lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 19 Jan 2009 22:32:24 -0700
From:	Shane Hathaway <shane@...hawaymix.org>
To:	Jeff Dike <jdike@...toit.com>
CC:	linux-kernel@...r.kernel.org,
	user-mode-linux-devel@...ts.sourceforge.net
Subject: Re: [Patch] UML: spurious interrupt freezes guest

Jeff Dike wrote:
> On Mon, Jan 19, 2009 at 08:53:25PM -0700, Shane Hathaway wrote:
>> A new instance of user mode linux that I created over the past couple of
>> days worked pretty well except that it had a habit of freezing after a
>> few minutes.  Every time it froze, the last message on the console was
>> either:
>>
>> spurious interrupt in ubd_handler, err = 4
> 
> What version and what's the workload?

I got the spurious interrupt with both Linux 2.6.28.1 and 2.6.27.12 as
guests.  The host runs 2.6.9-42.0.3.ELsmp.

I am putting OpenVPN and Asterisk inside the guest.  The guest is based
on Ubuntu 8.10.  The spurious interrupt happened more often when I
restricted the guest's RAM.  The processes in the guest normally consume
a total of about 20-24 MB of RAM.  I limited the guest's RAM to 48 MB
and gave it a 64 MB swap partition.  When I gave the guest only 32 MB,
the spurious interrupt seemed to happen more often.

The best way I found to trigger the spurious interrupt was to try to
"apt-get install" many packages at once.  The download would succeed,
but the guest would freeze partway through the install.

Shane
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ