lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 22 Dec 2014 16:06:02 +1100 From: Cyril Bur <cyrilbur@...il.com> To: linux-kernel@...r.kernel.org Cc: mpe@...erman.id.au, drjones@...hat.com, dzickus@...hat.com, akpm@...ux-foundation.org, mingo@...nel.org, uobergfe@...hat.com, chaiw.fnst@...fujitsu.com, cl@...u.com, fabf@...net.be, atomlin@...hat.com, benzh@...omium.org, Cyril Bur <cyrilbur@...il.com> Subject: [PATCH 0/2] Quieten softlockup detector on virtualised kernels When the hypervisor pauses a virtualised kernel the kernel will observe a jump in timebase, this can cause spurious messages from the softlockup detector. Whilst these messages are harmless, they are accompanied with a stack trace which causes undue concern and more problematically the stack trace in the guest has nothing to do with the observed problem and can only be misleading. Futhermore, on POWER8 this is completely avoidable with the introduction of the Virtual Time Base (VTB) register. Cyril Bur (2): Add another clock for use with the soft lockup watchdog. powerpc: add running_clock for powerpc to prevent spurious softlockup warnings arch/powerpc/kernel/time.c | 24 ++++++++++++++++++++++++ include/linux/sched.h | 1 + kernel/sched/clock.c | 14 ++++++++++++++ kernel/watchdog.c | 2 +- 4 files changed, 40 insertions(+), 1 deletion(-) -- 1.9.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists