Scott Wood wrote: > Rune Torgersen wrote: >> Scott Wood wrote: >>> Try calling irq_set_chip_and_handler() with handle_level_irq, rather >>> than irq_set_chip(). The -rt patch doesn't seem to have threadified >>> the __do_IRQ() path. >> >> The demuxer is setting itself up with set_irq_chained handler(), any >> pointers on how to change to irq_set_chip_and_handler()? > > No, I mean the call to set_irq_chip() in pci_pic_host_map() where it > sets up the IRQs it manages, not the cascade IRQ itself. Thanks!!! That fixed that particular problem. Of course I then ran headfirst into another one.... This one seems to happen when I attempt to read flash through an mtd driver. Oops: Exception in kernel mode, sig: 5 [#1] PREEMPT Innovative Systems ApMax Modules linked in: NIP: c005e780 LR: c005e758 CTR: 00000000 REGS: ef2c1d20 TRAP: 0700 Not tainted (2.6.25.4-rt1) MSR: 00029032 <EE,ME,IR,DR> CR: 48222482 XER: 20000000 TASK = ef2a1a90[98] 'S21initenv' THREAD: ef2c0000 GPR00: 3ffcf581 ef2c1dd0 ef2a1a90 00000000 c02cae8c 00000002 00000001 3ffcf580 GPR08: 00000000 c0370000 00000000 c037000c 28222484 1009ecc0 00000000 100a5838 GPR16: 10090000 10090000 00000000 00000000 10090000 ef2a7100 3ee38385 100955ac GPR24: 00000000 ef2a4ef0 00000000 c27dc700 c27dcb80 00000003 ef359040 c0334f88 NIP [c005e780] do_wp_page+0x650/0xc2c LR [c005e758] do_wp_page+0x628/0xc2c Call Trace: [ef2c1dd0] [c005e758] do_wp_page+0x628/0xc2c (unreliable) [ef2c1e10] [c0012420] do_page_fault+0x338/0x4b4 [ef2c1f40] [c0010120] handle_page_fault+0xc/0x80 --- Exception: 301 at 0x100322e0 LR = 0x100322dc Instruction dump: 409e0594 4810f2e1 3d20c035 1fa3000f 8129b140 3bbd0003 57ab103a 7c0b482e 7d6b4a14 540007fa 30e0ffff 7cc70110 <0f060000> 3d20c035 3d40c035 8129b480 Oops: Exception in kernel mode, sig: 5 [#2] PREEMPT Innovative Systems ApMax Modules linked in: NIP: c005db0c LR: c005dae4 CTR: 00000000 REGS: ef29fd00 TRAP: 0700 Tainted: G D (2.6.25.4-rt1) MSR: 00029032 <EE,ME,IR,DR> CR: 48002482 XER: 20000000 TASK = ef26e070[102] 'sed' THREAD: ef29e000 GPR00: 3ee2d581 ef29fdb0 ef26e070 00000000 c02cae8c 00000000 00000001 3ee2d580 GPR08: 00000000 c0370000 00000000 c037000c 00000722 1009ecc0 4802dfa4 4802d878 GPR16: 0014f73c 00000000 00000000 00000003 4802cce0 00000000 00000001 02000000 GPR24: ef3592e0 0ffece1c ef3592e0 ef2a50fc ef2a4df4 00000003 c27dcfe0 c27ff4c0 NIP [c005db0c] __do_fault+0x1e0/0x804 LR [c005dae4] __do_fault+0x1b8/0x804 Call Trace: [ef29fdb0] [c005dae4] __do_fault+0x1b8/0x804 (unreliable) [ef29fe10] [c0012420] do_page_fault+0x338/0x4b4 [ef29ff40] [c0010120] handle_page_fault+0xc/0x80 --- Exception: 301 at 0x48017b10 LR = 0x48007ac8 Instruction dump: 409e060c 4810ff55 3d20c035 1fa3000f 8129b140 3bbd0003 57ab103a 7c0b482e 7d6b4a14 540007fa 30e0ffff 7cc70110 <0f060000> 3d20c035 3d40c035 8129b480 -- To unsubscribe from this list: send the line "unsubscribe linux-ide" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html