Bug 497891

Summary: Kernel prints a stack trace if you try to send a file to the machine via bluetooth
Product: [openSUSE] openSUSE 11.1 Reporter: Andreas Schneider <asn>
Component: KernelAssignee: E-mail List <kernel-maintainers>
Status: RESOLVED DUPLICATE QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P5 - None CC: jeffm, tiwai
Version: Final   
Target Milestone: ---   
Hardware: i586   
OS: Other   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Andreas Schneider 2009-04-24 08:02:47 UTC
If you try to send a file from a mobile phone to your machine, the kernel prints a stack trace and the connection is lost.

Let me know if you need more information.

Stacktrace
===========

Apr 24 09:49:57 krikkit bluetoothd[3055]: link_key_request (sba=00:23:4E:E3:EF:AF, dba=00:21:9E:62:1F:13)
Apr 24 09:49:58 krikkit bluetoothd[3055]: link_key_notify (sba=00:23:4E:E3:EF:AF, dba=00:21:9E:62:1F:13) 
Apr 24 09:49:58 krikkit kernel: AppArmor Debug: Hook being called from interrupt context
Apr 24 09:49:58 krikkit kernel: Pid: 0, comm: swapper Tainted: G          2.6.27.21-0.1-pae #1
Apr 24 09:49:58 krikkit kernel:  [<c01061cc>] dump_trace+0x6b/0x249
Apr 24 09:49:58 krikkit kernel:  [<c0106ca3>] show_trace+0x20/0x39
Apr 24 09:49:58 krikkit kernel:  [<c0347ce1>] dump_stack+0x71/0x76
Apr 24 09:49:58 krikkit kernel:  [<c01fe73b>] aa_revalidate_sk+0x2c/0x87
Apr 24 09:49:58 krikkit kernel:  [<c01e8338>] security_socket_sendmsg+0xd/0xf
Apr 24 09:49:58 krikkit kernel:  [<c02d9b66>] sock_sendmsg+0xb4/0xe4
Apr 24 09:49:58 krikkit kernel:  [<c02d9da8>] kernel_sendmsg+0x27/0x35
Apr 24 09:49:58 krikkit kernel:  [<f8c5715c>] rfcomm_send_disc+0x8d/0x95 [rfcomm]
Apr 24 09:49:58 krikkit kernel:  [<f8c57681>] __rfcomm_dlc_close+0x4b/0x186 [rfcomm]
Apr 24 09:49:58 krikkit kernel:  [<f8c5787e>] rfcomm_encrypt_cfm+0x6b/0xd5 [rfcomm]
Apr 24 09:49:58 krikkit kernel:  [<f8f06079>] hci_event_packet+0x9c3/0x2272 [bluetooth]
Apr 24 09:49:58 krikkit kernel:  [<f8f03b65>] hci_rx_task+0xa4/0x213 [bluetooth]
Apr 24 09:49:58 krikkit kernel:  [<c012df25>] tasklet_action+0x59/0xa2
Apr 24 09:49:58 krikkit kernel:  [<c012e505>] __do_softirq+0x83/0x107
Apr 24 09:49:58 krikkit kernel:  [<c012e5bb>] do_softirq+0x32/0x36
Apr 24 09:49:58 krikkit kernel:  [<c012e6b9>] irq_exit+0x35/0x69
Apr 24 09:49:58 krikkit kernel:  [<c0107408>] do_IRQ+0x5c/0x70
Apr 24 09:49:58 krikkit kernel:  [<c01059c3>] common_interrupt+0x23/0x30
Apr 24 09:49:58 krikkit kernel:  [<f884a218>] acpi_idle_enter_bm+0x30e/0x38d [processor]
Apr 24 09:49:58 krikkit kernel:  [<c02c99c8>] cpuidle_idle_call+0x5d/0x91
Apr 24 09:49:58 krikkit kernel:  [<c0103aaa>] cpu_idle+0xc7/0xe9
Apr 24 09:49:58 krikkit kernel:  [<c05399ee>] start_kernel+0x344/0x349
Apr 24 09:49:58 krikkit kernel:  =======================

Kernel
=======

Name        : kernel-pae
Version     : 2.6.27.21
Release     : 0.1.2

Source Timestamp: 2009-03-31 14:50:44 +0200
GIT Revision: 23c791d70fe628d2d28a4aac869684089bcd3193
GIT Branch: SLE11_BRANCH
Distribution: openSUSE 11.1
Comment 1 Takashi Iwai 2009-04-28 07:30:59 UTC
It's a bug in apparmor, dup of bug #492961.
A temporary workaround would be to disable AA...

*** This bug has been marked as a duplicate of bug 492961 ***
Comment 2 Jeff Mahoney 2009-05-18 19:28:28 UTC
I don't think this is a bug in AppArmor. AppArmor is just doing the complaining. The real issue is that the code is going down a path that may allow it to sleep in interrupt context.