From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from bsmtp4.bon.at ([195.3.86.186]:36980 "EHLO bsmtp.bon.at" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933314Ab1JDTgq (ORCPT ); Tue, 4 Oct 2011 15:36:46 -0400 Date: Tue, 4 Oct 2011 20:36:42 +0200 From: Clemens Buchacher To: Adrian Chadd Cc: Mohammed Shafi , linux-wireless@vger.kernel.org Subject: Re: ath9k: irq storm after suspend/resume Message-ID: <20111004183601.GA1395@ecki> (sfid-20111004_213650_222360_4D7B92E9) References: <14be9f3b-4c91-481d-9e52-f3119659fd59@email.android.com> <20110927214245.GA1416@ecki> <20111003084823.GA1521@ecki.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii In-Reply-To: Sender: linux-wireless-owner@vger.kernel.org List-ID: On Tue, Oct 04, 2011 at 03:58:09PM +0800, Adrian Chadd wrote: > > There's a function further down in the isr routine which checks > whether the NIC itself posted the interrupt (it checks > SYNC_CAUSE/ASYNC_CAUSE.) That should cut down the spam quite a > bit and only log the relevant entries for ath9k. If I do this no interrupts are logged at all. In previous traces SYNC_CAUSE became non-zero only because the debugging output delayed the interrupt handler enough to give the initialization code a chance to run. Clemens