lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 6 Oct 2014 14:45:56 -0500 (CDT)
From:	Christoph Lameter <>
To:	David Lang <>
cc:	Thomas Gleixner <>,
	Richard Cochran <>,
Subject: Re: Why do we still have 32 bit counters? Interrupt counters overflow
 within 50 days

On Mon, 6 Oct 2014, David Lang wrote:

> No, tools recognize that things happen (wraps, reboots, etc) and have some
> threshold that they say "if this value changes more than the threshold,
> something happened and it's not valid to use this delta"
> This has been the case for decades. If you have a monitoring tool that does
> not account for this sort of thing, you have an immature tool.

Well maybe put those statement somewhere to find for those writing
diagnostics tools that use the counters.

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists