lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <56E3776B.9030200@sysnux.pf>
Date:	Fri, 11 Mar 2016 15:56:59 -1000
From:	Jean-Denis Girard <jd.girard@...nux.pf>
To:	Sebastian Andrzej Siewior <sebastian@...akpoint.cc>
Cc:	linux-kernel@...r.kernel.org, linux-rt-users@...r.kernel.org
Subject: Re: [ANNOUNCE] v4.4.4-rt11

Hi,

Le 11/03/2016 07:14, Sebastian Andrzej Siewior a écrit :
> This looks promising. Can you check if IRQ 16 is used by another
> peripherals? While we need get rid fo the warning I am curious if it
> works on boards which chare the timer with UART or something.

Here are the interrupts, I hope this is what you want:
jdg@...etta:~$ cat /proc/interrupts
           CPU0
 16:     145825  atmel-aic   1 Level     at91_rtc, ttyS0
 17:   45661872  atmel-aic  17 Level     tc_clkevt
 18:      72014  atmel-aic  20 Level     at_hdmac
 19:          0  atmel-aic  21 Level     at_hdmac
 23:    2541144  atmel-aic  12 Level     f0008000.mmc
 26:          0  atmel-aic  10 Level     f8014000.i2c
 27:          0  atmel-aic  19 Level     at91_adc
 28:          0  atmel-aic  14 Level     f0004000.spi
 31:          1  atmel-aic  22 Level     ehci_hcd:usb1, ohci_hcd:usb2
Err:          0


The Arietta has been working fine for a couple of days with this kernel:
jdg@...etta:~$ uname -r
4.4.4-rt11
jdg@...etta:~$ uptime
 14:30:06 up 2 days,  4:04,  1 user,  load average: 0.00, 0.02, 0.05


Thanks,
-- 
Jean-Denis Girard

SysNux                Systèmes   Linux   en   Polynésie   française
http://www.sysnux.pf/ Tél: +689 40.50.10.40 / GSM: +689 87.79.75.27

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ