[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+icZUVTG9hjrHarFts_SV1oAX1-fH7YMeHkC8oXcAd=1AKKvw@mail.gmail.com>
Date: Sat, 30 Jul 2016 14:55:12 +0200
From: Sedat Dilek <sedat.dilek@...il.com>
To: Rusty Russell <rusty@...tcorp.com.au>,
David Howells <dhowells@...hat.com>
Cc: LKML <linux-kernel@...r.kernel.org>,
Herbert Xu <herbert@...dor.apana.org.au>,
keyrings@...r.kernel.org, linux-crypto@...r.kernel.org
Subject: [v4.7-6816-g797cee982eef] Call-trace: modprobe | asymmetric-keys?
[ CC "MODULE SUPPORT" | "ASYMMETRIC KEYS" | "CRYPTO API" maintainers ]
Hi,
with latest Linus Git (v4.7-6816-g797cee982eef) I see the following
call-trace in my Ubuntu/precise AMD64 system...
[ 16.545234] BUG: sleeping function called from invalid context at
mm/slab.h:393
[ 16.545249] in_atomic(): 1, irqs_disabled(): 0, pid: 1148, name: modprobe
[ 16.545256] no locks held by modprobe/1148.
[ 16.545259] CPU: 2 PID: 1148 Comm: modprobe Not tainted
4.7.0-6816.1-iniza-small #1
[ 16.545261] Hardware name: SAMSUNG ELECTRONICS CO., LTD.
530U3BI/530U4BI/530U4BH/530U3BI/530U4BI/530U4BH, BIOS 13XK 03/28/2013
[ 16.545264] 0000000000000000 ffff8800d53479c0 ffffffff81423ba5
0000000000000000
[ 16.545268] ffffffff81c6072f ffff8800d53479e8 ffffffff810b2f32
ffffffff81c6072f
[ 16.545272] 0000000000000189 0000000000000000 ffff8800d5347a10
ffffffff810b3042
[ 16.545275] Call Trace:
[ 16.545282] [<ffffffff81423ba5>] dump_stack+0x85/0xc0
[ 16.545286] [<ffffffff810b2f32>] ___might_sleep+0x192/0x250
[ 16.545289] [<ffffffff810b3042>] __might_sleep+0x52/0xb0
[ 16.545293] [<ffffffff8121bb80>] kmem_cache_alloc_trace+0x210/0x330
[ 16.545297] [<ffffffff81463320>] mpi_alloc+0x20/0x80
[ 16.545300] [<ffffffff81460e53>] mpi_read_raw_from_sgl+0x103/0x1e0
[ 16.545304] [<ffffffff813d62f4>] rsa_verify+0x54/0xf0
[ 16.545307] [<ffffffff813d66ae>] ? pkcs1pad_sg_set_buf+0x2e/0xc0
[ 16.545309] [<ffffffff813d6e5b>] pkcs1pad_verify+0xbb/0x100
[ 16.545313] [<ffffffff813e37d1>] public_key_verify_signature+0x181/0x280
[ 16.545317] [<ffffffff8121d387>] ? kfree+0xc7/0x1f0
[ 16.545320] [<ffffffff813e38e5>] public_key_verify_signature_2+0x15/0x20
[ 16.545322] [<ffffffff813e353c>] verify_signature+0x3c/0x50
[ 16.545325] [<ffffffff813e541f>] pkcs7_validate_trust+0x11f/0x220
[ 16.545330] [<ffffffff811b048e>] verify_pkcs7_signature+0x7e/0x110
[ 16.545334] [<ffffffff81129edc>] mod_verify_sig+0x7c/0xb0
[ 16.545338] [<ffffffff811270c6>] load_module+0x156/0x2610
[ 16.545343] [<ffffffff8100301a>] ? trace_hardirqs_on_thunk+0x1a/0x1c
[ 16.545348] [<ffffffff811296a6>] SYSC_init_module+0x126/0x140
[ 16.545353] [<ffffffff8112977e>] SyS_init_module+0xe/0x10
[ 16.545358] [<ffffffff81843dc0>] entry_SYSCALL_64_fastpath+0x23/0xc1
Not sure if this is a modprobe (module support) and/or a problem of
asymmetric-keys.
Here is the place in...
[ mm/slab.h ]
...
static inline struct kmem_cache *slab_pre_alloc_hook(struct kmem_cache *s,
gfp_t flags)
{
flags &= gfp_allowed_mask;
lockdep_trace_alloc(flags);
might_sleep_if(gfpflags_allow_blocking(flags)); <--- XXX: Line #393
if (should_failslab(s, flags))
return NULL;
if (memcg_kmem_enabled() &&
((flags & __GFP_ACCOUNT) || (s->flags & SLAB_ACCOUNT)))
return memcg_kmem_get_cache(s);
return s;
}
Can you have a look at this?
I have attached my linux-config, dmesg-output and lsmod-output.
Do you need more informations?
Thanks.
Regards,
- Sedat -
P.S.: List some linux-config settings
$ egrep 'ASYM|MODULE' /boot/config-4.7.0-6816.1-iniza-small | sort
CONFIG_ASYMMETRIC_KEY_TYPE=y
CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE=y
CONFIG_DEBUG_SET_MODULE_RONX=y
# CONFIG_INTEGRITY_ASYMMETRIC_KEYS is not set
# CONFIG_MODULE_COMPRESS is not set
# CONFIG_MODULE_FORCE_LOAD is not set
# CONFIG_MODULE_FORCE_UNLOAD is not set
CONFIG_MODULE_SIG_ALL=y
# CONFIG_MODULE_SIG_FORCE is not set
CONFIG_MODULE_SIG_HASH="sha512"
CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
# CONFIG_MODULE_SIG_SHA1 is not set
# CONFIG_MODULE_SIG_SHA224 is not set
# CONFIG_MODULE_SIG_SHA256 is not set
# CONFIG_MODULE_SIG_SHA384 is not set
CONFIG_MODULE_SIG_SHA512=y
CONFIG_MODULE_SIG=y
CONFIG_MODULE_SRCVERSION_ALL=y
CONFIG_MODULES_TREE_LOOKUP=y
CONFIG_MODULES_USE_ELF_RELA=y
CONFIG_MODULES=y
CONFIG_MODULE_UNLOAD=y
- EOT -
View attachment "dmesg_4.7.0-6816.1-iniza-small.txt" of type "text/plain" (81506 bytes)
Download attachment "config-4.7.0-6816.1-iniza-small" of type "application/octet-stream" (137146 bytes)
View attachment "lsmod_4.7.0-6816.1-iniza-small.txt" of type "text/plain" (3071 bytes)
Powered by blists - more mailing lists