[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090307133448.GB13663@hash.localnet>
Date: Sat, 7 Mar 2009 08:34:48 -0500
From: Bob Copeland <me@...copeland.com>
To: Sitsofe Wheeler <sitsofe@...oo.com>
Cc: Jiri Slaby <jirislaby@...il.com>,
Nick Kossifidis <mickflemm@...il.com>,
Frederic Weisbecker <fweisbec@...il.com>,
linux-kernel@...r.kernel.org, linux-wireless@...r.kernel.org,
ath5k-devel@...ema.h4ckr.net,
"Luis R. Rodriguez" <lrodriguez@...eros.com>
Subject: Re: [TIP] BUG kmalloc-4096: Poison overwritten (ath5k_rx_skb_alloc)
On Sat, Mar 07, 2009 at 08:04:22AM +0000, Sitsofe Wheeler wrote:
> On Fri, Mar 06, 2009 at 11:47:32PM -0500, Bob Copeland wrote:
> > I saw _get_tsf64 in the trace; were you using ad-hoc/ibss mode, or
> > is that just a weird artifact?
>
> Sounds like a werid artifact - I only (intentionally) connect to access
> points.
Ok thanks, nevermind, that is just ath5k_extend_tsf being inlined.
--
Bob Copeland %% www.bobcopeland.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists