Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp4608654rwi; Mon, 17 Oct 2022 08:23:47 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5kCIVRlxyUqs5ZUtJvYk+UPEMByXy00JJB4MCfWENhmKWiD4ji6npx8yTZSioZ3UGMlzIB X-Received: by 2002:a17:907:2712:b0:78d:a223:729b with SMTP id w18-20020a170907271200b0078da223729bmr9043189ejk.443.1666020227216; Mon, 17 Oct 2022 08:23:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666020227; cv=none; d=google.com; s=arc-20160816; b=ImmnQtMaEEBY7OjPuonSg+6dtIzmGjnZ5s5OpCnSSlQZRtJBe34CvX2giK7KVriukO WicZ9RwchUJTgFjFEdrfJeQWhXIikGldqdhAXMHKUUmgzhCLHRypILDZpm085F/bdA2/ 0u0RZEpwz/u+F3GeIB7TSOy4ye1ZCwJ0Ycw2dNZAb3X0g+Mh2QNHaFfWe+KojP8XNMql 3pdgx+Aj2YhY5WHV0tbOFKGjJApNwGrCIOMh77gH6RCT2h/JqmK2EUFn6a3ipXrH/3VY xm/xnBDEsnpd6RJ2R3BKedca6r7bbLa8dLPAqO8A2TnhIb7f0jCCwq0v4fGoqgdfe9wP YUJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=OwvNLIZy6PADcTG5Rl12H9sO1TkAz11ew73KxbBjxF4=; b=vHVXJu68nYQSNOYuvR0aZ/HMebmf+uj95baUO0euvJlBknhXdJY5tNIcQjiUzAE+dh OipjQX4pvLUihJt/XHaaeUIsEhe4Z6VlvEdavSCLRpVDPikUA5evNZtts3ahavU846VW ASlduG2PfeiBP7QS1n/46xfe589ckRTLijd9wL0XCAGuo73sLrZy37UW631Z3/LmOOPB 47Slw9jKAgi5w93n13HbtAotkVcGeNpm8v1JoNyq2iKu8S2fZK8Xb2pJPsDP97Oon5bJ dCDEdhzJ97xxtvU7Qksj7zA4LNINtBOdxJGOqxWrkndmVmgxSPO1budvmS4zU4rHhHS+ QssA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=K4WXTVEv; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m12-20020a056402430c00b0045d050f0fa3si10367104edc.565.2022.10.17.08.23.24; Mon, 17 Oct 2022 08:23:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=K4WXTVEv; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230421AbiJQPQl (ORCPT + 63 others); Mon, 17 Oct 2022 11:16:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55190 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229829AbiJQPQk (ORCPT ); Mon, 17 Oct 2022 11:16:40 -0400 Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com [IPv6:2607:f8b0:4864:20::102d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 660D21EA for ; Mon, 17 Oct 2022 08:16:39 -0700 (PDT) Received: by mail-pj1-x102d.google.com with SMTP id a6-20020a17090abe0600b0020d7c0c6650so14586604pjs.0 for ; Mon, 17 Oct 2022 08:16:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=OwvNLIZy6PADcTG5Rl12H9sO1TkAz11ew73KxbBjxF4=; b=K4WXTVEvEBUk75zQvn4Io9zA6/3AoFiEd2PESd5siQfyZoT7dKF7SWA/4B8E1b8Xtr S3d7VdV3Kpb7Vhf6o0jBz1uun1cM0I783kYDgjt6EwcISSD7VtdhHeSsM13Nc1yZyTtb Vam6oDjq45rtJq9/nNHoQ1xJ7xw3FDTyxmLlJZYiP4BzyU2HZm53rdq7vfC/zJ0VkW+A pb/bsMZtVTx3whDWpbc/0chI1UtImK8fCDGxP43dYQeCEOA77254XveaO8XG2wqAMrGm ThdF7t94JUU+GWg3Dm0eqwcONKC7Noo3i/Rdr8ao9lGfu3XT/L+cxr0Pyw+xGeiplGk/ FTmw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=OwvNLIZy6PADcTG5Rl12H9sO1TkAz11ew73KxbBjxF4=; b=q6TiUycphgfb+Solf/4wrI6eif2cxnet64m/WmNy+VAbflMswnJZh4vzFY1a8fWa+6 tjqdhik/FrHEbpebl+qvNwgS6FmjoCgInGgoGXVppEQg0gwKOjPeZLyQGGMVE7HrIEAP bP5DQxs5oeKD+kZszHossLaNin1RRTueM6sXXbHLhlWIrgqUfHOIe/P2DI5eJAxRniL1 0CBvRwp6jkZ9dGxIPozalasmkPlPbkpnMXAWfsVDGrPef4GBQz5ivlEiewj5oYFhMcl0 LeaEseCvu/XCergOemyJiHv8/emviG2D2yjS+zXjQVAhF8/8anoNiIuEuNiztri+lIKa 6+HQ== X-Gm-Message-State: ACrzQf05c1/1ddd6noj8t6OAPvEJIrYEijWJFl+KVTuxCNrXNhkEt5jb JxcdmE7j6q7OZEElZit2lJUlkaNCx/kDef54KMEYDZwA X-Received: by 2002:a17:90b:4b83:b0:20c:5ac8:1e30 with SMTP id lr3-20020a17090b4b8300b0020c5ac81e30mr34647016pjb.71.1666019798445; Mon, 17 Oct 2022 08:16:38 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: bommy985 Date: Mon, 17 Oct 2022 15:16:27 +0000 Message-ID: Subject: Re: 8852be no longer works, weather on the individual github or the group github To: linux-wireless@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org nevermind recompiling the the individual module github driver seemed to work, not going to try the rtw89 github driver until i need do so(eg. when the next kernel releases).. On Mon, Oct 17, 2022 at 6:22 PM bommy985 wrote: > > especially interested in these errors, as even if i force version > magic to be excluded, it gives the error at the bottom, this is doing > sudo rmmod, as making and making install claims to be a success > i did not see any compiler errors in the compiler process, although > some warnings claiming that "x is always gonna be true" and whatnot > > [ 44.250693] audit: type=1101 audit(1665975479.413:87): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 44.251413] audit: type=1110 audit(1665975479.413:88): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 44.251506] audit: type=1105 audit(1665975479.413:89): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 44.306013] 8852be: version magic '6.0.1-arch2-1 SMP preempt > mod_unload ' should be '6.0.2-arch1-1 SMP preempt mod_unload ' > [ 44.307769] audit: type=1106 audit(1665975479.469:90): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 44.307820] audit: type=1104 audit(1665975479.469:91): pid=2145 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 48.155859] audit: type=1101 audit(1665975483.319:92): pid=2191 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 48.156372] audit: type=1110 audit(1665975483.319:93): pid=2191 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 48.156463] audit: type=1105 audit(1665975483.319:94): pid=2191 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 48.157747] audit: type=1106 audit(1665975483.319:95): pid=2191 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.195548] kauditd_printk_skb: 1 callbacks suppressed > [ 58.195551] audit: type=1101 audit(1665975493.356:97): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.196046] audit: type=1110 audit(1665975493.359:98): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.196131] audit: type=1105 audit(1665975493.359:99): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.197260] audit: type=1106 audit(1665975493.359:100): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 58.197283] audit: type=1104 audit(1665975493.359:101): pid=2321 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.051388] audit: type=1101 audit(1665975500.212:102): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.051835] audit: type=1110 audit(1665975500.212:103): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.051925] audit: type=1105 audit(1665975500.212:104): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.072451] audit: type=1106 audit(1665975500.232:105): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 65.072526] audit: type=1104 audit(1665975500.236:106): pid=2367 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.710765] audit: type=1101 audit(1665975508.872:107): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.711208] audit: type=1110 audit(1665975508.872:108): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.711298] audit: type=1105 audit(1665975508.872:109): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.712339] audit: type=1106 audit(1665975508.872:110): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 73.712372] audit: type=1104 audit(1665975508.872:111): pid=2455 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.139144] audit: type=1101 audit(1665975527.302:112): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.139503] audit: type=1110 audit(1665975527.302:113): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.139577] audit: type=1105 audit(1665975527.302:114): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.140550] audit: type=1106 audit(1665975527.302:115): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_close > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 92.140576] audit: type=1104 audit(1665975527.302:116): pid=2670 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 94.921630] audit: type=1101 audit(1665975530.082:117): pid=2716 > uid=1000 auid=1000 ses=3 msg='op=PAM:accounting > grantors=pam_unix,pam_permit,pam_time acct="nootskoot" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 94.921995] audit: type=1110 audit(1665975530.082:118): pid=2716 > uid=1000 auid=1000 ses=3 msg='op=PAM:setcred > grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 94.922051] audit: type=1105 audit(1665975530.082:119): pid=2716 > uid=1000 auid=1000 ses=3 msg='op=PAM:session_open > grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" > exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success' > [ 94.984078] 8852be: bad vermagic: kernel tainted. > [ 94.984083] Disabling lock debugging due to kernel taint > [ 95.159114] BPF: type_id=1765 bits_offset=128 > [ 95.159116] BPF: > [ 95.159117] BPF: Invalid name > [ 95.159117] BPF: > [ 95.159120] failed to validate module [8852be] BTF: -22