From 86f6301c7def930083173d7a8e59f28a7308ac19 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=AA=20de=20Souza=20Pinto?= Date: Tue, 21 Nov 2023 18:18:51 +0100 Subject: [PATCH] Disable split lock detection MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit We have experienced some cases where Guests are generating split lock exceptions that are flooding the host kernel with traps causing a tremendous impact to system's performance, besides flooding log buffers with messages like the following: x86/split lock detection: #AC: qemu-system-x86/4185 took a split_lock trap at address: 0x699e4dc1 There are several discussions about whether split lock detection should be enabled or not. Since we cannot predict our workloads, let's disabled it to avoid these situations. Signed-off-by: RenĂª de Souza Pinto --- pkg/grub/rootfs.cfg | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/grub/rootfs.cfg b/pkg/grub/rootfs.cfg index e986583408..5b3ffecb51 100644 --- a/pkg/grub/rootfs.cfg +++ b/pkg/grub/rootfs.cfg @@ -162,7 +162,7 @@ function set_generic { set_global dom0 /boot/kernel set_global dom0_rootfs "root=$rootfs_root" - set_global dom0_cmdline "$linuxkit_cmdline $panic_timeout rfkill.default_state=0" + set_global dom0_cmdline "$linuxkit_cmdline $panic_timeout rfkill.default_state=0 split_lock_detect=off" } function set_x86_64 {