lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130611172624.GA20496@redhat.com>
Date:	Tue, 11 Jun 2013 13:26:24 -0400
From:	Dave Jones <davej@...hat.com>
To:	Linux Kernel <linux-kernel@...r.kernel.org>
Cc:	jussi.kivilinna@....fi, herbert@...dor.hengli.com.au
Subject: GPF in aesni_xts_crypt8 (3.10-rc5)

Just found that 3.10-rc doesn't boot on my laptop with encrypted disk.


general protection fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
Modules linked in: xfs libcrc32c dm_crypt crc32c_intel ghash_clmulni_intel aesni_intel glue_helper ablk_helper i915 i2c_algo_bit drm_kms_helper drm i2c_core video
CPU: 1 PID: 53 Comm: kworker/1:1 Not tainted 3.10.0-rc5+ #5 
Hardware name: LENOVO 2356JK8/2356JK8, BIOS G7ET94WW (2.54 ) 04/30/2013
Workqueue: kcryptd kcryptd_crypt [dm_crypt]
task: ffff880135c58000 ti: ffff880135c54000 task.ti: ffff880135c54000
RIP: 0010:[<ffffffffa01433a2>]  [<ffffffffa01433a2>] aesni_xts_crypt8+0x42/0x1e0 [aesni_intel]
RSP: 0018:ffff880135c55b68  EFLAGS: 00010282
RAX: ffffffffa0142eb8 RBX: 0000000000000080 RCX: 00000000000000f0
RDX: ffff8801316eeaa8 RSI: ffff8801316eeaa8 RDI: ffff88012fd84440
RBP: ffff880135c55b70 R08: ffff8801304fe118 R09: 0000000000000020
R10: 00000000000000f0 R11: ffffffffa0142eb8 R12: ffff8801316eeb28
R13: 0000000000000080 R14: ffff8801316eeb28 R15: 0000000000000180
FS:  0000000000000000(0000) GS:ffff880139400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000039e88bc720 CR3: 0000000001c0b000 CR4: 00000000001407e0
Stack:
 ffffffffa0143683 ffff880135c55c40 ffffffffa00602fb ffff880135c55c70
 ffffffffa0146060 0000000001ad0190 ffffffffa0146060 ffffea0004c5bb80
 ffff8801316eeaa8 ffffea0004c5bb80 ffff8801316eeaa8 ffff8801304fe0c0
Call Trace:
 [<ffffffffa0143683>] ? aesni_xts_dec8+0x13/0x20 [aesni_intel]
 [<ffffffffa00602fb>] glue_xts_crypt_128bit+0x10b/0x1c0 [glue_helper]
 [<ffffffffa014358b>] xts_decrypt+0x4b/0x50 [aesni_intel]
 [<ffffffffa000617f>] ablk_decrypt+0x4f/0xd0 [ablk_helper]
 [<ffffffffa0067202>] crypt_convert+0x352/0x3b0 [dm_crypt]
 [<ffffffffa00675b5>] kcryptd_crypt+0x355/0x4e0 [dm_crypt]
 [<ffffffff81061b35>] ? process_one_work+0x1a5/0x700
 [<ffffffff81061ba1>] process_one_work+0x211/0x700
 [<ffffffff81061b35>] ? process_one_work+0x1a5/0x700
 [<ffffffff810621ab>] worker_thread+0x11b/0x3a0
 [<ffffffff81062090>] ? process_one_work+0x700/0x700
 [<ffffffff81069f4d>] kthread+0xed/0x100
 [<ffffffff81069e60>] ? insert_kthread_work+0x80/0x80
 [<ffffffff815fd41c>] ret_from_fork+0x7c/0xb0
 [<ffffffff81069e60>] ? insert_kthread_work+0x80/0x80
Code: 8d 04 25 b8 2e 14 a0 41 0f 44 ca 4c 0f 44 d8 66 44 0f 6f 14 25 00 70 14 a0 41 0f 10 18 44 8b 8f e0 01 00 00 48 01 cf 66 0f 6f c3 <66> 0f ef 02 f3 0f 7f 1e 66 44 0f 70 db 13 66 0f d4 db 66 41 0f 
RIP  [<ffffffffa01433a2>] aesni_xts_crypt8+0x42/0x1e0 [aesni_intel]
 RSP <ffff880135c55b68>

   0:	8d 04 25 b8 2e 14 a0 	lea    0xffffffffa0142eb8,%eax
   7:	41 0f 44 ca          	cmove  %r10d,%ecx
   b:	4c 0f 44 d8          	cmove  %rax,%r11
   f:	66 44 0f 6f 14 25 00 	movdqa 0xffffffffa0147000,%xmm10
  16:	70 14 a0 
  19:	41 0f 10 18          	movups (%r8),%xmm3
  1d:	44 8b 8f e0 01 00 00 	mov    0x1e0(%rdi),%r9d
  24:	48 01 cf             	add    %rcx,%rdi
  27:	66 0f 6f c3          	movdqa %xmm3,%xmm0
  2b:*	66 0f ef 02          	pxor   (%rdx),%xmm0     <-- trapping instruction
  2f:	f3 0f 7f 1e          	movdqu %xmm3,(%rsi)
  33:	66 44 0f 70 db 13    	pshufd $0x13,%xmm3,%xmm11
  39:	66 0f d4 db          	paddq  %xmm3,%xmm3
  3d:	66                   	data16
  3e:	41                   	rex.B
  3f:	

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ