lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 21 Feb 2009 18:19:13 +0100
From:	Frederic Weisbecker <fweisbec@...il.com>
To:	Thomas Meyer <thomas@...3r.de>
Cc:	Thomas Gleixner <tglx@...utronix.de>,
	Thomas Gleixner <tglx@...x.de>,
	LKML <linux-kernel@...r.kernel.org>,
	rt-users <linux-rt-users@...r.kernel.org>,
	Ingo Molnar <mingo@...e.hu>,
	Steven Rostedt <rostedt@...dmis.org>,
	Peter Zijlstra <peterz@...radead.org>,
	Carsten Emde <ce@...g.ch>,
	Clark Williams <williams@...hat.com>,
	ath5k-devel@...ts.ath5k.org, linux-wireless@...r.kernel.org
Subject: Re: [Announce] 2.6.29-rc4-rt2

On Sat, Feb 21, 2009 at 06:04:22PM +0100, Thomas Meyer wrote:
> Am Donnerstag, den 12.02.2009, 23:56 +0100 schrieb Thomas Gleixner:
> > We are pleased to announce the first update to our new preempt-rt
> > series. It fixes the reported bugs and some more.
> > 
> > Download locations:
> > 
> >    http://rt.et.redhat.com/download/
> >    http://www.kernel.org/pub/linux/kernel/projects/rt/
> >  
> > Information on the RT patch can be found at:
> > 
> >   http://rt.wiki.kernel.org/index.php/Main_Page
> > 
> > to build the 2.6.29-rc4-rt2 tree, the following patches should be
> > applied:
> > 
> >   http://www.kernel.org/pub/linux/kernel/v2.6/testing/linux-2.6.29-rc4.tar.bz2
> >   http://www.kernel.org/pub/linux/kernel/projects/rt/patch-2.6.29-rc4-rt2.bz2
> > 
> > The broken out patches are also available at the same download
> > locations.
> > 
> > Enjoy !
> > 
> >       Thomas, Ingo
> > --
> 
> Hi,
> 
> I got this warning, that i never saw before with a non rt-preempt
> kernel. But maybe it's just coincidence...
> 
> [22652.437889] ------------[ cut here ]------------
> [22652.437898] WARNING: at net/mac80211/rx.c:2234 __ieee80211_rx+0x85/0x53e [mac80211]()
> [22652.437904] Hardware name: MacBookPro1,1
> [22652.437908] Modules linked in: ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables nf_conntrack_ftp ip6t_REJECT xt_tcpudp nf_conntrack_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables x_tables ath5k mac80211 cfg80211 video [last unloaded: scsi_wait_scan]
> [22652.437952] Pid: 23, comm: sirq-tasklet/1 Tainted: G        W  2.6.29-rc4-rt2-tip #57
> [22652.437958] Call Trace:
> [22652.437970]  [<c0451e50>] warn_slowpath+0x8a/0xd3
> [22652.437981]  [<c0665165>] ? plist_add+0x73/0x8e
> [22652.437990]  [<c0447d8e>] ? enqueue_pushable_task+0x62/0x79
> [22652.437999]  [<c04480f1>] ? enqueue_task_rt+0x203/0x247
> [22652.438029]  [<f90e78bf>] __ieee80211_rx+0x85/0x53e [mac80211]
> [22652.438039]  [<c09aafaa>] ? __spin_unlock_irq+0x1e/0x44
> [22652.438057]  [<f92e14af>] ath5k_tasklet_rx+0x406/0x457 [ath5k]
> [22652.438067]  [<c045787e>] __tasklet_action+0x8c/0x100
> [22652.438075]  [<c04579d8>] tasklet_action+0x67/0x7f
> [22652.438083]  [<c04575e3>] ksoftirqd+0x12d/0x223
> [22652.438091]  [<c04574b6>] ? ksoftirqd+0x0/0x223
> [22652.438099]  [<c0467022>] kthread+0x4a/0x82
> [22652.438106]  [<c0466fd8>] ? kthread+0x0/0x82
> [22652.438114]  [<c0420b67>] kernel_thread_helper+0x7/0x10
> [22652.438120] ---[ end trace a7919e7f17c0a727 ]---
> 


Hi,

It's an known issue on ath5k (or 80211):
http://patchwork.kernel.org/patch/1169/

So not preempt-rt related. Perhaps it has been fixed in -rc5.

 
> --
> To unsubscribe from this list: send the line "unsubscribe linux-rt-users" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ