lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <878u3rod60.fsf@yhuang-dev.intel.com>
Date:	Fri, 15 Jan 2016 09:16:07 +0800
From:	kernel test robot <ying.huang@...ux.intel.com>
TO:	Aniroop Mathur <a.mathur@...sung.com>
CC:	0day robot <fengguang.wu@...el.com>
Subject: [lkp] [Input] 9233c9edc1: BUG: sleeping function called from
 invalid context at arch/x86/include/asm/uaccess.h:732

FYI, we noticed the below changes on

https://github.com/0day-ci/linux Aniroop-Mathur/Input-evdev-fix-bug-of-dropping-valid-full-packet-after-syn_dropped-event/20160115-004911
commit 9233c9edc1bef360918f5732803c53434a7c1515 ("Input: evdev: fix bug of dropping valid full packet after syn_dropped event")


+-------------------------------------------------------------------------------------+------------+------------+
|                                                                                     | 809d9516da | 9233c9edc1 |
+-------------------------------------------------------------------------------------+------------+------------+
| boot_successes                                                                      | 8          | 0          |
| boot_failures                                                                       | 0          | 8          |
| BUG:sleeping_function_called_from_invalid_context_at_arch/x86/include/asm/uaccess.h | 0          | 8          |
| backtrace:do_vfs_ioctl                                                              | 0          | 8          |
| backtrace:SyS_ioctl                                                                 | 0          | 8          |
+-------------------------------------------------------------------------------------+------------+------------+



         Starting LSB: Start/stop sysstat's sadc...
         Starting LSB: Start and stop bmc-watchdog...
         Starting LSB: RPC portmapper replacement...
[   13.738355] BUG: sleeping function called from invalid context at arch/x86/include/asm/uaccess.h:732
[   13.739213] in_atomic(): 1, irqs_disabled(): 1, pid: 286, name: systemd-logind
[   13.739816] 2 locks held by systemd-logind/286:
[   13.740227]  #0:  (&evdev->mutex){......}, at: [<ffffffff8194aed6>] evdev_ioctl_handler+0x3a/0x84
[   13.741108]  #1:  (&(&client->buffer_lock)->rlock){......}, at: [<ffffffff8194aaf1>] evdev_do_ioctl+0xb73/0xf1e
[   13.741995] CPU: 1 PID: 286 Comm: systemd-logind Not tainted 4.4.0-rc5-00057-g9233c9e #50
[   13.742820] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   13.743555]  0000000000000000 ffff88003dc3fd50 ffffffff813da063 ffff88003dc32c80
[   13.744194]  ffff88003dc3fd68 ffffffff81099704 ffffffff8223504b ffff88003dc3fd90
[   13.744874]  ffffffff81099777 0000000000000002 ffff88003ecaa5f0 00007ffd008daf20
[   13.745580] Call Trace:
[   13.745793]  [<ffffffff813da063>] dump_stack+0x4b/0x6c
[   13.746242]  [<ffffffff81099704>] ___might_sleep+0x118/0x11b
[   13.746701]  [<ffffffff81099777>] __might_sleep+0x70/0x77
[   13.747144]  [<ffffffff8111a5e9>] __might_fault+0x30/0x32
[   13.747582]  [<ffffffff819491ee>] bits_to_user+0x45/0x64
[   13.748009]  [<ffffffff8194abde>] evdev_do_ioctl+0xc60/0xf1e
[   13.748478]  [<ffffffff8194af06>] evdev_ioctl_handler+0x6a/0x84
[   13.748996]  [<ffffffff8194af3d>] evdev_ioctl+0xb/0xd
[   13.749448]  [<ffffffff81159177>] do_vfs_ioctl+0x45c/0x4e0
[   13.749895]  [<ffffffff81b41585>] ? __sys_sendmsg+0x3d/0x5e
[   13.750340]  [<ffffffff81159239>] SyS_ioctl+0x3e/0x5c
[   13.750753]  [<ffffffff81c487f6>] entry_SYSCALL_64_fastpath+0x16/0x7a


Thanks,
Kernel Test Robot

View attachment "config-4.4.0-rc5-00057-g9233c9e" of type "text/plain" (112364 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (17328 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ