lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Wed, 4 Dec 2013 13:21:04 -0700
From:	Jerry.Hoemann@...com
To:	Vivek Goyal <vgoyal@...hat.com>
Cc:	HATAYAMA Daisuke <d.hatayama@...fujitsu.com>,
	"H. Peter Anvin" <hpa@...ux.intel.com>,
	"Eric W. Biederman" <ebiederm@...ssion.com>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Fengguang Wu <fengguang.wu@...el.com>,
	Borislav Petkov <bp@...en8.de>,
	"kexec@...ts.infradead.org" <kexec@...ts.infradead.org>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Jingbai Ma <jingbai.ma@...com>
Subject: Re: [PATCH v9] x86, apic, kexec, Documentation: Add disable_cpu_apic
 kernel parameter

On Tue, Dec 03, 2013 at 10:25:36AM -0500, Vivek Goyal wrote:
> 
> Hi Hatayama, 
> 
> We are almost there. A minor nit. Why have we specified KEXEC here. This
> parameter disabled_cpu_apicid does not seem to dependon CONFIG_KEXEC?
> 
> Jerry, this patch looks good to me. Does it work on your system?
> 
> Thanks
> Vivek


Vivek,  Hatayama,

I've back ported v9 of this patch to 2.6.32 and 3.0.80 based kernels to
test with existing distros.

I've tested on our smaller prototype server specifying nr_cpus=8/maxcpus=8
to the capture kernel.  One hundred iterations (echo c > /proc/sysrq-trigger)
varying target cpu and system load to each kernel.

The 2.6.32 based distro kernel showed the < 5% soft lockup
(still unresolved) during boot of capture kernel.  This is
something i've seen on all versions of the patch that i've tested.

The 3.0.80 based distro kernel has had zero failures.

I have not had a chance to test upstream kernels or on
our larger prototype configuration.

We still plan to test on our larger prototype.  Testing of
prior versions of the patch on the larger systems didn't show
problems w/ this functionality and I don't anticipate we'll
find anything this time either.

I am okay with this patch being accepted upstream and working
the intermittent 2.6.32 failures separately.


Jerry


-- 

----------------------------------------------------------------------------
Jerry Hoemann            Software Engineer              Hewlett-Packard

3404 E Harmony Rd. MS 57                        phone:  (970) 898-1022
Ft. Collins, CO 80528                           FAX:    (970) 898-XXXX
                                                email:  jerry.hoemann@...com
----------------------------------------------------------------------------

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ