From owner-freebsd-current@FreeBSD.ORG Wed May 13 08:34:34 2015 Return-Path: Delivered-To: current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 3521D462; Wed, 13 May 2015 08:34:34 +0000 (UTC) Received: from mail.turbocat.net (mail.turbocat.net [IPv6:2a01:4f8:d16:4514::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E8A2011FC; Wed, 13 May 2015 08:34:33 +0000 (UTC) Received: from laptop015.home.selasky.org (cm-176.74.213.204.customer.telag.net [176.74.213.204]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.turbocat.net (Postfix) with ESMTPSA id F025F1FE023; Wed, 13 May 2015 10:34:30 +0200 (CEST) Message-ID: <55530CC3.1090204@selasky.org> Date: Wed, 13 May 2015 10:35:15 +0200 From: Hans Petter Selasky User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0 MIME-Version: 1.0 To: David Chisnall , John-Mark Gurney CC: Poul-Henning Kamp , Baptiste Daroussin , current@freebsd.org Subject: Re: Increase BUFSIZ to 8192 References: <20150511230635.GA46991@ivaldir.etoilebsd.net> <20150512032307.GP37063@funkthat.com> <14994.1431412293@critter.freebsd.dk> <20150513080342.GE37063@funkthat.com> In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 08:34:34 -0000 On 05/13/15 10:27, David Chisnall wrote: > On 13 May 2015, at 09:03, John-Mark Gurney wrote: >> >> Poul-Henning Kamp wrote this message on Tue, May 12, 2015 at 06:31 +0000: >>> -------- >>> In message <20150512032307.GP37063@funkthat.com>, John-Mark Gurney writes: >>> >>>> Also, you'd probably see even better performance by increasing the >>>> size to 64k, [...] >>> >>> easy: >>> 8K on 32bit >>> 64k on 64bit >> >> Sounds good to me... Just for people who care... I did a quick set of >> benchmarks on sha256.. This is using my preliminary patch to use sse4 >> optimized sha256... But this should be the same for others... >> >> The numbers in ministat output are the time in seconds it takes my >> 3.4GHz AMD A10-5700 APU running HEAD to process a 512MB file, so lower >> numbers are better.. I've processed them into easier to read format: >> BUFSIZ: 145MB/sec >> 8k: 193MB/sec >> 16k: 198MB/sec >> 64k: 202MB/sec >> 128k: 202MB/sec >> -t: 211MB/sec > > It looks like most of the benefit is gained at 16KB. Did you try running the benchmark with something else running at the same time to see if there is any advantage in trashing the caches a bit less (simple case, what happens if you run two instances of the same benchmark at once)? > > I suspect that you’re about right anyway - I recently did some tests while playing with JavaScript FFI generation with a multithreaded process JavaScript environment calling out to OpenSSL to do SHA calculations and having each of 8 threads reading in 128KB chunks gave the fastest performance (Core i7, 4 cores + hyperthreading), with only a negligible gain over 64KB. In all cases, the JavaScript implementation was significantly faster than the openssl tool, which used 8KB buffers. > Hi, You should also try this using an USB disk. The performance numbers heavily depends on the hardware's interrupt moderation values. --HPS