Hello everyone, I'm doing some testing here. When I'm trying the hardware latency test (hwlatdetect.py) I'm getting the following messages: hwlat_detector: version 1.0.0 BUG: using smp_processor_id() in preemptible [00000000] code: hwlatdetect/3755 caller is debug_sample_fread+0x138/0x1ea [hwlat_detector] Pid: 3755, comm: hwlatdetect Tainted: G N 2.6.29.5-M-jen80-rtpae-debug #1 Call Trace: [<c035be0b>] ? printk+0x14/0x19 [<c02403df>] debug_smp_processor_id+0xb3/0xc8 [<f855061f>] debug_sample_fread+0x138/0x1ea [hwlat_detector] [<c020fed8>] ? security_file_permission+0x14/0x16 [<c01b8a65>] ? rw_verify_area+0x8f/0xb1 [<f85504e7>] ? debug_sample_fread+0x0/0x1ea [hwlat_detector] [<c01b93b5>] vfs_read+0x8e/0x138 [<c01b9502>] sys_read+0x40/0x65 [<c0102cdc>] sysenter_do_call+0x12/0x2d The message is printed for every poll. Manually loading the hwlat module and reading "sample" produces the same message. I'm using a SuSE kernel with RT-Patches from j.eng (recompiled with hwlat Module). Version should roughly be 2.6.29.5-rt20, PAE is enabled. CPU is a dual core. The offending source could be: mutex_lock(&ring_buffer_mutex); e = ring_buffer_consume(ring_buffer, smp_processor_id(), NULL); I'm wondering, because the seems to run at least for some people. Can it be a problem with my kernel? Best regards, W. Steinwender -- To unsubscribe from this list: send the line "unsubscribe linux-rt-users" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html