Fact-checked by Grok 2 weeks ago
References
-
[1]
CPU Cycle Counter - IntelThis is a high-resolution counter inside the CPU which counts CPU cycles. This counter is called Timer Stamp Counter (TSC) on x86/Intel®64 architectures.
-
[2]
Acquiring high-resolution time stamps - Win32 apps | Microsoft LearnApr 18, 2023 · TSCs are high-resolution per-processor hardware counters that can be accessed with very low latency and overhead (in the order of 10s or 100s of ...
-
[3]
[PDF] System Programming Guide - IntelNOTE: The Intel 64 and IA-32 Architectures Software Developer's Manual ... TSC-Deadline Mode ...<|control11|><|separator|>
-
[4]
Invariant TSC support - Intel CommunityDec 21, 2011 · The invariant TSC means that the TSC continues at a fixed rate regardless of the C-state or frequency of the processor (as long as the processor ...TSC Synchronization Across Cores - Intel CommunityP-State invariant TSC on Nehalem platforms with multi-packagesMore results from community.intel.com
-
[5]
[PDF] Volume 3 (3A, 3B, 3C & 3D): System Programming Guide - IntelThis is Volume 3 of the Intel 64 and IA-32 manual, a System Programming Guide, part of a four-volume set.
-
[6]
[PDF] Pentium Processor User Manual Vol. 3 (1995) - DOS DaysAug 19, 1992 · In 1971,. Intel introduced the 4004, the first microprocessor. Containing 2300 transistors, this first commercially available computer-on-a ...
- [7]
- [8]
-
[9]
Pitfalls of TSC usage - Oliver YangSep 9, 2015 · The invariant TSC will run at a constant rate in all ACPI P-, C-, and T-states. This is the architectural behavior moving forward. Invariant TSC ...
-
[10]
[PDF] Multi-processor and Frequency Scaling - The Linux Kernel Archivescpufreq driver correcting the kernel TSC cal- ibration whenever the frequency changes. This issue may impact other code that uses the TSC register directly.
-
[11]
[PDF] Temporal accuracy and modern high performance processors - DRUMThe idea was to make the RDTSC instruction execute exactly at a multiple of 31 to 33 clock cycles ahead of the target TSC value by delaying the entry to the ...
-
[12]
[PDF] First the Tick, Now the Tock: Intel® Microarchitecture (Nehalem)This new, scalable, shared memory architecture integrates a memory controller into each microprocessor and connects processors and other components with a new ...
-
[13]
[PDF] BIOS and Kernel Developer's Guide (BKDG) For AMD Family 10h ...Apr 22, 2010 · ... and MONITOR instructions. • Misaligned SSE mode. • Power management state invariant time stamp counter (TSC). • Number of extended LVT ...
-
[14]
[PDF] Intel 64 and IA-32 Architectures Software Developer's ManualNOTE: The Intel® 64 and IA-32 Architectures Software Developer's Manual consists of nine volumes: Basic Architecture, Order Number 253665; Instruction Set ...Missing: TSC | Show results with:TSC
-
[15]
[PDF] AMD64 Architecture Programmer's Manual, Volume 2... AMD64 Architecture. Programmer's Manual. Volume 2: System Programming. Publication No. Revision. Date. 24593. 3.38. November 2021 ... Secure Memory Encryption ...
-
[16]
NoneBelow is a merged and comprehensive summary of the RDTSCP instruction based on all provided segments. To retain all details efficiently, I’ll use a structured table format in CSV style for key information, followed by a narrative summary that consolidates additional details and notes. This approach ensures maximum density and clarity while preserving all mentioned information.
-
[17]
[PDF] Intel® 64 and IA-32 Architectures Software Developer's ManualNOTE: The Intel® 64 and IA-32 Architectures Software Developer's Manual consists of five volumes: Basic Architecture, Order Number 253665;. Instruction Set ...Missing: AMD | Show results with:AMD
-
[18]
[PDF] Intel® 64 and IA-32 Architectures Software Developer's ManualNOTE: The Intel® 64 and IA-32 Architectures Software Developer's Manual consists of ten volumes: Basic Architecture, Order Number 253665; Instruction Set ...
-
[19]
[PDF] AMD-K5 - Bitsavers.orgThe AMD-K5 processor's 64-bit time stamp counter (TSC) increments on each proces- sor clock. In Real or Protected mode, the counter can be read with the RDMSR.Missing: introduction | Show results with:introduction
-
[20]
[PDF] AMD Athlon 64 Processor Product Data SheetAMD64 Technology. –. AMD64 technology instruction set extensions. –. 64-bit integer registers, 48-bit virtual addresses, 40- bit physical addresses. –. Eight ...Missing: TSC | Show results with:TSC
-
[21]
[PDF] BIOS and Kernel Developer's Guide (BKDG) For AMD Family 10h ...Jan 11, 2013 · Page 1. 31116 Rev 3.62 - January 11, 2013. AMD Family 10h Processor BKDG ... invariant time stamp counter (TSC). • Number of extended LVT ...
-
[22]
[PDF] Secure TSC for AMD SEV-SNP guests - Linux Plumbers ConferenceNov 15, 2023 · • SecureTSC guest v5 patches. • “Secure TSC” section in AMD64 Architecture Programmer's Manual · Volume 2: System Programming. • “TSC Info ...
-
[23]
[PDF] Open-Source Register Reference For AMD Family 17h Processors ...Jul 3, 2018 · AMD Virtualization is a trademark of Advanced Micro Devices, Incorporated. MMX is a trademark of Intel Corporation. PCI Express is a registered ...
-
[24]
Intel® 64 and IA-32 Architectures Software Developer ManualsOct 29, 2025 · Overview. These manuals describe the architecture and programming environment of the Intel® 64 and IA-32 architectures.Missing: TSC | Show results with:TSC
-
[25]
[PDF] Intel® 64 and IA-32 Architectures Software Developer's ManualNOTE: The Intel® 64 and IA-32 Architectures Software Developer's Manual consists of nine volumes: Basic Architecture, Order Number 253665; Instruction Set ...
-
[26]
Custom Data Collection for Performance Analysis (NEW) - IntelWhen you collect performance data with VTune Profiler, you can configure a custom data collector to interact with the collected data.
-
[27]
Linux perf Examples - Brendan GreggExamples of using the Linux perf command, aka perf_events, for performance analysis and debugging. perf is a profiler and tracer.
-
[28]
How to change the clock source in the system - Red Hat Customer ...Aug 7, 2024 · Checking the current clock source: One can easily perform this task through searching in /var/log/dmesg file for "time".Missing: vclock_read_tsc | Show results with:vclock_read_tsc
-
[29]
[PATCH RESEND] Prevent unexpected TSC to HPET clocksource ...Jun 4, 2025 · > > > > This manifests in the kernel log as: > > clocksource ... > > This fix successfully prevents HPET fallback on Eviden 12 socket ...
-
[30]
Timers | Microsoft LearnMay 26, 2021 · The partition reference time enlightenment uses a virtual TSC value, an offset and a multiplier to enable a guest partition to compute the ...Missing: mapping | Show results with:mapping<|separator|>
-
[31]
CPU Isolation – Nohz_full troubleshooting: broken TSC/clocksourceDec 14, 2022 · We are going to explore CPU isolation troubleshooting, starting with a strong focus on a common issue met by nohz_full users on x86.Missing: integration vclock_read_tsc
-
[32]
3.3. TSC Timer Synchronization on Opteron CPUs | Tuning GuideRed Hat Enterprise Linux for Real Time provides a method to prevent this skew by forcing all processors to simultaneously change to the same frequency.
-
[33]
KVM timekeeping and TSC virtualizationThis patch set implements full TSC virtualization, with both trapping and passthrough modes, and intelligent mode switching.Missing: laptops | Show results with:laptops
-
[34]
[PDF] Timestamp-Counter Scaling (TSC scaling) for VirtualizationThis paper describes an Intel® Virtualization Technology (Intel® VT) enhancement for future Intel processors. This feature, referred to as timestamp-counter ...
-
[35]
Real-Time Scheduling on Linux — ECI documentationSetting Low-latency Interrupt Software Handling¶. PREEMPT_RT enforces fundamental software design rules to reach full-preemptive and low-latency scheduling ...
-
[36]
[PDF] FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side ...In this paper we describe the FLUSH+RELOAD tech- nique and how we use it to extract GnuPG private keys across multiple processor cores and ...
-
[37]
[PDF] Exploiting Speculative Execution - Spectre AttacksThis paper describes practical attacks that combine methodology from side channel attacks, fault attacks, and return-oriented programming that can read.
-
[38]
[PDF] DNS FLaRE: A Flush-Reload Attack on DNS Forwarders - USENIXAug 13, 2025 · In this paper, we present DNS FLaRE, a DNS cache-based timing side-channel attack that allows an attacker to accu- rately infer the times at ...
-
[39]
[PDF] Side Channel Attacks on the CPU On-Chip Ring Interconnect Are ...Abstract. We introduce the first microarchitectural side channel at- tacks that leverage contention on the CPU ring interconnect.
-
[40]
[PDF] Inter-Core Interference Mitigation in a Mixed Criticality SystemAug 4, 2020 · solution in newer processors is an enhancement called the invariant TSC. The invariant TSC runs at a constant rate, regardless of changes in ...
-
[41]
AMD Secure TSC Support Might Finally Be Ready For Landing In ...Jan 9, 2025 · Secure TSC is a feature with SEV-SNP-enabled EPYC server processors for allowing VMs/guests to securely use the RDTSC and RDTSCP instructions ...
-
[42]
[PDF] Intel® 64 and IA-32 Architectures Software Developer's ManualEnhanced Intel SpeedStep® Technology was introduced in the Pentium M processor. ... time-stamp counter and processor ID;. Set IA32_MCi_STATUS to all 0s;. Execute ...
-
[43]
Intel® Xeon® Processor Scalable Family Technical OverviewJan 12, 2022 · Time Stamp Counter (TSC) Enhancement for Virtualization. The Intel Xeon processor Scalable family introduces a new TSC scaling feature to ...
-
[44]
TSC - OSDev WikiThe Timestamp Counter is a 64-bit internal register which is present in all Intel processors after the Pentium. It stores the number of cycles executed by the ...Introduction · Relation with the APIC TimerMissing: architecture | Show results with:architecture
-
[45]
Timekeeping Virtualization for X86-Based ArchitecturesThe TSC or time stamp counter is relatively simple in theory; it counts instruction cycles issued by the processor, which can be used as a measure of time.
-
[46]
Time-stamp counter disabling oddities in the Linux kernel - cr0 blogMay 28, 2009 · Most operating systems will not set CR4.TSD on any thread, so programmers are free to use RDTSC in their Ring3 code. The problem is that the TSC ...
-
[47]
KVM pvclock - Richard WM Jones - WordPress.comOct 15, 2010 · KVM pvclock lets guests read the host's wall clock time. It's really very simple: the guest sets aside a page of its RAM and asks the host to write time into ...
-
[48]
SchedGuard++: Protecting against Schedule Leaks Using Linux ...This article presents “SchedGuard++”: a temporal protection framework for Linux-based real-time systems that protects against posterior schedule-based attacks ...Missing: TSC | Show results with:TSC
-
[49]
[RISC-V][tech-timing-fences] Fence.time draft extension feedback ...Feb 24, 2025 · Building on previous answers. Your example is an EVICT+TIME cache side-channel attack, which must be prevented by FENCE.TIME.
-
[50]
[PDF] Exploring speculation barriers for RISC-V selective speculation - HALMay 9, 2025 · We examine three aspects: the semantics of speculation fences (ranging from broad to selective constraints), the placement of fences in programs ...
-
[51]
TAA - TSX Asynchronous Abort - The Linux Kernel documentationTAA is a hardware vulnerability that allows unprivileged speculative access to data which is available in various CPU internal buffers by using asynchronous ...
-
[52]
[PDF] Not So Secure TSC - Daniel GrussDec 2, 2024 · We exploit the new SecureTSC feature supported on recent AMD processors with SEV-SNP. SecureTSC is intended to provide a trusted timing source ...