lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 04 Jan 2014 15:38:31 +0100 From: "Rafael J. Wysocki" <rjw@...ysocki.net> To: Paolo Bonzini <pbonzini@...hat.com> Cc: Gleb Natapov <gleb@...nel.org>, Dirk Brandewie <dirk.brandewie@...il.com>, Kashyap Chamarthy <kchamart@...hat.com>, Josh Boyer <jwboyer@...oraproject.org>, One Thousand Gnomes <gnomes@...rguk.ukuu.org.uk>, Viresh Kumar <viresh.kumar@...aro.org>, "cpufreq@...r.kernel.org" <cpufreq@...r.kernel.org>, Linux PM list <linux-pm@...r.kernel.org>, "Linux-Kernel@...r. Kernel. Org" <linux-kernel@...r.kernel.org>, "Richard W.M. Jones" <rjones@...hat.com> Subject: Re: intel_pstate divide error with v3.13-rc4-256-gb7000ad On Saturday, January 04, 2014 09:35:58 AM Paolo Bonzini wrote: > Il 03/01/2014 23:46, Rafael J. Wysocki ha scritto: > > Well, fixing the KVM bug is surely welcome. > > > > That said, adding checks to ensure that your assumptions are valid is rarely > > wrong, especially if they are done once per kernel boot. And the kernel only > > should panic if it cannot continue to run, which isn't the case here. > > I agree, but I suspect even your check is already late. Well, it's just a sanity check and it makes the problem go away for the reporter. > Your patch is welcome but perhaps it should have a WARN_ON too. It has been pulled in already, so the WARN_ON() can only be added via a separate patch now. Would you like to prepare that patch? Rafael -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists