softlockup: Stop spurious softlockup messages due to overflow
authorColin Ian King <colin.king@canonical.com>
Fri, 19 Mar 2010 10:28:02 +0000 (10:28 +0000)
committerIngo Molnar <mingo@elte.hu>
Sun, 21 Mar 2010 18:30:13 +0000 (19:30 +0100)
commit8c2eb4805d422bdbf60ba00ff233c794d23c3c00
treeadd5be0a86cb9453d7d8c6d08847013137a98806
parent0cff810f54b3b52075c27f7a7021d5b195264b6c
softlockup: Stop spurious softlockup messages due to overflow

Ensure additions on touch_ts do not overflow.  This can occur
when the top 32 bits of the TSC reach 0xffffffff causing
additions to touch_ts to overflow and this in turn generates
spurious softlockup warnings.

Signed-off-by: Colin Ian King <colin.king@canonical.com>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Eric Dumazet <eric.dumazet@gmail.com>
Cc: <stable@kernel.org>
LKML-Reference: <1268994482.1798.6.camel@lenovo>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
kernel/softlockup.c