lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20091201151052.GB2262@elf.ucw.cz>
Date:	Tue, 1 Dec 2009 16:10:52 +0100
From:	Pavel Machek <pavel@....cz>
To:	kernel list <linux-kernel@...r.kernel.org>
Cc:	linux-bluetooth@...r.kernel.org,
	Marcel Holtmann <marcel@...tmann.org>
Subject: warn_on in mutex_lock_nested after hciattach

Hi!

I get this, repeatably.

								Pavel

root@amd:~# setserial /dev/ttyBT baud_base 921600
root@amd:~# hciattach -s 921600 /dev/ttyS0 bcsp
Device setup complete
root@amd:~# ------------[ cut here ]------------
WARNING: at kernel/mutex.c:207 mutex_lock_nested+0x219/0x230()
Hardware name: 17097HU
Modules linked in:
Pid: 0, comm: swapper Not tainted 2.6.32-rc8-00165-g2471433-dirty #92
Call Trace:
 [<c07824d9>] ? printk+0x18/0x1a
 [<c07843c9>] ? mutex_lock_nested+0x219/0x230
 [<c023131c>] warn_slowpath_common+0x6c/0xc0
 [<c07843c9>] ? mutex_lock_nested+0x219/0x230
 [<c0231385>] warn_slowpath_null+0x15/0x20
 [<c07843c9>] mutex_lock_nested+0x219/0x230
 [<c03e1afb>] ? tty_unthrottle+0x1b/0x50
 [<c0594bf2>] ? hci_uart_tty_receive+0x62/0x70
 [<c03e1afb>] tty_unthrottle+0x1b/0x50
 [<c0594bf9>] hci_uart_tty_receive+0x69/0x70
 [<c03e380b>] flush_to_ldisc+0x15b/0x190
 [<c03e38ab>] tty_flip_buffer_push+0x6b/0x80
 [<c0443587>] serial8250_handle_port+0x197/0x230
 [<c078545a>] ? _spin_lock+0x3a/0x40
 [<c044368e>] serial8250_interrupt+0x6e/0xf0
 [<c026801e>] handle_IRQ_event+0x2e/0xc0
 [<c0269ac4>] handle_fasteoi_irq+0x64/0xd0
 [<c02053fa>] handle_irq+0x1a/0x30
 [<c0204bb6>] do_IRQ+0x46/0xc0
 [<c024abb2>] ? sched_clock_local+0xd2/0x170
 [<c02034a9>] common_interrupt+0x29/0x30
 [<c024007b>] ? sys_setpgid+0xfb/0x180
 [<c03cf298>] ? acpi_idle_enter_simple+0x132/0x15d
 [<c03cef8b>] acpi_idle_enter_bm+0xc3/0x29e
 [<c05a360d>] cpuidle_idle_call+0x7d/0xc0
 [<c0201efd>] cpu_idle+0x4d/0x80
 [<c075e943>] rest_init+0x53/0x60
 [<c0a5981a>] start_kernel+0x272/0x2ad
 [<c0a5936e>] ? unknown_bootoption+0x0/0x1e9
 [<c0a5906b>] i386_start_kernel+0x6b/0x6d
---[ end trace bab0b3b26c16fcf5 ]---


-- 
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ