> It is, I could throw together a merge request. I am not a CI expert though.
> Next close person would be Matt Selsky I think.
> Any particular distro anyone wants it to run on? j/k
The idea is NOT to run it as part of a normal checkin, but have something in
addition that could be triggered
On Mon, Jan 13, 2020 at 5:58 PM Eric S. Raymond via devel
wrote:
>
> Hal Murray via devel :
> > A year or 2 ago, I put together a script to test as many build time options
> > as
> > I thought reasonable. It's in ./tests/option-tester.sh
> >
> > Does anybody other than me use it?
>
> I've run it
Hal Murray via devel :
> A year or 2 ago, I put together a script to test as many build time options
> as
> I thought reasonable. It's in ./tests/option-tester.sh
>
> Does anybody other than me use it?
I've run it once or twice, but's not easty to see how to integraste
it into our regularr tes
On Mon, Jan 13, 2020 at 05:06:01PM -0800, Hal Murray via devel wrote:
> A year or 2 ago, I put together a script to test as many build time options
> as
> I thought reasonable. It's in ./tests/option-tester.sh
>
> Does anybody other than me use it?
>
> It's a bit of a CPU hog -- too much to r
On Mon, Jan 13, 2020 at 05:06:01PM -0800, Hal Murray via devel wrote:
> How does waf tell the c compiler which Python.h to use?
> My system has:
> /usr/include/python2.7/Python.h
> /usr/include/python3.7m/Python.h
./waf --python=/path/to/python
OR
/path/to/python waf
> What can we do about
>From Gary:
> I find if I do not test on python2 that I quickly break code.
A year or 2 ago, I put together a script to test as many build time options as
I thought reasonable. It's in ./tests/option-tester.sh
Does anybody other than me use it?
It's a bit of a CPU hog -- too much to run rou
Thanks.
>> Suppose you don't trust all those CAs. What can you do?
> Then they shouldn't be in your trust root to begin with. It's easy enough to
> remove a CA source file from the system cert store and rebuild it, although
> what to do is slightly different on each system.
The problem with tha
Hal Murray via devel writes:
> Suppose you don't trust all those CAs. What can you do?
Then they shouldn't be in your trust root to begin with. It's easy
enough to remove a CA source file from the system cert store and rebuild
it, although what to do is slightly different on each system.
> One
Sorry All! Previous answer was about "Performance tweaks" Hal Murray
question!
About performance: every 1kpps give 1-2% for me regardless mrulist
enabled/disabled . If you want solution for highloaded up to "all cores
100% CPU" servers you can two ways:
1. multithreaded daemon. I think it
cpu affinity? If you have network card with many tx/rx threads (modern
PCI-E card can use MSI-X and 'software irq'), you can bind different
card threads/irqs to cores and ntpd process to other core. On BSD we use
cpuset to spread and bing threads to cores.
On Linux see script set_irq_affinity.
Thanks.
> and without 'limited' on ~5kpps I have 8-10% CPU regardless minitoring
> enabled/disabled. About 1% on 1000pps.
Is that within reason or worth investigating? 1% times 5 should be 5% rather
than 8-10% but there may not be enough significant digits in any of the
numbers.
> For those
A busy ntpd is CPU limited. Simple. I'm poking around, looking for tweaks
that will gain a few percent.
Does anybody have a quick recipe for how to get ntpd running on one CPU and
the interrupt processing running on the same or a different CPU?
Any idea on how much CPU it takes to do the in
12 matches
Mail list logo