lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+icZUVTG9hjrHarFts_SV1oAX1-fH7YMeHkC8oXcAd=1AKKvw@mail.gmail.com>
Date:	Sat, 30 Jul 2016 14:55:12 +0200
From:	Sedat Dilek <sedat.dilek@...il.com>
To:	Rusty Russell <rusty@...tcorp.com.au>,
	David Howells <dhowells@...hat.com>
Cc:	LKML <linux-kernel@...r.kernel.org>,
	Herbert Xu <herbert@...dor.apana.org.au>,
	keyrings@...r.kernel.org, linux-crypto@...r.kernel.org
Subject: [v4.7-6816-g797cee982eef] Call-trace: modprobe | asymmetric-keys?

[ CC "MODULE SUPPORT" | "ASYMMETRIC KEYS" | "CRYPTO API" maintainers ]

Hi,

with latest Linus Git (v4.7-6816-g797cee982eef) I see the following
call-trace in my Ubuntu/precise AMD64 system...

[   16.545234] BUG: sleeping function called from invalid context at
mm/slab.h:393
[   16.545249] in_atomic(): 1, irqs_disabled(): 0, pid: 1148, name: modprobe
[   16.545256] no locks held by modprobe/1148.
[   16.545259] CPU: 2 PID: 1148 Comm: modprobe Not tainted
4.7.0-6816.1-iniza-small #1
[   16.545261] Hardware name: SAMSUNG ELECTRONICS CO., LTD.
530U3BI/530U4BI/530U4BH/530U3BI/530U4BI/530U4BH, BIOS 13XK 03/28/2013
[   16.545264]  0000000000000000 ffff8800d53479c0 ffffffff81423ba5
0000000000000000
[   16.545268]  ffffffff81c6072f ffff8800d53479e8 ffffffff810b2f32
ffffffff81c6072f
[   16.545272]  0000000000000189 0000000000000000 ffff8800d5347a10
ffffffff810b3042
[   16.545275] Call Trace:
[   16.545282]  [<ffffffff81423ba5>] dump_stack+0x85/0xc0
[   16.545286]  [<ffffffff810b2f32>] ___might_sleep+0x192/0x250
[   16.545289]  [<ffffffff810b3042>] __might_sleep+0x52/0xb0
[   16.545293]  [<ffffffff8121bb80>] kmem_cache_alloc_trace+0x210/0x330
[   16.545297]  [<ffffffff81463320>] mpi_alloc+0x20/0x80
[   16.545300]  [<ffffffff81460e53>] mpi_read_raw_from_sgl+0x103/0x1e0
[   16.545304]  [<ffffffff813d62f4>] rsa_verify+0x54/0xf0
[   16.545307]  [<ffffffff813d66ae>] ? pkcs1pad_sg_set_buf+0x2e/0xc0
[   16.545309]  [<ffffffff813d6e5b>] pkcs1pad_verify+0xbb/0x100
[   16.545313]  [<ffffffff813e37d1>] public_key_verify_signature+0x181/0x280
[   16.545317]  [<ffffffff8121d387>] ? kfree+0xc7/0x1f0
[   16.545320]  [<ffffffff813e38e5>] public_key_verify_signature_2+0x15/0x20
[   16.545322]  [<ffffffff813e353c>] verify_signature+0x3c/0x50
[   16.545325]  [<ffffffff813e541f>] pkcs7_validate_trust+0x11f/0x220
[   16.545330]  [<ffffffff811b048e>] verify_pkcs7_signature+0x7e/0x110
[   16.545334]  [<ffffffff81129edc>] mod_verify_sig+0x7c/0xb0
[   16.545338]  [<ffffffff811270c6>] load_module+0x156/0x2610
[   16.545343]  [<ffffffff8100301a>] ? trace_hardirqs_on_thunk+0x1a/0x1c
[   16.545348]  [<ffffffff811296a6>] SYSC_init_module+0x126/0x140
[   16.545353]  [<ffffffff8112977e>] SyS_init_module+0xe/0x10
[   16.545358]  [<ffffffff81843dc0>] entry_SYSCALL_64_fastpath+0x23/0xc1

Not sure if this is a modprobe (module support) and/or a problem of
asymmetric-keys.

Here is the place in...

[ mm/slab.h ]
...
static inline struct kmem_cache *slab_pre_alloc_hook(struct kmem_cache *s,
                                                     gfp_t flags)
{
        flags &= gfp_allowed_mask;
        lockdep_trace_alloc(flags);
        might_sleep_if(gfpflags_allow_blocking(flags)); <--- XXX: Line #393

        if (should_failslab(s, flags))
                return NULL;

        if (memcg_kmem_enabled() &&
            ((flags & __GFP_ACCOUNT) || (s->flags & SLAB_ACCOUNT)))
                return memcg_kmem_get_cache(s);

        return s;
}


Can you have a look at this?

I have attached my linux-config, dmesg-output and lsmod-output.

Do you need more informations?

Thanks.

Regards,
- Sedat -

P.S.: List some linux-config settings

$ egrep 'ASYM|MODULE' /boot/config-4.7.0-6816.1-iniza-small | sort
CONFIG_ASYMMETRIC_KEY_TYPE=y
CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE=y
CONFIG_DEBUG_SET_MODULE_RONX=y
# CONFIG_INTEGRITY_ASYMMETRIC_KEYS is not set
# CONFIG_MODULE_COMPRESS is not set
# CONFIG_MODULE_FORCE_LOAD is not set
# CONFIG_MODULE_FORCE_UNLOAD is not set
CONFIG_MODULE_SIG_ALL=y
# CONFIG_MODULE_SIG_FORCE is not set
CONFIG_MODULE_SIG_HASH="sha512"
CONFIG_MODULE_SIG_KEY="certs/signing_key.pem"
# CONFIG_MODULE_SIG_SHA1 is not set
# CONFIG_MODULE_SIG_SHA224 is not set
# CONFIG_MODULE_SIG_SHA256 is not set
# CONFIG_MODULE_SIG_SHA384 is not set
CONFIG_MODULE_SIG_SHA512=y
CONFIG_MODULE_SIG=y
CONFIG_MODULE_SRCVERSION_ALL=y
CONFIG_MODULES_TREE_LOOKUP=y
CONFIG_MODULES_USE_ELF_RELA=y
CONFIG_MODULES=y
CONFIG_MODULE_UNLOAD=y

- EOT -

View attachment "dmesg_4.7.0-6816.1-iniza-small.txt" of type "text/plain" (81506 bytes)

Download attachment "config-4.7.0-6816.1-iniza-small" of type "application/octet-stream" (137146 bytes)

View attachment "lsmod_4.7.0-6816.1-iniza-small.txt" of type "text/plain" (3071 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ