[<prev] [next>] [day] [month] [year] [list]
Message-ID: <878u3rod60.fsf@yhuang-dev.intel.com>
Date: Fri, 15 Jan 2016 09:16:07 +0800
From: kernel test robot <ying.huang@...ux.intel.com>
TO: Aniroop Mathur <a.mathur@...sung.com>
CC: 0day robot <fengguang.wu@...el.com>
Subject: [lkp] [Input] 9233c9edc1: BUG: sleeping function called from
invalid context at arch/x86/include/asm/uaccess.h:732
FYI, we noticed the below changes on
https://github.com/0day-ci/linux Aniroop-Mathur/Input-evdev-fix-bug-of-dropping-valid-full-packet-after-syn_dropped-event/20160115-004911
commit 9233c9edc1bef360918f5732803c53434a7c1515 ("Input: evdev: fix bug of dropping valid full packet after syn_dropped event")
+-------------------------------------------------------------------------------------+------------+------------+
| | 809d9516da | 9233c9edc1 |
+-------------------------------------------------------------------------------------+------------+------------+
| boot_successes | 8 | 0 |
| boot_failures | 0 | 8 |
| BUG:sleeping_function_called_from_invalid_context_at_arch/x86/include/asm/uaccess.h | 0 | 8 |
| backtrace:do_vfs_ioctl | 0 | 8 |
| backtrace:SyS_ioctl | 0 | 8 |
+-------------------------------------------------------------------------------------+------------+------------+
Starting LSB: Start/stop sysstat's sadc...
Starting LSB: Start and stop bmc-watchdog...
Starting LSB: RPC portmapper replacement...
[ 13.738355] BUG: sleeping function called from invalid context at arch/x86/include/asm/uaccess.h:732
[ 13.739213] in_atomic(): 1, irqs_disabled(): 1, pid: 286, name: systemd-logind
[ 13.739816] 2 locks held by systemd-logind/286:
[ 13.740227] #0: (&evdev->mutex){......}, at: [<ffffffff8194aed6>] evdev_ioctl_handler+0x3a/0x84
[ 13.741108] #1: (&(&client->buffer_lock)->rlock){......}, at: [<ffffffff8194aaf1>] evdev_do_ioctl+0xb73/0xf1e
[ 13.741995] CPU: 1 PID: 286 Comm: systemd-logind Not tainted 4.4.0-rc5-00057-g9233c9e #50
[ 13.742820] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[ 13.743555] 0000000000000000 ffff88003dc3fd50 ffffffff813da063 ffff88003dc32c80
[ 13.744194] ffff88003dc3fd68 ffffffff81099704 ffffffff8223504b ffff88003dc3fd90
[ 13.744874] ffffffff81099777 0000000000000002 ffff88003ecaa5f0 00007ffd008daf20
[ 13.745580] Call Trace:
[ 13.745793] [<ffffffff813da063>] dump_stack+0x4b/0x6c
[ 13.746242] [<ffffffff81099704>] ___might_sleep+0x118/0x11b
[ 13.746701] [<ffffffff81099777>] __might_sleep+0x70/0x77
[ 13.747144] [<ffffffff8111a5e9>] __might_fault+0x30/0x32
[ 13.747582] [<ffffffff819491ee>] bits_to_user+0x45/0x64
[ 13.748009] [<ffffffff8194abde>] evdev_do_ioctl+0xc60/0xf1e
[ 13.748478] [<ffffffff8194af06>] evdev_ioctl_handler+0x6a/0x84
[ 13.748996] [<ffffffff8194af3d>] evdev_ioctl+0xb/0xd
[ 13.749448] [<ffffffff81159177>] do_vfs_ioctl+0x45c/0x4e0
[ 13.749895] [<ffffffff81b41585>] ? __sys_sendmsg+0x3d/0x5e
[ 13.750340] [<ffffffff81159239>] SyS_ioctl+0x3e/0x5c
[ 13.750753] [<ffffffff81c487f6>] entry_SYSCALL_64_fastpath+0x16/0x7a
Thanks,
Kernel Test Robot
View attachment "config-4.4.0-rc5-00057-g9233c9e" of type "text/plain" (112364 bytes)
Download attachment "dmesg.xz" of type "application/x-xz" (17328 bytes)
Powered by blists - more mailing lists