lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.20.1712281206140.1688@nanos>
Date:   Thu, 28 Dec 2017 12:12:12 +0100 (CET)
From:   Thomas Gleixner <tglx@...utronix.de>
To:     TimGuo <timguo_via@...yun.com>
cc:     mingo@...hat.com, hpa@...or.com, mingo@...nel.org, x86@...nel.org,
        linux-pm@...r.kernel.org, linux-kernel@...r.kernel.org,
        brucechang@...-alliance.com, benjaminpan@...tech.com,
        cooperyan@...oxin.com, qiyuanwang@...oxin.com
Subject: Re: [PATCH v2] x86/centaur: Mark TSC invariant

On Mon, 27 Nov 2017, TimGuo wrote:

> During the FIO benchmark for block device, we found there are lots of clocksource
> access. TSC access latency is much lower than HPET. Use TSC as clocksource can improve 
> the FIO benchmark result.
>  
> 
> changes from v1 to v2:
> ---------------------
> Adjust the subject and description of this patch according to tglx's suggestion.

Well, the subject makes sense. The changelog not so much.

It's completely irrelevant whether you run a FIO benchmark or something
different.

What's relevant is that the CPU has a constant frequency TSC and that TSC
does not stop in C-States. But because the flags are not set for that CPU
the TSC is treated as non constant frequency and assumed to stop in
C-States, which makes it an unreliable and unusable clock source.

Setting those flags tells the kernel that the TSC is usable, so it will
select it over HPET. The effect of this is that reading time stamps (from
kernel or user space) will be faster and more efficient.

Thanks,

	tglx

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ