Mailinglist Archive: opensuse-bugs (4664 mails)

< Previous Next >
[Bug 492961] `Hook being called from interrupt context' when trying to receive file from mobile over bluetooth
  • From: bugzilla_noreply@xxxxxxxxxx
  • Date: Sun, 7 Feb 2010 15:19:52 +0000
  • Message-id: <20100207151952.62D3BCC7CD@xxxxxxxxxxxxxxxxxxxxxx>
http://bugzilla.novell.com/show_bug.cgi?id=492961

http://bugzilla.novell.com/show_bug.cgi?id=492961#c14


Alexander Trubitsyn <a.trubitsyn@xxxxxxx> changed:

What |Removed |Added
----------------------------------------------------------------------------
CC| |a.trubitsyn@xxxxxxx
Component|Kernel |Kernel
AssignedTo|bphilips@xxxxxxxxxx |kernel-maintainers@xxxxxxxx
| |ovo.novell.com
Product|openSUSE 11.1 |openSUSE 11.2
OS/Version|openSUSE 11.1 |openSUSE 11.2

--- Comment #14 from Alexander Trubitsyn <a.trubitsyn@xxxxxxx> 2010-02-07
15:19:48 UTC ---
I have the same thing with OpenSuse 11.2 and latest unstable kernel
2.6.33-rc6-12-desktop
Linux linux-xm5v 2.6.33-rc6-12-desktop #1 SMP PREEMPT 2010-02-05 18:11:23 +0100
x86_64 x86_64 x86_64 GNU/Linux
[ 690.092005] usb 2-5: new full speed USB device using ohci_hcd and address 2
[ 690.521237] usb 2-5: New USB device found, idVendor=0a12, idProduct=0001
[ 690.521237] usb 2-5: New USB device strings: Mfr=0, Product=0,
SerialNumber=0
[ 690.634010] Bluetooth: Core ver 2.15
[ 690.636030] NET: Registered protocol family 31
[ 690.636030] Bluetooth: HCI device and connection manager initialized
[ 690.636030] Bluetooth: HCI socket layer initialized
[ 690.655264] Bluetooth: Generic Bluetooth USB driver ver 0.6
[ 690.655555] usbcore: registered new interface driver btusb
[ 690.780264] Bluetooth: L2CAP ver 2.14
[ 690.780264] Bluetooth: L2CAP socket layer initialized
[ 690.836015] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
[ 690.836015] Bluetooth: BNEP filters: protocol multicast
[ 690.888014] Bridge firewalling registered
[ 690.902259] Bluetooth: SCO (Voice Link) ver 0.6
[ 690.902259] Bluetooth: SCO socket layer initialized
[ 691.187012] Bluetooth: RFCOMM TTY layer initialized
[ 691.187012] Bluetooth: RFCOMM socket layer initialized
[ 691.187012] Bluetooth: RFCOMM ver 1.11
[ 800.382003] AppArmor Debug: Hook being called from interrupt context
[ 800.382003] Pid: 0, comm: swapper Not tainted 2.6.33-rc6-12-desktop #1
[ 800.382003] Call Trace:
[ 800.382003] [<ffffffff81006109>] dump_trace+0x79/0x340
[ 800.382003] [<ffffffff8149567b>] dump_stack+0x69/0x6f
[ 800.382003] [<ffffffff8120499d>] aa_revalidate_sk+0xad/0xc0
[ 800.382003] [<ffffffff813a7e02>] sock_sendmsg+0xc2/0x190
[ 800.382003] [<ffffffff813a7f09>] kernel_sendmsg+0x39/0x50
[ 800.382003] [<ffffffffa04c03b0>] rfcomm_send_frame+0x40/0x80 [rfcomm]
[ 800.382003] [<ffffffffa04c0460>] rfcomm_send_disc+0x70/0xb0 [rfcomm]
[ 800.382003] [<ffffffffa04c1c6a>] rfcomm_session_del+0x9a/0xf0 [rfcomm]
[ 800.382003] [<ffffffffa04c2a05>] rfcomm_session_timeout+0x25/0x80 [rfcomm]
[ 800.382003] [<ffffffff81061b1e>] run_timer_softirq+0x1ae/0x360
[ 800.382003] [<ffffffff8105766f>] __do_softirq+0xdf/0x240
[ 800.382003] [<ffffffff81003eec>] call_softirq+0x1c/0x30
[ 800.382003] [<ffffffff81005b4d>] do_softirq+0x4d/0x80
[ 800.382003] [<ffffffff810579f5>] irq_exit+0x95/0xa0
[ 800.382003] [<ffffffff8101d63b>] smp_apic_timer_interrupt+0x6b/0xa0
[ 800.382003] [<ffffffff810039b3>] apic_timer_interrupt+0x13/0x20
[ 800.382003] [<ffffffff8100bff2>] default_idle+0x42/0x90
[ 800.382003] [<ffffffff8100c0c3>] c1e_idle+0x83/0x100
[ 800.382003] [<ffffffff8100194a>] cpu_idle+0x5a/0xb0
[ 800.382003] [<ffffffff81b37e14>] start_kernel+0x32b/0x332
[ 800.382003] [<ffffffff81b373ee>] x86_64_start_kernel+0xe5/0xe9
[ 822.244020] AppArmor Debug: Hook being called from interrupt context
[ 822.244020] Pid: 2843, comm: ktorrent Not tainted 2.6.33-rc6-12-desktop #1
[ 822.244020] Call Trace:
[ 822.244020] [<ffffffff81006109>] dump_trace+0x79/0x340
[ 822.244020] [<ffffffff8149567b>] dump_stack+0x69/0x6f
[ 822.244020] [<ffffffff8120499d>] aa_revalidate_sk+0xad/0xc0
[ 822.244020] [<ffffffff813a7e02>] sock_sendmsg+0xc2/0x190
[ 822.244020] [<ffffffff813a7f09>] kernel_sendmsg+0x39/0x50
[ 822.244020] [<ffffffffa04c03b0>] rfcomm_send_frame+0x40/0x80 [rfcomm]
[ 822.244020] [<ffffffffa04c0460>] rfcomm_send_disc+0x70/0xb0 [rfcomm]
[ 822.244020] [<ffffffffa04c1c6a>] rfcomm_session_del+0x9a/0xf0 [rfcomm]
[ 822.244020] [<ffffffffa04c2a05>] rfcomm_session_timeout+0x25/0x80 [rfcomm]
[ 822.244020] [<ffffffff81061b1e>] run_timer_softirq+0x1ae/0x360
[ 822.244020] [<ffffffff8105766f>] __do_softirq+0xdf/0x240
[ 822.244020] [<ffffffff81003eec>] call_softirq+0x1c/0x30
[ 822.244020] [<ffffffff81005b4d>] do_softirq+0x4d/0x80
[ 822.244020] [<ffffffff810579f5>] irq_exit+0x95/0xa0
[ 822.244020] [<ffffffff8101d63b>] smp_apic_timer_interrupt+0x6b/0xa0
[ 822.244020] [<ffffffff810039b3>] apic_timer_interrupt+0x13/0x20
[ 822.244020] [<00007f108b52bb48>] 0x7f108b52bb48
[ 834.171265] AppArmor Debug: Hook being called from interrupt context
[ 834.171265] Pid: 0, comm: swapper Not tainted 2.6.33-rc6-12-desktop #1
[ 834.171265] Call Trace:
[ 834.171265] [<ffffffff81006109>] dump_trace+0x79/0x340
[ 834.171265] [<ffffffff8149567b>] dump_stack+0x69/0x6f
[ 834.171265] [<ffffffff8120499d>] aa_revalidate_sk+0xad/0xc0
[ 834.171265] [<ffffffff813a7e02>] sock_sendmsg+0xc2/0x190
[ 834.171265] [<ffffffff813a7f09>] kernel_sendmsg+0x39/0x50
[ 834.171265] [<ffffffffa04c03b0>] rfcomm_send_frame+0x40/0x80 [rfcomm]
[ 834.171265] [<ffffffffa04c0460>] rfcomm_send_disc+0x70/0xb0 [rfcomm]
[ 834.171265] [<ffffffffa04c1c6a>] rfcomm_session_del+0x9a/0xf0 [rfcomm]
[ 834.171265] [<ffffffffa04c2a05>] rfcomm_session_timeout+0x25/0x80 [rfcomm]
[ 834.171265] [<ffffffff81061b1e>] run_timer_softirq+0x1ae/0x360
[ 834.171265] [<ffffffff8105766f>] __do_softirq+0xdf/0x240
[ 834.171265] [<ffffffff81003eec>] call_softirq+0x1c/0x30
[ 834.171265] [<ffffffff81005b4d>] do_softirq+0x4d/0x80
[ 834.171265] [<ffffffff810579f5>] irq_exit+0x95/0xa0
[ 834.171265] [<ffffffff8101d63b>] smp_apic_timer_interrupt+0x6b/0xa0
[ 834.171265] [<ffffffff810039b3>] apic_timer_interrupt+0x13/0x20
[ 834.171265] [<ffffffff8100bff2>] default_idle+0x42/0x90
[ 834.171265] [<ffffffff8100c0c3>] c1e_idle+0x83/0x100
[ 834.171265] [<ffffffff8100194a>] cpu_idle+0x5a/0xb0
[ 845.321000] AppArmor Debug: Hook being called from interrupt context
[ 845.321000] Pid: 0, comm: swapper Not tainted 2.6.33-rc6-12-desktop #1
[ 845.321000] Call Trace:
[ 845.321000] [<ffffffff81006109>] dump_trace+0x79/0x340
[ 845.321000] [<ffffffff8149567b>] dump_stack+0x69/0x6f
[ 845.321000] [<ffffffff8120499d>] aa_revalidate_sk+0xad/0xc0
[ 845.321000] [<ffffffff813a7e02>] sock_sendmsg+0xc2/0x190
[ 845.321000] [<ffffffff813a7f09>] kernel_sendmsg+0x39/0x50
[ 845.321000] [<ffffffffa04c03b0>] rfcomm_send_frame+0x40/0x80 [rfcomm]
[ 845.321000] [<ffffffffa04c0460>] rfcomm_send_disc+0x70/0xb0 [rfcomm]
[ 845.321000] [<ffffffffa04c1c6a>] rfcomm_session_del+0x9a/0xf0 [rfcomm]
[ 845.321000] [<ffffffffa04c2a05>] rfcomm_session_timeout+0x25/0x80 [rfcomm]
[ 845.321000] [<ffffffff81061b1e>] run_timer_softirq+0x1ae/0x360
[ 845.321000] [<ffffffff8105766f>] __do_softirq+0xdf/0x240
[ 845.321000] [<ffffffff81003eec>] call_softirq+0x1c/0x30
[ 845.321000] [<ffffffff81005b4d>] do_softirq+0x4d/0x80
[ 845.321000] [<ffffffff810579f5>] irq_exit+0x95/0xa0
[ 845.321000] [<ffffffff8101d63b>] smp_apic_timer_interrupt+0x6b/0xa0
[ 845.321000] [<ffffffff810039b3>] apic_timer_interrupt+0x13/0x20
[ 845.321000] [<ffffffff8100bff2>] default_idle+0x42/0x90
[ 845.321000] [<ffffffff8100c0c3>] c1e_idle+0x83/0x100
[ 845.321000] [<ffffffff8100194a>] cpu_idle+0x5a/0xb0

--
Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

< Previous Next >