lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200728123200.GF883641@kuha.fi.intel.com>
Date:   Tue, 28 Jul 2020 15:32:00 +0300
From:   Heikki Krogerus <heikki.krogerus@...ux.intel.com>
To:     Jürgen Stauber <j.stauber@...oud.com>
Cc:     gregkh@...uxfoundation.org, linux-usb@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: Re: High load from process irq/65-i2c-INT3 - kernel module tps6598x

Hi Jürgen,

I'm sorry about the late reply (vacation).

On Mon, Jul 20, 2020 at 06:31:04PM +0200, Jürgen Stauber wrote:
> Hi all,
> 
> I was made aware in the following launchpad bug report, that I should report
> the issue directly with the upstream maintainers:
> https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883511
> <https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883511>
> 
> As mentioned in the report, I experience high cpu load due to an interrupted
> irq/65-i2c-INT3 process. A short fix is to unload the kernel module tps6598x.
> 
> Please be lenient with me, since I’ve got no glue whether I’m doing this
> correctly.
> 
> In case you need more details/logs/information, please let me know.

There is one thing that you may be able to try. If you can enter the
BIOS menu, then you should be able to disable an option called
"UCMCx". Unfortunately I don't know the full path to that option in
the BIOS menu of the NUC, or is entering the BIOS menu possible in the
first place. It is also possible that there is no option "UCMCx" at
all.

Unfortunately I don't have access to NUC10 at the moment, but I'll try
get one.

Br,

-- 
heikki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ