC2ieYRQzzoqpQxGGk=; b=dRe44JlFC29VKBQKKdw0r6P/Eiq0VvuHUtaUJrOlRpt6e/dpYgt+f2fy6CK6o4P1K3 w+gdcykvooIPeHxT881Mw62lNcd80c24W9oiynDPU2LGLz9F5wkK37mmSSrswUs9ywzr 8t6SUcn6G7JwwTUoqOGSaE0og+QUbO9crThwiaNCyWhu7E+j7q8cnOI1YybYPlS0qL87 z7Im63nIk7fXLkrhGlwLXqFggtUqxVjjN19tvTiebgaEZce2ksNHltxglTYqgVUg8rOF pKLFUGcbdMpRSu0Skif1YwJZbNJhUf1FfbeI0Ca3jmGxwbWQzG9YZzLkxZnKc312/8Bp PW8Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 82-v6si6466186pgh.144.2018.05.28.08.55.32; Mon, 28 May 2018 08:55:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1425250AbeE1PyO (ORCPT + 99 others); Mon, 28 May 2018 11:54:14 -0400 Received: from mx2.suse.de ([195.135.220.15]:43835 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1425224AbeE1PyF (ORCPT ); Mon, 28 May 2018 11:54:05 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 4B346AD4D; Mon, 28 May 2018 15:54:03 +0000 (UTC) Date: Mon, 28 May 2018 14:03:18 +0200 From: Michal Hocko To: kernel test robot Cc: Tejun Heo , LKML , lkp@01.org Subject: Re: [lkp-robot] [mm, memcontrol] 309fe96bfc: vm-scalability.throughput +23.0% improvement Message-ID: <20180528120318.GB27180@dhcp22.suse.cz> References: <20180528114019.GF9904@yexl-desktop> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180528114019.GF9904@yexl-desktop> User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 28-05-18 19:40:19, kernel test robot wrote: > > Greeting, > > FYI, we noticed a +23.0% improvement of vm-scalability.throughput due to commit: > > > commit: 309fe96bfc0ae387f53612927a8f0dc3eb056efd ("mm, memcontrol: implement memory.swap.events") > https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master This doesn't make any sense to me. The patch merely adds an accounting. It doesn't optimize anything. So I strongly suspect the result is just misleading or the test (environment) misconfigured. Not the first time I am seeing something like that I am afraid. -- Michal Hocko SUSE Labs