lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 30 Apr 2008 15:38:24 +0200
From:	Gabor Gombas <gombasg@...aki.hu>
To:	Bernhard Walle <bwalle@...e.de>
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	linux-kernel@...r.kernel.org, Ingo Molnar <mingo@...e.hu>,
	Thomas Gleixner <tglx@...utronix.de>
Subject: Re: Solid freezes with 2.6.25

On Tue, Apr 29, 2008 at 05:54:19PM +0200, Bernhard Walle wrote:

> Hm ..., can you mail /proc/interrupts of the affected system? According
> to the HPET specification 

The Intel box:

           CPU0       CPU1       
  0:      27346      29145   IO-APIC-edge      timer
  1:        842        819   IO-APIC-edge      i8042
  4:          2          2   IO-APIC-edge    
  6:          0          3   IO-APIC-edge      floppy
  8:          2          3   IO-APIC-edge      rtc0
  9:          0          0   IO-APIC-fasteoi   acpi
 14:         36         36   IO-APIC-edge      ata_piix
 15:          0          0   IO-APIC-edge      ata_piix
 16:         71         71   IO-APIC-fasteoi   uhci_hcd:usb5, HDA Intel
 17:      49357      47537   IO-APIC-fasteoi   ata_piix
 18:          0          0   IO-APIC-fasteoi   uhci_hcd:usb4
 19:          0          0   IO-APIC-fasteoi   uhci_hcd:usb3
 21:          0          0   IO-APIC-fasteoi   rtl
 23:         28         29   IO-APIC-fasteoi   ehci_hcd:usb1, uhci_hcd:usb2
380:        332        338   PCI-MSI-edge      mobo
NMI:        645        573   Non-maskable interrupts
LOC:      58828      55631   Local timer interrupts
RES:      78518      83802   Rescheduling interrupts
CAL:        477        492   function call interrupts
TLB:       1079       1084   TLB shootdowns
TRM:          0          0   Thermal event interrupts
THR:          0          0   Threshold APIC interrupts
SPU:          0          0   Spurious interrupts
ERR:          0

The AMD box:

           CPU0       
  0:         36   IO-APIC-edge      timer
  1:          2   IO-APIC-edge      i8042
  3:          3   IO-APIC-edge    
  4:          2   IO-APIC-edge    
  6:          3   IO-APIC-edge      floppy
  7:          1   IO-APIC-edge      parport0
  8:          1   IO-APIC-edge      rtc0
  9:          0   IO-APIC-fasteoi   acpi
 14:         53   IO-APIC-edge      pata_amd
 15:         73   IO-APIC-edge      pata_amd
 17:          0   IO-APIC-fasteoi   sata_sil
 18:          3   IO-APIC-fasteoi   firewire_ohci
 19:          0   IO-APIC-fasteoi   saa7134[0], saa7134[0]
 20:        424   IO-APIC-fasteoi   ehci_hcd:usb2
 21:        481   IO-APIC-fasteoi   ohci_hcd:usb1
 22:      19744   IO-APIC-fasteoi   sata_nv, nvidia
 23:      13590   IO-APIC-fasteoi   sata_nv, NVidia CK804
283:          1   PCI-MSI-edge      marvel
NMI:          0   Non-maskable interrupts
LOC:      11801   Local timer interrupts
TRM:          0   Thermal event interrupts
THR:          0   Threshold APIC interrupts
SPU:          0   Spurious interrupts
ERR:          1

> Can you try that patch and see if the IRQ handler is really called
> repeatedly in that case?

Unfortunately I won't have time today and will be traveling till the end
of the week. I'll give it a shot next week.

Gabor

-- 
     ---------------------------------------------------------
     MTA SZTAKI Computer and Automation Research Institute
                Hungarian Academy of Sciences
     ---------------------------------------------------------
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ