From: Romain Izard Subject: "BUG: scheduling while atomic" in atmel-aes on Linux v4.14-rc6 Date: Wed, 25 Oct 2017 17:26:31 +0200 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Cc: Nicolas Ferre , linux-arm-kernel To: linux-crypto@vger.kernel.org, Stephan Mueller , Herbert Xu , Cyrille Pitchen , Tudor Ambarus Return-path: Received: from mail-qk0-f182.google.com ([209.85.220.182]:55991 "EHLO mail-qk0-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751445AbdJYP0x (ORCPT ); Wed, 25 Oct 2017 11:26:53 -0400 Received: by mail-qk0-f182.google.com with SMTP id x82so465323qkb.12 for ; Wed, 25 Oct 2017 08:26:52 -0700 (PDT) Sender: linux-crypto-owner@vger.kernel.org List-ID: Hello, While running the kcapi test suite on a SAMA5D2 Xplained board with a v4.14-rc6 kernel, I encountered the following error: # kcapi -x 9 -e -c "cbc(aes)" -i 00000000000000000000000000000000 -k 00000000000 0000000000000000000000000000000000000 -p 1b077a6af4b7f98229de786d7516b639 BUG: scheduling while atomic: kcapi/926/0x00000100 CPU: 0 PID: 926 Comm: kcapi Not tainted 4.14.0-rc6 #2 Hardware name: Atmel SAMA5 [] (unwind_backtrace) from [] (show_stack+0x10/0x14) [] (show_stack) from [] (__schedule_bug+0x60/0x80) [] (__schedule_bug) from [] (__schedule+0x368/0x3fc) [] (__schedule) from [] (schedule+0x40/0xa0) [] (schedule) from [] (__lock_sock+0x78/0xb0) [] (__lock_sock) from [] (lock_sock_nested+0x48/0x50) [] (lock_sock_nested) from [] (af_alg_async_cb+0x20/0x80) [] (af_alg_async_cb) from [] (atmel_aes_transfer_complete+0x38/0x68) [] (atmel_aes_transfer_complete) from [] (tasklet_action+0x68/0xb4) [] (tasklet_action) from [] (__do_softirq+0xc4/0x250) [] (__do_softirq) from [] (irq_exit+0xfc/0x130) [] (irq_exit) from [] (__handle_domain_irq+0x58/0xa8) [] (__handle_domain_irq) from [] (__irq_svc+0x6c/0x90) [] (__irq_svc) from [] (skcipher_recvmsg+0x2d8/0x318) [] (skcipher_recvmsg) from [] (sock_read_iter+0x88/0xc8) [] (sock_read_iter) from [] (aio_read.constprop.3+0xcc/0x178) [] (aio_read.constprop.3) from [] (SyS_io_submit+0x540/0x644) [] (SyS_io_submit) from [] (ret_fast_syscall+0x0/0x48) After bisecting, I determined that it appeared during the 4.14 merge window, with the following commit: e870456d8e7c crypto: algif_skcipher - overhaul memory management Best regards, -- Romain Izard