lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1274741362.2954.80.camel@localhost.localdomain>
Date:	Mon, 24 May 2010 15:49:22 -0700
From:	john stultz <johnstul@...ibm.com>
To:	"H. Peter Anvin" <hpa@...or.com>
Cc:	Dan Magenheimer <dan.magenheimer@...cle.com>,
	Brian Bloniarz <bmb@...enacr.com>, Ingo Molnar <mingo@...e.hu>,
	Thomas Gleixner <tglx@...utronix.de>,
	Peter Zijlstra <peterz@...radead.org>,
	Andi Kleen <andi@...stfloor.org>,
	Arjan van de Ven <arjan@...radead.org>,
	Venkatesh Pallipadi <venki@...gle.com>, chris.mason@...cle.com,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] x86: Export tsc related information in sysfs

On Mon, 2010-05-24 at 15:30 -0700, H. Peter Anvin wrote:
> On 05/24/2010 03:04 PM, Dan Magenheimer wrote:
> >>> Is that still the case?  I thought newer versions of NTP could deal
> >> with
> >>> large values.  Inaccuracies of way more than 500 ppm are everyday.
> >>
> >> That's scary.
> >>
> >> Yea, in the kernel the ntp freq correction tops out at 500ppm. Almost
> >> all the systems I see tend to fall in the +/- 200ppm range (if there's
> >> not something terribly wrong with the hardware).
> >>
> >> So maybe things aren't so bad out there? Or is that wishful thinking?
> > 
> > Since Brian's concern is at boot-time at which point there is no
> > network or ntp, and assuming that it would be unwise to vary tsc_khz
> > dynamically on a clocksource==tsc machine (is it?), would optionally
> > lengthening the TSC<->PIT calibration beyond 25ms result in a more
> > consistent tsc_khz between boots?  Or is the relative instability
> > an unavoidable result of skew between the PIT and the fixed constant
> > PIT_TICK_RATE combined with algorithmic/arithmetic error?  Or is
> > the jitter of the (spread-spectrum) TSC too extreme?  Or ???
> > 
> > If better more consistent calibration is possible, offering
> > that as an optional kernel parameter seems better than specifying
> > a fixed tsc_khz (stamped or user-specified) which may or may
> > not be ignored due to "too different from measured tsc_khz".
> > Even an (*optional*) extra second or two of boot time might
> > be perfectly OK if it resulted in an additional five or six
> > bits of tsc_khz precision.
> > 
> > Thoughts, Brian?
> 
> Making the calibration time longer should give a more precise result,
> but of course at the expense of longer boot time.
> 
> A longer sample would make sense if the goal is to freeze it into a
> kernel command line variable, but the real question is how many people
> would actually do that (and how many people would then suffer problems
> because they upgraded their CPU/mobo and got massive failures on post-boot.)

I'll admit its a feature for a minority of users. Probably why its not
included. 

And the upgraded system issue was something I tried to address by using
the calibrated value if it was off by some unreasonable amount, however
folks protested that, figuring since if its explicitly stated kernel
should not override it (ie: for the use case of where the calibration is
broken and folks want to force the value).

Also, you don't really need extra accuracy, you just need it to be the
same from boot to boot. NTP keeps the correction factor persistent from
boot to boot via the drift file. The boot argument is just trying to
save the time (possibly hours depending on ntp config) after a reboot
for NTP to correct for the new error introduced by calibration.

thanks
-john




--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ