On 2025-03-03 03:31, MOESSBAUER, Felix wrote:
On Fri, 2025-02-28 at 23:23 -0600, Richard Laager wrote:
On 2024-10-24 09:24, Felix Moessbauer wrote:
the ntpsec service starts the ntpd binary with the option "-N|--
nice" (defined
in ntpsec.default (/etc/default/ntpsec) [1]. By that, the ntpd will
run with
the highest possible priority, which is SCHED_FIFO, prio 99. These
priorities are discouraged as this can starve kernel threads. I
also
don't think that it is the intention of the maintainer to let it
run at
such a high priority.

It actually was my intention. Perhaps that was misguided. But as I
understood that option, it would prioritize ntpd. Maybe that's not
actually necessary for good timekeeping, though?

I don't think that this is needed for good timekeeping, as the NTP
itself pretty well handles all kinds of latencies. If running at a
higher priority (or even under RT schedulers), it should not run at the
highest possible prio. Otherwise things like PI locks do not properly
work anymore (because the lock holder cannot be boosted higher than the
waiter).

Can you suggest a more appropriate priority?

Maybe a lower FIFO priority, or maybe a high priority regular niceness?

At least this option should made easily be configurable with an env
file (or any other kind of systemd dropin). On RT systems, the RT
workload should never be interrupted by NTP.

I've asked on the
NTPsec devel list. Perhaps someone there can provide more insight.

Can you please add a link here as well. Then I'll try to involve myself
there.

https://lists.ntpsec.org/pipermail/devel/2025-March/010666.html

--
Richard

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to