Created attachment 526850 [details] Screen after system is crashed Description of problem: As soon as wifi try to connect to AP, system crash. Version-Release number of selected component (if applicable): 3.1.0-0.rc8.git0.1.fc16.i686.PAE wpa_supplicant-0.7.3-11.fc16.i686 How reproducible: 100% Steps to Reproduce: 1. Prepare wifi connection (WPA2-Personal) in NetworkManager 2. Up connection 3. Actual results: System crash Expected results: System work Additional info: HW: HP EliteBook 2540p (WK304EA) Crash is reproduced by command line: wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf Of cource, WPA2-Personal profile is prepared [root@ua-dudn00000 ~]# cat /etc/wpa_supplicant/wpa_supplicant.conf ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=wheel # WPA2-Personal ############### network={ ssid="yyyyyyyy" #psk="xxxxxxxx" sk=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP priority=1 } [root@ua-dudn00000 ~]# ethtool -i wlan0 driver: iwlagn version: 3.1.0-0.rc8.git0.1.fc16.i686.PA firmware-version: 9.221.4.1 build 25532 bus-info: 0000:43:00.0 supports-statistics: no supports-test: no supports-eeprom-access: no supports-register-dump: no [root@ua-dudn00000 ~]# lspci 00:00.0 Host bridge: Intel Corporation Core Processor DRAM Controller (rev 02) 00:02.0 VGA compatible controller: Intel Corporation Core Processor Integrated Graphics Controller (rev 02) 00:16.0 Communication controller: Intel Corporation 5 Series/3400 Series Chipset HECI Controller (rev 06) 00:16.3 Serial controller: Intel Corporation 5 Series/3400 Series Chipset KT Controller (rev 06) 00:19.0 Ethernet controller: Intel Corporation 82577LM Gigabit Network Connection (rev 05) 00:1a.0 USB Controller: Intel Corporation 5 Series/3400 Series Chipset USB2 Enhanced Host Controller (rev 05) 00:1b.0 Audio device: Intel Corporation 5 Series/3400 Series Chipset High Definition Audio (rev 05) 00:1c.0 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 1 (rev 05) 00:1c.1 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 2 (rev 05) 00:1c.3 PCI bridge: Intel Corporation 5 Series/3400 Series Chipset PCI Express Root Port 4 (rev 05) 00:1d.0 USB Controller: Intel Corporation 5 Series/3400 Series Chipset USB2 Enhanced Host Controller (rev 05) 00:1e.0 PCI bridge: Intel Corporation 82801 Mobile PCI Bridge (rev a5) 00:1f.0 ISA bridge: Intel Corporation Mobile 5 Series Chipset LPC Interface Controller (rev 05) 00:1f.2 SATA controller: Intel Corporation 5 Series/3400 Series Chipset 6 port SATA AHCI Controller (rev 05) 00:1f.6 Signal processing controller: Intel Corporation 5 Series/3400 Series Chipset Thermal Subsystem (rev 05) 43:00.0 Network controller: Intel Corporation Centrino Advanced-N 6200 (rev 35) 44:06.0 FireWire (IEEE 1394): Ricoh Co Ltd R5C832 IEEE 1394 Controller (rev 06) 44:06.1 SD Host controller: Ricoh Co Ltd R5C822 SD/SDIO/MMC/MS/MSPro Host Adapter (rev 25) 44:06.2 CardBus bridge: Ricoh Co Ltd RL5c476 II (rev bb) ff:00.0 Host bridge: Intel Corporation Core Processor QuickPath Architecture Generic Non-core Registers (rev 02) ff:00.1 Host bridge: Intel Corporation Core Processor QuickPath Architecture System Address Decoder (rev 02) ff:02.0 Host bridge: Intel Corporation Core Processor QPI Link 0 (rev 02) ff:02.1 Host bridge: Intel Corporation Core Processor QPI Physical 0 (rev 02) ff:02.2 Host bridge: Intel Corporation Core Processor Reserved (rev 02) ff:02.3 Host bridge: Intel Corporation Core Processor Reserved (rev 02) ======================================================================= 1. Under F15 wifi work OK. 2. System do not crash with different wifi device, as exemple with: Bus 002 Device 003: ID 0b05:1723 ASUSTek Computer, Inc. WL-167G v2 802.11g Adapter [Ralink RT73]
Call trace photo does not show functions form iwlagn driver, so it's impossible to tell where the bug is. Could you try kernel-debug and see if it print something different at crash?
Also: [root@ua-dudn00000 wpa_supplicant]# /usr/sbin/wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant.conf.homedesk -iwlan0 -Dwext -dd Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' -> '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel' Line: 7 - start of a new network block ssid - hexdump_ascii(len=8): 68 6f 6d 65 64 65 73 6b homedesk PSK - hexdump(len=32): [REMOVED] proto: 0x2 key_mgmt: 0x2 pairwise: 0x10 group: 0x10 priority=1 (0x1) Priority group 1 id=0 ssid='homedesk' WEXT: cfg80211-based driver detected SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 Own MAC address: 00:23:14:08:c6:40 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec WPS: UUID based on MAC address - hexdump(len=16): 81 5b 04 05 53 d3 53 e2 8f 2f 89 8a eb 56 fe 13 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized ctrl_interface_group=10 (from group name 'wheel') Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 5 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1698 bytes of scan results (5 BSSes) BSS: Start scan result update 1 BSS: Add new id 0 BSSID 00:18:f8:ae:50:a0 SSID 'homedesk' BSS: Add new id 1 BSSID 00:17:9a:22:f1:26 SSID 'dlinkhome' BSS: Add new id 2 BSSID 00:24:01:ba:4d:ff SSID 'dlink' BSS: Add new id 3 BSSID 00:27:19:d5:ee:74 SSID 'benedik' BSS: Add new id 4 BSSID d8:5d:4c:ee:85:66 SSID 'VLAD' New scan results available Selecting BSS from priority group 1 Try to find WPA-enabled AP 0: 00:18:f8:ae:50:a0 ssid='homedesk' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:18:f8:ae:50:a0 ssid='homedesk' Trying to associate with 00:18:f8:ae:50:a0 (SSID='homedesk' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 20 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1088.940841] Oops: 0000 [#1] SMP Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1088.989521] Process kworker/u:5 (pid: 71, ti=f1b9c000 task=f1a29920 task.ti=f1b9c000) Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1088.993352] Stack: Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1089.009070] Call Trace: Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1089.090207] Code: 24 04 1c f6 c5 f8 8b 55 d4 8b 82 9c 05 00 00 e9 90 fe ff ff 8b 55 d8 8b 02 85 c0 74 1a 83 38 02 75 15 8b 4d d4 8b 51 0c 8b 52 24 <8b> 52 04 85 d2 74 05 e8 52 dd 67 00 83 c4 4c 89 d8 5b 5e 5f 5d Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1089.098364] EIP: [<f8c453ba>] iwlagn_commit_rxon+0x772/0x799 [iwlagn] SS:ESP 0068:f1b9dc60 Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1089.102491] CR2: 0000000000000004 RX EAPOL from 00:18:f8:ae:50:a0 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 d1 a0 59 41 86 d6 7e a8 03 a6 73 15 55 33 ae 7b b4 77 e9 b8 42 7c 69 c0 d2 b4 f1 73 95 d7 41 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RX EAPOL from 00:18:f8:ae:50:a0 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 d8 00 71 e8 de 39 84 f6 9e ac ce 8b 34 02 5d d3 ef 68 35 cb b2 a6 33 91 e3 38 0c 3c 81 b1 79 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RX EAPOL from 00:18:f8:ae:50:a0 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 76 a0 65 f5 d7 03 d6 29 94 c7 91 74 a5 22 9d c0 44 d8 71 e1 d7 03 0d af 94 fe 20 4e 3c 6f 23 fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RX EAPOL from 00:18:f8:ae:50:a0 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 cc e7 32 d1 5a 47 56 8e 56 53 6b 23 80 8d 20 a6 c9 43 cd eb 93 eb 8a f7 b7 6b b9 2b 57 0d cf af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame ================================================================== next terminal screen ================================================================== [root@ua-dudn00000 log]# Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1088.940841] Oops: 0000 [#1] SMP Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1088.989521] Process kworker/u:5 (pid: 71, ti=f1b9c000 task=f1a29920 task.ti=f1b9c000) Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1088.993352] Stack: Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1089.009070] Call Trace: Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1089.090207] Code: 24 04 1c f6 c5 f8 8b 55 d4 8b 82 9c 05 00 00 e9 90 fe ff ff 8b 55 d8 8b 02 85 c0 74 1a 83 38 02 75 15 8b 4d d4 8b 51 0c 8b 52 24 <8b> 52 04 85 d2 74 05 e8 52 dd 67 00 83 c4 4c 89 d8 5b 5e 5f 5d Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1089.098364] EIP: [<f8c453ba>] iwlagn_commit_rxon+0x772/0x799 [iwlagn] SS:ESP 0068:f1b9dc60 Message from syslogd@localhost at Oct 9 11:28:00 ... kernel:[ 1089.102491] CR2: 0000000000000004
OK, Debug Kernel... Last login: Sun Oct 9 11:46:59 2011 from homedesk [root@ua-dudn00000 ~]# /usr/sbin/wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant.conf.homedesk -iwlan0 -Dwext -dd Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' -> '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel' Line: 7 - start of a new network block ssid - hexdump_ascii(len=8): 68 6f 6d 65 64 65 73 6b homedesk PSK - hexdump(len=32): [REMOVED] proto: 0x2 key_mgmt: 0x2 pairwise: 0x10 group: 0x10 priority=1 (0x1) Priority group 1 id=0 ssid='homedesk' WEXT: cfg80211-based driver detected SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 Own MAC address: 00:23:14:08:c6:40 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec WPS: UUID based on MAC address - hexdump(len=16): 81 5b 04 05 53 d3 53 e2 8f 2f 89 8a eb 56 fe 13 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized ctrl_interface_group=10 (from group name 'wheel') Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 5 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 2792 bytes of scan results (7 BSSes) BSS: Start scan result update 1 BSS: Add new id 0 BSSID 00:18:f8:ae:50:a0 SSID 'homedesk' BSS: Add new id 1 BSSID 94:0c:6d:a2:ca:10 SSID 'Mag' BSS: Add new id 2 BSSID 00:18:e7:fa:ef:ed SSID 'IOE_HOME' BSS: Add new id 3 BSSID 00:27:19:d5:ee:74 SSID 'benedik' BSS: Add new id 4 BSSID 00:17:9a:22:f1:26 SSID 'dlinkhome' BSS: Add new id 5 BSSID d8:5d:4c:ee:85:66 SSID 'VLAD' BSS: Add new id 6 BSSID 00:21:29:99:6c:02 SSID '' New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 Selecting BSS from priority group 1 Try to find WPA-enabled AP 0: 00:18:f8:ae:50:a0 ssid='homedesk' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:18:f8:ae:50:a0 ssid='homedesk' Trying to associate with 00:18:f8:ae:50:a0 (SSID='homedesk' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 20 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 ============================================================= Fifferent terminal screen ============================================================= Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.413834] Oops: 0000 [#1] SMP Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.416016] Process kworker/u:5 (pid: 72, ti=f63a0000 task=f6394110 task.ti=f63a0000) Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.416127] Stack: Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.416677] Call Trace: Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.457774] Code: 24 04 a0 22 da f8 8b 55 d4 8b 82 4c 06 00 00 e9 90 fe ff ff 8b 55 d8 8b 02 85 c0 74 1a 83 38 02 75 15 8b 4d d4 8b 51 0c 8b 52 24 <8b> 52 04 85 d2 74 05 e8 9c e0 f3 ff 83 c4 4c 89 d8 5b 5e 5f 5d Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.465926] EIP: [<f8d83afc>] iwlagn_commit_rxon+0x79b/0x7c2 [iwlagn] SS:ESP 0068:f63a1c1c Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.469858] CR2: 0000000000000004 Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.486753] Oops: 0000 [#2] SMP Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.516438] Process kworker/u:5 (pid: 72, ti=f63a0000 task=f6394110 task.ti=f63a0000) Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.518410] Stack: Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.526765] Call Trace: Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.527053] Code: 85 00 c2 87 c0 89 d8 c1 e6 02 29 f2 e8 fd 17 fe ff 81 4b 0c 00 00 00 04 5b 5e 5d c3 55 89 e5 3e 8d 74 26 00 8b 80 58 02 00 00 5d <8b> 40 fc c3 55 89 e5 3e 8d 74 26 00 31 c0 5d c3 55 89 e5 57 56 Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.527069] EIP: [<c04664cb>] kthread_data+0xf/0x13 SS:ESP 0068:f63a19e8 Message from syslogd@localhost at Oct 9 11:47:58 ... kernel:[ 127.527072] CR2: 00000000fffffffc ==== I do not know where Debug kernel save full diagnostic in text form or have I can to save it.
Hi! I have the same problen on netbook Asus EeePC 1005HA (wireless adapter Intel 3150 ABG, iwlagn, i2400). When i try authenticate on accesspoint D-Link Dir-300 , kernel is crashed.
Installed Fedora16 Beta with latest updates. Fedora-15 works fine.
(In reply to comment #3) > I do not know where Debug kernel save full diagnostic in text form or have I > can to save it. If kernel hungs it does not save any text, but you can configure kdump to make memory dump after crash. But perhaps easiest way would be: 1) switch to virtual terminal (Alt+Ctr+F2), 2) disable rsyslogd "/etc/init.d/rsyslogd stop" 3) reproduce problem with wpa_supplicant 4) take a photo, this should show proper call trace.
Created attachment 527391 [details] It is serie of screens (rsyslog is disabled)
Picture 3 is interesting. Other photos seems to show other bug related with cpu_idle(). We have null pointer dereference, priv->cfg->ht_params can be NULL. (gdb) l *(iwlagn_commit_rxon+0x772) 0x1e416 is in iwlagn_commit_rxon (drivers/net/wireless/iwlwifi/iwl-agn-rxon.c:299). 294 IWL_ERR(priv, "Error sending TX power (%d)\n", ret); 295 return ret; 296 } 297 298 if ((ctx->vif && ctx->vif->type == NL80211_IFTYPE_STATION) && 299 priv->cfg->ht_params->smps_mode) 300 ieee80211_request_smps(ctx->vif, 301 priv->cfg->ht_params->smps_mode); 302 303 return 0;
Fix was posted: http://marc.info/?l=linux-wireless&m=131840748927629&w=2
>> Fix was posted: Can anybody provide i686.PAE rpm packet?
Here is build: http://koji.fedoraproject.org/koji/taskinfo?taskID=3425387
Patch is used http://marc.info/?l=linux-wireless&m=131840748927629&w=2 for 3.1.0-0.rc9.git0.0.fc16.i686.PAE Result => SUCCESS, wlan0 is authirized, IP address by DHCP is received. I think, bug is fixed... =====================>DETAIL<============================================ [root@ua-dudn00000 ~]# wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant/wpa_supplicant.conf.homedesk -dd Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' -> '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf.homedesk' ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel' Line: 7 - start of a new network block ssid - hexdump_ascii(len=8): 68 6f 6d 65 64 65 73 6b homedesk PSK - hexdump(len=32): [REMOVED] proto: 0x2 key_mgmt: 0x2 pairwise: 0x10 group: 0x10 priority=1 (0x1) Priority group 1 id=0 ssid='homedesk' WEXT: cfg80211-based driver detected SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 Own MAC address: 00:23:14:08:c6:40 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec WPS: UUID based on MAC address - hexdump(len=16): 81 5b 04 05 53 d3 53 e2 8f 2f 89 8a eb 56 fe 13 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized ctrl_interface_group=10 (from group name 'wheel') Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 5 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 2980 bytes of scan results (6 BSSes) BSS: Start scan result update 1 BSS: Add new id 0 BSSID 00:18:f8:ae:50:a0 SSID 'homedesk' BSS: Add new id 1 BSSID 94:0c:6d:a2:ca:10 SSID 'Mag' BSS: Add new id 2 BSSID 1c:af:f7:14:76:1e SSID 'DOM_dom' BSS: Add new id 3 BSSID 00:18:e7:fa:ef:ed SSID 'IOE_HOME' BSS: Add new id 4 BSSID b0:48:7a:a2:72:96 SSID 'Vik' BSS: Add new id 5 BSSID 00:21:29:99:6c:02 SSID '' New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=7 WPS: attr type=0x1023 len=9 WPS: attr type=0x1024 len=3 WPS: attr type=0x1042 len=3 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x103c len=1 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=7 WPS: attr type=0x1023 len=9 WPS: attr type=0x1024 len=3 WPS: attr type=0x1042 len=3 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x103c len=1 Selecting BSS from priority group 1 Try to find WPA-enabled AP 0: 00:18:f8:ae:50:a0 ssid='homedesk' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:18:f8:ae:50:a0 ssid='homedesk' Trying to associate with 00:18:f8:ae:50:a0 (SSID='homedesk' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 20 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=33 AssocResp IE wireless event - hexdump(len=25): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c dd 07 00 0c 43 01 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:f8:ae:50:a0 Association info event resp_ies - hexdump(len=25): 01 04 82 84 8b 96 32 08 8c 12 98 24 b0 48 60 6c dd 07 00 0c 43 01 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:18:f8:ae:50:a0 No keys have been configured - skip key clearing Associated with 00:18:f8:ae:50:a0 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from 00:18:f8:ae:50:a0 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 33 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 33 key_nonce - hexdump(len=32): 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 33 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:18:f8:ae:50:a0 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): c1 17 41 ca f5 af 93 b6 b8 16 48 a4 dd 47 0a 8e ee 0e 43 52 ce 9b 04 77 bc 83 d6 49 74 28 2f db WPA: PTK derivation - A1=00:23:14:08:c6:40 A2=00:18:f8:ae:50:a0 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 33 c1 17 41 ca f5 af 93 b6 b8 16 48 a4 dd 47 0a 8e ee 0e 43 52 ce 9b 04 77 bc 83 d6 49 74 28 2f db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f da 4e 99 63 59 97 f9 a5 c7 90 e2 ae 93 20 ae 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from 00:18:f8:ae:50:a0 RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 34 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 65 86 2c 91 9d 81 ed 8b 04 a3 5e 1f 0d 68 cf e6 00 38 6e 7e b2 5f 4e 79 a5 b6 ec 6f e4 f8 08 74 b4 d8 2c 36 36 67 f0 58 af bb 52 d4 08 dd 25 7c b8 60 a7 d2 8c 0c 0b bb a0 21 e3 98 af 61 b8 01 64 8e f3 44 12 e4 78 b2 bf 1f IEEE 802.1X RX: version=1 type=3 length=151 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 34 key_nonce - hexdump(len=32): 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 65 86 2c 91 9d 81 ed 8b 04 a3 5e 1f 0d 68 cf e6 WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 34 4a 91 be d9 2a 6a 2d 8d 7b ba 05 9a d7 cd ae 4c 12 0f 0a 23 b8 1e 78 ca 20 fb f5 86 ab f1 c4 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 65 86 2c 91 9d 81 ed 8b 04 a3 5e 1f 0d 68 cf e6 00 38 6e 7e b2 5f 4e 79 a5 b6 ec 6f e4 f8 08 74 b4 d8 2c 36 36 67 f0 58 af bb 52 d4 08 dd 25 7c b8 60 a7 d2 8c 0c 0b bb a0 21 e3 98 af 61 b8 01 64 8e f3 44 12 e4 78 b2 bf 1f RSN: encrypted key data - hexdump(len=56): 6e 7e b2 5f 4e 79 a5 b6 ec 6f e4 f8 08 74 b4 d8 2c 36 36 67 f0 58 af bb 52 d4 08 dd 25 7c b8 60 a7 d2 8c 0c 0b bb a0 21 e3 98 af 61 b8 01 64 8e f3 44 12 e4 78 b2 bf 1f WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:18:f8:ae:50:a0 (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 4e d1 86 99 4e ac 2e 8d 1c d8 58 65 69 7b 1e 0d 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5e 36 63 0a 10 84 d6 5e c4 1f 2c c1 61 2a a8 ad 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16 WPA: Key negotiation completed with 00:18:f8:ae:50:a0 [PTK=CCMP GTK=CCMP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:18:f8:ae:50:a0 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick
(In reply to comment #12) > Patch is used http://marc.info/?l=linux-wireless&m=131840748927629&w=2 > for 3.1.0-0.rc9.git0.0.fc16.i686.PAE This is not official build, I forgot to mark it so. Josh, could you apply fix to fedora kernel, bug affect anyone using iwlwifi device that is not 11n capable.
(In reply to comment #13) > (In reply to comment #12) > > Patch is used http://marc.info/?l=linux-wireless&m=131840748927629&w=2 > > for 3.1.0-0.rc9.git0.0.fc16.i686.PAE > This is not official build, I forgot to mark it so. > > Josh, could you apply fix to fedora kernel, bug affect anyone using iwlwifi > device that is not 11n capable. Added to f16 and rawhide. Will be in the next build.
(In reply to comment #13) >> bug affect anyone using iwlwifi device that is not 11n capable. FYI: bug is triggered even if 11n is disabled on device by kernel parameter...
kernel-3.1.0-0.rc10.git0.1.fc16 has been submitted as an update for Fedora 16. https://admin.fedoraproject.org/updates/kernel-3.1.0-0.rc10.git0.1.fc16
Package kernel-3.1.0-0.rc10.git0.1.fc16: * should fix your issue, * was pushed to the Fedora 16 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing kernel-3.1.0-0.rc10.git0.1.fc16' as soon as you are able to, then reboot. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2011-14609 then log in and leave karma (feedback).
kernel-3.1.0-0.rc10.git0.1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.