Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5062956rdb; Tue, 12 Dec 2023 19:01:18 -0800 (PST) X-Google-Smtp-Source: AGHT+IGD+DTomYml1luwX7lhBQMpyPpNB7k7In6iTJQ6FGwwoGiVZDldGBMVCmVXebCOT9U6dzwU X-Received: by 2002:a05:6214:212b:b0:67e:f30d:a67c with SMTP id r11-20020a056214212b00b0067ef30da67cmr2183865qvc.42.1702436478191; Tue, 12 Dec 2023 19:01:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702436478; cv=none; d=google.com; s=arc-20160816; b=JKiD9Kyv6JE6BuyMT5WkZVT6+FP/jGG2SQmGQ06rF4DFTiKqq66ymanFnNltZKXNAb AiziWGxiV5lGsZWRMUBU1myTE60AaE2jVSWCFoGiivXRwNIlPxIRByBtSIoIFsVAd/AT UzlHrbFM8Tr5h+LozEoQ1RpXc/raEFwyVUMGT+QkMuirvGZCGOxoIDw7g4Liswunootq RSfGxnu+v0G94wcJp1xKoWQOiJyiAcb76DvyCHlciBXCc8os727GkrEFhxWOYUogcM5J HcDixrhW8dczaWDFnzEh8oKS4727tG0qKW6+lYV+qIiSnUEeos6MLqICLZLRwiO0YgAg dtFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=a8su4pVCvOPvDsJnpjbhJt87wIdi1dZPbIAQjOrJiPw=; fh=x9GisyHy3nCpTeQ1cVHB71Bk1OUtRMAT6GVDFlYZdhk=; b=Nm9NBMdXGeBdLRDxC+Zj6j3eshIHdPk0CZGI8wGRAlK6BI10Wjn6nHBfL/LFwVwsQ0 xcBvvpkIE3fxB/igIYvHGWlVz+s0n2MTJSU61lkjFHYyzY95rOoh8kVV4+VqP2k8fpvB 4Nrw/0SdrkebJbaZr497fvu8URcrvt1H/TU9EY25281slXYIOsNpv0MDk4jvCtAanxZ6 o821ocHYemjgw9ZqwcYjhgGbO4URK0l4vG0xxai91xjI95nadfsHODj+GMcXRVsXCKN1 ZNRUTnfxCFlTaO2bvaEE/u0GRP2YFXwkBJjpIjrrwDDCoM4pJBblbn0lKKengJBTD0iF Oeog== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto+bounces-779-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-779-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id u4-20020a0ce5c4000000b0067ecc931df2si6968770qvm.579.2023.12.12.19.01.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Dec 2023 19:01:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-779-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto+bounces-779-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-779-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id BB1C41C20E6A for ; Wed, 13 Dec 2023 03:01:17 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A09D2568B; Wed, 13 Dec 2023 03:01:16 +0000 (UTC) X-Original-To: linux-crypto@vger.kernel.org Received: from wxsgout04.xfusion.com (wxsgout04.xfusion.com [36.139.87.180]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4A4B3AB; Tue, 12 Dec 2023 19:01:12 -0800 (PST) Received: from wuxshcsitd00600.xfusion.com (unknown [10.32.133.213]) by wxsgout04.xfusion.com (SkyGuard) with ESMTPS id 4SqgBq5S1sz9yxwg; Wed, 13 Dec 2023 10:57:39 +0800 (CST) Received: from localhost (10.82.147.3) by wuxshcsitd00600.xfusion.com (10.32.133.213) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Wed, 13 Dec 2023 11:01:07 +0800 Date: Wed, 13 Dec 2023 11:01:06 +0800 From: Wang Jinchao To: Tim Chen CC: Herbert Xu , "David S. Miller" , Steffen Klassert , Daniel Jordan , , , Subject: Re: [PATCH] crypto: tcrypt - add script tcrypt_speed_compare.py Message-ID: References: <202312101758+0800-wangjinchao@xfusion.com> <118d0b232f7daffc56db814f90dba7bad266c5ab.camel@linux.intel.com> Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <118d0b232f7daffc56db814f90dba7bad266c5ab.camel@linux.intel.com> X-ClientProxiedBy: wuxshcsitd00603.xfusion.com (10.32.134.231) To wuxshcsitd00600.xfusion.com (10.32.133.213) On Tue, Dec 12, 2023 at 01:56:56PM -0800, Tim Chen wrote: > On Sun, 2023-12-10 at 18:19 +0800, WangJinchao wrote: > > Create a script for comparing tcrypt speed test logs. > > The script will systematically analyze differences item > > by item and provide a summary (average). > > This tool is useful for evaluating the stability of > > cryptographic module algorithms and assisting with > > performance optimization. > > I have found that for such comparison, the stability is > dependent on whether we allow the frequency to > float or we pin the frequency. So in the past when > I use tcrypt, sometimes I have > to pin the frequency of CPU for stable results. > > One suggestion I have is for for you to also dump the > frequency governor and P-state info so we know > for the runs being compared, whether they are running > with the same CPU frequency. > > Tim > Thank you for the feedback. This information is valuable for stability testing and performance optimization. However, I am uncertain about how to dump P-state information, or I believe that the script is unable to do so. The reasons are as follows: 1. The primary purpose of this script is to compare tcrypt logs, and it is executed after the completion of the tcrypt tests. Consequently, it cannot dump P-state information during tcrypt's runtime. 2. In virtualized environments, there is no available information in the `/sys/devices/system/cpu/cpufreq` directory pertaining to P-state details. Am I correct in my understanding? I am considering documenting your suggestion in the script's comments. What are your thoughts? >