lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1KqUu7-0005vQ-7O@amazonia.comcast.net>
Date:	Thu, 16 Oct 2008 08:36:47 -0700
From:	Rick Bronson <rick@....org>
To:	linux-kernel@...r.kernel.org
Subject: RE: OMAP3430 spurious interrupts

Hi,

  I'm getting some info on the spurious interrupt that's happening
upon startup about once in 10-15 reboots.  By the way, I'm using
2.6.26-omap1 from the latest Open Embedded with Lauri's spurious
patch.  Here's what I'm seeing.  There is a barrage of interrupts on,
in one scenario A) from the Display Subsystem Module and in another
scenario B) I2C Module One.  This barrage leads up to
omap2_gp_timer_interrupt() happening and then in case A) an immediate
spurious GPTIMER interrupt.  In case B) a spurious GPTIMER interrupt
7.8ms later.  7.8ms is the time the GPTIMER is set for (128 Hz).

  I think the first thing to do is find out how to prevent the
spurious interrupt from happening.  The next thing to do is to solve
the barrage of interrupts upon startup.

  The question I have for you is this: Looking at page 1308 of 3446 of
the OMAP3 pdf "Spurious Interrupt Handling", it's not clear to me,
from a programming perspective, how to check if (when changing the
registers mentioned) we are encountering this condition.  If we
can't test for this condition, how can it be avoided?

  Thanks for your help.

  Rick Bronson
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ