lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c1ec31ea-494b-5d3e-3c0c-c3d8bb1a6c9c@yandex-team.ru>
Date:   Thu, 4 Jun 2020 12:43:52 +0300
From:   Konstantin Khlebnikov <khlebnikov@...dex-team.ru>
To:     Karel Zak <kzak@...hat.com>
Cc:     util-linux@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH util-linux] dmesg: adjust timestamps according to
 suspended time

On 04/06/2020 12.30, Karel Zak wrote:
> On Mon, Jun 01, 2020 at 10:21:34PM +0300, Konstantin Khlebnikov wrote:
>> Timestamps in kernel log comes from monotonic clocksource which does not
>> tick when system suspended. Suspended time easily sums into hours and days
>> rendering human readable timestamps in dmesg useless.
>>
>> Adjusting timestamps accouring to current delta between boottime and
>> monotonic clocksources produces accurate timestamps for messages printed
>> since last resume. Which are supposed to be most interesting.
> 
> It's definitely better than the current broken timestamps, but the real
> and final solution is to have exact information about system suspends.
> 
> It would be enough to maintain in kernel memory a simple log with
>     <bootime> <monotonic> <state_change>
> and export this info by /proc/suspendlog, after that we can all
> re-count /dev/kmsg timestamps to something useful.

Boottime or real time could be simply printed into kernel log at
suspend and resume. So demsg could detect current offset while reading.

But for older kernel dmesg still needs guessing like this.

> 
>    Karel
> 
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ