softlockup: Stop spurious softlockup messages due to overflow
commit7b6c1753bc0ee455adf4f4ed489a367c7dc7c432
authorColin Ian King <colin.king@canonical.com>
Fri, 19 Mar 2010 10:28:02 +0000 (19 10:28 +0000)
committerGreg Kroah-Hartman <gregkh@suse.de>
Thu, 1 Apr 2010 22:58:47 +0000 (1 15:58 -0700)
tree3d9b9b3f56bc8b36f2b081541522d7c920ee5e30
parent893b328f07c17aa84f562fc5566eb524bd76188e
softlockup: Stop spurious softlockup messages due to overflow

commit 8c2eb4805d422bdbf60ba00ff233c794d23c3c00 upstream.

Ensure additions on touch_ts do not overflow.  This can occur
when the top 32 bits of the TSC reach 0xffffffff causing
additions to touch_ts to overflow and this in turn generates
spurious softlockup warnings.

Signed-off-by: Colin Ian King <colin.king@canonical.com>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Eric Dumazet <eric.dumazet@gmail.com>
LKML-Reference: <1268994482.1798.6.camel@lenovo>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
kernel/softlockup.c