Michael Buesch wrote: > This fixes some locking w.r.t. the lower MAC (firmware). > It also removes a lot of ancient IRQ-locking that's not needed anymore. > We simply suspend the MAC. That's easier and causes less trouble. When booting with this patch and the RFKILL switch off, I got these b43dbg messages: kernel: b43-phy0 debug: PHY/RADIO register access with enabled MAC. kernel: Pid: 7, comm: events/0 Not tainted 2.6.28-rc8-wl #55 kernel: Call Trace: kernel: [<ffffffffa02d6b15>] b43_phy_read+0x33/0x46 [b43] kernel: [<ffffffffa02d8350>] b43_gphy_op_software_rfkill+0xde/0x131 [b43] kernel: [<ffffffffa02d66d8>] b43_software_rfkill+0x20/0x2d [b43] kernel: [<ffffffffa02e5609>] b43_rfkill_soft_toggle+0x71/0xa8 [b43] kernel: [<ffffffffa02c61c0>] rfkill_toggle_radio+0xc6/0x10e [rfkill] kernel: [<ffffffffa02c681d>] __rfkill_switch_all+0x6c/0xbb [rfkill] kernel: [<ffffffffa02c68e5>] rfkill_switch_all+0x2d/0x3e [rfkill] kernel: [<ffffffffa04bc165>] rfkill_task_handler+0x165/0x1ae [rfkill_input] kernel: [<ffffffff8024ac90>] run_workqueue+0x103/0x20a kernel: [<ffffffff8024ac3e>] ? run_workqueue+0xb1/0x20a kernel: [<ffffffffa04bc000>] ? rfkill_task_handler+0x0/0x1ae [rfkill_input] kernel: [<ffffffff8024ae77>] worker_thread+0xe0/0xf1 kernel: [<ffffffff8024e9fc>] ? autoremove_wake_function+0x0/0x38 kernel: [<ffffffff8024ad97>] ? worker_thread+0x0/0xf1 kernel: [<ffffffff8024e6a0>] kthread+0x49/0x76 kernel: [<ffffffff8020d0d9>] child_rip+0xa/0x11 kernel: [<ffffffff80236bd4>] ? finish_task_switch+0x0/0xb9 kernel: [<ffffffff8020c5f4>] ? restore_args+0x0/0x30 kernel: b43-phy0 debug: PHY/RADIO register access with enabled MAC. kernel: Pid: 7, comm: events/0 Not tainted 2.6.28-rc8-wl #55 kernel: Call Trace: kernel: [<ffffffffa02d6f93>] ? b43_gphy_op_read+0x2b/0x2f [b43] kernel: [<ffffffffa02d6b15>] b43_phy_read+0x33/0x46 [b43] kernel: [<ffffffffa02d835f>] b43_gphy_op_software_rfkill+0xed/0x131 [b43] kernel: [<ffffffffa02d66d8>] b43_software_rfkill+0x20/0x2d [b43] ... kernel: b43-phy0 debug: PHY/RADIO register access with enabled MAC. kernel: Pid: 7, comm: events/0 Not tainted 2.6.28-rc8-wl #55 kernel: Call Trace: kernel: [<ffffffffa02d6ac8>] b43_phy_write+0x3c/0x56 [b43] kernel: [<ffffffffa02d8384>] b43_gphy_op_software_rfkill+0x112/0x131 [b43] kernel: [<ffffffffa02d66d8>] b43_software_rfkill+0x20/0x2d [b43] ... kernel: b43-phy0 debug: PHY/RADIO register access with enabled MAC. kernel: Pid: 7, comm: events/0 Not tainted 2.6.28-rc8-wl #55 kernel: Call Trace: kernel: [<ffffffffa02d6fc7>] ? b43_gphy_op_write+0x30/0x35 [b43] kernel: [<ffffffffa02d6ac8>] b43_phy_write+0x3c/0x56 [b43] kernel: [<ffffffffa02d839a>] b43_gphy_op_software_rfkill+0x128/0x131 [b43] kernel: [<ffffffffa02d66d8>] b43_software_rfkill+0x20/0x2d [b43] ... These were on an x86_64 system running wireless testing that git-describe shows as v2.6.28-rc8-8079-g3af3a24. Larry -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html