lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20070124200947.GA925@elte.hu>
Date:	Wed, 24 Jan 2007 21:09:47 +0100
From:	Ingo Molnar <mingo@...e.hu>
To:	john stultz <johnstul@...ibm.com>
Cc:	John <me@...vacy.net>, linux-kernel@...r.kernel.org,
	tglx@...esys.com, akpm@...l.org, shill@...e.fr
Subject: Re: One-shot high-resolution POSIX timer periodically late


* john stultz <johnstul@...ibm.com> wrote:

> On Wed, 2007-01-24 at 10:41 +0100, John wrote:
> > I'm using the POSIX timers API. My platform is x86 running Linux
> > 2.6.18.6 patched with the high-resolution timer subsystem.
> > 
> > http://www.tglx.de/hrtimers.html

> > My process is the only SCHED_FIFO process on the system. There are 
> > no user-space processes with a higher priority. AFAICT, only a 
> > kernel thread could keep the CPU away from my app.
> > 
> > Is there a periodic kernel thread that runs every 2 seconds, cannot 
> > be preempted, and runs for over 50 µs??
> 
> This sounds like a BIOS SMI issue. Can you reproduce this behavior on 
> different hardware?

note that only the -hrt patchset is used - not the full -rt patchset - 
so 50 usecs delays (and more) are quite possible and common.

My question would be: does the same problem occur with the full -rt 
patchset and PREEMPT_RT? (see http://rt.wiki.kernel.org for details)

	Ingo
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ